Cyber SecureOT 2026
Turning Compliance into Resilience
-
16 June 2026
-
Hotel Kilkenny, Kilkenny, Ireland
Is compliance keeping you busy or actually keeping you secure?
Gain clear guidance and real world insight into using standards and regulations to reduce cyber risk improve visibility and keep your OT environment secure and reliable.
Cyber SecureOT Agenda
Tues
June 16
Plenary
This year we bring together a range of market leading software and hardware partners to share practical approaches to tackling compliance driven cyber security challenges and strengthening the resilience of your OT environment.
9.30 AM
Welcome
Tony Mannion, Industrial Cyber Security Business Development Manager, SolutionsPT
9.45 AM
Keynote: From Red Tape to Real OT Security
Lee Carter, Industrial Cyber Security Product Manager, SolutionsPT
This keynote cuts through regulatory noise to explain what really matters for industrial environments. It shows how to move beyond checkbox compliance and turn standards policies and controls into practical actions that reduce risk improve visibility and support safe reliable operations engineers can adopt with confidence across complex OT estates.
10:15 AM
Using Continuous Monitoring to Prove Compliance and Stop OT Issues Before They Escalate
Elliot Gidley, Field CTO, Claroty
Claroty demonstrates how continuous OT monitoring delivers the visibility and evidence needed to prove compliance and strengthen resilience. This session shows how passive asset discovery anomaly detection and contextual risk insight help teams identify misconfigurations policy drift and emerging threats early turning monitoring data into actionable assurance for auditors and operators alike.
10:45 AM
Applying Security Standards That Industrial Operations Can Live With
Anjay Mandalia, OT Security Leader UKI, TXOne Networks
How do you apply security standards in OT environments without disrupting production? Drawing on an operations first approach and OT native controls this session shows how asset visibility prevention first protection and segmentation support compliance reduce risk and keep industrial operations running safely and reliably across complex regulated sites.
11:35 AM
Managing Third Party Access Without Losing Control of Your OT Environment
Adam Gurney, Solutions Engineer, Cyolo
Cyolo explores how industrial organisations can securely manage third party and supply chain access without expanding risk or disrupting operations. This session shows how identity based zero trust access session oversight and full visibility give teams control of who connects what they access and how work is carried out across critical OT environments.
12:05 PM
Controlled Change Management for PLC‑Centric and other OT Systems
Name, Job Title, OCTOPLANT
This session focuses on controlled change management for PLC programmes while extending across wider OT systems. Octoplant shows how version control, approvals and traceability apply to PLCs, HMIs and SCADA. Learn how governing who changes what and when reduces downtime, supports compliance and keeps environments stable, secure and audit ready.
12:35 PM
Turning Incident Reporting and Threat Hunting into Actionable Security Evidence
Dom Storey, Principal OT Security Architect, Tenable
Tenable shows how incident reporting and threat hunting can move beyond alerts to become defensible security evidence. This session explains how asset visibility risk based vulnerability management and context rich detection help teams prioritise response support investigations and demonstrate measurable improvements in OT security posture and regulatory confidence.
13:05 PM
Lunch and Exhibition
14:35 PM
Technical Lab 1
Choose an expert led tech session. Click HERE for details
15:35 PM
Technical Lab 2
Your choice of workshop style breakout session. Click HERE for details
16:20 PM
Conference conclusion
Meet the Speakers
Lee Carter
Cyber Security Product Manager, SolutionsPT
Anjay Mandalia
OT Security Leader UKI, TXOne Networks
Adam Gurney
Solutions Engineer, Cyolo
Dominic Storey
Principal OT Security Architect, Tenable
Elliot Gidley
Field CTO, Claroty
Tech Labs
Practical demonstration on how to reduce your cyber exposure in converged IT/OT environments with TenableOne for OT
The Tenable team will demonstrate how organisations can build a unified approach to cyber risk and normalise their data so that they can take effective risk reduction decisions across their estate by taking a proactive approach to securing converged IT/OT environments.
From Level 0 to 5: Building an Optimal OT Security Architecture
Securing industrial environments requires more than isolated tools—it demands a layered, site-wide strategy. In this hands-on workshop, TXOne Networks walks you through a practical deployment model spanning Levels 0 to 5. Learn how to integrate endpoint, network, and inspection solutions across your ICS stack using TXOne’s OT-native technologies—from portable inspectors to next-gen firewalls. Discover how to design for resilience, visibility, and control—no matter where you are in your security journey.
Know your risks from Identification to Mitigation
Claroty's xDome solution is the latest innovation from the market leader in OT security that allows you to visually understand the risks to your Cyber Physical Systems and helps you prioritise where to take action and improve your operational resilience.
Learn how to quantify the risks of your OT environment, analyse and simulate where and how to respond to have the quickest impact, then take the next steps through to eventual mitigation and remediation.
How to protect your organisation against known and unknown threats from USB devices
This presentation will show you what you don't expect: USB is not dead ! Threats are increasing, with 50% of new malware designed to spread via removable devices, and concerns about unknown threats are growing stronger with the rise of AI. Come discover how to protect yourself.
Seamless Integration and Unmatched Scalability: Cyolo’s OT-Focused Solution
Discover how Cyolo seamlessly integrates OT systems with modern IT infrastructures. Its hybrid, agentless architecture supports legacy protocols with minimal customisation. Cyolo ensures secure, scalable access without disrupting operations, empowering businesses to grow confidently while maintaining agility, performance, and robust protection across all technology layers.
PLC Version Control and Backup
Octoplant offers an elegant and robust way to protect critical applications that are running on your PLCs and SCADA systems.
Version control becomes effortless with Octoplant, with a host of tools and features to track every change made by everybody, every time.
Octoplant ensures your applications are protected and available quickly. Should an incident occur, you can recover that application quickly, which will reduce costly downtime and helps to protect the bottom line.
See Octoplant in action and how it can benefit your organisation.
Data Communication between OT and IT systems. Which topologies are most secure?
Organisations need to pass data between their IT/OT environments. Across an estate of sites, you will find a variety of machines/devices on the OT network and a variety of software environments on the IT network.
In this presentation we will explore how to create a universal OT/IT stack, with security designed into its structure.
IT level security in an OT environment
2026 Venue details
Hotel Kilkenny, Ireland
College Road, Kilkenny, Ireland T45 HX62
Free parking is available.
Our partners
Previous Event Highlights