Cyber SecureOT 2025
-
17 June 2025
-
National Motorcycle Museum, Birmingham

Industrial Cyber Security Made Simple
Get the right advice, best solutions and correct understanding of how a robust cyber security framework can help increase the security of your OT environment.
Cyber SecureOT Agenda
Tues
June 17
Plenary
9.30 AM
Welcome
Tony Mannion, Industrial Cyber Security Business Development Manager, SolutionsPT
9.45 AM
Keynote: Digital Transformation is putting your business at risk
Lee Carter, Industrial Cyber Security Product Manager, SolutionsPT
This presentation will look at two companies which have different approaches in smart innovation. While their journey has differed, do they get to the same destination intact? We’ll explore the routes, lessons learnt as well as how things could have been done, quicker, simpler and more securely.
10:15 AM
Keynote: Implementing Effective Security Monitoring in Manufacturing: A Case Study from the MTC
Manufacturing Technology Centre
This presentation explores the Manufacturing Technology Centre's (MTC) Monitoring and Threat Cell, its projects, and future plans. We'll detail our Monitoring Cell project, showcasing our use of tools like Tenable and Claroty alongside open-source solutions, and share key takeaways for enhancing cybersecurity strategies.
10:45 AM
Bringing OT cyber security out of the shadows
Richard Allan, Regional Director North Europe, TXOne Networks
TXOne Networks, mastering the language of the shadows in the realm of Industrial Ot/IoT cybersecurity, illuminates the path for manufacturing firms to combat cyber threats. Their cutting-edge OT native solutions protect critical infrastructure, ensuring operational continuity. Join us at Cyber SecureOT 2025 to learn how TXOne’s expertise can help you navigate the darkness of cybersecurity threats.
11:35 AM
State of CPS Security: OT Exposures 2025
Elliot Gidley, EMEA Field CTO, Claroty
Join Elliot Gidley, CTO at Claroty as he delves into the new research report 'State of CPS Security: OT Exposures 2025.' The report covers 940,000-plus OT Devices Analysed across 270 Organisations and lays out the greatest risks associated with OT and ICS beyond merely assessing the criticality of a vulnerability. We'll share key takeaways and how they could impact your plant.
12:05 PM
How to protect your organisation against known and unknown threats from USB devices
Christophe Bourel, C.E.O, TYREX
This presentation will show you what you don't expect: USB is not dead! Threats are increasing, with 50% of new malwares designed to spread via removable devices, and concerns about unknown threats are growing stronger with the rise of AI. Come discover how to protect yourself.
12:35 PM
Effectively managing cyber exposure in converged IT/OT environments
Dom Storey, Principal OT Security Architect, Tenable
Organisations need a unified cyber risk strategy to address diverse IT/OT environments, asset lifecycles, and security solutions. This presentation explores building such a strategy, focusing on asset identification, vulnerability assessment, identity management, and configuration history. We'll discuss data normalisation for effective risk reduction across the organisation.
13:05 PM
Lunch and Exhibition
14:35 PM
Technical Lab 1
Choose an expert led tech session. Click HERE for details
15:35 PM
Technical Lab 2
Your choice of workshop style breakout session. Click HERE for details
16:20 PM
Conference conclusion
Meet the Speakers

Lee Carter
Cyber Security Product Manager, SolutionsPT

Richard Allan
Regional Director North Europe, TXOne Networks

Dominic Storey
Principal OT Security Architect, Tenable

Christophe Bourel

Elliot Gidley
EMEA Field CTO, Claroty
Tech Labs
Practical demonstration on how to reduce your cyber exposure in converged IT/OT environments with TenableOne for OT
The Tenable team will demonstrate how organisations can build a unified approach to cyber risk and normalise their data so that they can take effective risk reduction decisions across their estate by taking a proactive approach to securing converged IT/OT environments.
How to protect your organisation against known and unknown threats from USB devices
This presentation will show you what you don't expect: USB is not dead ! Threats are increasing, with 50% of new malware designed to spread via removable devices, and concerns about unknown threats are growing stronger with the rise of AI. Come discover how to protect yourself.
To Speak with Shadows Understand the Language of the Darkness to Protect Your Crown Jewels
The so-called “IT/OT Convergence” may be a misnomer. While the lines between Information Technology and Operational Technology are becoming increasingly blurry, the fact that these remain two distinct stakeholder communities may inadvertently increase the security risk within a supply chain.
Shared responsibility can lead to confusion and misunderstandings around the unintended consequences of software patches, device installation, data security, and governance. Understanding the risks and drivers for IT and OT can be a valuable first step in better managing the common goal of a secure supply chain and uninterrupted operations.
Know Your Risks! From Identification to Mitigation
Claroty's xDome solution is the latest innovation from the market leader in OT security that allows you to visually understand the risks to your Cyber Physical Systems and helps you prioritise where to take action and improve your operational resilience.
Learn how to quantify the risks of your OT environment, analyse and simulate where and how to respond to have the quickest impact, then take the next steps through to eventual mitigation and remediation.
Seamless Integration and Unmatched Scalability: Cyolo’s OT-Focused Solution
Discover how Cyolo seamlessly integrates OT systems with modern IT infrastructures. Its hybrid, agentless architecture supports legacy protocols with minimal customisation. Cyolo ensures secure, scalable access without disrupting operations, empowering businesses to grow confidently while maintaining agility, performance, and robust protection across all technology layers.
PLC Version Control and Backup
Octoplant offers an elegant and robust way to protect critical applications that are running on your PLCs and SCADA systems.
Version control becomes effortless with Octoplant, with a host of tools and features to track every change made by everybody, every time.
Octoplant ensures your applications are protected and available quickly. Should an incident occur, you can recover that application quickly, which will reduce costly downtime and helps to protect the bottom line.
See Octoplant in action and how it can benefit your organisation.
Data Communication between OT and IT systems. Which topologies are most secure?
Organisations need to pass data between their IT/OT environments. Across an estate of sites, you will find a variety of machines/devices on the OT network and a variety of software environments on the IT network.
In this presentation we will explore how to create a universal OT/IT stack, with security designed into its structure.
Architecting for Security in Today’s Connected World
The right architecture can inherently improve your exposure to cyber-oriented incidents by reducing the surface available to an adversary to attack.
This short presentation will deliver a brief overview of ThinManager for the unfamiliar and then discuss multiple ways using ThinManager in your industrial architecture can lower costs while at the same time protecting your assets.
IT level Security in an OT Environment
2025 Venue details
National Motorcycle Museum, Birmingham
Coventry Road, Bickenhill, Solihull,
West Midlands. B92 0EJ
The National Motorcycle Museum is situated in the very centre of England, in the West Midlands near Birmingham, with easy access from both the south and the north of the UK.
Free parking is available.
Our partners




.png)




Previous Event Highlights



.png?width=2000&height=1500&name=MicrosoftTeams-image%20(4).png)



















