12th Cyber and SCADA Security for Energy,
Power & Utilities Industry 2025
23 - 24 September 2025 | Berlin
About the Event
Join top cybersecurity leaders, OT/IT professionals, and infrastructure operators at the 12th Cyber and SCADA Security for Energy, Power & Utilities Industry 2025 conference to explore the latest strategies, technologies, and regulations shaping cyber defense in the energy sector.This focused, two-day event will cover SCADA and ICS protection, NIS2 compliance, AI-driven threat detection, and OT/IT convergence.Engage in high-impact discussions, real-world case studies, and expert panels with decision-makers from Europe’s leading TSOs, DSOs, and utility companies.With expert speakers and unparalleled networking opportunities, this conference is designed to equip you with the tools to safeguard critical infrastructure, ensure grid reliability, and stay ahead of emerging threats.Don’t miss this opportunity to enhance your cybersecurity strategy and build resilience in an increasingly connected energy ecosystem.

Why Attend Conferences Hosted by Us?
PEER TO PEER
We make sure that you are in good company. Prospero conferences provide energy industry experts and decision-makers a platform to discuss common challenges, share best practices, and network.
LONGEST INTERACTION TIME
We promise the most prolonged average duration of direct peer-to-peer networking (at least 10 minutes per participant within two days of an in-person event) with the most senior and relevant professionals about specific energy-themed topics.
ENERGY SECTOR
Since 2013, we have been specializing in producing conferences in the energy sector. Our in-depth knowledge of the industry helps us create tailor-made conferences on the latest and the most pressing developments.
EUROPE
Europe is at the forefront of advancements and revolutions in the clean energy transition. We aim to provide a platform for European decision-makers in the energy industry to benchmark best-practices with their peers.
Speakers

Marta Majtenyi
Director of Information Security
Office
Norsk Hydro

Gaetano Sanacore
Group Security & Cyber Defence - OT Security Manager
A2A

Frederic GUYOMARD
Senior Project Manager
EDF

Wim Horseling
Cyber Security Channel Manager
Goldilock

Cassian Ewert
Solution Engineer
CLAROTY

Damien Ploix
Head of Cybersecurity Service Management
Enedis

Ayesha Hussain
Data Governance and
Quality Lead
University of Leeds

Bruno Guiot
Cyber Analyst
Enedis

Jan Lausch
Principal Consultant Cyber Security
DNV

Radim Trávníček
CEO & Co-Founder
BESECURED

Adeiza Yisa
Business Information Security Office (BISO) Advisor
Shell

Ana Hazi
Cyber Commercial Portfolio
Manager
National Grid

Abraham Akhigbe Ola
SOC Analyst
Uniper

Joshua Deakin
Global Head of
Services
SHIELDWORKZ

Sithembile Songo
Chief Information Security
Officer
Eskom Holdings SOC Limited

Marcin Bruszewski
Head of Legal Affairs -
Region Poland
Fortum

Lida Rragami
Head of Cyber Security
Sonnedix

Dr. Ibukun Oladunjoye *
Innovation Engineer
NATIONAL GRID
* Preliminary Confirmed
Speaker Introduction
Testimonials

"Thank you very much. It was also my pleasure to participate, and I’m looking forward to our next
project"National Information Security Officer, Vattenfall

"Great organization! I really enjoyed the international character: so many different participants from different countries and perspectives and all that was very valuable."VP Infrastructure Economics, E.ON

"I find all the presentations very relevant to the challenges we are going to deal with. It is good to understand the trends as well as hear the experience from other colleagues on how they are approaching those challenges"GM & CEO, CEZ

"Thank you very much for the opportunity to speak. It was great working with you and the pleasure was mine as well to get to know you. I’m also interested in further collaborations. It’s a good thing that you got going here. Unfortunately, this time I was not able to participate full time, I hope next time this will be possible again."Head of SAS Engineering, Swissgrid
Register Now
Seats are filling up fast, book yours today!
IN-PERSON DELEGATE
1499€
Access to the 2-day conference in-person at the venue
Peer-to-peer networking between sessions
Post-conference Documentation Package
Refreshments, coffee breaks, and luncheons at the hotel venue
VIRTUAL DELEGATE
599€
Access to the 2-day conference online
Post-conference Documentation Package
Speaking, Branding, and Sponsorship Opportunities at the Event

Ignite unprecedented business growth by seizing the extraordinary opportunity to sponsor the event. Leverage Speaking, Branding, and Sponsorship Opportunities to showcase your expertise, elevate your brand visibility, and forge enduring connections with decision-makers and qualified buyers who align seamlessly with your target market.Our Speaking, Branding, and Sponsorship Opportunities platform is not just an investment; it's a strategic partnership designed to maximize your value. Whether you're looking to turbocharge your advertising, drive impactful business development, amplify your promotional strategies, or optimize your overall marketing investments, rest assured that we possess the expertise to elevate your brand and deliver exceptional conversions.Seize this opportunity now to secure Speaking, Branding, and Sponsorship Opportunities beyond traditional marketing. Join us at the forefront of industry influence, let your voice be heard on stage, your brand shine across channels, and your message resonate with a curated audience of decision-makers.

Claroty is a leader in cyber-physical systems (CPS) protection, offering an industry-centric platform designed to secure mission-critical infrastructure.Its comprehensive solution set includes exposure management, network protection, secure access, and threat detection, both in the cloud with Claroty xDome and on-premise with Claroty Continuous Threat Detection (CTD).Trusted by organizations worldwide, Claroty delivers unparalleled asset visibility, backed by award-winning research and strong technology alliances. This enables fast risk reduction and lower total cost of ownership.We are proud to have Claroty as a Gold Sponsor for the conference, acknowledging their exceptional contributions to securing cyber-physical systems and critical infrastructure in the cybersecurity sector.
Who Should Attend?
Job Titles
Chief Information Security Officer (CISO)
Head of OT Security
SCADA Security Manager
Cybersecurity Program Director – Energy Sector
Operational Technology Risk Manager
Cyber Risk & Compliance Officer – Utilities
Director of Infrastructure Security – Energy
Digital Security Lead – Power Operations
Incident Response Manager – Critical Infrastructure
Head of Critical Infrastructure Protection
Network Security Architect – Industrial Systems
OT Threat Intelligence Analyst
Penetration Tester – Industrial Control Systems (ICS)
Cybersecurity Policy Advisor – Energy & Utilities
Head of Cyber Resilience – Grid Operations
Industry Focus
Electric Power Utilities
Transmission System Operators (TSOs)
Oil & Gas Companies (Upstream/Midstream/Downstream)
Power Generation Companies (Thermal, Nuclear, Hydro, Renewables)
Energy Distribution Network Operators (DNOs)
Smart Grid Technology Providers
Water & Wastewater Utilities (Critical Infrastructure)
LNG Terminals & Storage Facilities
Industrial Automation & Control System Vendors
Cybersecurity Solution Providers – ICS/OT
Energy Sector Regulatory Authorities
National Cybersecurity Agencies
SCADA/ICS System Integrators
Energy-focused MSSPs (Managed Security Service Providers)
Engineering, Procurement & Construction (EPC) Firms with SCADA/ICS projects
Previous Attendees
Venue
Hotel H4 Hotel Berlin-Alexanderplatz
𝐕𝐞𝐧𝐮𝐞Hotel H4 Hotel Berlin-Alexanderplatz Berlin, GermanyAddress: Karl-Liebknecht-Str. 32 | 10178 Berlin𝐑𝐞𝐬𝐞𝐫𝐯𝐚𝐭𝐢𝐨𝐧 𝐈𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧:To book your accommodation for the event, get in touch with the H4 Hotel Berlin-Alexanderplatz hotel's reservation department:𝐏𝐡𝐨𝐧𝐞: +49 30 3010411-0𝐄𝐦𝐚𝐢𝐥: berlin.alex@h-hotels.comWhen booking, please mention 𝐏𝐑𝐎𝐒𝐏𝐄𝐑𝐎 to ensure you receive the appropriate rates and accommodations for the event.

Download Agenda
Speaking, Branding, and Sponsorship Opportunities at the Event
At Prospero Events Group, we prioritize Speaking, Branding, and Sponsorship Opportunities as powerful avenues to foster meaningful connections and active engagements that drive your business forward.
We provide an exclusive platform for industry leaders to showcase their expertise, amplify their brand, and engage with decision-makers through high-impact speaking slots, branded materials, and tailored sponsorship packages. These opportunities position your organization at the forefront of industry innovation, ensuring your solutions and thought leadership reach a highly targeted audience.Our conferences are designed to create a dynamic environment where sponsors can deliver their message directly to key executives actively seeking partnerships and innovative ideas. With options to exhibit your brand, present on stage, and maximize your visibility through premium branding opportunities, you’ll make a lasting impression on top-level delegates.Partner with Prospero Events Group to leverage these Speaking, Branding, and Sponsorship Opportunities, elevate your profile, and forge powerful connections that set your business apart in today’s competitive landscape.

Evening Cocktail Sponsor

1 Speaker slot.
2 in-person passes for the 2-day event.
2 hours of snacks and drinks (soft drinks, house wine, draft beer, spirits, cocktails) & welcome address by sponsor.
Participation in the panel discussion.
Booth space provided with a desk and two chairs. Roll-up banner (provided by sponsor) placed in the venue or cocktail area.
Logo with hyperlink featured on the event website.
Social media promotion, including dedicated pre-event posts.
Logo featured on the event agenda and highlighted in pre-event email campaigns sent to potential attendees.
Sponsor’s business description and contact information included in the final agenda.
Access to participants' contact details.
Gold Sponsor

1 speaker slot.
2 in-person passes for the 2-day event.
Booth space provided with a desk and two chairs. Roll-up banner (provided by sponsor) placed in the venue.
Participation in the panel discussion.
Logo with hyperlink featured on the event website.
Social media promotion, including dedicated pre-event posts.
Logo featured on the event agenda and highlighted in pre-event email campaigns sent to potential attendees.
Sponsor’s business description and contact information included in the final agenda.
Access to participants' contact details.
Silver Sponsor

1 speaker slot.
1 in-person pass for the 2-day event.
Booth space provided with a desk and two chairs. Roll-up banner (provided by sponsor) placed in the venue.
Participation in the panel discussion.
Logo with hyperlink featured on the event website.
Social media promotion, including dedicated pre-event posts.
Logo featured on the event agenda and highlighted in pre-event email campaigns sent to potential attendees.
Sponsor’s business description and contact information included in the final agenda.
Access to participants’ contact details.
Speaking Slot

1 Speaker slot: 45 min: 30 min session and 15 min Q&A
1 in-person pass for the 2-day event
Participation in the panel discussion
Social media promotion leading up to the conference
Access to participants' contact details
Post-conference Documentation Package
Submit Your Interest
Thank you! 😊
Our team will respond within 24-48 hours.
Online Payment
IN-PERSON DELEGATE
1499€
VIRTUAL DELEGATE
599€
Blog
Quantum Security Migration Lags, Forescout Launches 4D Platform to Bridge the Gap
Global adoption of post-quantum encryption is lagging—only 6% of SSH servers are quantum-safe. Discover how Forescout’s 4D Platform helps secure IT, OT, and IoT systems before quantum threats become reality.
iOT365 and Civitas Group Launch OT, IoT Cybersecurity Partnership in Eastern Europe
iOT365 partners with Civitas Group to expand OT and IoT cybersecurity in Romania and Eastern Europe. The alliance delivers advanced AI-driven protection for physical and digital infrastructure through 24/7 managed security services.
Xona, Forescout Partner to Strengthen OT Cybersecurity and Secure Remote Access for Critical Infrastructure
Xona and Forescout partner to deliver zero-trust remote access and enhanced OT cybersecurity for critical infrastructure. Their integrated solution ensures secure, compliant connectivity with full auditability across IT, OT, and IoT environments.
Claroty Enhances Cybersecurity for U.S. Public Sector Critical Infrastructure
Claroty cybersecurity for U.S. critical infrastructure with advanced OT, IoT, and public sector protections. New CTD platform updates boost compliance, threat detection, and operational efficiency across federal agencies.
BT Group Joins Forces with CHERI Alliance to Strengthen Cybersecurity Future
BT Group joins the CHERI Alliance to strengthen global cybersecurity with hardware-based memory safety. Together, they aim to advance CHERI technology adoption for a safer, more resilient digital future.
Fortinet Reveals: OT Security Maturity Mitigates Attacks
Discover how the convergence of IT and OT is reshaping cybersecurity strategies. Fortinet’s 2025 report reveals rising OT security maturity, vendor consolidation, and best practices driving a 93% drop in cyber incidents.
Cybersecurity Giants Shaping the Future of SCADA & OT Protection in 2025
As cyber threats evolve and converge with operational technology (OT), the energy and utilities industry is investing heavily in robust SCADA security frameworks. From real-time monitoring to attack path simulation and AI-driven defense, companies are stepping up with purpose-built solutions tailored for critical infrastructure.
Quantum Security Migration Lags, Forescout Launches 4D Platform to Bridge the Gap
Uneven Progress in Post-Quantum Encryption Adoption
Recent analysis by forescout highlights a significant disparity in global efforts to transition to post-quantum cryptography, raising compliance and cybersecurity concerns. Out of 186 million internet-accessible SSH servers, only 6% have adopted quantum-resistant encryption, while just over 20% of OpenSSH servers support these advanced protections. “Quantum computing is no longer a distant threat; it’s an imminent challenge to digital trust,” emphasized Barry Mainz, CEO of Forescout Technologies Inc. “Organizations must urgently prioritize post-quantum resilience across IT, OT, and IoT environments.”Between October 2024 and March 2025, adoption of ML-KEM—a NIST-certified post-quantum algorithm for SSH key exchange—surged by 554%, indicating rapid movement among early adopters. Nevertheless, nearly 75% of OpenSSH servers still run outdated versions (2015–2022) lacking quantum-safe capabilities, and less than 20% of TLS servers use the quantum-enabled TLS 1.3 protocol. According to Robert McNutt, Forescout’s chief strategy officer, “Detecting systems using outdated encryption is critical. Our patented technology uniquely identifies non-quantum-safe ciphers in real time, enabling risk-based mitigation and compliance.”
🎯 Join us at the "12th Cyber and SCADA Security for Energy,
Power & Utilities Industry 2025" conference!
23 - 24 September 2025 | Berlin
Forescout 4D Platform: Comprehensive Protection for All Assets
To address the risks revealed by their research, Forescout has unveiled the 4D Platform, designed to deliver continuous discovery, protection, and governance for both managed and unmanaged cyber assets. Its capabilities span device identification, risk assessment, network segmentation, rapid threat mitigation, and policy enforcement—across IT, IoT, IoMT, and OT networks. The platform works seamlessly, without business disruption, leveraging patented technology to pinpoint insecure encryption—even on devices actively masking their security status.
Preparing for a Post-Quantum Future
Forescout’s research underscores two crucial takeaways: foundational post-quantum encryption technologies are ready for deployment, yet progress is slowing as organizations exhaust easy updates and face complex legacy systems. With mandates for quantum protection on critical assets looming, the urgency for visibility, risk analysis, and remediation intensifies.
Want to stay ahead of the cybersecurity revolution? 🎯 Join us at the 12th Cyber and SCADA Security for Energy, Power & Utilities Industry 2025 conference!
Claroty Enhances Cybersecurity for U.S. Public Sector Critical Infrastructure
Claroty Bolsters U.S. Critical Infrastructure Cybersecurity with Expanded Protections for OT, IoT, and Public Sector
Strategic Investment in U.S. Public Sector Cybersecurity -Claroty is enhancing its cybersecurity offerings to protect critical infrastructure in the U.S. public sector. This includes securing Operational Technology (OT) systems used in essential services, Internet of Things (IoT) devices, Internet of Medical Things (IoMT) medical equipment, and Building Management Systems (BMS). By expanding its services in these areas, Claroty aims to safeguard federal, state, and local agencies, as well as the defense sector, from growing cyber threats.
Enhanced Exposure Management for Federal Agencies
Claroty’s upgraded Continuous Threat Detection (CTD) platform introduces advanced exposure management capabilities, allowing U.S. public sector agencies to quickly prioritize and remediate critical vulnerabilities. With tools like the CISA KEV catalog and the Exploit Prediction Scoring System (EPSS), organizations can swiftly respond to cyber threats targeting essential systems.
Derek Phillips , Chief Revenue Officer at Claroty:“We continue to grow rapidly in the Public Sector across customers, product development, headcount, and revenue, and require the support of leaders who can guide our teams along this exciting trajectory—Jen brings a level of experience and expertise to support that mission.”FISMA Support with STIG-Hardened Configuration Controls
Claroty strengthens its CTD platform with Security Technical Implementation Guide (STIG)-hardened configuration management controls, ensuring compliance with FISMA and DoD Risk Management Framework (RMF) requirements. This allows federal agencies to deploy secure systems aligned with NIST 800-53 Rev5 standards, protecting against potential cyber threats.
🎯 Join us at the "12th Cyber and SCADA Security for Energy,
Power & Utilities Industry 2025" conference!
23 - 24 September 2025 | Berlin
Enabling Operational Efficiency and Compliance
The latest CTD updates streamline compliance with FIPS-140-2/3, NIST SP 800-53, and other key standards. By automating workflows, enhancing reporting, and offering portability, Claroty helps agencies achieve cost reductions and operational optimization while bolstering their cybersecurity resilience.
Want to stay ahead of the cybersecurity revolution? 🎯 Join us at the 12th Cyber and SCADA Security for Energy, Power & Utilities Industry 2025 conference!
Xona, Forescout Partner to Strengthen OT Cybersecurity and Secure Remote Access for Critical Infrastructure
XONA and Forescout Join Forces to Protect Critical Infrastructure with Integrated OT Security
Xona and forescout Technologies Inc. have announced a powerful partnership aimed at improving cybersecurity and remote access across operational technology (OT) environments.By integrating Xona’s secure remote access platform with Forescout’s 4D cybersecurity platform, the collaboration helps critical infrastructure operators—including those in energy, water, transport, and healthcare—ensure continuous connectivity without compromising security.
Zero-Trust Access Without Operational Friction
Xona’s clientless, browser-based platform delivers secure access to critical systems without VPNs, software installs, or network tunnels.
When combined with Forescout’s real-time asset discovery and network visibility, organizations can dynamically enforce identity-based access, ensuring users only reach the systems they are authorized to use—when they’re authorized to use them.
🎯 Join us at the "12th Cyber and SCADA Security for Energy,
Power & Utilities Industry 2025" conference!
23 - 24 September 2025 | Berlin
Streamlined Compliance and Audit Readiness
The joint solution helps simplify compliance with standards such as NERC CIP, IEC 62443, TSA SD2, and OTCC-1. Xona’s high-fidelity session recording and file governance are enriched by Forescout’s live telemetry, offering a complete audit trail for all remote activities.With this partnership, vendors, contractors, and OEMs can be granted secure, time-limited access to systems—without exposing the core network or using persistent credentials.This solves a critical challenge in industrial cybersecurity: enabling collaboration without increasing attack surfaces.“OT environments demand both visibility and control,”said Christina H. , vice president of OT/ IoT Vertical and Strategy at Forescout.
“Our partnership with Xona extends that control to secure remote access, ensuring every session is verified, authorized, and monitored with zero exceptions. Together, we’re helping customers enforce zero trust principles across their most critical infrastructure to protect OT, IT, and cloud environments at scale.”
Future Outlook
Xona provides secure remote access solutions tailored for industrial environments, delivering fast, compliant, and safe connectivity to mission-critical systems.Forescout Technologies is a global cybersecurity leader with over 20 years of experience providing visibility and automated control across IT, OT, and IoT ecosystems.
Want to stay ahead of the cybersecurity revolution? 🎯 Join us at the 12th Cyber and SCADA Security for Energy, Power & Utilities Industry 2025 conference!
iOT365 and Civitas Group Launch OT, IoT Cybersecurity Partnership in Eastern Europe
iOT365 , a global leader in operational technology (OT) and Internet of Things (IoT) cybersecurity solutions, has announced a strategic partnership with Civitas Group , a leading provider of integrated security services in Romania.This collaboration aims to bring the advanced iOT365 cybersecurity platform to Romania and other Eastern European and Balkan markets, fortifying the region's cybersecurity landscape.Expanding CybersecurityUnder the new partnership, Civitas Group will utilize iOT365’s cybersecurity platform to enhance the protection of physical security systems such as cameras, access control devices, and alarm systems.By offering iOT365’s comprehensive OT and IoT cybersecurity services, Civitas will provide its broad client base with expert installation, ongoing management, and round-the-clock cybersecurity monitoring through iOT365’s OT/IoT Security Operations Center (SOC).This offering aims to protect organizations from an ever-growing range of cyber threats that target critical physical and digital infrastructure.“We are thrilled to partner with Civitas to expand our reach into Romania and the wider Eastern European and Balkan markets,” said Alex Tartakovsky, CEO of iOT365.Rene Pasculescu, CEO of Civitas, added: “This partnership marks a significant milestone for the Civitas Group and our clients. As the convergence of physical and digital security accelerates, our customers are seeking holistic solutions that address both domains. With iOT365’s leading cybersecurity platform, we can now offer unparalleled protection for our clients.
🎯 Join us at the "12th Cyber and SCADA Security for Energy,
Power & Utilities Industry 2025" conference!
23 - 24 September 2025 | Berlin
A Strategic Milestone for iOT365This partnership comes on the heels of iOT365's recent collaboration with Check Point Software Technologies Ltd., enhancing their ability to offer zero-trust enforcement and proactive defense for industrial sites and critical infrastructure.The iOT365 platform leverages AI-powered analytics to identify real threats in real time, ensuring high precision and minimal false positives, strengthening OT and IoT device security across the region.
Want to stay ahead of the cybersecurity revolution? 🎯 Join us at the 12th Cyber and SCADA Security for Energy, Power & Utilities Industry 2025 conference!
BT Group Joins Forces with CHERI Alliance to Strengthen Cybersecurity Future
The CHERI Alliance, a global coalition dedicated to enhancing cybersecurity through hardware memory safety technology, has welcomed BT Group as its newest member.As a leading telecommunications company, BT brings its extensive expertise in network security and innovation to the Alliance, reinforcing its mission to create a safer digital future.CHERI Technology and Its ImpactThe CHERI Alliance is a consortium that unites industry leaders, researchers, and governments with the goal of promoting the adoption of Capability Hardware Enhanced RISC Instructions (CHERI) technology.This transformative technology aims to address memory safety vulnerabilities, a common cause of cyberattacks, by implementing hardware-enforced protections. By joining the Alliance, BT will collaborate with other members to advance the deployment of CHERI technology across various industries, ensuring a safer and more resilient digital environment.BT’s leadership in secure communications is unparalleled, and their involvement in the CHERI Alliance marks a significant step forward for our mission said Mike Eftimakis, founding director of the
🎯 Join us at the "12th Cyber and SCADA Security for Energy,
Power & Utilities Industry 2025" conference!
23 - 24 September 2025 | Berlin
CHERI AllianceAs a global leader in telecommunications, BT recognizes the critical importance of securing the digital infrastructure that underpins our economy and society,” said Dave Harcourt, chief security authority and automation director at BT Group.Collaborative Effort for Safer Digital InfrastructureThe CHERI Alliance operates through collaborative working groups, raising awareness of the benefits of CHERI technology.These groups also provide tools, recommendations, and open-source software to accelerate product development, empowering developers and promoting the widespread adoption of CHERI technology.The Alliance’s partnership with the British government marks a significant step forward in advancing this initiative.
Want to stay ahead of the cybersecurity revolution? 🎯 Join us at the 12th Cyber and SCADA Security for Energy, Power & Utilities Industry 2025 conference!
Fortinet Reveals: OT Security Maturity Mitigates Attacks as More CISOs Take the Lead in 2025
The convergence of IT and Operational Technology (OT) has pushed cybersecurity to the forefront. A 2025 Fortinet report reveals that 52% of organizations have now placed OT security under the Chief Information Security Officer (CISO), up from 16% in 2022. As 80% more organizations are expected to follow this shift, OT cybersecurity is gaining increasing attention at the executive level.Rising Security MaturityThe report indicates that 81% of organizations now rate their OT security maturity at levels 3 or 4, reflecting a focus on continuous improvement. Higher maturity levels correlate with fewer intrusions.In fact, organizations at Level 4 maturity saw a 65% drop in intrusions compared to 46% for those at lower levels. As a result, operational disruptions caused by cyberattacks have also decreased, from 52% to 42% year-over-year.
🎯 Join us at the "12th Cyber and SCADA Security for Energy,
Power & Utilities Industry 2025" conference!
23 - 24 September 2025 | Berlin
Adopting Best Practices and Vendor ConsolidationConsolidation of OT vendors is on the rise, with 78% of organizations now relying on one to four vendors, signaling more efficient operations. Fortinet unified OT security platform has shown a 93% reduction in cyber incidents, proving the importance of integrated security solutions."OT security maturity is not just about technology; it’s about a holistic approach," says Shah.Key Actions to Strengthen OT SecurityFortinet emphasizes four core strategies: visibility, segmentation, platform-based security, and real-time threat intelligence. By segmenting IT and OT networks, organizations can limit potential damage from cyberattacks. A unified security platform enhances visibility and automates defense mechanisms, ensuring a more proactive and cohesive approach.
Want to stay ahead of the cybersecurity revolution? 🎯 Join us at the 12th Cyber and SCADA Security for Energy, Power & Utilities Industry 2025 conference!
Cybersecurity Giants Shaping the Future of SCADA & OT Protection in 2025
As cyber threats evolve and converge with operational technology (OT), the energy and utilities industry is investing heavily in robust SCADA security frameworks. From real-time monitoring to attack path simulation and AI-driven defense, companies are stepping up with purpose-built solutions tailored for critical infrastructure.Here are notable companies making headlines and why their innovations matter to utility CISOs, cyber architects, and SCADA specialists.1. Rockwell Automation – Real-Time OT Security MonitoringIn April 2025, Rockwell Automation launched its Security Monitoring and Response Service. This new launch managed security service delivers continuous, real-time threat monitoring tailored specifically for operational technology (OT) environments. Designed to address critical workforce shortages in cybersecurity teams, the service offers hands-free protection, enabling faster detection and response across complex and distributed industrial assets. This solution is especially valuable for utility operators, grid infrastructure managers, and industrial control teams who require constant visibility and rapid action without overburdening internal resources.“As cyber risk continues to increase, manufacturers need constant vigilance and the right expertise to stay ahead of evolving threats. But they often lack the resources to do so,” said Nick Creath, cybersecurity services lead product manager at Rockwell Automation.
🎯 Join us at the "12th Cyber and SCADA Security for Energy,
Power & Utilities Industry 2025" conference!
23 - 24 September 2025 | Berlin
2. Claroty – Expanding SCADA Visibility at Industrial ScaleClaroty continues its rapid growth, supported by $740 million+ in funding and a strategic expansion into the utilities and critical infrastructure sector. As a top-tier solution provider in ICS visibility, asset inventory, and policy enforcement, Claroty addresses some of the most urgent challenges in SCADA-heavy environments. Its tools empower grid operators and asset managers to consolidate OT asset data, manage vulnerabilities more effectively, and accelerate incident response—making it a vital player in today’s evolving cyber-threat landscape.“For ten years, our customers have trusted Claroty to protect their organizations from adversaries that are increasingly targeting the systems that are critical to modern society,” said Yaniv Vardi , CEO of Claroty.3. DOE’s CESER Launches Breakthrough OT Cybersecurity Tool with Bastazo & Network PerceptionThe U.S. Department of Energy’s CESER office, in collaboration with Bastazo and Network Perception , has unveiled V-INT—a cutting-edge tool designed to help energy utilities identify and prioritize vulnerabilities in complex OT networks. By simulating real-world cyberattacks and analyzing firewall policies, V-INT gives a hacker’s-eye view into critical system exposure. Backed by AI-powered insights from Bastazo and network visualization from Network Perception (a Dragos company), this solution enables utilities to take targeted, risk-based action to protect infrastructure and enhance national grid resilience."V-INT enables companies to conduct realistic attack simulations to provide a clear view of how their vulnerabilities appear from an attacker’s perspective,” said Philip Huff, Bastazo’s co-founder and chief scientist4. SentinelOne Unveils Purple AI Athena: Smart Defense for Modern Utility CybersecuritySentinelOne launched Purple AI Athena, a next-gen agentic AI-powered tool designed to transform how utilities detect and respond to complex cyber threats. Built for the scale and urgency of today’s energy infrastructure, Athena automates threat investigation across multiple data sources, orchestrates precise response actions, and enables intelligent remediation. With seamless integration into third-party platforms and a focus on hyperautomation, it delivers exactly what large utilities and energy providers need: faster, smarter, and more resilient cybersecurity.5. Nozomi Networks Secures $100M and Leader Spot in 2025 Gartner CPS QuadrantNozomi Networks, a global industrial cybersecurity frontrunner, was named a Leader in the 2025 Gartner Magic Quadrant for CPS Protection Platforms. Backed by $100M in Series E funding in the past. Nozomi’s AI-driven platform protects over 115 million OT and IoT assets across 12,000+ sites. With deep-packet inspection, real-time threat detection, and hybrid visibility, it empowers SCADA teams and CISOs to defend critical infrastructure with precision and scale.As the convergence of IT and OT continues to reshape the cybersecurity landscape, these pioneering companies are pushing the boundaries of innovation to protect the energy sector’s most critical infrastructure.
Want to stay ahead of the cybersecurity revolution? 🎯 Join us at the 12th Cyber and SCADA Security for Energy, Power & Utilities Industry 2025 conference!