isa_will_host_leading_ot_cybersecurity_event_in_ju

ISA will host Leading OT cybersecurity event in June in London

April 22, 2024
The event is expected to draw hundreds of operators, service companies, regulators and equipment providers

The International Society of Automation will host its second annual Operations Technology (OT) Cybersecurity Summit on June 18-19 in London. The two-day, two-track event is expected to draw hundreds of OT cybersecurity experts, including operators, service companies, regulators and equipment providers. It will be organized around two major topics: intelligence evolution and IoT cybersecurity, with additional panel discussions on standards and conformity assessment. Registration for the 2024 OT Cybersecurity Summit in London is open and starts at £500 GBP. For more information, click here.  

The keynote addresses will include “Security by design – a communication problem?” by Sarah Fluchs, CTO of admeritia, and “The intersection of sustainability and cybersecurity” by Simon Hodgkinson, formerly CISO at BP. They’ll be joining by close to 30 speakers representing the U.S. Dept. of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA), Rolls-Royce, Siemens, Royal Caribbean, Schneider Electric, Cybeats, exida, Cyber ICS, Exiger, Debian, Surrey Institute for PeopleCentered AI and National Automation. 

“The ISA community includes the world’s leading voices on industrial cybersecurity, and we’re proud to have developed ISA/IEC 62443, the standard behind the most robust and secure operational technologies,” says Claire Fallon, ISA executive director. “ISA OT Cybersecurity Summit stands apart 
from other cybersecurity events as a venue where attendees can gain practical knowledge about the standard and best practices for implementing it.”

Beyond its technical program, the event will offer workshops, special events and training opportunities, including:

  • “Using ISA/IEC 62443 standards to secure your control systems” (IC32),
  • “Assessing the cybersecurity of new and existing IACS systems” (IC33),
  • “Incident command systems for industrial control systems” (ICS4ICS) workshop
  • “Volunteer workshop” for ISA members
  • “Cyber-escape room” with participants imagining they’re on the International Space Station, that their oxygen systems has been hacked, and they have 15 minutes to solve the code before they run out of air. Working in a virtual, realistic OT environment, they’ll will solve puzzles and get answers to achieve their goals before the clock runs out.
About the Author

Jim Montague | Executive Editor

Jim Montague is executive editor of Control.