Gain Confidence
in Your OT Plan
ISA OT Cybersecurity Summit
Prague, Czech Republic
16-18 June 2026
Early bird discount now through 17 April 2026!
Thank You To Our Premier Sponsor
The future of intelligence evolution relies on a strategic approach that integrates supply chain sustainability and security. By leveraging smart technologies and prioritizing standards and conformance, we can create a more resilient and secure future for all.
Conference Tracks
TRACK 1
Threat Intelligence and Supply Chain Security: Driving Resilient and Secure Automation
As automation and industrial technologies continue to advance, organizations face an increasingly complex threat landscape. Integrating threat intelligence with robust supply chain and operational technology (OT) security strategies is essential to building resilient, adaptive and efficient systems.
Threat intelligence enables organizations to leverage advanced capabilities such as machine learning, artificial intelligence and predictive analytics to better understand emerging risks, learn from past incidents and make informed, proactive decisions. At the same time, the growing interconnectedness of systems and reliance on third-party vendors make supply chain security a critical priority, as attackers increasingly exploit weaknesses across the extended ecosystem.
By combining intelligence-driven security practices with secure-by-design principles and strong supply chain governance, organizations can strengthen their cybersecurity posture, protect critical infrastructure and drive transformative progress across industries while staying ahead of evolving threats and regulatory requirements.
Takeaways
-
Strengthen network, OT and supply chain security using intelligence-driven and secure-by-design approaches.
Improve detection, prevention and response to cyber threats through effective threat intelligence.
Apply key standards, technologies and regulations (NIS2, CRA, ISA/IEC 62443) to enhance cybersecurity posture.
Build resilient threat intelligence and supply chain risk management strategies to anticipate and mitigate emerging risks.
TRACK 2
Cyber-Physical Safety Risk Management: Protecting People, Assets and Operations
Cyber-physical safety risk management plays a critical role in the safe and resilient operation of modern asset-intensive organizations. As industrial environments become increasingly digital, the convergence of information technology (IT), operational technology (OT) and physical processes introduces new pathways through which cyber events can create real-world safety consequences.
Effective cyber-physical safety risk management integrates cybersecurity, functional safety and operational risk practices to identify, assess and control hazards that span digital and physical domains. This includes understanding how abnormal cyber conditions can affect control systems, safety instrument functions and human decision-making, as well as how operational and maintenance activities can unintentionally introduce cyber-enabled safety risks.
By adopting a structured, risk-based approach grounded in engineering, standards and real-world incident analysis, organizations can better anticipate unsafe conditions, strengthen defenses and ensure that automation systems remain safe, reliable and resilient throughout their lifecycle.
Takeaways
-
Understand how cyber threats and abnormal digital conditions can translate into physical safety hazards affecting people, equipment and the environment.
Learn how to apply risk-based frameworks and industrial standards to manage cyber-physical safety across the lifecycle of automated systems.
Improve collaboration between safety, cybersecurity, operations and engineering teams to reduce gaps between digital security and physical safety management.
Explore real-world incidents, emerging threats and best practices for identifying, assessing and mitigating cyber-physical safety risks in industrial and critical infrastructure environments.
Daily Schedule
Tuesday,
16 June
Exhibitor Setup
Kickoff Reception
Wednesday,
17 June
Cyber Empowerment Forum
Conference Day 1
Expo Day 1
Welcome Reception
Thursday,
18 June
Conference Day 2
Expo Day 2
Friday,
19 June
IC32 Training
IC33 Training
Saturday,
20 June
IC32 Training
IC33 Training
Sunday,
21 June
IC33 Training
Why You Should Attend
Connect with global cybersecurity professionals through expert-led sessions, exhibits and engagement activities.
Impact your industry by learning about the latest trends and new technologies.
Cultivate leadership buy-in by learning to craft a cybersecurity strategy that aligns with your organizational goals.
Earn professional development hours for each session.
Who Should Attend
Individuals who are directly involved in securing operational technology (OT) systems within their organizations at the management level or higher in the following industries:
Energy
Manufacturing
Transportation
Government Policy
Oil & Gas
Rail & Maritime
Explore the 2025 Event Photo Album!
2025 Keynote Speakers
Day 1 | 18 June
Embracing AI to Enhance Your Job
Bola Adesina, MBA
Director of AI Governance & Ethics
Bola Adesina Consulting
Day 2 | 19 June
Proven Resilience:
Trusting in OT's Own Path
to Cybersecurity
John Fitzpatrick
Founder, Lab539
2025 Keynote Speakers
Day 1 | 18 June
Embracing AI to Enhance Your Job
Bola Adesina, MBA
Director of AI Governance & Ethics
Bola Adesina Consulting
Day 2 | 19 June
Proven Resilience:
Trusting in OT's Own Path
to Cybersecurity
John Fitzpatrick
Founder, Lab539
2025 Conference Tracks
TRACK 1: Threat Intelligence: Transforming Business and Driving Progress
Threat Intelligence plays a crucial role in the ongoing advancement of automation by enabling the development of more sophisticated, adaptive, and efficient systems. As automation technologies continue to evolve, integrating advanced intelligence capabilities, such as machine learning, artificial intelligence and predictive analytics, is becoming increasingly important.
These technologies enable automation systems to learn from experience, adapt to changing conditions, and make more informed decisions, ultimately driving greater efficiency, productivity, and accuracy.
By harnessing the power of the intelligence evolution threat intelligence, organizations can unlock new possibilities in automation and drive transformative change across various industries.
Takeaways
-
Focus on enhancing the security of your network and information systems.
Enhance your ability to detect, prevent and respond to cyber threats.
Discover the latest developments in new technology and government policy (NIS2 and CRA) and adapt them to improve your organization's cybersecurity posture.
Analyze the latest trends, challenges and best practices for building and maintaining a threat intelligence program to help organizations stay ahead of emerging threats.
TRACK 2: Securing the Supply Chain: Strategies for Mitigating Risk
As the industrial landscape rapidly evolves, ensuring the security of operational technology (OT) systems is paramount. A critical component of this is safeguarding the supply chain, which has become a prime target for cybercriminals seeking to exploit vulnerabilities.
With the rise of interconnected systems and the growing reliance on third-party vendors, organizations must develop a comprehensive approach to protecting their critical infrastructure and understand the implications of supply chain security for their overall cybersecurity posture.
Takeaways
-
Participate in expert discussions about the ISA/IEC 62443 Standard Series and Conformity Assessments to ensure a robust cybersecurity position.
Understand the core principles of Secure by Design and the recommended approach for communicating cybersecurity requirements.
Build confidence in your OT cybersecurity plan and learn to anticipate new challenges.
Secure and evolve the supply chain. Create a more comprehensive understanding of potential threats and vulnerabilities, leading to more effective risk mitigation strategies.
2025 Daily Schedule
Tuesday,
17 June
Exhibitor Setup
Wednesday,
18 June
Conference Day 1
Cyber Escape Room
Welcome Reception
Thursday,
19 June
Conference Day 2
Cyber Escape Room
Friday,
20 June
IC32 Training
IC33 Training
ICS4ICS Workshop
Saturday,
21 June
IC32 Training
IC33 Training
Registration Packages
Prices subject to change.
Conference Registration
- ISA Member: 762.00 €
- Non-Member: 990.00 €
Conference Add-ons
- Cybersecurity Escape Room: 60 €
- Incident Command System for Industrial Control Systems (ICS4ICS) Workshop: 149 €
Training
Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32)
- Fees:
- Member: 1650.00 €
- Non-Member: 2050.00 €
- Dates: 20-21 June 2025; 8:00 a.m.-4:00 p.m. daily
Assessing the Cybersecurity of New or Existing IACS Systems (IC33)
- Fees:
- Member: 1650.00 €
- Non-Member: 2050.00 €
- Dates: 20-21 June 2025; 8:00 a.m.-4:00 p.m. daily
Registration Packages
Prices subject to change.
Conference Registration
- ISA Member: 762.00 €
- Non-Member: 990.00 €
Conference Add-ons
- Cybersecurity Escape Room: 60 €
- Incident Command System for Industrial Control Systems (ICS4ICS) Workshop: 149 €
Training
Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32)
- Fees:
- Member: 1650.00 €
- Non-Member: 2050.00 €
- Dates: 20-21 June 2025; 8:00 a.m.-4:00 p.m. daily
Assessing the Cybersecurity of New or Existing IACS Systems (IC33)
- Fees:
- Member: 1650.00 €
- Non-Member: 2050.00 €
- Dates: 20-21 June 2025; 8:00 a.m.-4:00 p.m. daily
Attendees
Sessions
Speakers
Increase in attendance year over year
Watch the 2024 Recap Video

You won't want to miss our highly immersive, custom-created OT Cyber Escape Room! Can you succeed before time runs out? Come and find out!
Thank You to Our 2025 Sponsors
Diamond Sponsors


Platinum Sponsors


Gold Sponsors



.png?width=250&height=65&name=01_MS%20logo_full%20(1).png)

Silver Sponsor

Break Sponsors



Booth Sponsors



%20(1).png?width=200&height=53&name=LOGO_WALLIX_2024_black+orange%20(3)%20(1).png)

Media Partners


2025 OT Cybersecurity Summit
More details coming soon! Sign up below to receive ISA event emails to stay up to date.
Meet Our 2024 Keynotes
Sarah Fluchs
CTO, admeritia GmbH
Simon Hodgkinson
Former BP CISO
What Attendees Say About the Event
Very well supported, feature rich, responsive and fast theme
Dark Business Pro is superb - it has all the features you'd expect and is fairly customizable. I had to add some custom CSS to pages to get it just the way I wanted. When I hit a tricky bit, I just emailed FThemes and got an answer to my problem very quickly. One aspect could be improved - upgrading from the Free version to the Pro version isn't completely clean, so having started the config on the Free theme, I had to rebuild the site from scratch on the Pro theme. No big deal as I had only made two pages, but it could have been worse if I had heavily invested before discovering this. Overall, it's an amazing dark theme - I highly recommend it.
Tapan Sharma
Very well supported, feature rich, responsive and fast theme
Dark Business Pro is superb - it has all the features you'd expect and is fairly customizable. I had to add some custom CSS to pages to get it just the way I wanted. When I hit a tricky bit, I just emailed FThemes and got an answer to my problem very quickly. One aspect could be improved - upgrading from the Free version to the Pro version isn't completely clean, so having started the config on the Free theme, I had to rebuild the site from scratch on the Pro theme. No big deal as I had only made two pages, but it could have been worse if I had heavily invested before discovering this. Overall, it's an amazing dark theme - I highly recommend it.
Tapan Sharma
Very well supported, feature rich, responsive and fast theme
Dark Business Pro is superb - it has all the features you'd expect and is fairly customizable. I had to add some custom CSS to pages to get it just the way I wanted. When I hit a tricky bit, I just emailed FThemes and got an answer to my problem very quickly. One aspect could be improved - upgrading from the Free version to the Pro version isn't completely clean, so having started the config on the Free theme, I had to rebuild the site from scratch on the Pro theme. No big deal as I had only made two pages, but it could have been worse if I had heavily invested before discovering this. Overall, it's an amazing dark theme - I highly recommend it.
Tapan Sharma


