Cyber SecureOT 2025
-
26 June 2025
-
Fota Island Resort, Cork

Industrial Cyber Security Made Simple
Get the right advice, best solutions and correct understanding of how a robust cyber security framework can help increase the security of your OT environment.
Cyber SecureOT Agenda
Thurs
June 26
Plenary
9.30 AM
Welcome
Tony Mannion, Industrial Cyber Security Business Development Manager, SolutionsPT
9.45 AM
Keynote: Digital Transformation is putting your business at risk
Lee Carter, Industrial Cyber Security Product Manager, SolutionsPT
This presentation will look at two companies which have different approaches in smart innovation. While their journey has differed, do they get to the same destination intact? We’ll explore the routes, lessons learnt as well as how things could have been done, quicker, simpler and more securely.
10:15 AM
Industrial cyber security journey, a customer experience
Chris Wright, Cyber Security Executive, SolutionsPT
This presentation explores a real-world OT customer’s journey through infrastructure modernisation, highlighting the cyber security challenges they faced along the way. Discover the key considerations, lessons learned, and how tailored OT cyber solutions played a critical role in overcoming obstacles and securing their path to a more connected, resilient future.
10:45 AM
Bringing OT cyber security out of the shadows
Richard Allan, Regional Director North Europe, TXOne Networks
TXOne Networks, mastering the language of the shadows in the realm of Industrial Ot/IoT cybersecurity, illuminates the path for manufacturing firms to combat cyber threats. Their cutting-edge OT native solutions protect critical infrastructure, ensuring operational continuity. Join us at Cyber SecureOT 2025 to learn how TXOne’s expertise can help you navigate the darkness of cybersecurity threats.
11:35 AM
Enabling secure and simple privileged remote access to OT
Ian Cuthbertson, Director of Global System Engineering, Cyolo
Learn how Cyolo enables secure, user-friendly remote access to OT environments with reduced attack surfaces, better visibility, and control. Cyolo seamlessly integrates with third-party tools across on-prem, hybrid, and cloud environments - without network change - replacing complex VPNs with a scalable, flexible, and secure access solution.
12:05 PM
How to protect your organisation against known and unknown threats from USB devices
Christophe Bourel, C.E.O, TYREX
This presentation will show you what you don't expect: USB is not dead! Threats are increasing, with 50% of new malwares designed to spread via removable devices, and concerns about unknown threats are growing stronger with the rise of AI. Come discover how to protect yourself.
12:35 PM
Effectively managing cyber exposure in converged IT/OT environments
Dom Storey, Principal OT Security Architect, Tenable
Organisations need a unified cyber risk strategy to address diverse IT/OT environments, asset lifecycles, and security solutions. This presentation explores building such a strategy, focusing on asset identification, vulnerability assessment, identity management, and configuration history. We'll discuss data normalisation for effective risk reduction across the organisation
13:05 PM
Lunch and Exhibition
14:35 PM
Technical Lab 1
Choose an expert led tech session. Click HERE for details
15:35 PM
Technical Lab 2
Your choice of workshop style breakout session. Click HERE for details
16:20 PM
Conference conclusion
Meet the Speakers

Lee Carter
Cyber Security Product Manager, SolutionsPT

Richard Allan
Regional Director North Europe, TXOne Networks

Ian Cuthbertson
Director of Global Systems Engineer, Cyolo

Dominic Storey
Principal OT Security Architect, Tenable
Tech Labs
Practical demonstration on how to reduce your cyber exposure in converged IT/OT environments with TenableOne for OT
The Tenable team will demonstrate how organisations can build a unified approach to cyber risk and normalise their data so that they can take effective risk reduction decisions across their estate by taking a proactive approach to securing converged IT/OT environments.
To Speak with Shadows Understand the Language of the Darkness to Protect Your Crown Jewels
The so-called “IT/OT Convergence” may be a misnomer. While the lines between Information Technology and Operational Technology are becoming increasingly blurry, the fact that these remain two distinct stakeholder communities may inadvertently increase the security risk within a supply chain.
Shared responsibility can lead to confusion and misunderstandings around the unintended consequences of software patches, device installation, data security, and governance. Understanding the risks and drivers for IT and OT can be a valuable first step in better managing the common goal of a secure supply chain and uninterrupted operations.
How to protect your organisation against known and unknown threats from USB devices
This presentation will show you what you don't expect: USB is not dead ! Threats are increasing, with 50% of new malware designed to spread via removable devices, and concerns about unknown threats are growing stronger with the rise of AI. Come discover how to protect yourself.
Seamless Integration and Unmatched Scalability: Cyolo’s OT-Focused Solution
Discover how Cyolo seamlessly integrates OT systems with modern IT infrastructures. Its hybrid, agentless architecture supports legacy protocols with minimal customisation. Cyolo ensures secure, scalable access without disrupting operations, empowering businesses to grow confidently while maintaining agility, performance, and robust protection across all technology layers.
PLC Version Control and Backup
Octoplant offers an elegant and robust way to protect critical applications that are running on your PLCs and SCADA systems.
Version control becomes effortless with Octoplant, with a host of tools and features to track every change made by everybody, every time.
Octoplant ensures your applications are protected and available quickly. Should an incident occur, you can recover that application quickly, which will reduce costly downtime and helps to protect the bottom line.
See Octoplant in action and how it can benefit your organisation.
Data Communication between OT and IT systems. Which topologies are most secure?
Organisations need to pass data between their IT/OT environments. Across an estate of sites, you will find a variety of machines/devices on the OT network and a variety of software environments on the IT network.
In this presentation we will explore how to create a universal OT/IT stack, with security designed into its structure.
IT level Security in an OT Environment
2025 Venue details
Fota Island Resort
Fota Island, Co. Cork, Ireland T45 HX62
This upscale golf resort is 17 km from Cork city centre.
Free parking is available.
Our partners




.png)


Previous Event Highlights


.png?width=2000&height=1500&name=MicrosoftTeams-image%20(4).png)




















