Guide to Infosec 2025 for Cyber Professionals in Manufacturing
Cybersecurity is vital in manufacturing to protect critical systems, supply chains and sensitive data from evolving threats, ensuring operational continuity and resilience.
This guide is designed to help cyber professionals who work in the manufacturing industry make the most of their visit to Infosecurity Europe. Here are some of the conference sessions, cybersecurity solutions and exhibitors to check out.
Conference Sessions Include
- Guarding Critical Systems: IT-OT Security through Network Visibility
Company: Gatewatcher
Why attend: This session covers cybersecurity across IT and operational technology (OT) — essential for securing factories and industrial control systems.
When: Wednesday 4th June, 12:20-12:45
Learn more
- From Stuxnet to Pagers: Weaponizing Hardware Supply Chain Attacks
Company: Sepio
Why attend: This session focuses on hardware-level attacks and supply chain vulnerabilities — high-risk areas for smart manufacturing operations.
When: Wednesday 4th June, 10:00-10:25
Learn more
- Untangling the Supply Chain Problem: Managing Concentration Risk
Company: Risk Ledger
Why attend: The session Addresses how to manage third-party risk and supplier ecosystems, a critical challenge in manufacturing cybersecurity.
When: Wednesday 4th June, 10:00-11:15
Learn more
- From Ransomware to Evacuation: Lessons Learned in Managing Cyber Crises with Lives on the Line
Company: Code Blue
Why attend: A case study on handling ransomware in high-risk environments — applicable to manufacturing sites and production continuity.
When: Tuesday 3rd June, 10:35-11:00
Learn more
- CISO Secrets: Strengthening Cyber Resilience in 2025
Company: Varonis
Why attend: The session offers practical strategies from top CISOs (including those from manufacturing) on improving cyber resilience. Focuses on data-centric, identity-first security, and automation—critical for protecting sensitive IP, controlling access across machines and people, and securing hybrid manufacturing environments.
When: Tuesday 3rd June, 12:00-12:25
Learn more
Cybersecurity Solutions and Exhibitors Include
1. OT (Operational Technology) Security
OT systems (e.g., SCADA, PLCs) control machinery and industrial processes. Unlike traditional IT, they were not designed with security in mind.
Examples:
- Network segmentation for OT
- Anomaly detection in industrial control systems
- Asset discovery and inventory tools (e.g., Nozomi, Claroty, Dragos)
Check out exhibitors with OT and IoT Security solutions here.
2. Supply Chain & Third-Party Risk Management
Manufacturers rely heavily on complex supplier networks — any breach in the chain can compromise operations.
Examples:
- Vendor risk assessment platforms
- Software bill of materials (SBOM) tools
- Continuous monitoring of third-party access
Check out exhibitors with Vulnerability Management solutions here.
3. Ransomware Defense & Incident Response
Manufacturing is a top target for ransomware due to its high-cost downtime. Fast response is critical.
Examples:
- Endpoint detection and response (EDR)
- Immutable backups
- Playbooks for ransomware containment and recovery
Check out exhibitors with Incident Response solutions here.
4. Threat Detection & Security Monitoring (SIEM/XDR/NDR)
Proactive monitoring helps detect intrusions early — especially important in hybrid IT/OT environments.
Examples:
- Extended Detection & Response (XDR)
- Network Detection & Response (NDR)
- Security Information & Event Management (SIEM)
Check out exhibitors with Threat Intelligence solutions here.
5. Zero Trust Architecture & Identity Management
Many manufacturing environments still use legacy access models. Zero trust limits lateral movement if attackers gain entry.
Examples:
- Identity & access control for both users and machines
- Privileged access management (PAM)
- Microsegmentation
Register for Europe’s leading cybersecurity event
Join us at London ExCeL, 3-5 June, for three days of learning, networking, discovering and exploring all things Infosecurity.
These organisations represent some of the biggest innovators in manufacturing cybersecurity and bring a wealth of knowledge and expertise to the event.
By attending the recommended sessions, exploring cutting-edge cybersecurity solutions, and engaging with top exhibitors, you will leave Infosecurity Europe equipped with practical insights to tackle today’s evolving challenges!
ADVERTISEMENT
Enjoyed this article? Make sure to share it!
Latest Articles
Keep up to date with the latest infosecurity news and trends in our latest articles.
Stay in the know
Receive updates about key events, news and recent insights from Infosecurity Europe.
Looking for something else?