Thank You To Our Premier Sponsor

IRON OT Logo

The future of intelligence evolution relies on a strategic approach that integrates supply chain sustainability and security. By leveraging smart technologies and prioritizing standards and conformance, we can create a more resilient and secure future for all.

Conference Tracks

 TRACK 1 
Threat Intelligence and Supply Chain Security: Driving Resilient and Secure Automation

As automation and industrial technologies continue to advance, organizations face an increasingly complex threat landscape. Integrating threat intelligence with robust supply chain and operational technology (OT) security strategies is essential to building resilient, adaptive and efficient systems.

Threat intelligence enables organizations to leverage advanced capabilities such as machine learning, artificial intelligence and predictive analytics to better understand emerging risks, learn from past incidents and make informed, proactive decisions. At the same time, the growing interconnectedness of systems and reliance on third-party vendors make supply chain security a critical priority, as attackers increasingly exploit weaknesses across the extended ecosystem.

By combining intelligence-driven security practices with secure-by-design principles and strong supply chain governance, organizations can strengthen their cybersecurity posture, protect critical infrastructure and drive transformative progress across industries while staying ahead of evolving threats and regulatory requirements.

Takeaways
  • Strengthen network, OT and supply chain security using intelligence-driven and secure-by-design approaches.

    Improve detection, prevention and response to cyber threats through effective threat intelligence.

    Apply key standards, technologies and regulations (NIS2, CRA, ISA/IEC 62443) to enhance cybersecurity posture.

    Build resilient threat intelligence and supply chain risk management strategies to anticipate and mitigate emerging risks. 

 TRACK 2 
Cyber-Physical Safety Risk Management: Protecting People, Assets and Operations

Cyber-physical safety risk management plays a critical role in the safe and resilient operation of modern asset-intensive organizations. As industrial environments become increasingly digital, the convergence of information technology (IT), operational technology (OT) and physical processes introduces new pathways through which cyber events can create real-world safety consequences. 

Effective cyber-physical safety risk management integrates cybersecurity, functional safety and operational risk practices to identify, assess and control hazards that span digital and physical domains. This includes understanding how abnormal cyber conditions can affect control systems, safety instrument functions and human decision-making, as well as how operational and maintenance activities can unintentionally introduce cyber-enabled safety risks.

By adopting a structured, risk-based approach grounded in engineering, standards and real-world incident analysis, organizations can better anticipate unsafe conditions, strengthen defenses and ensure that automation systems remain safe, reliable and resilient throughout their lifecycle.

Takeaways
  • Understand how cyber threats and abnormal digital conditions can translate into physical safety hazards affecting people, equipment and the environment.

    Learn how to apply risk-based frameworks and industrial standards to manage cyber-physical safety across the lifecycle of automated systems. 

    Improve collaboration between safety, cybersecurity, operations and engineering teams to reduce gaps between digital security and physical safety management.

    Explore real-world incidents, emerging threats and best practices for identifying, assessing and mitigating cyber-physical safety risks in industrial and critical infrastructure environments.

Daily Schedule

Tuesday,
16 June

Exhibitor Setup


Kickoff Reception


 

Wednesday,
17 June

Cyber Empowerment Forum


Conference Day 1


Expo Day 1


Welcome Reception


 

Thursday,
18 June

Conference Day 2


Expo Day 2


 

Friday,
19 June

IC32 Training


IC33 Training


 

Saturday,
20 June

IC32 Training


IC33 Training


 

Sunday,
21 June

IC33 Training


 

Why You Should Attend

Cyber Track icon - dive-ase

Connect with global cybersecurity professionals through expert-led sessions, exhibits and engagement activities.

Career track icon - discover-ase

Impact your industry by learning about the latest trends and new technologies.

ASE Cybersecurity Track icon

Cultivate leadership buy-in by learning to craft a cybersecurity strategy that aligns with your organizational goals.

DT track icon - obtain-ase

Earn professional development hours for each session.

 

Who Should Attend

Individuals who are directly involved in securing operational technology (OT) systems within their organizations at the management level or higher in the following industries:

Energy

Manufacturing

Transportation

Government Policy

Oil & Gas

Rail & Maritime

Explore the 2025 Event Photo Album!

54611796200_4a13295cf9_b

Explore the 2025 Event Photo Album!


View Album

Watch the 2025 Recap Video

Explore the 2025 Event Photo Album!

2025 Keynote Speakers

Bola Adesina-1

Day 1 | 18 June

Embracing AI to Enhance Your Job

Bola Adesina, MBA
Director of AI Governance & Ethics
Bola Adesina Consulting
John Fitzpatrick

Day 2 | 19 June

Proven Resilience:
Trusting in OT's Own Path
to Cybersecurity

John Fitzpatrick
Founder, Lab539

2025 Keynote Speakers

Bola Adesina-1

Day 1 | 18 June

Embracing AI to Enhance Your Job

Bola Adesina, MBA
Director of AI Governance & Ethics
Bola Adesina Consulting
John Fitzpatrick

Day 2 | 19 June

Proven Resilience:
Trusting in OT's Own Path
to Cybersecurity

John Fitzpatrick
Founder, Lab539

2025 Conference Tracks

TRACK 1: Threat Intelligence: Transforming Business and Driving Progress

Threat Intelligence plays a crucial role in the ongoing advancement of automation by enabling the development of more sophisticated, adaptive, and efficient systems. As automation technologies continue to evolve, integrating advanced intelligence capabilities, such as machine learning, artificial intelligence and predictive analytics, is becoming increasingly important.

These technologies enable automation systems to learn from experience, adapt to changing conditions, and make more informed decisions, ultimately driving greater efficiency, productivity, and accuracy.

By harnessing the power of the intelligence evolution threat intelligence, organizations can unlock new possibilities in automation and drive transformative change across various industries. 

Takeaways
  • Focus on enhancing the security of your network and information systems.

    Enhance your ability to detect, prevent and respond to cyber threats.

    Discover the latest developments in new technology and government policy (NIS2 and CRA) and adapt them to improve your organization's cybersecurity posture.

    Analyze the latest trends, challenges and best practices for building and maintaining a threat intelligence program to help organizations stay ahead of emerging threats.  

TRACK 2: Securing the Supply Chain: Strategies for Mitigating Risk

As the industrial landscape rapidly evolves, ensuring the security of operational technology (OT) systems is paramount. A critical component of this is safeguarding the supply chain, which has become a prime target for cybercriminals seeking to exploit vulnerabilities.

With the rise of interconnected systems and the growing reliance on third-party vendors, organizations must develop a comprehensive approach to protecting their critical infrastructure and understand the implications of supply chain security for their overall cybersecurity posture.

Takeaways
  • Participate in expert discussions about the ISA/IEC 62443 Standard Series and Conformity Assessments to ensure a robust cybersecurity position.

    Understand the core principles of Secure by Design and the recommended approach for communicating cybersecurity requirements.

    Build confidence in your OT cybersecurity plan and learn to anticipate new challenges.

    Secure and evolve the supply chain. Create a more comprehensive understanding of potential threats and vulnerabilities, leading to more effective risk mitigation strategies.

2025 Daily Schedule

Tuesday,
17 June

Exhibitor Setup


 

Wednesday,
18 June

Conference Day 1


Cyber Escape Room


Welcome Reception


 

Thursday,
19 June

Conference Day 2


Cyber Escape Room


 

Friday,
20 June

IC32 Training


IC33 Training


ICS4ICS Workshop


 

Saturday,
21 June

IC32 Training


IC33 Training


 

Registration Packages

Prices subject to change.

Conference Registration
  • ISA Member: 762.00 €
  • Non-Member: 990.00 €
Conference Add-ons
  • Cybersecurity Escape Room: 60 €
  • Incident Command System for Industrial Control Systems (ICS4ICS) Workshop: 149 €

 

Training

Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32)

  • Fees:
    • Member: 1650.00 €
    • Non-Member: 2050.00 € 
  • Dates: 20-21 June 2025; 8:00 a.m.-4:00 p.m. daily

Assessing the Cybersecurity of New or Existing IACS Systems (IC33)

  • Fees:
    • Member: 1650.00 €
    • Non-Member: 2050.00 €
  • Dates: 20-21 June 2025; 8:00 a.m.-4:00 p.m. daily

Registration Packages

Prices subject to change.

Conference Registration
  • ISA Member: 762.00 €
  • Non-Member: 990.00 €
Conference Add-ons
  • Cybersecurity Escape Room: 60 €
  • Incident Command System for Industrial Control Systems (ICS4ICS) Workshop: 149 €

 

Training

Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32)

  • Fees:
    • Member: 1650.00 €
    • Non-Member: 2050.00 € 
  • Dates: 20-21 June 2025; 8:00 a.m.-4:00 p.m. daily

Assessing the Cybersecurity of New or Existing IACS Systems (IC33)

  • Fees:
    • Member: 1650.00 €
    • Non-Member: 2050.00 €
  • Dates: 20-21 June 2025; 8:00 a.m.-4:00 p.m. daily
260

Attendees

34

Sessions

44

Speakers

117 %

Increase in attendance year over year

Watch the 2024 Recap Video

2024 Event Recap

Neon-Escape-Room-Graphic-ISA-OTCS
You won't want to miss our highly immersive, custom-created OT Cyber Escape Room! Can you succeed before time runs out? Come and find out!

Thank You to Our 2025 Sponsors

Diamond Sponsors

honeywell-logo-300
Schneider-Electric-350px

Platinum Sponsors

ISAGCA-Logo - Color-on-White
ISASecure-Logo-Color-RGB

Gold Sponsors

armis_PMS269-BLK_med
1898-logo-gray-bmcd-400px
Cyolo Logo Colors-Green and Black
Fortinet-logo-350
01_MS logo_full (1)
ssh_logo_black_tight

Silver Sponsor

Claroty-Logo-500px

Break Sponsors

Waterfall Logo
Radiflow-logo
Orise_Logo_Dusk_Black_RGB

Booth Sponsors

Xona Logo-Full Color (1)
Salvador logo Tall White BG
cynalytica_cmyk_600_dpi
Tosibox-logo-350px
logo-Xage-Security-Color-Light-Background-300px
LOGO_WALLIX_2024_black+orange (3) (1)
HMS logo - 500px-1

Media Partners

automation.com-logo - color-on-transparent-background
IndCy+TPR

2025 OT Cybersecurity Summit

More details coming soon! Sign up below to receive ISA event emails to stay up to date.

Meet Our 2024 Keynotes

sarah-fluchs-headshot

Sarah Fluchs

CTO, admeritia GmbH

simon-hodgkins-headshot

Simon Hodgkinson

Former BP CISO

What Attendees Say About the Event

testimonials
"It's been amazing networking and meeting new people. I've enjoyed talking and listening about other people's experiences in cybersecurity. What's been great about this event is all the vendors that are here and being exposed to new products."
Patrick Corbett
Patrick Corbett
Attendee, PepsiCo
testimonials
"ISA events are great because the attendees are quite OT-centric, and that's the benefit, we as speakers get out of the conference. Also, it's well structured. ISA has the right slots, the right topics and it's a great conference for everyone in the OT industry to attend."
Anjay Mandalia
Anjay Mandalia
Speaker, TXOne Networks

Very well supported, feature rich, responsive and fast theme

Dark Business Pro is superb - it has all the features you'd expect and is fairly customizable. I had to add some custom CSS to pages to get it just the way I wanted. When I hit a tricky bit, I just emailed FThemes and got an answer to my problem very quickly. One aspect could be improved - upgrading from the Free version to the Pro version isn't completely clean, so having started the config on the Free theme, I had to rebuild the site from scratch on the Pro theme. No big deal as I had only made two pages, but it could have been worse if I had heavily invested before discovering this. Overall, it's an amazing dark theme - I highly recommend it.

Tapan Sharma

Founder of Yati Events
Layer 0 (1)

Very well supported, feature rich, responsive and fast theme

Dark Business Pro is superb - it has all the features you'd expect and is fairly customizable. I had to add some custom CSS to pages to get it just the way I wanted. When I hit a tricky bit, I just emailed FThemes and got an answer to my problem very quickly. One aspect could be improved - upgrading from the Free version to the Pro version isn't completely clean, so having started the config on the Free theme, I had to rebuild the site from scratch on the Pro theme. No big deal as I had only made two pages, but it could have been worse if I had heavily invested before discovering this. Overall, it's an amazing dark theme - I highly recommend it.

Tapan Sharma

Founder of Yati Events
Layer 0 (1)

Very well supported, feature rich, responsive and fast theme

Dark Business Pro is superb - it has all the features you'd expect and is fairly customizable. I had to add some custom CSS to pages to get it just the way I wanted. When I hit a tricky bit, I just emailed FThemes and got an answer to my problem very quickly. One aspect could be improved - upgrading from the Free version to the Pro version isn't completely clean, so having started the config on the Free theme, I had to rebuild the site from scratch on the Pro theme. No big deal as I had only made two pages, but it could have been worse if I had heavily invested before discovering this. Overall, it's an amazing dark theme - I highly recommend it.

Tapan Sharma

Founder of Yati Events
Layer 0 (1)