InfoSec World 2025 brings together cybersecurity leaders, risk officers, and IT strategists from across the manufacturing sector for three days of insight, collaboration, and innovation.
Whether you’re a CISO navigating the complexities of securing connected factories, or a security architect mitigating supply chain and third-party risks, you’ll find manufacturing-specific content and expert-led sessions designed to address your toughest challenges.
As organizations expand their reliance on third-party providers, insider threats—whether driven by malice or mistake—become increasingly difficult to detect and control. This session, presented in collaboration with the CERT Division’s Insider Threat Center and Risk Management team, explores the critical intersection of insider risk and supply chain security. Using real-world examples, the session will highlight the challenges of monitoring and mitigating threats from both internal actors and Trusted External Entities (TEEs).
In this session you will:
In 2024, the National Reconnaissance Office (NRO), in partnership with vendors like SpaceX and Northrop Grumman, launched over 100 satellites—more than in any previous year in its history. This monumental achievement reflects a dramatic shift in how the NRO approaches space operations: fast, agile, and cyber-resilient. With satellite development cycles collapsing from years to months, and commercial-grade IT systems now integrated across space vehicles and communications, the need for adaptable, robust cybersecurity has never been greater.
In this session you will:
In a rapidly evolving threat landscape, securing critical infrastructure requires forward-thinking strategies. This session explores how AI, Zero Trust, and attack surface management can strengthen organizational resilience— while also addressing the emerging risks of quantum computing and IoT expansion.
In this session you will:
In the fast-moving world of cybersecurity, innovative ideas can quickly become game-changers—or targets. Without proper intellectual property (IP) protection, groundbreaking cybersecurity advancements risk being exploited or misused. This session empowers cybersecurity professionals, researchers, and innovators to identify patent-worthy inventions and navigate the often-overlooked patent process. Led by a renowned cybersecurity evangelist with 88 granted U.S. patents, the session offers a practical roadmap to safeguarding innovation while aligning IP strategy with business objectives.
In this session you will:
When ransomware hits, the clock starts ticking—and the decisions made in the first 24 hours can mean the difference between swift recovery and prolonged chaos. This session provides a tactical, hour-by-hour roadmap for responding to ransomware attacks, highlighting key actions to take, mistakes to avoid, and strategies to contain damage and restore operations efficiently.
In this session you will: