Cyber SecureOT 2026
Turning Compliance into Resilience
-
16 June 2026
-
Hotel Kilkenny, Kilkenny, Ireland
Is compliance keeping you busy or actually keeping you secure?
Gain clear guidance and real world insight into using standards and regulations to reduce cyber risk improve visibility and keep your OT environment secure and reliable.
Cyber SecureOT Agenda
Tues
June 16
Plenary
This year we bring together a range of market leading software and hardware partners to share practical approaches to tackling compliance driven cyber security challenges and strengthening the resilience of your OT environment.
9:30 AM
Welcome
Tony Mannion, Industrial Cyber Security Business Development Manager, SolutionsPT
9:45 AM
Keynote: From Red Tape to Real OT Security
Lee Carter, Industrial Cyber Security Product Manager, SolutionsPT
This keynote cuts through regulatory noise to explain what really matters for industrial environments. It shows how to move beyond checkbox compliance and turn standards policies and controls into practical actions that reduce risk improve visibility and support safe reliable operations engineers can adopt with confidence across complex OT estates.
10:15 AM
OT Under Pressure: Reduce CPS Risk, Protect Uptime, Ensure Compliance
Elliot Gidley, Field CTO, Claroty
Compliance is no longer just a checkbox, turn regulatory mandates into OT resilience. Explore the evolving OT threat landscape, key CPS trends for 2026, and why managing third-party access is critical for supply chain and operational security. Gain a practical roadmap to reduce CPS risk, protect uptime, lower costs, and strengthen cyber resilience.
10:35 AM
Applying Security Standards That Industrial Operations Can Live With
Anjay Mandalia, OT Security Leader UKI, TXOne Networks
How do you apply security standards in OT environments without disrupting production? Drawing on an operations first approach and OT native controls this session shows how asset visibility prevention first protection and segmentation support compliance reduce risk and keep industrial operations running safely and reliably across complex regulated sites.
10:55 AM
Q&A Panel
11:15 AM
Break
11:35 AM
Managing Third Party Access Without Losing Control of Your OT Environment
Adam Gurney, Solutions Engineer, Cyolo
Cyolo explores how industrial organisations can securely manage third party and supply chain access without expanding risk or disrupting operations. This session shows how identity based zero trust access session oversight and full visibility give teams control of who can connect, what they can access and how work is carried out across critical OT environments.
11:55 AM
Controlled Change Management for PLC‑Centric and other OT Systems
Vitaly Lifanov, Channel Partner Manager EMEA, Octoplant
This session focuses on controlled change management for PLC programmes while extending across wider OT systems. Octoplant shows how version control, approvals and traceability apply to PLCs, HMIs and SCADA. Learn how governing who changes what and when reduces downtime, supports compliance and keeps environments stable, secure and audit ready.
12:15 PM
Turning Incident Reporting and Threat Hunting into Actionable Security Evidence
Dom Storey, Principal OT Security Architect, Tenable
Tenable shows how incident reporting and threat hunting can move beyond alerts to become defensible security evidence. This session explains how asset visibility risk based vulnerability management and context rich detection help teams prioritise response support investigations and demonstrate measurable improvements in OT security posture and regulatory confidence.
12.35 PM
Q&A Panel
12:55 PM
Lunch and Exhibition
14:15 PM
Technical Lab 1
Choose an expert led tech session. Click HERE for details
14:45 PM
Technical Lab 2
Your choice of workshop style breakout session. Click HERE for details
15:15 PM
Technical Lab 3
15:45 PM
Close
Meet the Speakers
Lee Carter
Cyber Security Product Manager, SolutionsPT
Anjay Mandalia
OT Security Leader UKI, TXOne Networks
Adam Gurney
Solutions Engineer, Cyolo
Dominic Storey
Principal OT Security Architect, Tenable
Elliot Gidley
Field CTO, Claroty
Vitaly Lifanov
Tech Labs
Practical demonstration on how to reduce your cyber exposure in converged IT/OT environments with TenableOne for OT
The Tenable team will demonstrate how organisations can build a unified approach to cyber risk and normalise their data so that they can take effective risk reduction decisions across their estate by taking a proactive approach to securing converged IT/OT environments.
From Level 0 to 5: Building an Optimal OT Security Architecture
Securing industrial environments requires more than isolated tools—it demands a layered, site-wide strategy. In this hands-on workshop, TXOne Networks walks you through a practical deployment model spanning Levels 0 to 5. Learn how to integrate endpoint, network, and inspection solutions across your ICS stack using TXOne’s OT-native technologies—from portable inspectors to next-gen firewalls. Discover how to design for resilience, visibility, and control—no matter where you are in your security journey.
From Visibility to Action: What It Really Takes to Operationalise CPS Security
This workshop focuses on turning cyber-physical systems (CPS) insights into action, demonstrating what an operationalised CPS Protection Program looks like in practice. It highlights how organisations are maturing beyond ad-hoc approaches and outlines steps to move from reactive security efforts to a repeatable, programmatic model that reduces risk, ensures compliance, and protects operational integrity.
How to protect your organisation against known and unknown threats from USB devices
This presentation will show you what you don't expect: USB is not dead ! Threats are increasing, with 50% of new malware designed to spread via removable devices, and concerns about unknown threats are growing stronger with the rise of AI. Come discover how to protect yourself.
From Policy to Practice: Implementing Secure Third-Party Access in OT Environments
Building on the Cyolo plenary session, this technical workshop takes a deeper dive into how organisations can operationalise secure third-party and supply chain access in real-world OT environments. Attendees will explore practical architectures, deployment patterns, and enforcement strategies that align with zero trust principles without introducing operational friction.
The session will walk through how identity-centric access controls, session governance, and granular visibility can be applied to enforce least privilege, monitor activity, and respond to risk in real time. Through practical examples, we will demonstrate how to move from compliance-driven requirements to resilient, scalable access models that support both security and operational continuity.
PLC Version Control and Backup
Octoplant offers an elegant and robust way to protect critical applications that are running on your PLCs and SCADA systems.
Version control becomes effortless with Octoplant, with a host of tools and features to track every change made by everybody, every time.
Octoplant ensures your applications are protected and available quickly. Should an incident occur, you can recover that application quickly, which will reduce costly downtime and helps to protect the bottom line.
See Octoplant in action and how it can benefit your organisation.
Data Communication between OT and IT systems. Which topologies are most secure?
Organisations need to pass data between their IT/OT environments. Across an estate of sites, you will find a variety of machines/devices on the OT network and a variety of software environments on the IT network.
In this presentation we will explore how to create a universal OT/IT stack, with security designed into its structure.
Architecting for Security Starts at the Bottom
The right architecture can inherently improve your exposure to cyber-oriented incidents by reducing the surface available to an adversary to attack.
This short presentation will deliver a brief overview of ThinManager for the unfamiliar and then outline how using thin clients lays a firm base for inherently securing your infrastructure. We discuss multiple ways using ThinManager in your industrial architecture can lower costs while at the same time protecting your assets.
Predictive, Productive, Proactive: A Live Deep-Dive into Integrated IAM
In technical workshop, we demonstrate the power of a fully integrated Industrial Asset Management (IAM) ecosystem. Using a live rotor rig, we will simulate a real-world mechanical anomaly and track its journey through the digital thread. You will witness how Advanced Analytics identifies the earliest signs of asset fatigue, how that data automatically triggers a structured work order within the EAM (Ultimo) environment, and how the Connected Worker (Teamwork) platform provides the frontline technician with the exact knowledge needed to execute the repair. This session focuses on the practical elimination of data silos to drive maximum uptime and operational excellence.
IT level security in an OT environment
What Our Attendees Say, "Excellent event with informative sessions and knowledgeable speakers. It really reinforced that we are focusing on the right areas of OT security."
What Our Attendees Say, "Very informative conference with strong presentations and real world insights. I learned a lot and would highly recommend attending."
What Our Attendees Say, "Fantastic experience. Clear engaging talks that made complex OT topics easy to understand even for someone new to the space."
What Our Attendees Say, "A well organised and insightful event. The speakers clearly understand real industrial OT challenges and focus on what matters."
What Our Attendees Say, "Really enjoyable and engaging event. Great content, strong networking and practical takeaways I could apply straight away."
2026 Venue details
Hotel Kilkenny, Ireland
College Road, Kilkenny, Ireland T45 HX62
Free parking is available.
Our partners
Previous Event Highlights