Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

5/31/2019
09:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cyber Ireland announced by IDA Ireland and Cork Institute of Technology

National cyber security cluster initiative is recruiting industry and higher education institutes.

Facilitated by Cork Institute of Technology (CIT), the national cybersecurity cluster will be called Cyber Ireland and is supported by IDA Ireland.  It will provide a collective voice to represent the needs of the cyber security sector across the country and will address key challenges including: skills needs, research and the development of a national community which connects industry, academia and government.
 
CIT, which has best practice cluster development expertise and a strong core of in-depth cyber security expertise among its faculty, will drive the development of the national cluster. 
 
Welcoming the initiative Minister Richard Bruton, Department of Communications, Climate Action and the Environment whose department holds responsibility for Ireland’s national cyber security strategy said, “Today’s announcement of a National Cyber Security Cluster is a really exciting opportunity. Supported by Cork IT and backed by government funding, this initiative will greatly advance the sector in Ireland, by facilitating greater collaboration between the companies involved. There are already more than 6,000 people employed in Cyber Security here, but there is considerable potential for further growth, particularly with the potential of areas like cloud computing.
 
“Cyber Ireland will also provide a collective voice for the sector and will provide an avenue for challenges facing the sector to be addressed. Overall the establishment of the cluster will result in a better cyber security response for the State and better outcomes for the companies involved.”
 
Dr Eoin Byrne, Senior Researcher in CIT who will lead and manage development of the cluster said, “For Cyber Ireland to be successful, it needs to be industry-driven, supported by third level education and Government. Without the co-operation of these three pillars, the cluster cannot reach its full potential. Industry must be at the core of the cluster, which needs to be championed by passionate and dedicated leaders. Academia is also critical in addressing the skills and training needs of industry. We look forward to engaging with industry and academia across Ireland in the coming months to develop a programme that is in line with international best practice in cluster development based on key learnings from successful cluster initiatives elsewhere in Europe.”
 
Martin Shanahan, CEO IDA Ireland said, “Ireland has become a significant base of international technology and cyber security companies thanks to a growing, well-educated and flexible workforce with a rapidly increasing graduate output.  The cyber security industry in Ireland is growing at an unprecedented rate and we believe Ireland is uniquely placed to benefit from increased global investment to position itself as a world class cyber security cluster.”
 
Cyber Ireland is also supported by a number of leading cyber security and technology firms in Ireland, who called for the establishment of a cluster to represent industry needs and address key challenges, including Johnson Controls International, Dell EMC, IBM, McAfee, McKesson and Trend Micro.
 
Johnson Controls International is a global diversified technology and multi-industrial leader, serving a wide range of customers in more than 150 countries, Donal Sullivan, VP & General Manager, sees the importance of Cyber Ireland and the benefits of the cluster for industry, “We are seeing a profound transformation in our digital lives and environment. The security of connected objects and cyber-physical systems, advances brought about by artificial intelligence or data-centric security are three examples of major challenges and opportunities. To ensure the continued growth, sustainability and international competitiveness of cyber security firms in Ireland, there is a need to support industry and address certain challenges. Cyber Ireland provides a unique opportunity to co-ordinate the many organizations involved in cyber security in Ireland and position the country as a global leader.”
 
Minister Heather Humphreys TD, Department for Business, Enterprise, and Innovation said “The announcement of Cyber Ireland and the development of a national cyber security cluster is a significant step forward for the industry in Ireland. This exciting new initiative brings together key stakeholders from both industry and academia and will provide a clear platform for the industry to address key challenges. The cluster will help to build on our existing strengths in the technology sector and enable Ireland to become a global leader in cybersecurity research, development and training.
 
I am certain that this innovative collaboration will only serve to keep Ireland right at the forefront of this fast-growing and strategically important sector.”
 
From the 18th to 20th of February 2019, CIT there will be a series of cluster initiation workshops organised in Cork, Dublin and Galway, which will provide industry and higher education institutes with an opportunity to learn about Cyber Ireland and its benefits and value to cluster members. The objective of these workshops is to develop a robust collaborative mandate that will strengthen Ireland’s cyber security ecosystem. For further information on Ireland’s Cyber Security Cluster initiative and how to get involved, see www.cyberireland.ie  www.linkedin.com or contact [email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Virginia a Hot Spot For Cybersecurity Jobs
Jai Vijayan, Contributing Writer,  10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17612
PUBLISHED: 2019-10-15
An issue was discovered in 74CMS v5.2.8. There is a SQL Injection generated by the _list method in the Common/Controller/BackendController.class.php file via the index.php?m=Admin&c=Ad&a=category sort parameter.
CVE-2019-17613
PUBLISHED: 2019-10-15
qibosoft 7 allows remote code execution because do/jf.php makes eval calls. The attacker can use the Point Introduction Management feature to supply PHP code to be evaluated. Alternatively, the attacker can access admin/index.php?lfj=jfadmin&action=addjf via CSRF, as demonstrated by a payload in...
CVE-2019-17395
PUBLISHED: 2019-10-15
In the Rapid Gator application 0.7.1 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.
CVE-2019-17602
PUBLISHED: 2019-10-15
An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated.
CVE-2019-17394
PUBLISHED: 2019-10-15
In the Seesaw Parent and Family application 6.2.5 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.