Gain Confidence in your OT Plan

The future of intelligence evolution relies on a strategic approach that integrates supply chain sustainability and security. By leveraging intelligent technologies and prioritizing standards and conformance, we can create a more resilient and secure future for all. 

Keynote Speakers

Lauren NEal-rev

Day 1 | 18 June

Protecting Capital Assets
with a Robust
Cybersecurity Plan 

Lauren Neal
Project Manager, BP, UK
John Fitzpatrick

Day 2 | 19 June

Proven Resilience:
Trusting in OT's Own Path
to Cybersecurity

John Fitzpatrick
Founder, Lab539

Conference Tracks

TRACK 1: Threat Intelligence: Transforming Business and Driving Progress

Threat Intelligence plays a crucial role in the ongoing advancement of automation by enabling the development of more sophisticated, adaptive, and efficient systems. As automation technologies continue to evolve, integrating advanced intelligence capabilities, such as machine learning, artificial intelligence and predictive analytics, is becoming increasingly important.

These technologies enable automation systems to learn from experience, adapt to changing conditions, and make more informed decisions, ultimately driving greater efficiency, productivity, and accuracy.

By harnessing the power of the intelligence evolution threat intelligence, organizations can unlock new possibilities in automation and drive transformative change across various industries. 

Takeaways
  • Focus on enhancing the security of your network and information systems.

    Enhance your ability to detect, prevent and respond to cyber threats.

    Discover the latest developments in new technology and government policy (NIS2 and CRA) and adapt them to improve your organization's cybersecurity posture.

    Analyze the latest trends, challenges and best practices for building and maintaining a threat intelligence program to help organizations stay ahead of emerging threats.  

TRACK 2: Securing the Supply Chain: Strategies for Mitigating Risk

As the industrial landscape rapidly evolves, ensuring the security of operational technology (OT) systems is paramount. A critical component of this is safeguarding the supply chain, which has become a prime target for cybercriminals seeking to exploit vulnerabilities.

With the rise of interconnected systems and the growing reliance on third-party vendors, organizations must develop a comprehensive approach to protecting their critical infrastructure and understand the implications of supply chain security for their overall cybersecurity posture.

Takeaways
  • Participate in expert discussions about the ISA/IEC 62443 Standard Series and Conformity Assessments to ensure a robust cybersecurity position.

    Understand the core principles of Secure by Design and the recommended approach for communicating cybersecurity requirements.

    Build confidence in your OT cybersecurity plan and learn to anticipate new challenges.

    Secure and evolve the supply chain. Create a more comprehensive understanding of potential threats and vulnerabilities, leading to more effective risk mitigation strategies.

Daily Schedule

Wednesday,
18 June

Cyber Escape Room


Threat Intelligence Track


Securing the Supply Chain Track


Welcome Reception


 

Thursday,
19 June

Cyber Escape Room


Threat Intelligence Track


Securing the Supply Chain Track


 

Friday,
20 June

IC32 Training


IC33 Training


ICS4ICS Workshop


 

Saturday,
21 June

IC32 Training


IC33 Training


 

Registration Packages

Conference Registration
  • ISA Member: 762.00 €
  • Non-Member: 990.00 €
Conference Add-ons
  • Cybersecurity Escape Room: 60 €
  • Incident Command System for Industrial Control Systems (ICS4ICS) Workshop: 149 €

 

Training

Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32)

  • Fees: Member: 1582.00 €
  • Non-Member: 1883.00 € 
  • Dates: 20-21 June 2025; 8:00 a.m.-4:00 p.m. daily

Assessing the Cybersecurity of New or Existing IACS Systems (IC33)

  • Fees: Member: 2184.00 €
  • Non-Member: 2585.00 €
  • Dates: 20-21 June 2025; 8:00 a.m.-4:00 p.m. daily

Why You Should Attend

Cyber Track icon - dive-ase

Connect with global cybersecurity professionals through expert-led sessions, exhibits and engagement activities.

Career track icon - discover-ase

Impact your industry by learning about the latest trends and new technologies.

ASE Cybersecurity Track icon
Cultivate leadership buy-in by learning to craft a cybersecurity strategy that aligns with your organizational goals.
DT track icon - obtain-ase
Earn professional development hours for each session.
260

Attendees

34

Sessions

44

Speakers

117 %

Increase in attendance year over year

Watch the 2024 Recap Video

Who Should Attend

Individuals who are directly involved in securing operational technology (OT) systems within their organizations at the management level or higher in the following industries:

  • Energy
  • Manufacturing
  • Water/Wastewater
  • Government Policy
  • Oil & Gas
  • Transportation

2024 Event Recap

2025 OT Cybersecurity Summit

More details coming soon! Sign up below to receive ISA event emails to stay up to date.

Meet Our 2024 Keynotes

sarah-fluchs-headshot

Sarah Fluchs

CTO, admeritia GmbH

simon-hodgkins-headshot

Simon Hodgkinson

Former BP CISO

v

What Attendees Say About the Event

>
testimonials
"It's been amazing networking and meeting new people. I've enjoyed talking and listening about other people's experiences in cybersecurity. What's been great about this event is all the vendors that are here and being exposed to new products."
Patrick Corbett
Patrick Corbett
Attendee, PepsiCo
testimonials
"ISA events are great because the attendees are quite OT-centric, and that's the benefit, we as speakers get out of the conference. Also, it's well structured. ISA has the right slots, the right topics and it's a great conference for everyone in the OT industry to attend."
Anjay Mandalia
Anjay Mandalia
Speaker, TXOne Networks