OT Cybersecurity Summit
Brussels, Belgium
17-19 June 2025
Strategic OT Cybersafety with ISA/IEC 62443
Intelligent Innovation for a Secure World
Gain Confidence in your OT Plan
The future of intelligence evolution relies on a strategic approach that integrates supply chain sustainability and security. By leveraging intelligent technologies and prioritizing standards and conformance, we can create a more resilient and secure future for all.
Keynote Speakers
Day 1 | 18 June
Protecting Capital Assets
with a Robust
Cybersecurity Plan
Lauren Neal
Project Manager, BP, UK
Day 2 | 19 June
Proven Resilience:
Trusting in OT's Own Path
to Cybersecurity
John Fitzpatrick
Founder, Lab539
Conference Tracks
TRACK 1: Threat Intelligence: Transforming Business and Driving Progress
Threat Intelligence plays a crucial role in the ongoing advancement of automation by enabling the development of more sophisticated, adaptive, and efficient systems. As automation technologies continue to evolve, integrating advanced intelligence capabilities, such as machine learning, artificial intelligence and predictive analytics, is becoming increasingly important.
These technologies enable automation systems to learn from experience, adapt to changing conditions, and make more informed decisions, ultimately driving greater efficiency, productivity, and accuracy.
By harnessing the power of the intelligence evolution threat intelligence, organizations can unlock new possibilities in automation and drive transformative change across various industries.
Takeaways
-
Focus on enhancing the security of your network and information systems.
Enhance your ability to detect, prevent and respond to cyber threats.
Discover the latest developments in new technology and government policy (NIS2 and CRA) and adapt them to improve your organization's cybersecurity posture.
Analyze the latest trends, challenges and best practices for building and maintaining a threat intelligence program to help organizations stay ahead of emerging threats.
TRACK 2: Securing the Supply Chain: Strategies for Mitigating Risk
As the industrial landscape rapidly evolves, ensuring the security of operational technology (OT) systems is paramount. A critical component of this is safeguarding the supply chain, which has become a prime target for cybercriminals seeking to exploit vulnerabilities.
With the rise of interconnected systems and the growing reliance on third-party vendors, organizations must develop a comprehensive approach to protecting their critical infrastructure and understand the implications of supply chain security for their overall cybersecurity posture.
Takeaways
-
Participate in expert discussions about the ISA/IEC 62443 Standard Series and Conformity Assessments to ensure a robust cybersecurity position.
Understand the core principles of Secure by Design and the recommended approach for communicating cybersecurity requirements.
Build confidence in your OT cybersecurity plan and learn to anticipate new challenges.
Secure and evolve the supply chain. Create a more comprehensive understanding of potential threats and vulnerabilities, leading to more effective risk mitigation strategies.
Daily Schedule
Wednesday,
18 June
Cyber Escape Room
Threat Intelligence Track
Securing the Supply Chain Track
Welcome Reception
Thursday,
19 June
Cyber Escape Room
Threat Intelligence Track
Securing the Supply Chain Track
Friday,
20 June
IC32 Training
IC33 Training
ICS4ICS Workshop
Saturday,
21 June
IC32 Training
IC33 Training
Registration Packages
Conference Registration
- ISA Member: 762.00 €
- Non-Member: 990.00 €
Conference Add-ons
- Cybersecurity Escape Room: 60 €
- Incident Command System for Industrial Control Systems (ICS4ICS) Workshop: 149 €
Training
Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32)
- Fees: Member: 1582.00 €
- Non-Member: 1883.00 €
- Dates: 20-21 June 2025; 8:00 a.m.-4:00 p.m. daily
Assessing the Cybersecurity of New or Existing IACS Systems (IC33)
- Fees: Member: 2184.00 €
- Non-Member: 2585.00 €
- Dates: 20-21 June 2025; 8:00 a.m.-4:00 p.m. daily
Why You Should Attend
Connect with global cybersecurity professionals through expert-led sessions, exhibits and engagement activities.
Impact your industry by learning about the latest trends and new technologies.
Cultivate leadership buy-in by learning to craft a cybersecurity strategy that aligns with your organizational goals.
Earn professional development hours for each session.
Attendees
Sessions
Speakers
Increase in attendance year over year
Watch the 2024 Recap Video
Who Should Attend
Individuals who are directly involved in securing operational technology (OT) systems within their organizations at the management level or higher in the following industries:
- Energy
- Manufacturing
- Water/Wastewater
- Government Policy
- Oil & Gas
- Transportation
2025 OT Cybersecurity Summit
More details coming soon! Sign up below to receive ISA event emails to stay up to date.
Meet Our 2024 Keynotes
Sarah Fluchs
CTO, admeritia GmbH
Simon Hodgkinson
Former BP CISO