<img src="https://secure.leadforensics.com/24951.png" alt="" style="display:none;">
Cyber SecureOT Promo Video 2026 - Ireland

 Is compliance keeping you busy or actually keeping you secure?

Join industry experts to explore how compliance can be transformed from a burden into a practical tool for strengthening industrial cyber security and resilience.

Gain clear guidance and real world insight into using standards and regulations to reduce cyber risk improve visibility and keep your OT environment secure and reliable.
 

 

Cyber SecureOT Agenda

Tues

June 16
Plenary

This year we bring together a range of market leading software and hardware partners to share practical approaches to tackling compliance driven cyber security challenges and strengthening the resilience of your OT environment.

9:30 AM

Welcome

Tony Mannion, Industrial Cyber Security Business Development Manager, SolutionsPT

9:45 AM

Keynote: From Red Tape to Real OT Security

Lee Carter, Industrial Cyber Security Product Manager, SolutionsPT

This keynote cuts through regulatory noise to explain what really matters for industrial environments. It shows how to move beyond checkbox compliance and turn standards policies and controls into practical actions that reduce risk improve visibility and support safe reliable operations engineers can adopt with confidence across complex OT estates.  

10:15 AM

OT Under Pressure: Reduce CPS Risk, Protect Uptime, Ensure Compliance 

Elliot Gidley, Field CTO, Claroty

Compliance is no longer just a checkbox, turn regulatory mandates into OT resilience. Explore the evolving OT threat landscape, key CPS trends for 2026, and why managing third-party access is critical for supply chain and operational security. Gain a practical roadmap to reduce CPS risk, protect uptime, lower costs, and strengthen cyber resilience. 

10:35 AM

Applying Security Standards That Industrial Operations Can Live With

Anjay Mandalia, OT Security Leader UKI, TXOne Networks

How do you apply security standards in OT environments without disrupting production? Drawing on an operations first approach and OT native controls this session shows how asset visibility prevention first protection and segmentation support compliance reduce risk and keep industrial operations running safely and reliably across complex regulated sites.

10:55 AM

 

Q&A Panel

11:15 AM

 

Break

11:35 AM

Managing Third Party Access Without Losing Control of Your OT Environment

Adam Gurney, Solutions Engineer, Cyolo

Cyolo explores how industrial organisations can securely manage third party and supply chain access without expanding risk or disrupting operations. This session shows how identity based zero trust access session oversight and full visibility give teams control of who can connect, what they can access and how work is carried out across critical OT environments.

11:55 AM

Controlled Change Management for PLC‑Centric and other OT Systems

Vitaly Lifanov, Channel Partner Manager EMEA, Octoplant

This session focuses on controlled change management for PLC programmes while extending across wider OT systems. Octoplant shows how version control, approvals and traceability apply to PLCs, HMIs and SCADA. Learn how governing who changes what and when reduces downtime, supports compliance and keeps environments stable, secure and audit ready.

12:15 PM

Turning Incident Reporting and Threat Hunting into Actionable Security Evidence

Dom Storey, Principal OT Security Architect, Tenable

Tenable shows how incident reporting and threat hunting can move beyond alerts to become defensible security evidence. This session explains how asset visibility risk based vulnerability management and context rich detection help teams prioritise response support investigations and demonstrate measurable improvements in OT security posture and regulatory confidence. 

12.35 PM

 

Q&A Panel

12:55 PM

Lunch and Exhibition

14:15 PM

Technical Lab 1

Choose an expert led tech session. Click HERE for details 

14:45 PM

Technical Lab 2

Your choice of workshop style breakout session. Click HERE for details

15:15 PM

Technical Lab 3

15:45 PM

 

Close

Meet the Speakers

lee carter-1

Lee Carter

Cyber Security Product Manager, SolutionsPT

Anjay Mandalia Square

Anjay Mandalia

OT Security Leader UKI, TXOne Networks

Adam Gurney Cyolo

Adam Gurney

Solutions Engineer, Cyolo

Dominic Storey

Dominic Storey

Principal OT Security Architect, Tenable

Elliot Gidley Claroty

Elliot Gidley

Field CTO, Claroty

Vitaly Lifanov-1

Vitaly Lifanov

Channel Partner Manager EMEA, Octoplant

Tech Labs

Practical demonstration on how to reduce your cyber exposure in converged IT/OT environments with TenableOne for OT

The Tenable team will demonstrate how organisations can build a unified approach to cyber risk and normalise their data so that they can take effective risk reduction decisions across their estate by taking a proactive approach to securing converged IT/OT environments.

From Level 0 to 5: Building an Optimal OT Security Architecture

Securing industrial environments requires more than isolated tools—it demands a layered, site-wide strategy. In this hands-on workshop, TXOne Networks walks you through a practical deployment model spanning Levels 0 to 5. Learn how to integrate endpoint, network, and inspection solutions across your ICS stack using TXOne’s OT-native technologies—from portable inspectors to next-gen firewalls. Discover how to design for resilience, visibility, and control—no matter where you are in your security journey.

From Visibility to Action: What It Really Takes to Operationalise CPS Security

This workshop focuses on turning cyber-physical systems (CPS) insights into action, demonstrating what an operationalised CPS Protection Program looks like in practice. It highlights how organisations are maturing beyond ad-hoc approaches and outlines steps to move from reactive security efforts to a repeatable, programmatic model that reduces risk, ensures compliance, and protects operational integrity.

How to protect your organisation against known and unknown threats from USB devices

This presentation will show you what you don't expect: USB is not dead ! Threats are increasing, with 50% of new malware designed to spread via removable devices, and concerns about unknown threats are growing stronger with the rise of AI. Come discover how to protect yourself.

From Policy to Practice: Implementing Secure Third-Party Access in OT Environments

Building on the Cyolo plenary session, this technical workshop takes a deeper dive into how organisations can operationalise secure third-party and supply chain access in real-world OT environments. Attendees will explore practical architectures, deployment patterns, and enforcement strategies that align with zero trust principles without introducing operational friction.
The session will walk through how identity-centric access controls, session governance, and granular visibility can be applied to enforce least privilege, monitor activity, and respond to risk in real time. Through practical examples, we will demonstrate how to move from compliance-driven requirements to resilient, scalable access models that support both security and operational continuity.

PLC Version Control and Backup

Octoplant offers an elegant and robust way to protect critical applications that are running on your PLCs and SCADA systems.

Version control becomes effortless with Octoplant, with a host of tools and features to track every change made by everybody, every time.

Octoplant ensures your applications are protected and available quickly. Should an incident occur, you can recover that application quickly, which will reduce costly downtime and helps to protect the bottom line.

See Octoplant in action and how it can benefit your organisation.

Data Communication between OT and IT systems. Which topologies are most secure?

Organisations need to pass data between their IT/OT environments. Across an estate of sites, you will find a variety of machines/devices on the OT network and a variety of software environments on the IT network.

In this presentation we will explore how to create a universal OT/IT stack, with security designed into its structure.

Architecting for Security Starts at the Bottom

The right architecture can inherently improve your exposure to cyber-oriented incidents by reducing the surface available to an adversary to attack.
This short presentation will deliver a brief overview of ThinManager for the unfamiliar and then outline how using thin clients lays a firm base for inherently securing your infrastructure. We discuss multiple ways using ThinManager in your industrial architecture can lower costs while at the same time protecting your assets.

Predictive, Productive, Proactive: A Live Deep-Dive into Integrated IAM

In technical workshop, we demonstrate the power of a fully integrated Industrial Asset Management (IAM) ecosystem. Using a live rotor rig, we will simulate a real-world mechanical anomaly and track its journey through the digital thread. You will witness how Advanced Analytics identifies the earliest signs of asset fatigue, how that data automatically triggers a structured work order within the EAM (Ultimo) environment, and how the Connected Worker (Teamwork) platform provides the frontline technician with the exact knowledge needed to execute the repair. This session focuses on the practical elimination of data silos to drive maximum uptime and operational excellence.

IT level security in an OT environment

What Our Attendees Say, "Excellent event with informative sessions and knowledgeable speakers. It really reinforced that we are focusing on the right areas of OT security."
What Our Attendees Say, "Very informative conference with strong presentations and real world insights. I learned a lot and would highly recommend attending."
What Our Attendees Say, "Fantastic experience. Clear engaging talks that made complex OT topics easy to understand even for someone new to the space."
What Our Attendees Say, "A well organised and insightful event. The speakers clearly understand real industrial OT challenges and focus on what matters."
What Our Attendees Say, "Really enjoyable and engaging event. Great content, strong networking and practical takeaways I could apply straight away."

2026 Venue details

Hotel Kilkenny, Ireland

College Road, Kilkenny, Ireland  T45 HX62

Free parking is available.

Our partners

Claroty-Logo-2022-FullColor1 (4)
tenable_logo_webinar_lp-1
txone1
octoplant final (1)
Cyolo Logo_GreenBlue_Transfer
Cropped Green.black landscape (1)
TYREX.logo
ThinManager logo

Previous Event Highlights

Secure OT 2024 cam2 134
Secure OT 2024 cam2 33
Cyber SecureOT 2023 - 21-6-23 109
Secure OT 2024 cam2 40
MicrosoftTeams-image (4)
Cyber SecureOT 2023 - 21-6-23 088
Secure OT 2024 cam2 123
Cyber SecureOT 2023 - 21-6-23 071
Secure OT 2024 cam2 94
Secure OT 2024 cam2 136
Cyber SecureOT 2023 - 21-6-23 203
Cyber SecureOT 2023 - 21-6-23 199
Cyber SecureOT 2023 - 21-6-23 178
Secure OT 2024 cam2 127
Cyber SecureOT 2023 - 21-6-23 103
Secure OT 2024 cam2 124
Secure OT 2024 cam2 74
Cyber SecureOT 2023 - 21-6-23 147
Secure OT 2024 cam2 129
Cyber SecureOT 2023 - 21-6-23 167
Secure OT 2024 cam2 41
Cyber SecureOT 2023 - 21-6-23 158
Cyber SecureOT 2023 - 21-6-23 145
Secure OT 2024 cam2 128

Secure your place today by registering for a ticket

Simply complete the form below to secure your spot.

 

 

Registration includes:

 

Lunch and refreshments throughout the day are included with registration.