Infosecurity Europe
3-5 June 2025
ExCeL London

Guide to Infosec 2025 for Cyber Professionals in Manufacturing

Cybersecurity is vital in manufacturing to protect critical systems, supply chains and sensitive data from evolving threats, ensuring operational continuity and resilience.

This guide is designed to help cyber professionals who work in the manufacturing industry make the most of their visit to Infosecurity Europe, with a curated list of must-attend conference sessions, essential cybersecurity solutions and key exhibitors to check out.

5 Must-Attend Conference Sessions

  1. Guarding Critical Systems: IT-OT Security through Threat Detection
    Company: Gatewatcher
    Why attend:
    This session covers cybersecurity across IT and operational technology (OT) — essential for securing factories and industrial control systems.
    When: Wednesday 4th June, 12:20-12:45
    For more details, click here.

  2. From Stuxnet to Pagers: Weaponising Hardware Supply Chains
    Company:
    Sepio
    Why attend:
    This session focuses on hardware-level attacks and supply chain vulnerabilities — high-risk areas for smart manufacturing operations.
    When: Wednesday 4th June, 10:00-10:25
    For more details, click here.

  3. Untangling the Supply Chain Problem: Managing Third-Party Risk at Scale
    Company:
    Risk Ledger
    Why attend:
    The session Addresses how to manage third-party risk and supplier ecosystems, a critical challenge in manufacturing cybersecurity.
    When: Wednesday 4th June, 10:00-11:15
    For more details, click here.

  4. From Ransomware to Evacuation: Lessons from Critical Infrastructure Attacks
    Company:
    Code Blue
    Why attend:
    A case study on handling ransomware in high-risk environments — applicable to manufacturing sites and production continuity.
    When: Tuesday 3rd June, 10:35-11:00
    For more details, click here.

  5. CISO Secrets: Strengthening Cyber Resilience in 2025
    Company:
    Varonis
    Why attend:
    The session offers practical strategies from top CISOs (including those from manufacturing) on improving cyber resilience. Focuses on data-centric, identity-first security, and automation—critical for protecting sensitive IP, controlling access across machines and people, and securing hybrid manufacturing environments.
    When: Tuesday 3rd June, 12:00-12:25
    For more details, click here.

5 Essential Cybersecurity Solutions and Exhibitors for Manufacturing

1. OT (Operational Technology) Security
Why it matters: OT systems (e.g., SCADA, PLCs) control machinery and industrial processes. Unlike traditional IT, they were not designed with security in mind.
Examples:

  • Network segmentation for OT
  • Anomaly detection in industrial control systems
  • Asset discovery and inventory tools (e.g., Nozomi, Claroty, Dragos) 

Check out exhibitors with OT and IoT Security solutions here.

2. Supply Chain & Third-Party Risk Management
Why it matters: Manufacturers rely heavily on complex supplier networks — any breach in the chain can compromise operations.
Key tools:

  • Vendor risk assessment platforms
  • Software bill of materials (SBOM) tools
  • Continuous monitoring of third-party access

Check out exhibitors with Vulnerability Management solutions here.

3. Ransomware Defense & Incident Response
Why it matters:
 Manufacturing is a top target for ransomware due to its high-cost downtime. Fast response is critical.
Examples:

  • Endpoint detection and response (EDR)
  • Immutable backups
  • Playbooks for ransomware containment and recovery

4. Threat Detection & Security Monitoring (SIEM/XDR/NDR)
Why it matters:
 Proactive monitoring helps detect intrusions early — especially important in hybrid IT/OT environments.
Key tools:

  • Extended Detection & Response (XDR)
  • Network Detection & Response (NDR)
  • Security Information & Event Management (SIEM)

Check out exhibitors with Threat Intelligence solutions here.

5. Zero Trust Architecture & Identity Management
Why it matters: Many manufacturing environments still use legacy access models. Zero trust limits lateral movement if attackers gain entry.
Key tools:

  • Identity & access control for both users and machines
  • Privileged access management (PAM)
  • Microsegmentation
Check out exhibitors with Zero Trust and Identity and Access Management solutions here.


Peers Attending from the Manufacturing Industry

These organisations represent some of the biggest innovators in manufacturing cybersecurity and bring a wealth of knowledge and expertise to the event.

By attending the recommended sessions, exploring cutting-edge cybersecurity solutions, and engaging with top exhibitors, you will leave Infosecurity Europe equipped with practical insights to tackle today’s evolving challenges!


ADVERTISEMENT


Enjoyed this article? Make sure to share it!



Looking for something else?


Tags


ADVERTISEMENT


ADVERTISEMENT