ICS/SCADA cybersecurity conference

Speaking Opportunities


ICS/SCADA cybersecurity conference The agenda of speakers and sessions for the ICS/SCADA Cybersecurity Symposium 2025 is currently in development.

Industry professionals who are interested in delivering a stand-alone, 30-minute presentation, or organizing and moderating a 60-90 minute panel session with multiple panelists, are encouraged to submit a proposal to speak@ics-cybersec-event.com.

Guidelines for Submitting a Proposal

Speaking proposals should include the following:
    1. Speaker name, title, company, and contact information
    2. Session type (stand-alone 30 min, or 60-90 min panel session) 3. Presentation or panel title
    4. Abstract of session (150 words)
    5. Speaker biography and photo
    6. Bullet list of 3-4 Key Takeaway Points
Additional Guidance:
  • We ask that proposals be non-commercial in nature. All submissions will be reviewed by the Program Advisory Group prior to formal acceptance into the program. The goal is to ensure depth of information, obectivity and relevance to the Forum.

  • This is an interactive, discussion-oriented Symposium in which Q&A participation among attendees is highly encouraged.

  • Presentations that include an ICS/SCADA asset operator co-presenter and/or emphasize (redacted) case studies, best practices, and real-world results are especially welcome.
Topics to be addressed include:
  • The current status of nation-state level APTs
  • Defense-in-depth strategies for ICS/SCADA environments
  • Meeting and exceeding regulatory requirements
  • Protecting ICS networks from ransomware attacks
  • Architecting a network security solution to address cyber threats
  • Deception technology and other emerging innovations
  • Conducting in-depth risk assessments
  • Extending protections to cloud-connected OT assets
  • Machine learning and AI in next-gen ICS cybersecurity
  • Addressing the growing convergence between IT and OT networks
  • Cybersecurity for operational technologies and smart systems
  • Software-defined perimeters for securing ICS remote access
  • Restricting communication paths and limiting potential attack vectors
  • Reducing supply chain risks for ICS networks
  • The role of network monitoring and centralized security analytics
  • Partnerships for public-private collaboration and information sharing
  • Case studies and lessons learned: Insights and key takeaways across industry verticals
  • And more

For further information or to discuss a proposal, please contact us.