Event Agenda
23-24 February, 2027 // Munich, Germany
23-24 February, 2027 // Munich, Germany
We are currently working on the 2027 agenda and will be updating it soon.
In the meantime, take a look at the topics and themes discussed as part of the 2026 agenda:
| Day 1 – 26th February 2026 Chair: Filip Nowak, Global Head of Cyber Defence, Ferrero |
|
![]() |
08:00Registration & Coffee |
![]() |
08:50Chairman’s Opening Address |
![]() |
09:00Panel Discussion: Building Effective Incident Response: How Should We Respond to an OT Cyber Attack? . • What should be our first steps in the scenario of a cyber attack on our OT systems? What should be our priorities in both protection and response? • Why is an attack on OT different from any other form of cyber attack? Should the standard playbook also be applicable to OT attacks? • Where can Table Top Exercises and OT Cyber Ranges support our incident response strategies? • What can we do to ensure that downtime is limited and that impact is minimised? • How can we best communicate with our boards in the event of an attack? How can we ensure we have the necessary funding to protect against future incidents? • How can we best take care of our teams following an attack? What can we do to tackle stress and anxiety that may occur post an attack? . – Moderator: Reinhard Bertram, Head of Internal IT and Group Cyber Security Officer, Softing Services – Ricardo Hormann, Industrial Cyber Security Specialist, Volkswagen – Craig McEwen, Global CISO,Dechra Pharmaceuticals PLC – Liran Farazis, Director of Global Enterprise Security Department, Sygnia – Luca Barba, Sr. Director of Product Management, Forescout Technologies . |
![]() |
09:40Case Study: Safeguarding Business Continuity in the Face of Disaster • Explore why a business continuity strategy is significant in OT manufacturing environments • Discuss a case study overview of a cyber incident impact on operations and supply chain • Examine how we can ensure disaster preparedness through risk assessments and continuity planning • What were the lessons from incident handling and restoration • How we can build long-term resilience within our own manufacturing organisations . – Claudio Sangaletti, Corporate Head of Infrastructure & Communication, PERSÁN . |
![]() |
10:10Presentation: Securing Industrial Operations: An Integrated Approach to OT Security and Governance As operational technology environments become increasingly connected, organisations face mounting pressure to secure critical industrial systems while maintaining operational continuity. In this session, ABB and ServiceNow share insights from an ongoing transformation in OT security governance. Learn how ABB is evolving its approach to OT security, including the strategic shift of responsibility into the CISO organisation – a transformation many industrial enterprises are navigating. We’ll explore the framework behind supporting comprehensive security programs and demonstrate how unified platforms can bridge IT and OT security gaps. Through practical insights on program design and implementation, attendees will gain actionable perspectives on protecting industrial infrastructure while enabling digital transformation. . – Jürgen Schön, Head of Manufacturing GTM, EMEA, ServiceNow – Bart de Wijs, Global IS Department Manager – OT & Business Ops Security, ABB – Jörg Soormann, Senior Solution Sales Executive, Risk & Security, ServiceNow . |
![]() |
10:50 Break & Networking – Breakfast Hosted by Darktrace |
| TRACK A Building Structures for Resilient OT Risk Management Chair: Filip Nowak, Global Head of Cyber Defence, Ferrero |
|
![]() |
11:30 Case Study: From Incident to Insight: Real-World Lessons in OT Cyber Defence • How we built a framework of continuous monitoring for real-time anomaly detection and rapid incident response • How we leveraged automation to neutralise threats before they could disrupt critical OT operations • Where we restricted lateral movement by enforcing granular, segmented network zones across production environments • Where we applied Zero-Trust principles to control access, verify identities, and contain risks proactively • How we utilised strengthened collaboration between IT and OT teams to ensure unified visibility, faster decision-making, and sustained resilience . – Craig McEwen, Global CISO, Dechra Pharmaceuticals PLC . . |
![]() |
12:00 Spotlight: OT Security A New Approach to OT Endpoint Access Control Learn how critical manufacturing organisations attest for compliance. See into a process that: • Bridging the OT Security Gap: Analysing why conventional IT authentication methods often fail in industrial settings and identifying the critical security risks posed by shared credentials at the endpoint level. • Next-Generation Authentication Paradigms: Exploring the transition towards non-repetitive, unidirectional dynamic code technology that enables secure user and device verification even in offline or air-gapped environments. • Navigating the Regulatory Landscape: Discussing practical strategies to align OT infrastructure with evolving global standards such as IEC 62443, NIS2, CRA, and NERC CIP to ensure operational resilience and compliance. . – Dr. Godfrey Gaston MBE, Cyber Security Principal, swIDch |
![]() |
12:10Presentation: Leveraging Two Decades of OT Security Compliance Into NIS2 Management and Growth . The advent of supply chain regulation provides suppliers with a choice. Do you meet minimum compliant behaviors or do you proactively embrace the need for security and turn this regulation into a valuable recurring service for your customers? This session will discuss some of the lessons learned in other global regulatory initiatives (like power, pipelines, etc) and how OT security services have evolved to help automate, contextualise and proactively drive awareness and security best practice. We will also examine a use case for a distributed deployment of machines but managed by a central view with near real time data and risk updates. . – Rick Kaun, Global Director Cyber Security Services Sales, Rockwell Automation . |
| TRACK B Implementing Robust Tools To Ensure Effective IT/OT Convergence Chair: Matthias Kratz, Head of Manufacturing IT, Ronal Group |
|
![]() |
11:30Case Study: Dynamic Edge Segmentation: Securing the Past, Enabling the Future . • Traditional network segmentation for plant-floor systems is costly, disruptive and resource-intensive. • Ensuring uninterrupted supply to patients required a faster, low friction approach to detection and protection. • Working with an innovative external partner, GSK pioneered software-based network segmentation applying agile security policies instead of static rules. • The solution scales with business needs, and supports our Digital Transformation as OT evolves towards Industry 4.0 and Factories of the Future. • GSK’s approach offers a model to protect critical physical systems across multiple sectors. . – Mark Finch, Senior Director, OT Cyber Security, GSK . |
![]() |
12:00Spotlight: Why OT Security Can’t Stop at Detection . • How to move beyond the limitations of network anomaly detection to enable prevention and protection from cyber threats • How OT anomaly detection delivers visibility—but why protection, safe response, and IT/OT integration are required to reduce real operational risk in manufacturing environments • Why single-stack promises fall short in OT, and how a best-of-breed, platform-driven approach with clear accountability improves OT cybersecurity effectiveness . – Gregor Chroner, Director, Solutions Consulting, GTT . |
![]() |
12:10Presentation: Securing Brownfield Modernisations, Expansions, & Greenfield Builds in the Smart Manufacturing Era . What steps can you take to engineer a secure solution for brownfield sites that meets the increased business intelligence demand of the Smart Manufacturing era? How can your brownfield experience reasonably advance greenfield project design and implementation? We illustrate simple steps to secure Smart Manufacturing-ready sites based on our experience uplifting brownfield sites and through deliberate Secure-by-Design for Operational Technology (SbD4OT) at greenfield sites. This presentation will leverage both a case study at a global automotive manufacturer as well as lessons learned from hundreds of manufacturing engagements. . – Hatteras Hoops, OT Cyber Security Delivery Lead – Europe, Booz Allen Hamilton . |
| Lunch | |
![]() |
12:40Lunch Hosted by ServiceNow |
| TRACK A Proactive Risk Management for Secure and Resilient OT Operations Chair: Filip Nowak, , Global Head of Cyber Defence, Ferrero |
|
![]() |
13:40Presentation: Factories Under Pressure: A Data-Driven Approach to Modernising OT security Factories are central to manufacturing yet more fragile than many leaders realize. Unlike IT environments, they are built for continuity, not change. Long asset lifecycles, mixed technologies, and tightly coupled processes mean small disruptions can cause major operational and financial impact. This session examines the real-world consequences of manufacturing security incidents, including production loss, response costs, recovery effort, and supply-chain effects. It takes a data-driven view of recurring OT risk areas and systemic weaknesses, and highlights architectural approaches that reduce lateral movement while maintaining operational continuity. . – Umang Barman, Senior Director of Product Marketing, Zscaler . |
![]() |
14:10Case Study: From Asset Inventory to Impact: Operationalising OT Vulnerability Management • How we identified and prioritised vulnerabilities across complex OT environments to build an effective roadmap for OT vulnerability management • How moving from static asset inventories to dynamic, real-time visibility helped us • The importance of integrating IT and OT perspectives to create a unified risk picture • How we can overcome challenges with our legacy systems, vendor patching, and resource constraints and where we can utilise automation and threat intelligence to strengthen our OT vulnerability management . – Ricardo Hormann, Industrial Cyber Security Specialist, Volkswagen . |
![]() |
14:40Presentation: Operational Resilience in Practice: Rapid OT incident Response • How we developed and operationalised a Rapid OT Incident Response capability across multiple production sites to strengthen resilience •Why proactive risk management in OT requires more than visibility and vulnerability data — and how plant-ready response structures close this gap • Practical lessons from building response playbooks, decision pathways, and cross-functional roles that support both security and production continuity. . – Konstantin Schäfers – Manager, Cyber Security & Resilience, KPMG & Majida Dere Head of OT-Security Management, WESTFLEISCH . |
| TRACK B Building Effective Governance to Ensure Compliance to an Expanding Regulatory Landscape – Chaired by Matthias Kratz, Head of Manufacturing IT, Ronal Group |
|
![]() |
13:40Presentation: Remote Access in OT: Findings from a Global Benchmark Study of 400 OT Leaders This keynote presents findings from “The State of Industrial Remote Access 2026”. The data challenges prevailing 2026 assumptions that accelerating Zero Trust adoption and regulatory pressure are, on their own, sufficient to drive maturity. While both forces shape direction, the evidence points to a more constrained reality: organisational confidence is advancing faster than verifiable control. The conclusion is deliberately uncomfortable. Despite clear momentum toward consolidation and Zero Trust, many organisations continue to operate remote access as inherited connectivity, assessing readiness through perception rather than evidence of protection. This session identifies where control is established, where it is assumed, and which structural changes most consistently close the gap. . – Knud Kegel, CPO, Secomea . |
![]() |
14:10Group Discussion: How Can We Build an Effective IT/ OT Governance Structure For NIS2 & Cyber Resilience Act Compliance? • How does understanding the difference between cyber risks and threats in maintaining compliance help us build a secure strategy? • What rules should we adhere to in order to develop an efficient governance architecture for OT security? • Why does bringing our OT systems online requires us to maintain compliance? • How can we ensure our outlook is not just compliant to NIS2, but was an overall effective strategy throughout our organisation? • How can we best sell our cyber strategies to our board level executives to ensure we got the funding necessary? . – Ali Baccouche, Regional CISO & Data Privacy Officer – EMEA, Texas Instruments . |
![]() |
14:40Presentation: OT-Security in 2026 – A Tale of Ignorance, Compliance and Submarines Leon Staufer has spent the past six years working with organizations of varying sizes and across multiple industries, with a clear focus on developing cybersecurity concepts for operational technology (OT) environments to ensure production availability. In his talk, he will share insights into the lack of awareness he has encountered over time, discuss how compliance requirements have evolved in recent years, and explain why submarines serve as a universal and effective metaphor for illustrating OT security concepts. . – Leon Staufer, Cyber Security Consultant DACH, TXOne Networks . |
| – Chair: Filip Nowak, Global Head of Cyber Defence, Ferrero |
|
![]() |
15:10Presentation: Protecting What You Can’t Patch - How to Secure OT Systems Against Modern Cyber Threats Without Replacing Your Machines Cyber incidents remain the #1 global business risk – yet most factories still run machines built before cyber security existed. This session shows why firewalls and segmentation alone fall short, and what machine-level protection looks like in practice – using the real-world example of a manufacturer securing production-critical machines. . – Benjamin Pieritz, CEO, TRIOVEGA GmbH . |
![]() |
15:40Break & Networking |
![]() |
16:10Roundtables: - Pick a Table and Let’s Discuss! . T1. – Zero Trust Challenges in OT Brownfields – Daniel Götz, Senior Manager OT Cyber Security, Deloitte . T2. – High Velocity vs. High Constraint: Two Manufacturing Security Realities Under NIS2 (read more) – Raphaëlle Linette, Cybersecurity Expert, VirtualBrowser . T3. – From Silos to Solutions: Combating AI-Amplified Attacks in Converged IT/ICS/OT Infrastructures – Aris Koios, Principal Field Tech Strategist, Central Europe, CrowdStrike . T4. – Developing Strategies to Best Adapt to NIS2 & The Cyber Resilience Act – Luca Barba, Sr. Director of Product Management, Forescout Technologies & Danielle Kinsella, Senior Director Sales Engineering, EMEA, Gigamon . T5. – OT Resilience in Critical Manufacturing: Ensuring Backup and Availability When It Matters Most – Sergey Pankin-Schott, Team Lead Solution Engineering, Acronis . T6. – OT Cyber Visibility: From High‑Level Approach to Actionable Roadmap – Dr. Barbara Hauer, Managing Consultant Cyber Security – IoT/OT, NTT DATA & Kai Kudlek, System Engineer, Claroty . |
![]() |
16:50Panel Discussion: Where Should OT Security Lie in Our Organisations? This session will bring together senior representatives, CISOs and Head of OT Security to discuss and debate, who really is responsible for operational security? And who should be? We’ll ask: . • What responsibilities do you have in securing your organisation’s cyber security? What responsibilities should you have? • Why is it important to define clear organisational roles responsible for security? • Do we need an independent Chief Operational Security Officer? Or Can The CISO do all of this? • How can you build a culture of security internally that ensures cyber resilience – no matter who is in charge? • Who should ultimately be responsible for our operational security through our organisations? Where should cyber security fit in an organisation? . – Moderator: Charles Widdis, Head, Manufacturing Security CoE, Novo Nordisk – Markus Wintruff, CISO, Veolia Holding Deutschland GmbH – Frank Polky, , Director OT Security, Mars – Dr. Saadat Bunyatova, Head of Cybersecurity, Merck Healthcare – Jürgen Schön; Head of Manufacturing GTM, EMEA; ServiceNow – Thomas Becker, Vice President Sales EMEA, AMDT . |
![]() |
17:30Chairman’s Closing Remarks |
![]() |
17:45Drinks Reception – Bavarian Experience Hosted by Xage Security |
![]() |
19:00Dinner Hosted by Nozomi Networks (Invite-Only) & Shieldworkz (Invite-Only) |