<img src="https://secure.leadforensics.com/24951.png" alt="" style="display:none;">
Cyber SecureOT Promo Video 2024 - social

Industrial Cyber Security Made Simple

Join us to explore how to keep your industrial operation secure from cyber threats in a world of evolving threats. 
Get the right advice, best solutions and correct understanding of how a robust cyber security framework can keep your OT environment secure. 


Cyber SecureOT Agenda


June 20

We don't take a one-size-fits all approach to cyber security.  We have a range of market-leading software and hardware partners assembled to discuss their approach to tackling your cyber-security challenges.

9.30 AM



Tony Mannion, Industrial Cyber Security Business Development Manager, SolutionsPT

9.45 AM

Keynote: Anatomy of a Cyber-Incident in an OT Environment

Lee Carter, Industrial Cyber Security Product Manager, SolutionsPT

This presentation takes you through a typical day for an OT professional, highlighting their role in mitigating cyberattacks in today's industrial environment. We'll explore existing security measures and identify common deficiencies exposed during an attack. Finally, based on industry best practices, we'll discuss actionable steps to strengthen your OT security posture.

10:15 AM

Keynote: Industrial cyber security journey, a customer experience

John Thornley, Operational Technology Lead Engineer, Diageo

Challenges faced, successes and a personal journey of discovery implementing a cyber security strategy.

10:45 AM

Bringing OT cyber security out of the shadows

Richard Allan, Regional Director North Europe, TXOne Networks

TXOne Networks, mastering the language of the shadows in the realm of Industrial Ot/IoT cybersecurity, illuminates the path for manufacturing firms to combat cyber threats. Their cutting-edge OT native solutions protect critical infrastructure, ensuring operational continuity. Join us at Cyber SecureOT 2024 to learn how TXOne’s expertise can help you navigate the darkness of cybersecurity threats.

11:35 AM


Work smarter to detect threats and manage risks in your industrial network

Wycliffe Sylvester - Fraser, Solutions Engineer, Claroty

Using learnings from Claroty's State of XIoT bi annual report, this session will discuss the current threat landscape and what strategies can be used to mitigate today's security and operational risks and challenges. The session will leverage real world examples as published by Team 82.

12:05 PM

Endpoint OT security (prevention of increase of attacks)

Stephen Grey, Regional Partner Manager, BlackBerry

UK manufacturers face a battery of cyber security risks, ranging from simple employee error through to complex targeted attacks. Our research found that production stoppages were the most common result of a cyber-attack (65%), with reputational damage ranking second (43%). Companies further revealed that new customers now want reassurance on details of the cyber security in place before signing contracts.

12:35 PM


Aligning your cyber security strategy to optimize business outcomes (and how to get a bigger security budget)

Dom Storey, Principal OT Architect, Tenable

ITSEC security professionals have traditionally communicated risk in the language of vulnerabilities: how many CVEs a machine has, severity mix and so on. We have been spearheading the move away from static vulnerability scores to real-time cyber-exposure indices, weaving asset context, vulnerabilities, threat detection, configuration drift detection and attack path analysis into an integrated view that identifies true system exposure. By mapping this exposure approach into the higher level risk matrices used by executives (financial, safety, environmental and reputation risk) we can align IT and OT ITSEC data with C-level corporate language and initiatives to maximise our utility and drive further ITSEC investment.

13:05 PM


Lunch and Exhibition

14:35 PM

Technical Lab 1

Choose an expert led tech session. Click HERE for details 


15:35 PM


Technical Lab 2

Your choice of workshop style breakout session. Click HERE for details

16:20 PM


Conference conclusion


Meet the Speakers

lee carter-1

Lee Carter

Cyber Security Product Manager, SolutionsPT

John Thornley 2

John Thornley

Operational Technology Lead Engineer, Diageo

Richard Allan

Richard Allan

Regional Director North Europe, TXOne Networks

Wycliffe Sylvester-Fraser

Wycliffe Sylvester-Fraser

Solutions Engineer, Claroty

Hugh Jones Head Shot-1

Hugh Jones

Principal Channel Sales Engineer, Blackberry

Dominic Storey

Dominic Storey

Principal OT Architect, Tenable



Tech labs

What’s new with Tenable OT Security 3.19 and how can it better secure your OT environment?

Tenable OT Security 3.19 ships in June and is packed with new and improved features that can help you on your security journey. Some notable enhancements include a massively increased IoT coverage, further enhancements to our industry-leading active query system, executive OT site reports, Cisco Catalyst embedded sensors, faster protocol and device support capability, better vulnerability tracking, connected asset detection and a new visual theme aligned with our other products. This session will highlight what’s new and show you the new capabilities in action.


Know Your Risks! From Identification to Mitigation

Claroty's xDome solution is the latest innovation from the market leader in OT security that allows you to visually understand the risks to your Cyber Physical Systems and helps you prioritise where to take action and improve your operational resilience.

Learn how to quantify the risks of your OT environment, analyse and simulate where and how to respond to have the quickest impact, then take the next steps through to eventual mitigation and remediation.

Protection of Offline Endpoint and Legacy Systems

Discover the power of BlackBerry's AI-driven protection, safeguarding offline and legacy systems with unmatched efficiency. Join us for an enlightening session showcasing how our innovative technology defends your digital assets, ensuring resilience and security in an ever-evolving landscape. Don't miss out on this opportunity to witness cutting-edge solutions in action!

Cyber-Attack Recovery for ICS & OT - In 30 Seconds!

With cyber-attack rate increasing exponentially, Salvador Technologies sets a new standard in operational continuity and cyber-attack recovery: 
a complete recovery in 30 seconds for SCADA/HMI systems.
The patented air-gap technology is designed to enhance resilience and minimize downtime in converged ICS & OT systems.
Salvador Technologies offers Plug & Play on-prem solutions, through an entirely automated recovery process, enabling your operation a complete and instant recovery in a one-click action.
Optimal for meeting RTO requirements and enterprise policy compliance

PLC Backup and Version Control

Octoplant offers an elegant and robust way to protect critical applications that are running on your PLC’s and SCADA systems.

Version control becomes effortless with Octoplant, with a host of tools and features to track every change made by everybody, every time.

Octoplant ensures your applications are protected and available quickly. Should an incident occur, you can recover that application quickly, which will reduce costly downtime and helps to protect the bottom line.

To Speak with Shadows Understand the Language of the Darkness to Protect Your Crown Jewels

The so-called “IT/OT Convergence” may be a misnomer. While the lines between Information Technology and Operational Technology are becoming increasingly blurry, the fact that these remain two distinct stakeholder communities may inadvertently increase the security risk within a supply chain.

Shared responsibility can lead to confusion and misunderstandings around the unintended consequences of software patches, device installation, data security, and governance.

Understanding the risks and drivers for IT and OT can be a valuable first step in better managing the common goal of a secure supply chain and uninterrupted operations.

Secure OT to Cloud Connectivity

This workshop tackles securing connections between Operational Technology (OT) systems and the cloud. Learn best practices to safeguard sensitive OT data while benefiting from cloud-based analytics, storage, and remote monitoring. We'll explore secure network architectures, data filtering, and one-way data flows to minimise risk. Discover how to leverage cloud technologies for enhanced OT functionality without compromising security.

From Darkness to Data: Strategies for OT Data Protection

With the rising significance of OT data, industrial networks are increasingly interconnected, heightening their vulnerability to cyberattacks and human errors. But is locking your data in a cave, an acceptable solution to mitigate these risks? This workshop offers a holistic approach to safeguarding industrial networks, presenting recommended best-practices, and delving into real-world attack scenarios to provide insights into methodologies and effective countermeasures.

IT level Security in an OT Environment



2024 Venue details

National Motorcycle Museum, Birmingham

Coventry Road, Bickenhill, Solihull,
West Midlands. B92 0EJ

The National Motorcycle Museum is situated in the very centre of England, in the West Midlands near Birmingham, with easy access from both the south and the north of the UK.

Free parking is available.

Our partners

Salvador Logo PNG 250pxl-1

2023 Event Highlights

Cyber SecureOT 2023 - 21-6-23 088
MicrosoftTeams-image (4)
Cyber SecureOT 2023 - 21-6-23 071
Cyber SecureOT 2023 - 21-6-23 109
Cyber SecureOT 2023 - 21-6-23 203
Cyber SecureOT 2023 - 21-6-23 199
Cyber SecureOT 2023 - 21-6-23 178
Cyber SecureOT 2023 - 21-6-23 103
Cyber SecureOT 2023 - 21-6-23 147
Cyber SecureOT 2023 - 21-6-23 167
Cyber SecureOT 2023 - 21-6-23 158
Cyber SecureOT 2023 - 21-6-23 145