<img src="https://secure.leadforensics.com/24951.png" alt="" style="display:none;">
Cyber SecureOT Promo Video 2026 - Ireland

 Is compliance keeping you busy or actually keeping you secure?

Join industry experts to explore how compliance can be transformed from a burden into a practical tool for strengthening industrial cyber security and resilience.

Gain clear guidance and real world insight into using standards and regulations to reduce cyber risk improve visibility and keep your OT environment secure and reliable.
 

 

Cyber SecureOT Agenda

Tues

June 16
Plenary

This year we bring together a range of market leading software and hardware partners to share practical approaches to tackling compliance driven cyber security challenges and strengthening the resilience of your OT environment.

9.30 AM

Welcome

Tony Mannion, Industrial Cyber Security Business Development Manager, SolutionsPT

9.45 AM

Keynote: From Red Tape to Real OT Security

Lee Carter, Industrial Cyber Security Product Manager, SolutionsPT

This keynote cuts through regulatory noise to explain what really matters for industrial environments. It shows how to move beyond checkbox compliance and turn standards policies and controls into practical actions that reduce risk improve visibility and support safe reliable operations engineers can adopt with confidence across complex OT estates.  

10:15 AM

Using Continuous Monitoring to Prove Compliance and Stop OT Issues Before They Escalate

Elliot Gidley, Field CTO, Claroty

Claroty demonstrates how continuous OT monitoring delivers the visibility and evidence needed to prove compliance and strengthen resilience. This session shows how passive asset discovery anomaly detection and contextual risk insight help teams identify misconfigurations policy drift and emerging threats early turning monitoring data into actionable assurance for auditors and operators alike.

10:45 AM

Applying Security Standards That Industrial Operations Can Live With

Anjay Mandalia, OT Security Leader UKI, TXOne Networks

How do you apply security standards in OT environments without disrupting production? Drawing on an operations first approach and OT native controls this session shows how asset visibility prevention first protection and segmentation support compliance reduce risk and keep industrial operations running safely and reliably across complex regulated sites.

11:35 AM

Managing Third Party Access Without Losing Control of Your OT Environment

Adam Gurney, Solutions Engineer, Cyolo

Cyolo explores how industrial organisations can securely manage third party and supply chain access without expanding risk or disrupting operations. This session shows how identity based zero trust access session oversight and full visibility give teams control of who connects what they access and how work is carried out across critical OT environments.

12:05 PM

Controlled Change Management for PLC‑Centric and other OT Systems

Name, Job Title, OCTOPLANT

This session focuses on controlled change management for PLC programmes while extending across wider OT systems. Octoplant shows how version control, approvals and traceability apply to PLCs, HMIs and SCADA. Learn how governing who changes what and when reduces downtime, supports compliance and keeps environments stable, secure and audit ready.

12:35 PM

Turning Incident Reporting and Threat Hunting into Actionable Security Evidence

Dom Storey, Principal OT Security Architect, Tenable

Tenable shows how incident reporting and threat hunting can move beyond alerts to become defensible security evidence. This session explains how asset visibility risk based vulnerability management and context rich detection help teams prioritise response support investigations and demonstrate measurable improvements in OT security posture and regulatory confidence. 

13:05 PM

Lunch and Exhibition

14:35 PM

Technical Lab 1

Choose an expert led tech session. Click HERE for details 

15:35 PM

Technical Lab 2

Your choice of workshop style breakout session. Click HERE for details

16:20 PM

Conference conclusion

Meet the Speakers

lee carter-1

Lee Carter

Cyber Security Product Manager, SolutionsPT

anjay3

Anjay Mandalia

OT Security Leader UKI, TXOne Networks

Adam Gurney Cyolo

Adam Gurney

Solutions Engineer, Cyolo

Dominic Storey

Dominic Storey

Principal OT Security Architect, Tenable

Elliot Gidley Claroty

Elliot Gidley

Field CTO, Claroty

Tech Labs

Practical demonstration on how to reduce your cyber exposure in converged IT/OT environments with TenableOne for OT

The Tenable team will demonstrate how organisations can build a unified approach to cyber risk and normalise their data so that they can take effective risk reduction decisions across their estate by taking a proactive approach to securing converged IT/OT environments.

From Level 0 to 5: Building an Optimal OT Security Architecture

Securing industrial environments requires more than isolated tools—it demands a layered, site-wide strategy. In this hands-on workshop, TXOne Networks walks you through a practical deployment model spanning Levels 0 to 5. Learn how to integrate endpoint, network, and inspection solutions across your ICS stack using TXOne’s OT-native technologies—from portable inspectors to next-gen firewalls. Discover how to design for resilience, visibility, and control—no matter where you are in your security journey.

Know your risks from Identification to Mitigation

Claroty's xDome solution is the latest innovation from the market leader in OT security that allows you to visually understand the risks to your Cyber Physical Systems and helps you prioritise where to take action and improve your operational resilience.

Learn how to quantify the risks of your OT environment, analyse and simulate where and how to respond to have the quickest impact, then take the next steps through to eventual mitigation and remediation.

How to protect your organisation against known and unknown threats from USB devices

This presentation will show you what you don't expect: USB is not dead ! Threats are increasing, with 50% of new malware designed to spread via removable devices, and concerns about unknown threats are growing stronger with the rise of AI. Come discover how to protect yourself.

Seamless Integration and Unmatched Scalability: Cyolo’s OT-Focused Solution

Discover how Cyolo seamlessly integrates OT systems with modern IT infrastructures. Its hybrid, agentless architecture supports legacy protocols with minimal customisation. Cyolo ensures secure, scalable access without disrupting operations, empowering businesses to grow confidently while maintaining agility, performance, and robust protection across all technology layers. 

PLC Version Control and Backup

Octoplant offers an elegant and robust way to protect critical applications that are running on your PLCs and SCADA systems.

Version control becomes effortless with Octoplant, with a host of tools and features to track every change made by everybody, every time.

Octoplant ensures your applications are protected and available quickly. Should an incident occur, you can recover that application quickly, which will reduce costly downtime and helps to protect the bottom line.

See Octoplant in action and how it can benefit your organisation.

Data Communication between OT and IT systems. Which topologies are most secure?

Organisations need to pass data between their IT/OT environments. Across an estate of sites, you will find a variety of machines/devices on the OT network and a variety of software environments on the IT network.

In this presentation we will explore how to create a universal OT/IT stack, with security designed into its structure.

IT level security in an OT environment

2026 Venue details

Hotel Kilkenny, Ireland

College Road, Kilkenny, Ireland  T45 HX62

Free parking is available.

Our partners

Claroty-Logo-2022-FullColor1 (4)
tenable_logo_webinar_lp-1
txone1
octoplant final (1)
Cyolo Logo_GreenBlue_Transfer
MAC Solutions Logo
TYREX.logo
ThinManager logo

Previous Event Highlights

Secure OT 2024 cam2 134
Secure OT 2024 cam2 33
Cyber SecureOT 2023 - 21-6-23 109
Secure OT 2024 cam2 40
MicrosoftTeams-image (4)
Cyber SecureOT 2023 - 21-6-23 088
Secure OT 2024 cam2 123
Cyber SecureOT 2023 - 21-6-23 071
Secure OT 2024 cam2 94
Secure OT 2024 cam2 136
Cyber SecureOT 2023 - 21-6-23 203
Cyber SecureOT 2023 - 21-6-23 199
Cyber SecureOT 2023 - 21-6-23 178
Secure OT 2024 cam2 127
Cyber SecureOT 2023 - 21-6-23 103
Secure OT 2024 cam2 124
Secure OT 2024 cam2 74
Cyber SecureOT 2023 - 21-6-23 147
Secure OT 2024 cam2 129
Cyber SecureOT 2023 - 21-6-23 167
Secure OT 2024 cam2 41
Cyber SecureOT 2023 - 21-6-23 158
Cyber SecureOT 2023 - 21-6-23 145
Secure OT 2024 cam2 128

Secure your place today by registering for a ticket

Simply complete the form below to secure your spot.

 

 

Registration includes:

 

Lunch and refreshments throughout the day are included with registration.