All Events and Webinars

Seasonal Cybersecurity Risks for Technology Webinar

Technology and Software
Data Security and Privacy
Leadership and Resilience
AI and Emerging Technology
Supply Chain and Third Party Risks
November 19, 2025
Tech companies love to think they’re ahead of the curve, which is exactly why attackers enjoy proving them wrong. This session breaks down how AI is supercharging threats, why ransomware and supply-chain risk hit startups as hard as enterprises, and how compliance is now tied directly to revenue. It’s a practical look at what actually matters if you want to scale without becoming an easy target.

In-House Specialists

Gavan Egan

Chief Revenue Officer

Ed Burke

Enterprise Cyber Security Specialist

External Speakers

No external speakers for this session.

Key Strategic Takeaways

Has Cybersecurity Become a Growth Constraint and Not Just a Risk?

Cybersecurity is no longer a backend concern, it directly impacts revenue, customer trust, and the ability to close enterprise deals. With AI accelerating both attack scale and complexity, and investors scrutinising security maturity, weak controls now signal operational risk. Embedding security early reduces long-term cost, prevents disruption, and removes friction from sales, partnerships, and fundraising.

Why Are Smaller Tech Companies a Primary Target?

SMEs are disproportionately targeted because they combine valuable data with lower security maturity, making them efficient and profitable targets for attackers. Ransomware actors, in particular, adapt demands to match a company’s size, ensuring a higher likelihood of payment. For growing tech firms, aligning security maturity with business scale is critical to avoid becoming predictable “low-effort” targets.

Is Supply Chain Risk Redefining Vendor Expectations in Tech?

A significant proportion of breaches now originate through third parties, meaning even well-secured companies can be exposed via their suppliers. As a result, security is no longer evaluated post-sale, it is a core requirement during procurement and due diligence.Technology vendors must proactively demonstrate security maturity or risk losing deals, damaging reputation, and exposing customer data indirectly.

Is Compliance Now a Commercial Requirement for Tech Companies?

Frameworks like NIS2, DORA, ISO 27001, and SOC 2 are no longer optional checkboxes, they are increasingly embedded in sales cycles and customer expectations. Late-stage compliance gaps can delay or completely derail deals, especially with enterprise buyers.Aligning with recognised standards early ensures smoother sales cycles, faster procurement, and stronger positioning in competitive markets.

Is the Overlooked Risk Insider Threat and Identity Control in Tech?

Rapid growth often leads to excessive access, weak processes, and increased insider risk, whether through error or malicious intent. Without strong identity controls and monitoring, sensitive data and code can be exposed internally before any external attack occurs.Implementing MFA, least privilege, and continuous monitoring from day one provides high-impact protection and establishes a scalable security foundation.

Has Cybersecurity Become a Growth Constraint and Not Just a Risk?
Why Are Smaller Tech Companies a Primary Target?
Is Supply Chain Risk Redefining Vendor Expectations in Tech?
Is Compliance Now a Commercial Requirement for Tech Companies?
Is the Overlooked Risk Insider Threat and Identity Control in Tech?
  • 00:00 Introduction to cybersecurity in the technology sector
  • 01:32 Why cyber risk is accelerating across tech companies
  • 02:10 Why security must be embedded from day one in startups
  • 03:40 AI-driven threats and why smaller companies are being targeted
  • 06:45 Regulation, compliance, and supply chain pressure on tech firms
  • 08:00 How security requirements can delay or kill enterprise deals
  • 10:27 Real-world supply chain breaches and third-party risk exposure
  • 12:05 Insider threats, human error, and scaling risks in tech teams
  • 14:48 Key regulations like NIS2 and DORA shaping the sector
  • 16:53 Investor pressure and why security maturity impacts growth
  • 19:23 Top cybersecurity priorities for scaling tech companies
  • 20:49 Final takeaways on identity, monitoring, and control effectiveness
Watch More
Security Operations

Seasonal Cybersecurity Risks for Transport Webinar

Smarttech247 leaders discuss transportation cybersecurity, focusing on OT security, digital twins, evolving threats, third-party risk, and resilience.

HSE Ransomware Attack and the Future of Cybersecurity in Ireland

Cybersecurity leaders discuss HSE ransomware attack and a path forward for Ireland, focusing on resilience, regulation, maturity models, and public awareness

Ransomware Cyber Attack Simulation Webinar

Attack simulation showing a multi-stage ransomware campaign and how Cybereason detects, correlates, and responds to fileless and living-off-the-land techniques.

Ready to scale your security and compliance operations?

We protect your on-premise/cloud/OT environments - 24x7x365