Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

5/31/2019
09:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cyber Ireland announced by IDA Ireland and Cork Institute of Technology

National cyber security cluster initiative is recruiting industry and higher education institutes.

Facilitated by Cork Institute of Technology (CIT), the national cybersecurity cluster will be called Cyber Ireland and is supported by IDA Ireland.  It will provide a collective voice to represent the needs of the cyber security sector across the country and will address key challenges including: skills needs, research and the development of a national community which connects industry, academia and government.
 
CIT, which has best practice cluster development expertise and a strong core of in-depth cyber security expertise among its faculty, will drive the development of the national cluster. 
 
Welcoming the initiative Minister Richard Bruton, Department of Communications, Climate Action and the Environment whose department holds responsibility for Ireland’s national cyber security strategy said, “Today’s announcement of a National Cyber Security Cluster is a really exciting opportunity. Supported by Cork IT and backed by government funding, this initiative will greatly advance the sector in Ireland, by facilitating greater collaboration between the companies involved. There are already more than 6,000 people employed in Cyber Security here, but there is considerable potential for further growth, particularly with the potential of areas like cloud computing.
 
“Cyber Ireland will also provide a collective voice for the sector and will provide an avenue for challenges facing the sector to be addressed. Overall the establishment of the cluster will result in a better cyber security response for the State and better outcomes for the companies involved.”
 
Dr Eoin Byrne, Senior Researcher in CIT who will lead and manage development of the cluster said, “For Cyber Ireland to be successful, it needs to be industry-driven, supported by third level education and Government. Without the co-operation of these three pillars, the cluster cannot reach its full potential. Industry must be at the core of the cluster, which needs to be championed by passionate and dedicated leaders. Academia is also critical in addressing the skills and training needs of industry. We look forward to engaging with industry and academia across Ireland in the coming months to develop a programme that is in line with international best practice in cluster development based on key learnings from successful cluster initiatives elsewhere in Europe.”
 
Martin Shanahan, CEO IDA Ireland said, “Ireland has become a significant base of international technology and cyber security companies thanks to a growing, well-educated and flexible workforce with a rapidly increasing graduate output.  The cyber security industry in Ireland is growing at an unprecedented rate and we believe Ireland is uniquely placed to benefit from increased global investment to position itself as a world class cyber security cluster.”
 
Cyber Ireland is also supported by a number of leading cyber security and technology firms in Ireland, who called for the establishment of a cluster to represent industry needs and address key challenges, including Johnson Controls International, Dell EMC, IBM, McAfee, McKesson and Trend Micro.
 
Johnson Controls International is a global diversified technology and multi-industrial leader, serving a wide range of customers in more than 150 countries, Donal Sullivan, VP & General Manager, sees the importance of Cyber Ireland and the benefits of the cluster for industry, “We are seeing a profound transformation in our digital lives and environment. The security of connected objects and cyber-physical systems, advances brought about by artificial intelligence or data-centric security are three examples of major challenges and opportunities. To ensure the continued growth, sustainability and international competitiveness of cyber security firms in Ireland, there is a need to support industry and address certain challenges. Cyber Ireland provides a unique opportunity to co-ordinate the many organizations involved in cyber security in Ireland and position the country as a global leader.”
 
Minister Heather Humphreys TD, Department for Business, Enterprise, and Innovation said “The announcement of Cyber Ireland and the development of a national cyber security cluster is a significant step forward for the industry in Ireland. This exciting new initiative brings together key stakeholders from both industry and academia and will provide a clear platform for the industry to address key challenges. The cluster will help to build on our existing strengths in the technology sector and enable Ireland to become a global leader in cybersecurity research, development and training.
 
I am certain that this innovative collaboration will only serve to keep Ireland right at the forefront of this fast-growing and strategically important sector.”
 
From the 18th to 20th of February 2019, CIT there will be a series of cluster initiation workshops organised in Cork, Dublin and Galway, which will provide industry and higher education institutes with an opportunity to learn about Cyber Ireland and its benefits and value to cluster members. The objective of these workshops is to develop a robust collaborative mandate that will strengthen Ireland’s cyber security ecosystem. For further information on Ireland’s Cyber Security Cluster initiative and how to get involved, see www.cyberireland.ie  www.linkedin.com or contact [email protected]

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
How Attackers Infiltrate the Supply Chain & What to Do About It
Shay Nahari, Head of Red-Team Services at CyberArk,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10101
PUBLISHED: 2019-07-18
OECMS v4.3.R60321 and v4.3 later is affected by: Cross Site Request Forgery (CSRF). The impact is: The victim clicks on adding an administrator account. The component is: admincp.php. The attack vector is: network connectivity. The fixed version is: v4.3.
CVE-2019-10102
PUBLISHED: 2019-07-18
MailCleaner before c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9 is affected by: Unauthenticated MySQL database password information disclosure. The impact is: MySQL database content disclosure (e.g. username, password). The component is: The API call in the function allowAction() in NewslettersControlle...
CVE-2019-10102
PUBLISHED: 2019-07-18
Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The component is: detect.c (https://github.com/OISF/suric...
CVE-2019-13959
PUBLISHED: 2019-07-18
In Bento4 1.5.1-627, AP4_DataBuffer::SetDataSize does not handle reallocation failures, leading to a memory copy into a NULL pointer. This is different from CVE-2018-20186.
CVE-2019-13960
PUBLISHED: 2019-07-18
** DISPUTED ** In libjpeg-turbo 2.0.2, a large amount of memory can be used during processing of an invalid progressive JPEG image containing incorrect width and height values in the image header. NOTE: the vendor's expectation, for use cases in which this memory usage would be a denial of service, ...