The speaker's profile picture
Adam Bromiley

Adam is a security consultant at Pen Test Partners who specialises in industrial control systems and embedded hardware security. He's worked on everything safety-critical: from high-speed rail to aircraft, power stations, and gas distribution. His embedded work has seen him break driverless cars, slot machines, and drones and has led to the responsible disclosure of numerous vulnerabilities in industrial controllers. Adam enjoys hands-on and boots-on-the-ground testing, reverse engineering, and providing practical security advice for complex real-world systems.

  • Do you even bench, bro?
The speaker's profile picture
Amy Brooks

Amy is a Chartered Engineer specialising in cyber and information security, with deep expertise in Operational Technology, IoT, and semiconductors. She provides consultancy and advisory services across critical national infrastructure sectors, helping organisations navigate complex risk landscapes.
Her strategic thought leadership spans semiconductor microprocessor architecture, automotive technology, and safety-critical cyber-physical systems. This cross-sector experience gives her a distinctive perspective on securing the technologies that underpin modern infrastructure.
Beyond her consultancy work, Amy is passionate about building the next generation of cyber professionals. She was a founding contributor to the CyberFirst Girls competition and remains actively involved in STEM outreach through the Cheltenham STEM community, FameLab, and Women in Technology initiatives.

  • Speaking Their Language: An Engineer's Guide to the Safety-Security Divide
The speaker's profile picture
Amy Stokes-Waters

Amy Stokes-Waters is the founder of The Cyber Escape Room Co., where she designs immersive, experience-led cybersecurity training that helps people learn by doing, not clicking through slides. Her work focuses on human behaviour, decision-making, and how people respond under pressure, turning real-world security challenges into memorable learning experiences that actually stick.

  • The Break In: Interactive OT Cyber Escape Room - Session 2
  • The Break In: Interactive OT Cyber Escape Room - Session 3
  • The Break In: Interactive OT Cyber Escape Room
The speaker's profile picture
Andi Hudson

Andi is Kyndryl’s Global Security Operations & Response Portfolio Lead, shaping how organisations worldwide modernise their SOC, detection, and incident‑response capabilities. With deep experience across IT and OT, Andi is known for turning complex operational challenges into clear, effective security outcomes

  • Modernising OT in the SOC
The speaker's profile picture
Andy Richings

I’m Andy Richings, a Principal Security Engineer at Synoptix, working on Secure by Design projects for defence, space, and critical national infrastructure. I focus on threat modelling, cyber assurance, and security architecture for complex software and OT-adjacent systems, including water treatment environments. My work is about making cyber risk visible, traceable, and manageable in systems society depends on.

  • Insider Attack below the Detection Threshold in Water Treatment OT
The speaker's profile picture
Arnaud Soullie

Arnaud Soullié is a Senior Manager at Wavestone, a global consulting company. For 15 years, he has been performing security assessments and pentests on all types of targets. He started specializing in ICS cybersecurity 10 years ago. He has spoken at numerous security conferences on ICS topics: BlackHat Europe, BruCon, 4SICS, BSides Las Vegas, DEFCON... He is also the creator of the DYODE project, an open source data diode aimed at ICS. He has been teaching ICS cybersecurity trainings since 2015.

  • Assess the Efficiency of Your OT Cyber Monitoring with CALDERA
The speaker's profile picture
Chris Bore

Chris has a PhD in MRI from the early days before it was called that: and a subsequent career that swirled around signal processing, security, and medical imaging systems. Now mostly retired he enjoys attending, and sometimes speaking at, BSIDES events.

  • When absolute zero gets too hot to handle - Cyber Risks for Cryogenic Failure in MRI
The speaker's profile picture
Christopher Robinson

Chris Robinson is an Offensive Security Certified Professional (OSCP) and Global Industrial Control Systems Professional (GICSP) with an advanced Computer Science degree and years of Information Technology (IT) and Operational Technology experience specializing in IT and Industrial Control Systems (ICS) cybersecurity.

Chris is Principal Consultant focusing on OT/ICS cybersecurity at DNV Cyber and an instructor for SANS Institute, teaching the ICS410 (ICS/SCADA Security Essentials) course and is a co-author for the ICS612 (ICS Cyber Security In-Depth) course. Chris is experienced in conducting penetration tests, security assessments, and network architectures for ICS systems such as electricity generation and transmission, automotive manufacturing systems, mass telecommunications systems, and chemical processing. Additionally, Chris is an expert assessor, helping clients design program and strategies, improving IT/ICS cybersecurity in accordance with IEC 62443, NIST 800-82, NIST CSF, and NERC CIP. Chris regular presents at various cybersecurity industry events on multiple topics, such as penetration testing and IEC 62443.

  • Lessons Learned from the Yard (Greenfield projects are hard too)
The speaker's profile picture
Colin Cassidy

Colin Cassidy used to be a senior software engineer at GE for 15 years working on their Distribution Management System (DMS) which runs most of the UK's electrical distribution network. He is currently atoning for all his software development sin as a Principal security consultant with IOActive. Colin has performed a number of security audits for ICS operators including one of the UKs largest Distribution Network Operators, several windfarms, container ships, shipping terminals, and AMI/smart meter infrastructure. Colin has also presented and Blackhat and Defcon on vulnerabilities found in Industrial Ethernet Switches. In his spare time, he searches for spare time.

  • Acme Windpharm
The speaker's profile picture
Dave Gunn

OT Security Specialist currently working within UK utilities industry. Previous experience working directly with SCADA / ICS in both utilities and oil & gas sectors.

  • SCADA Protocol Security - What Is The Answer And Why?
The speaker's profile picture
David G2

I am a NCSC Senior Cyber Physical Security Architect with experience supporting major CNI projects across multiple sectors including electricity, water and gas. I have also led the production of several Operational Technology (OT) focused pieces of NCSC guidance including Privileged Access Workstations (PAWs), Creating and maintaining a definitive view of your operational technology (OT) architecture, Secure connectivity principles for operational technology (OT) and Cloud-hosted supervisory control and data acquisition (SCADA).

  • Beyond Isolation: Modern OT Needs Modern Defences
The speaker's profile picture
David Jones

David is an experienced Non-Executive, currently on the Board of Ofwat and Chair at DVLA.
Previously, he's been on the Board of Ofcom, amongst many other Non-Executive roles.

I help boards and regulators navigate cyber risk and fast-moving technology where regulation, governance and geopolitical realities intersect.

(NOTE: David is speaking in a Personal capacity, not in his role at Ofwat)

  • Explaining OT Cyber to the Board Was Hard Enough: Then the Regulator Asked for Evidence
The speaker's profile picture
Fiona Kastrati

Fiona Kastrati is a cyber security consultant specialising in OT security, risk assessments, supply chain management and incident response preparedness. With extensive experience in bridging the gap network security teams, engineers and operational staff, she helps translate technical risk into actionable strategies. She is an advocate for women in OT and cyber, championing the skills and perspectives they bring into shaping resilient, safe and efficient systems.

  • Soft Skills in a Hard-Hat World: Why Communication is One of the Most Critical OT Security Controls
The speaker's profile picture
George Chapman

George Chapman is a senior cyber security consultant who delivers Penetration Testing engagements, Red Team Operations and Incident Response support. A CVE-credited researcher, George converts technical insight into tangible business value and stronger organisational resilience.

  • The Road to Cyber Security Consulting
The speaker's profile picture
George Edmond

2 years at Synoptix
4 years of Cyber Security

  • Insider Attack below the Detection Threshold in Water Treatment OT
The speaker's profile picture
Ian Thornton-Trump CD

Ian Thornton-Trump CD is an ITIL certified IT professional with 30 years of experience in IT security and information technology. From 1989 to 1992, Ian served with the Canadian Forces (CF), Military Intelligence Branch; in 2002, he joined the CF Military Police Reserves and retired as a Public Affairs Officer in 2013. After a year with the RCMP as a Criminal Intelligence Analyst, Ian worked as a cyber security analyst/consultant for multi-national insurance, banking, and regional health care verticals. With a deep background in cyber threat intelligence Ian was previously the CISO for Cyjax Ltd., a UK based threat intelligence provider to enterprise customers. As a CISO at Inversion6 Ian’s role is to spearhead the efforts to duplicate the success of Inversion6 USA by offering fractional CISO and advanced cyber security solutions in the UK and EU markets. Ian has deep experience with the threats facing small, medium and enterprise businesses. His research and experience have made him a sought-after cyber security consultant specialising in building security operations providing services as a vCISO, and sharing his passion for building effective threat intelligence programs for small, medium, and enterprise organisations.

  • Grayzone Warfare: From IT Systems to OT Effects
The speaker's profile picture
Jacob Williams

I'm a PhD student at the Bristol Cyber Security (TIPs-at-Scale) Centre for Doctoral Training. My primary area of research is the application of honeypots in industrial control systems, focusing on the optimal design and testing of individual deployments. Before this I worked in a Security Operations Centre. I pivoted into industrial control systems because I love the physical engineering aspect of it and a passion to secure the infrastructure that people use in their every day life.

  • Industrial Honeypots Challenges and Research Opportunities
The speaker's profile picture
James Bore

James Bore is a security consultant, speaker, and writer with a particular interest in risk, systems, and how security works (or fails) in practice. His work spans cyber security, critical infrastructure, and supply chain risk, and he is known for taking a sceptical, systems-focused approach rather than a checklist-driven one.

He regularly speaks at community events including BSides, writes on security and risk, and spends an unreasonable amount of time designing tiny board games.

  • OT Ownership Myths
The speaker's profile picture
James John

James is a Chartered Incident Response Professional with extensive expertise in Digital Forensics and Incident Response (DFIR). Certified by SANS, he brings over nine years of specialised experience to the field, having conducted both criminal and civil forensic investigations across public and private sectors.

James spearheads the strategic development of Bridewell's proactive and reactive incident response services, driving team growth and service innovation across critical national infrastructure, finance, hospitality, defence and government clients. His leadership encompasses strategic planning, team development, and service line expansion for UK and US markets.

  • What Your IT Response Playbook Gets Wrong About OT.
The speaker's profile picture
James Sabin

James Sabin is a security researcher specializing in OT adversary emulation and industrial control systems networking. Currently completing his degree in Cybersecurity and Digital Forensics at the University of the West of England, he focuses on ICS/OT protocol analysis and the development of open-source tools for operational technology security research.

  • Breaking the Air Gap: Covert Command and Control Attacks on Industrial Systems
The speaker's profile picture
John Allen

John Allen is a senior OT and industrial cybersecurity leader with over two decades of experience securing complex manufacturing and critical infrastructure environments.

He previously served as Global Vice President of OT Security at GSK, where he led a £97m global OT security programme spanning 77 manufacturing and research sites worldwide. In this role, John was responsible for embedding OT security across live production environments, balancing cyber risk reduction with safety, uptime, regulatory compliance, and operational efficiency.

John’s career has been shaped by working directly with engineers, operators, and plant leadership to turn security strategy into operational reality. His experience spans global governance design, large-scale OT security transformation, incident response in production environments, and the cultural change required to make security sustainable on the factory floor.

Today, John advises manufacturers and critical infrastructure organisations through Harpoon Consulting, where he sits as Co-Founder of the organisation, helping them design and embed practical, operations-first OT security programmes that actually work in the real world. He is known for his ability to translate security risk into operational and business impact, and for challenging approaches that look good on paper but fail in production.

John is a regular speaker at specialist security events, where his sessions consistently receive strong feedback for being honest, practical, and grounded in real-world end-user experience rather than theory or vendor-driven narratives.

  • Why OT Security Fails on the Factory Floor, and How to Make It Stick
The speaker's profile picture
John Fitzpatrick

John has spent many years leading some of the most formidable offensive and defensive cyber teams globally. Currently focused on securing downstream oil infrastructure, his career spans critical industries from finance to defence. Formerly MWR, John is now the founder of Lab539, has the world's largest collection of supercomputer related CVEs, and spends his free time tracking and disrupting AiTM and other adversarial infrastructure.

  • Square Pegs and Round Holes: What Actually Works in OT Security
The speaker's profile picture
Jonny Keiller

I am an ISA/IEC 62443 Certified Expert leading an OT consultancy team focused on securing Critical National Infrastructure and manufacturing environments. My work involves delivering robust cyber security strategies, risk assessments, and compliance solutions to protect complex industrial systems from evolving threats.
Previously, I spent 22 years in the Royal Navy specialising in Electronic Warfare and Cyber Defence, gaining extensive experience in countering advanced threats and supporting the protection of mission-critical systems. This background provides a strong foundation for understanding the challenges of resilience in operational technology.

  • Crossing the Wire: Defensive OT Workshop with Live Red Team Attack
The speaker's profile picture
Juliette Barbier

Juliette Barbier is a Senior Consultant at Wavestone, a global consulting company. She specializes in industrial cybersecurity, with a strong focus on detection strategies and solutions for ICS environments. She has worked on implementing detection capabilities and getting the most of network-based detection solutions. Curious and enthusiastic, she enjoys putting detection theory to the test against real-world adversaries and operational constraints.

  • Assess the Efficiency of Your OT Cyber Monitoring with CALDERA
The speaker's profile picture
KevTheHermit

Kev Breen currently serves as Senior Director of Cyber Threat Research at Immersive, where he helps organizations assess, build, and prove their Cyber Workforce Resilience. He is a renowned expert on new and emerging threats.

Prior to his time at Immersive, Breen spent 15 years in the military with the Royal Signals, starting as a radio technician repairing radio electronics and communications, before moving on to digital networks specialising as a malware analyst protecting UK MOD networks against cyber attacks. With over two decades of experience in IT and cybersecurity, Breen has learned the tradecraft for defensive, offensive, and deceptive cyber operations.

Breen has conducted extensive open-source research, including creating and releasing toolkits for network defenders, mainly for malware analysis and decryption, as well as writing the YARA rules, which are still recommended by VirusTotal. Breen’s open-source research gets a lot of attention, not only from the cybersecurity community, but also from the threat actors themselves.

  • Getting Into OT Security on a Budget: From Software Simulations to Practical Ranges
The speaker's profile picture
Kostas Anastasakis

PhD student in Cybersecurity at University of Bristol

  • Dynamic Risk Assessment For Critical National Infrastructures
The speaker's profile picture
Laurence Halfpenny

Who is this guy?

  • Software Engineer of 6 years
  • Preacher of Rust 🦀
  • Worked in cross domain, electronic warfare and now aerospace
  • Rare MG / Rover enthusiast
  • From Currys to Classified: £20 Cross Domain Solutions
The speaker's profile picture
M. Endhy Aziz

With more than 10 years of professional experience in security, I am now pursuing a PhD for further study.

  • Beyond Alerts: Diagnosing and Improving Situational Awareness in Industrial Systems
The speaker's profile picture
Mandie Grosskopf

Mandie has a passion for expanding traditional InfoSec governance to include complex and non-traditional environments, including OT, IoT, IoMT, IIoT, and more. She leads governance design and expansion across sectors such as Healthcare, Manufacturing, Maritime, and Pharmaceuticals, with a strong focus on incident response and post-incident remediation. Mandie also supports clients through gap analysis and strategic roadmap development as they work towards compliance with the EU Cybersecurity Resiliency Act.

Mandie currently holds certifications in GIAC Response and Industrial Defense (GRID), Network+, Security+, Cybersecurity Analyst+, and Security Analytics Professional.

  • Mind the Gap: Security on Paper, Reality on the Wire
The speaker's profile picture
Mike Holcomb

Mike Holcomb is an independent consultant and an educational content creator focused on OT/ICS cybersecurity . Prior to supporting clients full-time through UtilSec, he was the Fellow of Cybersecurity and the OT/ICS Cybersecurity Global Lead for one of the world’s largest engineering and construction companies, providing him with the opportunity to work in securing some of the world’s largest OT/ICS environments, from power plants and commuter rail to manufacturing facilities and refineries.

As part of his community efforts, Michael founded the BSidesICS/OT with multiple events planned globally in 2026. He has his master’s degree in OT/ICS cybersecurity from the SANS Technology Institute. Additionally, he maintains cyber security and OT/ICS certifications such as the CISSP, GRID, GICSP, GCIP, GPEN, GCIH, ISA 62443, and more.

He was awarded the SANS Difference Maker Award for Practitioner of the Year: ICS/OT Defender for 2025.

He posts regularly on LinkedIn and YouTube to help others learn more about securing OT/ICS and critical infrastructure.

You can find out more information about Mike and his resources at mikeholcomb.com.

  • Creating Offensive and Defensive Tools for OT/ICS with GenAI
The speaker's profile picture
Richard Dosumu

Richard Dosumu is a cybersecurity practitioner, Founder at OctaTech, and an independent researcher focused on practical security in real-world environments. He holds an MSc in Cyber Security & Human Factors and writes educational cybersecurity content on Medium and LinkedIn, with a particular interest in making security guidance usable under operational pressure. His published research spans the intersection of AI, cybersecurity, and Industry 4.0/manufacturing, exploring how modern systems introduce new risks and control challenges. He is also involved with the OWASP Bristol organising community and is committed to sharing actionable, defensible approaches that teams can implement without disrupting critical operations.

  • Fixing the Front Door: Securing OT Remote Access Without Killing Production
The speaker's profile picture
RichardS

Dr. Richard Smith is a Senior OT Security Consultant at Bureau Veritas, specialising in the intersection of industrial resilience and cyber-physical security. Formerly an Associate Professor of Cyber Security at De Montfort University, Richard has spent his career bridging the gap between theoretical research and the operational realities of critical infrastructure. His expertise spans the full security lifecycle from initial risk assessment to high-pressure incident response.
Richard is a firm believer in "learning by doing." He has designed and built hybrid cyber ranges to facilitate complex security exercises and has showcased the real-world impact of OT vulnerabilities as a demonstrator at global stages like DEFCON and RSA. His mission remains constant: translating complex technical risks into actionable business intelligence to ensure the continued safety and operation of essential services.

  • Enable, Don't Obstruct: Building an OT Security Career That Actually Works
The speaker's profile picture
Sam Thom

Sam is a security consultant at Pen Test Partners who focuses on the weird stuff - hardware, IoT and Operational Technology. He's poked and prodded Industrial and embedded systems across various industries like automotive, IoT, IIoT, chemical, water, power, gas, manufacturing and his favourite of all - the alcohol industry. Sam enjoys tearing down operational systems on the bench almost as much as owning them in the field.

  • Do you even bench, bro?
The speaker's profile picture
Sarad

Researcher at Swansea University

  • Insider Attack below the Detection Threshold in Water Treatment OT
The speaker's profile picture
Zachary Sleath

Zachary Sleath is an OT Cyber Security Consultant with over five years of experience supporting industrial and critical national infrastructure organisations. He graduated from the University of Portsmouth with a BSc in Cyber Security and Forensic Computing, and he currently works at Bureau Veritas Cybersecurity. Zachary’s expertise spans governance, risk and compliance (GRC), network architecture, vulnerability management, and third‑party risk management (TPRM). His work focuses on helping organisations strengthen their cyber resilience, embed security‑by‑design practices, and navigate complex regulatory landscapes across the OT and product‑security domains.

  • CRAzy about Product Security - Navigating the Cyber Resilience Act