2019 Sponsors



IBM Security

Security and the environment of trust it establishes, enables businesses to innovate and grow safely. Nowhere is this more important than in OT environments where organizations are challenged with gaining visibility into their infrastructure and reducing risk. IBM Security is helping thousands of organizations of all sizes implement any or all components of their security programs, from strategy definition through to data security, IAM and hybrid cloud integration. Combining that experience with our extensive research into quantum computing, IoT, AI, as well as from monitoring over 70B security events every day, we have a deep understanding of the current and future threat landscapes. This understanding puts us on the leading edge of developing and deploying the countermeasures that these threats demand. IBM Security is therefore uniquely placed to help our clients plan for, detect and respond to threats and attacks today and for years to come.



Darktrace Industrial is the world’s leading machine learning company for cyber defense. Created by mathematicians from the University of Cambridge, Darktrace’s Industrial Immune System technology uses AI algorithms that mimic the human immune system to defend industrial networks of all types and sizes. In an era where OT and IT are increasingly converging, Darktrace’s technology is uniquely positioned to provide full coverage of both enterprise and industrial environments. By applying advanced machine learning and AI, Darktrace Industrial defends Critical Infrastructure across the world, and is relied upon by leading energy providers, utility companies and manufactures to secure their ICS and SCADA environments. (www.darktrace.com)

Nozomi Networks delivers a solution for real-time visibility to manage cyber risk and improve resilience for industrial operations. With one solution, customers gain advanced cyber security, improved operational reliability and easy IT/OT integration. Innovating the use of artificial intelligence, the company helps the largest industrial facilities around the world See and Secure™ their critical industrial control networks. Today Nozomi Networks supports over a quarter of a million devices in sectors such as critical infrastructure, energy, manufacturing, mining, transportation and utilities, making it possible to tackle escalating cyber risks to operational networks.


Combining patented technologies and services, the Irdeto Cloakware suite of products enables brands and developers to protect their platform against reverse engineering, tampering and automated attacks. Irdeto’s techniques protect software through function and control flow transformation, anti-debug, whitebox cryptography, integrity verification, diversity and self-healing code. Irdeto’s Cloakware solutions provide a highly effective, multi-layered, renewable and tunable approach to software protection that is future-proof and relies on 20 years of proven cybersecurity success. Irdeto’s Cloakware cybersecurity technology, products and solutions include Secure Environment, Software Protection, Keys & Credentials and Security Services. Cloakware for IoT – Protects IoT applications, connected devices and data in transit, keeping hackers and cybercriminals out of their products. (www.irdeto.com)


Gold Sponsors

Dragos - Silver Sponsor

Dragos applies expert human intelligence and threat behavior analytics to redefine ICS cybersecurity. Its ICS cybersecurity ecosystem provides industrial security practitioners with unprecedented situational awareness over their environments, with threat intelligence, detection, and response capabilities. Dragos’ solutions include: the Dragos Platform, software providing ICS-specific asset discovery, threat detection, and investigation capabilities; Dragos Threat Operations Center, providing ICS threat hunting, incident response services, and ICS cybersecurity training; and Dragos ICS WorldView, providing global, ICS-specific threat intelligence in the form of weekly reports and critical alerts upon discovery. (www.dragos.com)

A pioneer of Industrial Internet cybersecurity, Sentryo enables organizations to ensure the availability, resilience and safety of their industrial systems while fighting against cyberattacks. The Sentryo solution, ICS CyberVision, is a network monitoring platform which detects any intrusion and anomaly and provides visibility, integrity and security for industrial control systems. ICS CyberVision is successfully deployed in the energy, manufacturing and transportation business sectors. Sentryo is headquartered in Lyon and has a worldwide presence including offices and partners in Europe, North and South America and Asia. (www.sentryo.net)

Ampex specializes in systems for acquiring, exploiting and protecting data by offering cost-effective solutions for data recording, on-board storage, cyber security, data management, machine learning and associated technologies. The experts at Ampex’s Cyber and Electronic Analysis, Development, and Integration Laboratory (CEADIL) have been awarded North America’s Cyber Security Team of the Year by the 2019 Cybersecurity Excellence Awards. Aaron Fansler, Chief Technologist, was awarded as North America’s 2019 Cybersecurity Professional of the Year. Ampex engineers solutions at the forefront of monitoring, detecting, and responding to Critical Infrastructure and Operational Technology cyberattacks and provides robust capabilities that offer a quick ROI. Ampex’s BLUE Lightning is a complete disruptive edge security solution with the ability to prevent threats BEFORE they affect an organization’s revenue security. (www.ampex.com)

Fortinet secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network. The Fortinet Security Fabric architecture can deliver security features without compromise to address the visibility, availability and reliability necessary for your operational technology (OT) and information technology (IT), whether in networked, application, cloud or mobile environments. (www.fortinet.com)

CyberX provides the most widely-deployed cybersecurity platform for continuously reducing risk to critical industrial infrastructures. Recognized as a “Cool Vendor” by Gartner and backed by military-grade cyber experts from the IDF, CyberX enables to prevent costly production outages, catastrophic safety failures, and theft of corporate IP. CyberX is the only industrial cybersecurity vendor selected for the SINET16 Innovator Award sponsored by the US DHS and DoD, and the only ICS security vendor recognized by ISA (International Society of Automation). An active member of the Industrial Internet Consortium (IIC) and ICS-ISAC, CyberX’s ICS threat intelligence research was featured in the popular book series, “ICS Hacking Exposed.”

Trend Micro Incorporated, a global leader in cybersecurity solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud workloads, networks, and endpoints. All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and investigation, enabling better, faster protection. With more than 6,000 employees in 50 countries and the world’s most advanced global threat research and intelligence, Trend Micro enables organizations to secure their connected world.

Cyberbit - Silver Sponsor

Cyberbit is the world-leading provider of cyber ranges for cybersecurity training and simulation. Cyberbit is also the first to provide a consolidated threat detection and response platform that includes: security automation, orchestration and response (SOAR), ICS/SCADA security (OT security), and endpoint detection and response (EDR) powered by behavioral analysis. This unique platform provides consolidated detection and response protecting an organization’s entire attack surface across IT, OT and IoT networks. Since founded in mid-2015 Cyberbit’s products are rapidly adopted by enterprises, governments, higher education institutions and MSSPs. Cyberbit’s investors include Elbit Systems (NASDAQ: ESLT) and Claridge Israel. Cyberbit has offices in Israel, the US, Europe, and Asia.

Radiflow is a leading provider of cyber security solutions for Industrial Control Systems (ICS). Radiflow’s solutions empower operators of Industrial IoT automation systems to maintain visibility and control of their operational networks. Radiflow’s line of security solutions were designed especially for ICS systems, overcoming the shortcomings of traditional industrial applications in industrial ICS settings. (www.radiflow.com)

ConsoleWorks provides a secure, persistent connection to streamline access and control to any device for privileged users. The solution is always monitoring, auditing and logging activity down to the keystroke to support regulatory, cybersecurity best practices and IT/OT operations while providing a staunch defense against access by unauthorized users. ConsoleWorks is unique because the platform sits between the privileged users and the assets they interact with, enabling the ability to automate activities like configuration monitoring, password management and other cybersecurity and operations functions using the assets’ native language.



Claroty’s mission is to secure and optimize the industrial control networks that run the world. The company’s platform enables customers to enjoy the substantial benefits of increasingly networked control systems without compromising operational resiliency or the security of core assets. The Claroty Platform provides extreme visibility into the widest range of ICS, SCADA and other control system devices, protocols and networks using passive monitoring techniques to safely examine and analyze OT networks. The system employs real-time monitoring, high-fidelity models and advanced analytics to detect anomalies and to rapidly alert organizations to security and process integrity issues. The platform is powered by the Claroty Research; an OT cybersecurity research team with members from an elite cyber unit of the Israeli Defense Force. (www.claroty.com/)

Indegy secures against operational disruptions caused by Cyber Threats, Malicious Insiders and Human Error. Indegy enables organizations to reduce risk and ensure operational safety, continuity and reliability, by providing real-time visibility and control for industrial control networks (ICS), industrial automation controllers (PLCs, RTUs, DCS) and the processes. The Indegy platform delivers unparalleled visibility into ICS networks to identify threats, anomalies and unauthorised access to critical assets. It maintains a comprehensive asset inventory and captures all changes to these assets, whether performed by malware or human, and whether authorized or not, including activities executed via proprietary control-plane protocols. The company has been named a Gartner “Cool Vendor” and received worldwide recognition for its innovative platform. (www.indegy.com)

Founded in 1993, PAS is a leading provider of software solutions for ICS cybersecurity, process safety, and asset reliability to the energy, process, and power industries worldwide. PAS solutions include industrial control system cybersecurity, automation asset management, IPL assurance, alarm management, high performance HMI™, boundary management, and control loop performance optimization. PAS solutions are installed in over 1,380 facilities worldwide in more than 70 countries. PAS was recently named the #1 Global Provider of Safety Lifecycle Management by ARC Advisory Group including #1 rankings within Chemical, Power Generation, Refining, and Oil & Gas. (www.pas.com)

OWL Cyber Defense - Exhibitor

Owl Cyber Defense Solutions, LLC leads the world in data diode and cross domain network cybersecurity. With a constant focus on customers in the military, government, critical infrastructure, and commercial communities, Owl develops market-first, one-way data transfer products to meet a variety of operational needs, from entry level to enterprise. (www.owlcyberdefense.com)]