Today’s manufacturers confront unprecedented cyber and operational risks—from ransomware on production lines to IP theft and supply chain exposure.
InfoSec World 2025 brings together cybersecurity leaders, risk officers, and IT strategists from across the manufacturing sector for three days of insight, collaboration, and innovation.
Whether you’re a CISO navigating the complexities of securing connected factories, or a security architect mitigating supply chain and third-party risks, you’ll find manufacturing-specific content and expert-led sessions designed to address your toughest challenges.
Impactful Sessions
Session level:
intermediate
What's in the Soup?: Navigating Insider Threat in the Supply Chain
As organizations expand their reliance on third-party providers, insider threats—whether driven by malice or mistake—become increasingly difficult to detect and control. This session, presented in collaboration with the CERT Division’s Insider Threat Center and Risk Management team, explores the critical intersection of insider risk and supply chain security. Using real-world examples, the session will highlight the challenges of monitoring and mitigating threats from both internal actors and Trusted External Entities (TEEs).
In this session you will:
Examine real-world insider incidents that reveal how third-party relationships can expand attack surfaces
Learn strategies to integrate insider threat considerations into enterprise-wide risk management programs
Discover tools and metrics to help build, assess, and maintain a trusted ecosystem of external providers
Director, CERT National Insider Threat Center
Carnegie Mellon University, Software Engineering Institute
Session level:
intermediate
Building Secure Satellites and Managing Risk in Space
In 2024, the National Reconnaissance Office (NRO), in partnership with vendors like SpaceX and Northrop Grumman, launched over 100 satellites—more than in any previous year in its history. This monumental achievement reflects a dramatic shift in how the NRO approaches space operations: fast, agile, and cyber-resilient. With satellite development cycles collapsing from years to months, and commercial-grade IT systems now integrated across space vehicles and communications, the need for adaptable, robust cybersecurity has never been greater.
In this session you will:
Learn how the NRO and its vendors leveraged commercial capabilities, security best practices, and the NIST Risk Management Framework to reduce risk in space operations
Explore how cybersecurity vulnerabilities common to ground systems are now present in space-based platforms—and how to address them
Gain insights from Lance Dubsky on risk adaptation in satellite environments and successful public-private teaming strategies for securing next-generation constellations
AI, Zero Trust, and the Future of Cybersecurity for Critical Infrastructure
In a rapidly evolving threat landscape, securing critical infrastructure requires forward-thinking strategies. This session explores how AI, Zero Trust, and attack surface management can strengthen organizational resilience— while also addressing the emerging risks of quantum computing and IoT expansion.
In this session you will:
Discover how AI enhances threat detection and response across dynamic environments
Understand the role of Zero Trust and continuous verification in modern cybersecurity
Gain insights into managing expanding attack surfaces and preparing for quantum-era encryption challenges
CEO/Founding Partner
International Holding Company LLC
Session level:
intermediate
Hacking the Patent System - When and Why to Protect Cybersecurity Innovations
In the fast-moving world of cybersecurity, innovative ideas can quickly become game-changers—or targets. Without proper intellectual property (IP) protection, groundbreaking cybersecurity advancements risk being exploited or misused. This session empowers cybersecurity professionals, researchers, and innovators to identify patent-worthy inventions and navigate the often-overlooked patent process. Led by a renowned cybersecurity evangelist with 88 granted U.S. patents, the session offers a practical roadmap to safeguarding innovation while aligning IP strategy with business objectives.
In this session you will:
Learn how to recognize and evaluate potentially patentable cybersecurity innovations
Understand the difference between general security concepts and true patentable inventions
Discover how to integrate intellectual property into your business strategy and avoid common pitfalls in the patent process
We've been Hit with Ransomware: Best Practices for the first 24 hours after a Cyber Attack
When ransomware hits, the clock starts ticking—and the decisions made in the first 24 hours can mean the difference between swift recovery and prolonged chaos. This session provides a tactical, hour-by-hour roadmap for responding to ransomware attacks, highlighting key actions to take, mistakes to avoid, and strategies to contain damage and restore operations efficiently.
In this session you will:
Learn immediate response steps to take within the first hours of a ransomware attack
Discover containment techniques that minimize business disruption and data loss
Gain a strategic playbook for IT teams, incident responders, and executives to lead effective ransomware recovery
Sessions on ICS/SCADA security, ransomware resilience, and supply chain risk
Specialized Speakers
Expert insights from cybersecurity leaders in aerospace, automotive, and electronics
Smart Factory Case Studies
Case studies on securing digital transformation in smart factories
Focused Networking
Exclusive networking with peers from across the manufacturing industry
Shape the Future
Secure your seat and help lead the future of manufacturing security
Testimonials
Doosan Bobcat
Colm Fagan
Director IT Security and Risk Management
Content was very good, good to see what's coming up next from a threat / security perspective. I particularly found the presentations regarding AI / ML very interesting,
Cutsforth Inc.
Dylan Thomas
Director of Cybersecurity & IT Operations
Much of the content was aimed at people in my position (CISO/Director), which hasn't been the case at many other events I've attended.
For any and all inquiries please click the button below
Interested in speaking at the event?
Join our mailing list for the latest news on InfoSec World 2025.
This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you. If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.