Agenda
Presentations already confirmed include:
►The risks and opportunities that AI brings to cybersecurity
Gustavo Mania, Information Security and Risk Manager (Regional CISO), HEINEKEN (AME)
- Real-world AI-driven cyber-risks – from phishing automation to deepfakes and agentic AI threats
- Learn how HEINEKEN manages emerging AI risks while harnessing AI to strengthen defence
- Gain practical insights to help your organisation embrace AI securely and strategically
►How Neste built a business-driven cyber-risk program
Santtu Erkkilä, Cyber Governance, Risk & Compliance Lead, Neste
- Understand the key challenges Neste faced in managing cyber-risk across a global, complex industrial and R&D environment
- See the step-by-step journey of transforming their cyber program into one that is business-driven and risk-informed
- Learn the lessons from Neste’s experience that you can apply to mature your own organisation’s risk management program
►Maintaining Operations through Conflict: Emergency Planning in a Connected OT Environment
Matthew Rogers, Industrial Control Systems Cybersecurity Expert, CISA
- Security Connectivity Principles for OT, designing OT systems to be interconnected while maintaining operator control
- Threats impacting reliable telecommunications and internet, as well as disrupting and destroying OT
- CI Fortify, isolation and recovery goals for preventing some impact to OT in a crisis or conflict
- How to address connectivity requirements impact on isolation and recovery
►Cyber Crisis in Manufacturing: Prioritizing Recovery When Everything Is Critical
Kinga Kertesz-Takacs, Sr. Operational Technology Governance & Compliance Manager, Haleon
- Risk-Based Restoration Sequencing: How to determine what truly needs to come back online first during multi-site disruptions.
- Executive Decision-Making Under Pressure: Strategies for making fast, defensible recovery choices when every system feels mission-critical.
- Building Resilience Before the Crisis: Using governance frameworks to strengthen operational recovery and long-term stability.
►IT/OT Data Convergence and Data Value
Kate Silverman, Deputy CISO, Ardagh Group
- Understand how IT and OT data integration creates unified, real-time operational and business insights.
- Identify practical IT and OT data insights that drive performance, reliability, and efficiency improvements.
- Learn how to evaluate and define measurable data value aligned to business outcomes.
- Explore key data sharing considerations, including governance, ownership, interoperability, and cybersecurity.
- Recognize regulatory and compliance considerations impacting IT/OT data environments.
►How Conversations about Risk Shape Everyday Security Decisions
Marius Ebel, Senior Security Specialist, Bilfinger
- How everyday interactions and language shape shared reasoning about security risk.
- Why the way security discussions start often matters more than the controls or policies being discussed.
- How risk-based thinking plays out in day-to-day decisions beyond rules, tools, or processes.
►From Blind Spots to Control: Achieving Complete ICS/OT Exposure Visibility in Manufacturing
Nick Palmer, Senior Solutions Engineer, Censys
- Gain full ICS/OT visibility: Discover exposed HMIs, PLCs, and controllers with continuous global scanning and asset intelligence.
- Validate exposures quickly: Use real HMI screenshots and metadata to confirm risks with confidence.
- Speed up incident response: Triage alerts faster with contextual evidence and historical exposure data.
- Simplify compliance reporting: Generate audit-ready insights for industry regulators.
►CrowdStrike 2026 Global Threat Report: A Review of Key Findings
CrowdStrike
- Adversaries are becoming more evasive, faster, and harder to stop — they’re leveraging AI and abusing unmanaged edge devices to move rapidly across endpoint, identity, cloud, and SaaS environments while operating in plain sight.
- Join us for an in-depth review of the findings from the CrowdStrike 2026 Global Threat Report to gain actionable insights, strengthen your defences, and learn the critical steps needed to protect your organisation in the year ahead.
►Beyond Logs: Why Manufacturers Need Active Defence to Detect Earlier and Respond Faster
Carlo Minassian, Founder & CEO, LMNTRIX
- Manufacturing has been the #1-targeted industry by cybercriminals four years running — yet most security budgets still pour 80% into prevention, leaving detection and response chronically underfunded and understaffed.
- Logs-only approaches are failing: 99% of successful attacks go undiscovered by log analysis alone, and 83% of incidents take weeks or more to uncover. The industry needs a structural shift toward active defence — real-time monitoring, behavioural analysis, and human threat hunters who can spot what automated tools miss.
- Building a tiered Cyber Defence Centre (CDC), combining automation for high-volume triage with expert analysts for adversary hunting, gives manufacturers a practical framework for slashing mean time to remediate and limiting attacker dwell time.
- As ransomware actors evolve from encryption to pure extortion and IP theft, how do manufacturing security teams secure executive buy-in, the right organisational structure, and the authority to act — before the next incident forces the issue?
►Insights for OT resilience, reduce exposure & supply chain attack in 2026
Elliot Gidley, EMEA Field CTO, Claroty
- Manufacturing is being targeted by cyber criminal gangs
- Exposed HMIs and Open VNC is the Weapon of Choice
- Supply chain using non-central Secure Remote Access solutions are a risk
- Centralising Secure Remote Access
►Make Your Business a Hard Target for Cybercriminals
Seamus Lennon, VP of Operations EMEA, ThreatLocker
- When it comes to potential targets for cyberattacks, easier to breach means more likely to fall victim.
- While you might not be able to influence your perceived value, there are changes that can eliminate your organization from being seen as an easy target.
- We’ll explore practical tactics to reduce your surface area of attack and controls to prevent lateral movement should a breach occur.
►Inside the Manufacturing Threat Landscape – and How BeyondTrust Closes the Gaps
Tom Scase, Principal Solutions Engineer, BeyondTrust
- UK manufacturers face rising cyber risk across operational technology, driven by ransomware, insecure remote access, and IT/OT convergence.
- This session examines why legacy approaches no longer protect modern plants and shows how a framework‑driven model aligned to Purdue and ISA‑95 enables secure access without disrupting production.
- Learn how BeyondTrust helps manufacturers secure vendor access, control credentials, and reduce OT attack surface pragmatically.
- Understand how OT cyber risk is rising and directly threatens uptime and safety.
- How legacy remote access and VPNs are no longer fit for manufacturing.
- Secure OT access can align to Purdue without disrupting production.
- How to reduce risk fast with credential management and controlled vendor access.