Cyber SecureOT 2025
-
26 June 2025
-
Fota Island Resort, Cork

Industrial Cyber Security Made Simple
Get the right advice, best solutions and correct understanding of how a robust cyber security framework can help increase the security of your OT environment.
Cyber SecureOT Agenda
Thurs
June 26
Plenary
9.30 AM
Welcome
Tony Mannion, Industrial Cyber Security Business Development Manager, SolutionsPT
9.45 AM
Keynote: Digital Transformation is putting your business at risk
Lee Carter, Industrial Cyber Security Product Manager, SolutionsPT
This presentation will look at two companies which have different approaches in smart innovation. While their journey has differed, do they get to the same destination intact? We’ll explore the routes, lessons learnt as well as how things could have been done, quicker, simpler and more securely.
10:15 AM
Industrial cyber security journey, a customer experience
Chris Wright, Cyber Security Executive, SolutionsPT
This presentation explores a real-world OT customer’s journey through infrastructure modernisation, highlighting the cyber security challenges they faced along the way. Discover the key considerations, lessons learned, and how tailored OT cyber solutions played a critical role in overcoming obstacles and securing their path to a more connected, resilient future.
10:45 AM
Closing the Confidence Gap: 4 OT Security Capabilities That Matter
Anjay Mandalia, OT Security Leader UKI, TXOne Networks
Despite rising cybersecurity budgets, only 1 in 4 organisations feel confident in their OT security. Backed by global insights from Forrester, this session explores the four critical capabilities OT security teams need to turn investment into impact. Discover how best in class OT-native solutions deliver real-time visibility, threat containment, and operational resilience—empowering OT teams to secure what matters most.
11:35 AM
Enabling secure and simple privileged remote access to OT
Mark Edge, Regional Director Northern Europe, Cyolo
Learn how Cyolo enables secure, user-friendly remote access to OT environments with reduced attack surfaces, better visibility, and control. Cyolo seamlessly integrates with third-party tools across on-prem, hybrid, and cloud environments - without network change - replacing complex VPNs with a scalable, flexible, and secure access solution.
12:05 PM
How to protect your organisation against known and unknown threats from USB devices
Christophe Bourel, C.E.O, TYREX
This presentation will show you what you don't expect: USB is not dead! Threats are increasing, with 50% of new malwares designed to spread via removable devices, and concerns about unknown threats are growing stronger with the rise of AI. Come discover how to protect yourself.
12:35 PM
Effectively managing cyber exposure in converged IT/OT environments
Dom Storey, Principal OT Security Architect, Tenable
Organisations need a unified cyber risk strategy to address diverse IT/OT environments, asset lifecycles, and security solutions. This presentation explores building such a strategy, focusing on asset identification, vulnerability assessment, identity management, and configuration history. We'll discuss data normalisation for effective risk reduction across the organisation
13:05 PM
Lunch and Exhibition
14:35 PM
Technical Lab 1
Choose an expert led tech session. Click HERE for details
15:35 PM
Technical Lab 2
Your choice of workshop style breakout session. Click HERE for details
16:20 PM
Conference conclusion
Meet the Speakers

Lee Carter
Cyber Security Product Manager, SolutionsPT

Anjay Mandalia
OT Security Leader UKI, TXOne Networks

Mark Edge
Regional Director Northern Europe, Cyolo

Dominic Storey
Principal OT Security Architect, Tenable
Tech Labs
Practical demonstration on how to reduce your cyber exposure in converged IT/OT environments with TenableOne for OT
The Tenable team will demonstrate how organisations can build a unified approach to cyber risk and normalise their data so that they can take effective risk reduction decisions across their estate by taking a proactive approach to securing converged IT/OT environments.
From Level 0 to 5: Building an Optimal OT Security Architecture
Securing industrial environments requires more than isolated tools—it demands a layered, site-wide strategy. In this hands-on workshop, TXOne Networks walks you through a practical deployment model spanning Levels 0 to 5. Learn how to integrate endpoint, network, and inspection solutions across your ICS stack using TXOne’s OT-native technologies—from portable inspectors to next-gen firewalls. Discover how to design for resilience, visibility, and control—no matter where you are in your security journey.
How to protect your organisation against known and unknown threats from USB devices
This presentation will show you what you don't expect: USB is not dead ! Threats are increasing, with 50% of new malware designed to spread via removable devices, and concerns about unknown threats are growing stronger with the rise of AI. Come discover how to protect yourself.
Seamless Integration and Unmatched Scalability: Cyolo’s OT-Focused Solution
Discover how Cyolo seamlessly integrates OT systems with modern IT infrastructures. Its hybrid, agentless architecture supports legacy protocols with minimal customisation. Cyolo ensures secure, scalable access without disrupting operations, empowering businesses to grow confidently while maintaining agility, performance, and robust protection across all technology layers.
PLC Version Control and Backup
Octoplant offers an elegant and robust way to protect critical applications that are running on your PLCs and SCADA systems.
Version control becomes effortless with Octoplant, with a host of tools and features to track every change made by everybody, every time.
Octoplant ensures your applications are protected and available quickly. Should an incident occur, you can recover that application quickly, which will reduce costly downtime and helps to protect the bottom line.
See Octoplant in action and how it can benefit your organisation.
Data Communication between OT and IT systems. Which topologies are most secure?
Organisations need to pass data between their IT/OT environments. Across an estate of sites, you will find a variety of machines/devices on the OT network and a variety of software environments on the IT network.
In this presentation we will explore how to create a universal OT/IT stack, with security designed into its structure.
IT level Security in an OT Environment
2025 Venue details
Fota Island Resort
Fota Island, Co. Cork, Ireland T45 HX62
This upscale golf resort is 17 km from Cork city centre.
Free parking is available.
Our partners




.png)


Previous Event Highlights


.png?width=2000&height=1500&name=MicrosoftTeams-image%20(4).png)




















