Cyber SecureOT 2025
-
17 June 2025
-
National Motorcycle Museum, Birmingham

Industrial Cyber Security Made Simple
Get the right advice, best solutions and correct understanding of how a robust cyber security framework can help increase the security of your OT environment.
Cyber SecureOT Agenda
Tues
June 17
Plenary
9.30 AM
Welcome
Tony Mannion, Industrial Cyber Security Business Development Manager, SolutionsPT
9.45 AM
Keynote: Digital Transformation is putting your business at risk
Lee Carter, Industrial Cyber Security Product Manager, SolutionsPT
This presentation will look at two companies which have different approaches in smart innovation. While their journey has differed, do they get to the same destination intact? We’ll explore the routes, lessons learnt as well as how things could have been done, quicker, simpler and more securely.
10:15 AM
Keynote: Implementing Effective Security Monitoring in Manufacturing: A Case Study from the MTC
Manufacturing Technology Centre
This presentation explores the Manufacturing Technology Centre's (MTC) Monitoring and Threat Cell, its projects, and future plans. We'll detail our Monitoring Cell project, showcasing our use of tools like Tenable and Claroty alongside open-source solutions, and share key takeaways for enhancing cybersecurity strategies.
10:45 AM
Bringing OT cyber security out of the shadows
Richard Allan, Regional Director North Europe, TXOne Networks
TXOne Networks, mastering the language of the shadows in the realm of Industrial Ot/IoT cybersecurity, illuminates the path for manufacturing firms to combat cyber threats. Their cutting-edge OT native solutions protect critical infrastructure, ensuring operational continuity. Join us at Cyber SecureOT 2025 to learn how TXOne’s expertise can help you navigate the darkness of cybersecurity threats.
11:35 AM
State of CPS Security: OT Exposures 2025
Elliot Gidley, EMEA Field CTO, Claroty
Join Elliot Gidley, CTO at Claroty as he delves into the new research report 'State of CPS Security: OT Exposures 2025.' The report covers 940,000-plus OT Devices Analysed across 270 Organisations and lays out the greatest risks associated with OT and ICS beyond merely assessing the criticality of a vulnerability. We'll share key takeaways and how they could impact your plant.
12:05 PM
How to protect your organisation against known and unknown threats from USB devices
Christophe Bourel, C.E.O, TYREX
This presentation will show you what you don't expect: USB is not dead! Threats are increasing, with 50% of new malwares designed to spread via removable devices, and concerns about unknown threats are growing stronger with the rise of AI. Come discover how to protect yourself.
12:35 PM
Effectively managing cyber exposure in converged IT/OT environments
Dom Storey, Principal OT Security Architect, Tenable
Organisations need a unified cyber risk strategy to address diverse IT/OT environments, asset lifecycles, and security solutions. This presentation explores building such a strategy, focusing on asset identification, vulnerability assessment, identity management, and configuration history. We'll discuss data normalisation for effective risk reduction across the organisation.
13:05 PM
Lunch and Exhibition
14:35 PM
Technical Lab 1
Choose an expert led tech session. Click HERE for details
15:35 PM
Technical Lab 2
Your choice of workshop style breakout session. Click HERE for details
16:20 PM
Conference conclusion
Meet the Speakers

Lee Carter
Cyber Security Product Manager, SolutionsPT

Richard Allan
Regional Director North Europe, TXOne Networks

Dominic Storey
Principal OT Security Architect, Tenable

Christophe Bourel
Elliot Gidley
EMEA Field CTO, Claroty
Tech Labs
Practical demonstration on how to reduce your cyber exposure in converged IT/OT environments with TenableOne for OT
The Tenable team will demonstrate how organisations can build a unified approach to cyber risk and normalise their data so that they can take effective risk reduction decisions across their estate by taking a proactive approach to securing converged IT/OT environments.
How to protect your organisation against known and unknown threats from USB devices
This presentation will show you what you don't expect: USB is not dead ! Threats are increasing, with 50% of new malware designed to spread via removable devices, and concerns about unknown threats are growing stronger with the rise of AI. Come discover how to protect yourself.
To Speak with Shadows Understand the Language of the Darkness to Protect Your Crown Jewels
The so-called “IT/OT Convergence” may be a misnomer. While the lines between Information Technology and Operational Technology are becoming increasingly blurry, the fact that these remain two distinct stakeholder communities may inadvertently increase the security risk within a supply chain.
Shared responsibility can lead to confusion and misunderstandings around the unintended consequences of software patches, device installation, data security, and governance. Understanding the risks and drivers for IT and OT can be a valuable first step in better managing the common goal of a secure supply chain and uninterrupted operations.
Know Your Risks! From Identification to Mitigation
Claroty's xDome solution is the latest innovation from the market leader in OT security that allows you to visually understand the risks to your Cyber Physical Systems and helps you prioritise where to take action and improve your operational resilience.
Learn how to quantify the risks of your OT environment, analyse and simulate where and how to respond to have the quickest impact, then take the next steps through to eventual mitigation and remediation.
Seamless Integration and Unmatched Scalability: Cyolo’s OT-Focused Solution
Discover how Cyolo seamlessly integrates OT systems with modern IT infrastructures. Its hybrid, agentless architecture supports legacy protocols with minimal customisation. Cyolo ensures secure, scalable access without disrupting operations, empowering businesses to grow confidently while maintaining agility, performance, and robust protection across all technology layers.
PLC Backup and Version Control
Octoplant offers an elegant and robust way to protect critical applications that are running on your PLCs and SCADA systems.
Version control becomes effortless with Octoplant, with a host of tools and features to track every change made by everybody, every time.
Octoplant ensures your applications are protected and available quickly. Should an incident occur, you can recover that application quickly, which will reduce costly downtime and helps to protect the bottom line.
IT level Security in an OT Environment
2025 Venue details
National Motorcycle Museum, Birmingham
Coventry Road, Bickenhill, Solihull,
West Midlands. B92 0EJ
The National Motorcycle Museum is situated in the very centre of England, in the West Midlands near Birmingham, with easy access from both the south and the north of the UK.
Free parking is available.
Our partners




.png)



Previous Event Highlights



.png?width=2000&height=1500&name=MicrosoftTeams-image%20(4).png)



















