Cyber SecureOT 2025
-
26 June 2025
-
Fota Island Resort, Cork

Industrial Cyber Security Made Simple
Get the right advice, best solutions and correct understanding of how a robust cyber security framework can help increase the security of your OT environment.
Cyber SecureOT Agenda
Thurs
June 26
Plenary
9.30 AM
Welcome
Tony Mannion, Industrial Cyber Security Business Development Manager, SolutionsPT
9.45 AM
Keynote: Digital Transformation is putting your business at risk
Lee Carter, Industrial Cyber Security Product Manager, SolutionsPT
This presentation will look at two companies which have different approaches in smart innovation. While their journey has differed, do they get to the same destination intact? We’ll explore the routes, lessons learnt as well as how things could have been done, quicker, simpler and more securely.
10:15 AM
Keynote: Industrial cyber security journey, a customer experience
TBA,
Challenges faced, successes and a personal journey of discovery implementing a cyber security strategy.
10:45 AM
Bringing OT cyber security out of the shadows
Richard Allan, Regional Director North Europe, TXOne Networks
TXOne Networks, mastering the language of the shadows in the realm of Industrial Ot/IoT cybersecurity, illuminates the path for manufacturing firms to combat cyber threats. Their cutting-edge OT native solutions protect critical infrastructure, ensuring operational continuity. Join us at Cyber SecureOT 2025 to learn how TXOne’s expertise can help you navigate the darkness of cybersecurity threats.
11:35 AM
Enabling secure and simple privileged remote access to OT
Ian Cuthbertson, Director of Global System Engineering, Cyolo
Learn how Cyolo enables secure, user-friendly remote access to OT environments with reduced attack surfaces, better visibility, and control. Cyolo seamlessly integrates with third-party tools across on-prem, hybrid, and cloud environments - without network change - replacing complex VPNs with a scalable, flexible, and secure access solution.
12:05 PM
How to protect your organisation against known and unknown threats from USB devices
Christophe Bourel, C.E.O, TYREX
This presentation will show you what you don't expect: USB is not dead! Threats are increasing, with 50% of new malwares designed to spread via removable devices, and concerns about unknown threats are growing stronger with the rise of AI. Come discover how to protect yourself.
12:35 PM
Effectively managing cyber exposure in converged IT/OT environments
Dom Storey, Principal OT Security Architect, Tenable
Organisations need a unified cyber risk strategy to address diverse IT/OT environments, asset lifecycles, and security solutions. This presentation explores building such a strategy, focusing on asset identification, vulnerability assessment, identity management, and configuration history. We'll discuss data normalisation for effective risk reduction across the organisation
13:05 PM
Lunch and Exhibition
14:35 PM
Technical Lab 1
Choose an expert led tech session. Click HERE for details
15:35 PM
Technical Lab 2
Your choice of workshop style breakout session. Click HERE for details
16:20 PM
Conference conclusion
Meet the Speakers

Lee Carter
Cyber Security Product Manager, SolutionsPT

Richard Allan
Regional Director North Europe, TXOne Networks

Ian Cuthbertson
Director of Global Systems Engineer, Cyolo

Dominic Storey
Principal OT Security Architect, Tenable
Tech Labs
Practical demonstration on how to reduce your cyber exposure in converged IT/OT environments with TenableOne for OT
The Tenable team will demonstrate how organisations can build a unified approach to cyber risk and normalise their data so that they can take effective risk reduction decisions across their estate by taking a proactive approach to securing converged IT/OT environments.
To Speak with Shadows Understand the Language of the Darkness to Protect Your Crown Jewels
The so-called “IT/OT Convergence” may be a misnomer. While the lines between Information Technology and Operational Technology are becoming increasingly blurry, the fact that these remain two distinct stakeholder communities may inadvertently increase the security risk within a supply chain.
Shared responsibility can lead to confusion and misunderstandings around the unintended consequences of software patches, device installation, data security, and governance. Understanding the risks and drivers for IT and OT can be a valuable first step in better managing the common goal of a secure supply chain and uninterrupted operations.
Seamless Integration and Unmatched Scalability: Cyolo’s OT-Focused Solution
Discover how Cyolo seamlessly integrates OT systems with modern IT infrastructures. Its hybrid, agentless architecture supports legacy protocols with minimal customisation. Cyolo ensures secure, scalable access without disrupting operations, empowering businesses to grow confidently while maintaining agility, performance, and robust protection across all technology layers.
How to protect your organisation against known and unknown threats from USB devices
This presentation will show you what you don't expect: USB is not dead ! Threats are increasing, with 50% of new malware designed to spread via removable devices, and concerns about unknown threats are growing stronger with the rise of AI. Come discover how to protect yourself.
IT level Security in an OT Environment
2025 Venue details
Fota Island Resort
Fota Island, Co. Cork, Ireland T45 HX62
This upscale golf resort is 17 km from Cork city centre.
Free parking is available.
Our partners




.png)


Previous Event Highlights


.png?width=2000&height=1500&name=MicrosoftTeams-image%20(4).png)




















