Infosecurity Europe
2-4 June 2026
ExCeL London

Guide to Infosec 2025 for Cyber Professionals in Manufacturing

Cybersecurity is vital in manufacturing to protect critical systems, supply chains and sensitive data from evolving threats, ensuring operational continuity and resilience.

This guide is designed to help cyber professionals who work in the manufacturing industry make the most of their visit to Infosecurity Europe. Here are some of the conference sessions, cybersecurity solutions and exhibitors to check out.

Conference Sessions Include

  1. Guarding Critical Systems: IT-OT Security through Network Visibility
    Company: Gatewatcher
    Why attend:
    This session covers cybersecurity across IT and operational technology (OT) — essential for securing factories and industrial control systems.
    When: Wednesday 4th June, 12:20-12:45
    Learn more

  2. From Stuxnet to Pagers: Weaponizing Hardware Supply Chain Attacks
    Company:
    Sepio
    Why attend:
    This session focuses on hardware-level attacks and supply chain vulnerabilities — high-risk areas for smart manufacturing operations.
    When: Wednesday 4th June, 10:00-10:25
    Learn more

  3. Untangling the Supply Chain Problem: Managing Concentration Risk
    Company:
    Risk Ledger
    Why attend:
    The session Addresses how to manage third-party risk and supplier ecosystems, a critical challenge in manufacturing cybersecurity.
    When: Wednesday 4th June, 10:00-11:15
    Learn more

  4. From Ransomware to Evacuation: Lessons Learned in Managing Cyber Crises with Lives on the Line
    Company:
    Code Blue
    Why attend:
    A case study on handling ransomware in high-risk environments — applicable to manufacturing sites and production continuity.
    When: Tuesday 3rd June, 10:35-11:00
    Learn more

  5. CISO Secrets: Strengthening Cyber Resilience in 2025
    Company:
    Varonis
    Why attend:
    The session offers practical strategies from top CISOs (including those from manufacturing) on improving cyber resilience. Focuses on data-centric, identity-first security, and automation—critical for protecting sensitive IP, controlling access across machines and people, and securing hybrid manufacturing environments.
    When: Tuesday 3rd June, 12:00-12:25
    Learn more

Cybersecurity Solutions and Exhibitors Include

1. OT (Operational Technology) Security
OT systems (e.g., SCADA, PLCs) control machinery and industrial processes. Unlike traditional IT, they were not designed with security in mind.
Examples:

  • Network segmentation for OT
  • Anomaly detection in industrial control systems
  • Asset discovery and inventory tools (e.g., Nozomi, Claroty, Dragos) 

Check out exhibitors with OT and IoT Security solutions here.

 

2. Supply Chain & Third-Party Risk Management
Manufacturers rely heavily on complex supplier networks — any breach in the chain can compromise operations.
Examples:

  • Vendor risk assessment platforms
  • Software bill of materials (SBOM) tools
  • Continuous monitoring of third-party access

Check out exhibitors with Vulnerability Management solutions here.

 

3. Ransomware Defense & Incident Response
Manufacturing is a top target for ransomware due to its high-cost downtime. Fast response is critical.
Examples:

  • Endpoint detection and response (EDR)
  • Immutable backups
  • Playbooks for ransomware containment and recovery

Check out exhibitors with Incident Response solutions here.

 

4. Threat Detection & Security Monitoring (SIEM/XDR/NDR)
Proactive monitoring helps detect intrusions early — especially important in hybrid IT/OT environments.
Examples:

  • Extended Detection & Response (XDR)
  • Network Detection & Response (NDR)
  • Security Information & Event Management (SIEM)

Check out exhibitors with Threat Intelligence solutions here.

 

5. Zero Trust Architecture & Identity Management
Many manufacturing environments still use legacy access models. Zero trust limits lateral movement if attackers gain entry.
Examples:

  • Identity & access control for both users and machines
  • Privileged access management (PAM)
  • Microsegmentation
Check out exhibitors with Zero Trust and Identity and Access Management solutions here.


These organisations represent some of the biggest innovators in manufacturing cybersecurity and bring a wealth of knowledge and expertise to the event.

By attending the recommended sessions, exploring cutting-edge cybersecurity solutions, and engaging with top exhibitors, you will leave Infosecurity Europe equipped with practical insights to tackle today’s evolving challenges!


ADVERTISEMENT


Enjoyed this article? Make sure to share it!



Looking for something else?


Tags


ADVERTISEMENT


ADVERTISEMENT