SlideShare a Scribd company logo
1 of 23
Download to read offline
IISF Chapter Meeting
                         p          g




             What s
             What’s Hot In Infosec
                      For
                     2010

28/01/2010       Copyright © BH IT Consulting Ltd   www.bhconsulting.ie   1
2010 – So Far
                               0 0       a




28/01/2010   Copyright © 2008 BH IT Consulting Ltd   www.bhconsulting.ie   2
Reported Issues
                          epo ted ssues




28/01/2010   Copyright © 2008 BH IT Consulting Ltd   www.bhconsulting.ie   3
Infosec Certainties
                        osec Ce ta t es




28/01/2010   Copyright © 2008 BH IT Consulting Ltd   www.bhconsulting.ie   4
Why Improve Incident Response?
               y p                   p




28/01/2010       Copyright © BH IT Consulting Ltd   www.bhconsulting.ie   5
Establish Team
                                        stab s ea




 Information                        Human                                            Public      Facilities
               Operations                                      Legal
   Security                        Resources                                        Relations   Management




28/01/2010                  Copyright © BH IT Consulting Ltd           www.bhconsulting.ie                6
Infosec C a e ges
                       osec Challenges




28/01/2010   Copyright © 2008 BH IT Consulting Ltd   www.bhconsulting.ie   7
Economic Factors
                       co o c acto s




28/01/2010   Copyright © 2008 BH IT Consulting Ltd   www.bhconsulting.ie   8
Budget Cuts
                                 udget




28/01/2010   Copyright © 2008 BH IT Consulting Ltd   www.bhconsulting.ie   9
Increased Co p a ce
                c eased Compliance




28/01/2010   Copyright © 2008 BH IT Consulting Ltd   www.bhconsulting.ie   10
Typical IT Secu ty
                    yp ca     Security




28/01/2010   Copyright © BH IT Consulting Ltd   www.bhconsulting.ie   11
Co t o s
             Controls Will be Bypassed
                               ypassed




28/01/2010     Copyright © BH IT Consulting Ltd   www.bhconsulting.ie   12
Dealing With The Future
              ea g t        e utu e




28/01/2010   Copyright © 2008 BH IT Consulting Ltd   www.bhconsulting.ie   13
ISO 27001 Can Help
                                         p



             Recognisable Standard
                 g



                        Independent



                                  Global


28/01/2010     Copyright © 2008 BH IT Consulting Ltd   www.bhconsulting.ie   14
What is ISO 27001?


 An INFORMATION Security Standard
      Physical and Electronic




 It is NOT a Computer Security
  Standard
  St d d


 28/01/2010        Copyright © 2008 BH IT Consulting Ltd   www.bhconsulting.ie   15
Risk Management Process

                  4    Measuring Program
                                                              1    Assessing Risk
                         Effectiveness




             3   Implementing
                   Controls

                                                              2     Conducting
                                                                  Decision Support



28/01/2010            Copyright © 2008 BH IT Consulting Ltd        www.bhconsulting.ie   16
What ISO 27001 is Not
  Limited to information technology

  A security checklist

  An insurance policy against security breaches

  An audit method

  A risk analysis method
              y

28/01/2010     Copyright © 2008 BH IT Consulting Ltd   www.bhconsulting.ie   17
C oud Security
             Cloud Secu ty Alliance
                               a ce




28/01/2010   Copyright © 2008 BH IT Consulting Ltd   www.bhconsulting.ie   18
C oud Security
             Cloud Secu ty Alliance
                               a ce




28/01/2010   Copyright © 2008 BH IT Consulting Ltd   www.bhconsulting.ie   19
C oud Security
             Cloud Secu ty Alliance
                               a ce




28/01/2010   Copyright © 2008 BH IT Consulting Ltd   www.bhconsulting.ie   20
C oud Security
             Cloud Secu ty Alliance
                               a ce




28/01/2010   Copyright © 2008 BH IT Consulting Ltd   www.bhconsulting.ie   21
Cloud Security Alliance
 Promote common level of understanding
 Promote independent research.
               p
 Launch awareness campaigns.
 Create consensus lists of issues
 Guidance for cloud security assurance

             www.cloudsecurityalliance.org

28/01/2010        Copyright © 2008 BH IT Consulting Ltd   www.bhconsulting.ie   22
Quest o s
                                 Questions ?




                Brian.honan@bhconsulting.ie
                    www.bhconsulting.ie
                www.twitter.com/brianhonan
              www.bhconsulting.ie/securitywatch
                  Tel : +353 – 1 - 4404065


28/01/2010   Copyright © 2008 BH IT Consulting Ltd   www.bhconsulting.ie   23

More Related Content

Viewers also liked

Askartelukerho kevät 2011
Askartelukerho kevät 2011Askartelukerho kevät 2011
Askartelukerho kevät 2011
Tiina Sarisalmi
 
Googlen työkaluja oppimisen tueksi
Googlen työkaluja oppimisen tueksiGooglen työkaluja oppimisen tueksi
Googlen työkaluja oppimisen tueksi
Tiina Sarisalmi
 
Hazcrowd for Crowdsourcing
Hazcrowd for CrowdsourcingHazcrowd for Crowdsourcing
Hazcrowd for Crowdsourcing
Tristan Cooke
 
How to add a canvas to your image
How to add a canvas to your imageHow to add a canvas to your image
How to add a canvas to your image
Sirron Carrector
 
Video Game Console
Video Game ConsoleVideo Game Console
Video Game Console
judah43
 
SRI Brochure -- Boardwalk Capital
SRI Brochure -- Boardwalk CapitalSRI Brochure -- Boardwalk Capital
SRI Brochure -- Boardwalk Capital
Scott Sadler
 

Viewers also liked (20)

Sosiale medier
Sosiale medierSosiale medier
Sosiale medier
 
Askartelukerho kevät 2011
Askartelukerho kevät 2011Askartelukerho kevät 2011
Askartelukerho kevät 2011
 
Johdatus kansainvälisyyskoulutukseen
Johdatus kansainvälisyyskoulutukseenJohdatus kansainvälisyyskoulutukseen
Johdatus kansainvälisyyskoulutukseen
 
Googlen työkaluja oppimisen tueksi
Googlen työkaluja oppimisen tueksiGooglen työkaluja oppimisen tueksi
Googlen työkaluja oppimisen tueksi
 
Hazcrowd for Crowdsourcing
Hazcrowd for CrowdsourcingHazcrowd for Crowdsourcing
Hazcrowd for Crowdsourcing
 
Twelve Gods of Olympus
Twelve Gods of OlympusTwelve Gods of Olympus
Twelve Gods of Olympus
 
Rok 09
Rok 09Rok 09
Rok 09
 
Boardwalk Capital overview
Boardwalk Capital overviewBoardwalk Capital overview
Boardwalk Capital overview
 
Welcome to Dywity
Welcome to DywityWelcome to Dywity
Welcome to Dywity
 
KMUTNB - Internet Programming 7/7
KMUTNB - Internet Programming 7/7KMUTNB - Internet Programming 7/7
KMUTNB - Internet Programming 7/7
 
How to add a canvas to your image
How to add a canvas to your imageHow to add a canvas to your image
How to add a canvas to your image
 
Denver Green Car Presentation
Denver Green Car PresentationDenver Green Car Presentation
Denver Green Car Presentation
 
Ic Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp BhIc Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp Bh
 
MVT Asia Presentation
MVT Asia PresentationMVT Asia Presentation
MVT Asia Presentation
 
Video Game Console
Video Game ConsoleVideo Game Console
Video Game Console
 
Springtime in Orivesi
Springtime in OrivesiSpringtime in Orivesi
Springtime in Orivesi
 
SRI Brochure -- Boardwalk Capital
SRI Brochure -- Boardwalk CapitalSRI Brochure -- Boardwalk Capital
SRI Brochure -- Boardwalk Capital
 
Luovuuden vuoristorata
Luovuuden vuoristorataLuovuuden vuoristorata
Luovuuden vuoristorata
 
Finnish baseball
Finnish baseballFinnish baseball
Finnish baseball
 
Formative Capitalism
Formative CapitalismFormative Capitalism
Formative Capitalism
 

Similar to Hot Topics For 2010

Social Media Can Not Be Ignored
Social Media Can Not Be IgnoredSocial Media Can Not Be Ignored
Social Media Can Not Be Ignored
richard_turner
 
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...
IBM India Smarter Computing
 

Similar to Hot Topics For 2010 (20)

Promoting e-competence
Promoting e-competencePromoting e-competence
Promoting e-competence
 
TEID March 2012
TEID March 2012TEID March 2012
TEID March 2012
 
Starter coaching contest 2011 - greening our world through ICT
Starter coaching  contest 2011 - greening our world through ICTStarter coaching  contest 2011 - greening our world through ICT
Starter coaching contest 2011 - greening our world through ICT
 
Souter Consulting Limited Promo V0.3 For Slideshare (Old Ppt)
Souter Consulting Limited Promo V0.3 For Slideshare (Old Ppt)Souter Consulting Limited Promo V0.3 For Slideshare (Old Ppt)
Souter Consulting Limited Promo V0.3 For Slideshare (Old Ppt)
 
TEID March 2012
TEID March 2012TEID March 2012
TEID March 2012
 
TEID March 2012
TEID March 2012TEID March 2012
TEID March 2012
 
Atos Powering progress
Atos Powering progressAtos Powering progress
Atos Powering progress
 
Swedish IT Outsourcing Intelligence Report 2010
Swedish IT Outsourcing Intelligence Report 2010Swedish IT Outsourcing Intelligence Report 2010
Swedish IT Outsourcing Intelligence Report 2010
 
Social Media Can Not Be Ignored
Social Media Can Not Be IgnoredSocial Media Can Not Be Ignored
Social Media Can Not Be Ignored
 
Lessons in Project Management - 4 - Risk Management
Lessons in Project Management - 4 - Risk ManagementLessons in Project Management - 4 - Risk Management
Lessons in Project Management - 4 - Risk Management
 
Meta forum 2012 - Presentation on big data
Meta forum 2012 - Presentation on big dataMeta forum 2012 - Presentation on big data
Meta forum 2012 - Presentation on big data
 
Big Data Public-Private Forum_Meta Forum 2012
Big Data Public-Private Forum_Meta Forum 2012Big Data Public-Private Forum_Meta Forum 2012
Big Data Public-Private Forum_Meta Forum 2012
 
CIO Pulse Sept 2008
CIO Pulse Sept 2008CIO Pulse Sept 2008
CIO Pulse Sept 2008
 
UNIT Corp. - Company Profile - EN
UNIT Corp. - Company Profile - ENUNIT Corp. - Company Profile - EN
UNIT Corp. - Company Profile - EN
 
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...
Enterprise Strategy Group, IBM's System Storage DR550: Enabling Compliance in...
 
Independent Contractor Compliance: What You Need To Know
Independent Contractor Compliance: What You Need To KnowIndependent Contractor Compliance: What You Need To Know
Independent Contractor Compliance: What You Need To Know
 
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
 
How to build awareness for your government organization
How to build awareness for your government organizationHow to build awareness for your government organization
How to build awareness for your government organization
 
Open data in japan
Open data in japanOpen data in japan
Open data in japan
 
Getting IT projects to succeed
Getting IT projects to succeedGetting IT projects to succeed
Getting IT projects to succeed
 

More from Brian Honan

More from Brian Honan (20)

Brian honan ipexpo keynote
Brian honan ipexpo keynoteBrian honan ipexpo keynote
Brian honan ipexpo keynote
 
GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
 
Brian honan
Brian honanBrian honan
Brian honan
 
The dark side of the internet
The dark side of the internetThe dark side of the internet
The dark side of the internet
 
Data security brian honan
Data security   brian honanData security   brian honan
Data security brian honan
 
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...
 
Incident Response in the Cloud
Incident Response in the CloudIncident Response in the Cloud
Incident Response in the Cloud
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Bridging the air gap
Bridging the air gapBridging the air gap
Bridging the air gap
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
Learning from History
Learning from HistoryLearning from History
Learning from History
 
Incident response cloud
Incident response cloudIncident response cloud
Incident response cloud
 
Preparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident ResponsePreparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident Response
 
Best practises for log management
Best practises for log managementBest practises for log management
Best practises for log management
 
Cloud security
Cloud securityCloud security
Cloud security
 
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & ScreenLayer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
 
Creating a CERT at WARP Speed
Creating a CERT at WARP SpeedCreating a CERT at WARP Speed
Creating a CERT at WARP Speed
 
The Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsThe Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure Laws
 
Knowing Me Knowing You
Knowing Me Knowing YouKnowing Me Knowing You
Knowing Me Knowing You
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Hot Topics For 2010

  • 1. IISF Chapter Meeting p g What s What’s Hot In Infosec For 2010 28/01/2010 Copyright © BH IT Consulting Ltd www.bhconsulting.ie 1
  • 2. 2010 – So Far 0 0 a 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 2
  • 3. Reported Issues epo ted ssues 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 3
  • 4. Infosec Certainties osec Ce ta t es 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 4
  • 5. Why Improve Incident Response? y p p 28/01/2010 Copyright © BH IT Consulting Ltd www.bhconsulting.ie 5
  • 6. Establish Team stab s ea Information Human Public Facilities Operations Legal Security Resources Relations Management 28/01/2010 Copyright © BH IT Consulting Ltd www.bhconsulting.ie 6
  • 7. Infosec C a e ges osec Challenges 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 7
  • 8. Economic Factors co o c acto s 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 8
  • 9. Budget Cuts udget 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 9
  • 10. Increased Co p a ce c eased Compliance 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 10
  • 11. Typical IT Secu ty yp ca Security 28/01/2010 Copyright © BH IT Consulting Ltd www.bhconsulting.ie 11
  • 12. Co t o s Controls Will be Bypassed ypassed 28/01/2010 Copyright © BH IT Consulting Ltd www.bhconsulting.ie 12
  • 13. Dealing With The Future ea g t e utu e 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 13
  • 14. ISO 27001 Can Help p Recognisable Standard g Independent Global 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 14
  • 15. What is ISO 27001?  An INFORMATION Security Standard  Physical and Electronic  It is NOT a Computer Security Standard St d d 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 15
  • 16. Risk Management Process 4 Measuring Program 1 Assessing Risk Effectiveness 3 Implementing Controls 2 Conducting Decision Support 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 16
  • 17. What ISO 27001 is Not  Limited to information technology  A security checklist  An insurance policy against security breaches  An audit method  A risk analysis method y 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 17
  • 18. C oud Security Cloud Secu ty Alliance a ce 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 18
  • 19. C oud Security Cloud Secu ty Alliance a ce 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 19
  • 20. C oud Security Cloud Secu ty Alliance a ce 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 20
  • 21. C oud Security Cloud Secu ty Alliance a ce 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 21
  • 22. Cloud Security Alliance Promote common level of understanding Promote independent research. p Launch awareness campaigns. Create consensus lists of issues Guidance for cloud security assurance www.cloudsecurityalliance.org 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 22
  • 23. Quest o s Questions ? Brian.honan@bhconsulting.ie www.bhconsulting.ie www.twitter.com/brianhonan www.bhconsulting.ie/securitywatch Tel : +353 – 1 - 4404065 28/01/2010 Copyright © 2008 BH IT Consulting Ltd www.bhconsulting.ie 23