OT Security Summit 2026

OT Security Summit – 5 års jubilæum

OT Security Summit fejrer i år 5-års jubilæum som det største rene OT-sikkerhedsevent i Jylland.

I den anledning inviterer vi igen slut-kunder og andre samarbejdspartnere til et 2-dages event, hvor faglig fordybelse, erfaringsudveksling og netværk er i centrum, og du har nu mulighed for at pre-booke din plads.

Som sidste år tilbyder vi både kundemiddag og overnatning, så der er god tid til dialog og relationer – et format, der viste sig at være en stor succes i 2025. Se mere nedenfor.

Hvad kan du forvente?

Agendaen er under udarbejdelse, men vi kan allerede nu love:

  • Masser af tid til erfaringsudveksling og dialog
  • Kundepræsentationer og konkrete OT-cases
  • Workshops med fokus på aktuelle og praksisnære OT-sikkerhedsudfordringer
  • Keynotes fra førende eksperter
  • Dybdegående tekniske præsentationer fra førende OT-leverandører

Ved tilmelding skal du tage stilling til 4 ting

Tilmelding sker via formularen nederst på denne side

  1. Hvilke 4 ”ERFA workshops” på dag 1 (15. april) ønsker jeg at deltage i?
  2. Hvilke ”Technology Talks” på dag 1 (15. april) vil jeg deltage i?
  3. Ønsker jeg at deltage ”Business talks” på dag 2 (16. april)?
  4. Ønsker du at deltage i middagen og/eller overnatte fra den 15. til 16. april (Eksternt link)?

Keynote Speakers

Markus Mueller

2026 OT Threat Landscape: Three Forces Every OT Defender Must Address

The OT threat landscape is evolving quickly, making it more difficult than ever to protect our industrial environments. This session filters out the noise to identify the three main threat forces shaping OT security in 2026: the weaponization of artificial intelligence, the impact of geopolitical events on targeted infrastructure attacks, and growing attack vectors through supply chains. Each of these trends is accelerating independently, and they are increasingly merging.

Drawing on real-world incidents and threat intelligence from 2025 and early 2026, this session provides leaders and practitioners with a clear assessment of emerging risks and what effective responses look like in practice. Attendees will gain a practical understanding of how to prioritize defenses, communicate with leadership, and build resilience into OT environments that were never designed for today’s threats.

BIO

Markus Mueller is a dedicated Operational Technology (OT) cybersecurity leader and practitioner with almost 25 years of experience helping organizations secure and improve their industrial environments. His career has been focused on manufacturing and utility space, including power generation, transmission, and distribution—including thermal, hydro, solar, and wind sources—as well as water, wastewater, and gas systems.

Markus specializes in developing resilient OT cybersecurity programs that adhere to industry best practices and regulatory standards, such as IEC 62443, NIST, and NERC CIP. He has led projects ranging from incident response and security assessments to enterprise OT program development, risk management, and threat intelligence.

In his current role as Field CISO for Nozomi Networks, Markus collaborates with strategic customers to ensure that our most critical infrastructure remains safe, reliable, and secure. He supports teams across the spectrum, from substations to the boardroom, on their OT journey.

Ryan Devis

Pragmatic OT Cyber Protection Strategies for 2026

Explore the evolution of OT cybersecurity—from its early, isolated systems to today’s highly connected and threat-prone environments—and understand how these changes shape current risk landscapes. This session pairs that historical perspective with practical guidance, offering actionable steps to build, strengthen, and sustain an effective OT cyber protection program in modern industrial operations.

BIO

Ryan brings over a decade of storage and data management experience to Acronis leading a commercial enterprise sales organization. Acronis’ enterprise sales team is focused on helping organizations improve their business continuity plans and reduce cyber exposure in historically difficult computing areas such as the edge, endpoints, industrial automation, and R&D labs.

Ryan began his sales career selling knives door to door and holds a BS in Sales & Business Marketing from Western Michigan University.

Kundetalere

Leverandører

Programoverblik

Dag 1 – onsdag 15. april 2026

Her sammensætter du selv din dag ved at vælge mellem ERFA Workshops og Technology Talks som kører sideløbende.

ERFA Workshops – del erfaringer og få nye perspektiver

I år afholder vi en række ERFA Workshops, hvor fokus er på videndeling og erfaringsudveksling mellem deltagerne.

Disse workshops er dialogbaserede. Det betyder, at du som deltager spiller en aktiv rolle, mens vi fungerer som værter og facilitatorer for samtalen. Hver workshop indledes med et kort oplæg og præsenterer nogle konkrete dilemmaer, som danner rammen for dialogen.

Der er begrænset antal pladser pr. workshop, og disse fordeles efter ”først-til-mølle” princippet. Hver ERFA Workshop tema bliver afholdt 2 gange i løbet af dagen, så du kan nå at være med i Tech Talks.

Vælg dine 4 favoritemner blandt de 4 emmer, som er beskrevet her. Vi fordeler derefter jer ud på jeres valg ud fra emnernes popularitet og dine Tech Talks valg, når vi har det samlede overblik.

De 4 emner er:

Emne nr. Overskrift Beskrivelse
Emne nr. 1 OT vs IT – samarbejde eller? OT- og IT-systemer er i dag tæt forbundne, hvilket stiller nye krav til roller, ansvar og kompetencer.
Hvad er udfordringer i grænsefladen mellem OT, IT og cybersikkerhed, og hvordan løses det bedst?
Emne nr. 2 Beredskab i OT Beredskabsplaner skal udarbejdes, dokumenteres og afprøves for at sikre håndtering af hændelser i OT-miljøer.
Hvad er jeres erfaringer og tilgang till dette område?
Emne nr. 3 OT-arkitektur – Design og implementering Opbygning af en OT-arkitektur, der både er sikker og stabil, har stort fokus i dag. Segmentering betragtes som et af de vigtigste forsvar mod cybertrusler, men samtidig stiller forretningen og nye teknologier krav om øget integration.
Hvordan balanceres dette hos virksomhederne?
Emne nr. 4 Backup og Recovery Backup af systemer og evnen til at “recover” fra et nedbrud er et centralt punkt og der er forskellige tilgange til det, men hvilke erfaringer sidder du med?

Tech Talks – mød leverandørerne

Tech Talks vil køre sideløbende med ”ERFA Workshops”. Hver Tech talk tager udgangspunkt i en konkret kunde-case, hvor leverandørens teknologi har været med til at løse én eller flere udfordringer hos en kunde. Der vil samtidig være fokus på design og arkitektur i løsningerne – herunder overvejelser, valg og erfaringer fra praksis og evt. demo.

Vælg de emner og leverandører, som du ønsker at fordybe dig i.

Tid Overskrift Taler
08.30 – 09.10 From Visibility to Lockdown — A Brownfield OT Endpoint Hardening Case
A manufacturing organisation had deployed visibility solutions and identified legacy systems, vulnerabilities, and exposure across production. But visibility alone did not reduce risk, and the organisation needed to demonstrate concrete improvements to management.
The case shows how an organisation moved from visibility to enforceable protection in a live OT environment.
Christian Søgaard, TXOne
09.15 – 10.00 Securing Remote Access in OT: A Real-World Manufacturing Use Case
BeyondTrust presents a real-world use case from a global manufacturer that set out to secure and standardize remote access across its OT environment. By consolidating all remote access into a single, centrally managed solution, the organization significantly reduced its attack surface while enforcing consistent access controls and least privilege. The results were immediate and measurable: over 300 compliance issues were reduced to just one. In addition to stronger security and uncomplicated compliance, the solution also delivered operational and financial benefits.
BeyondTrust
10.00 – 10.15 Pause
10.15 – 10.55 OT Risk, Operational Impact: Closing the Gap Between Insight and Action
OT cyber risk doesn’t sit in dashboards, it directly impacts uptime, safety, and production. Get a close look into a real-world OT security challenge faced by a critical infrastructure operator, and hear how it was identified, prioritised, and resolved. We break down the decision-making process step by step, from cutting through alert noise to understanding true operational impact, to taking action without interrupting production. You’ll see what it takes to move from insight to outcome.
Diana Paz, Nozomi Networks
11.00 – 11.40 Air Gaps Don’t Last Forever
SensorFu shows real-life examples from critical infrastructure and industrial networks on how network segment isolation can fail over time and how to fix these.
Pekka Pirttiaho, SensorFu
11.40 – 13.00 Frokost
13.00 – 13.40 Stopping Malware at the Gate
How one completely legitimate file compromised a highly secure environment, and why modern controls didn’t stop it. We will follow the file step-by-step – from upload to execution – and then rebuild the security model together.
OPSWAT
13.45 – 14.30 Legacy Access, Modern Risk: How Outdated Remote Connections Are Undermining OT Security
Hear how Cyolo mitigated key access risks with a global manufacturing customer, including persistent third-party connections, limited traceability and audibility, no session control or supervisory approval. Learn how Cyolo’s lightweight, identity-based, and agent-less platform addresses these risks whilst providing the visibility and control required by operational personnel.
Cyolo
14.30 – 15.00 Pause
15.00 – 15.40 Pragmatic OT Cyber Protection Strategies for 2026
Explore the evolution of OT cybersecurity—from its early, isolated systems to today’s highly connected and threat-prone environments—and understand how these changes shape current risk landscapes. This session pairs that historical perspective with practical guidance, offering actionable steps to build, strengthen, and sustain an effective OT cyber protection program in modern industrial operations.
Ryan Davis, Acronis
15.45 – 16.30 Operationalizing SBOM in OT – Real-Time Exposure Detection for Emerging Vulnerabilities
Industrial/OT organizations traditionally rely on vendors to confirm whether newly disclosed vulnerabilities affect deployed assets. This process often takes days or weeks while operational risk remains unknown.
Keysight

Dag 2 – 16. april 2026 – Business Talks – hør eksperter og kunders erfaringer

Dag to er fyldt med inspirerende indlæg fra førende eksperter samt stærke kundecases, hvor kunder deler deres konkrete erfaringer med OT-sikkerhed i praksis.

Se programmet herunder og glæd dig til en dag med ny viden, inspiration og erfaringsudveksling.

Tid Overskrift Taler
08.15 – 08.30 Velkommen SecuriOT
08.30 – 09.15 Beredskab
Bestseller forbereder sig på worst case scenario, hvis ondsindede aktører rammer virksomhedens IT/OT systemer.
Kundetaler 1:
Thomas Janke, Senior IT Security Architect, Bestseller
09.15 – 10.00 Pragmatic OT Cyber Protection Strategies for 2026
Explore the evolution of OT cybersecurity—from its early, isolated systems to today’s highly connected and threat-prone environments—and understand how these changes shape current risk landscapes. This session pairs that historical perspective with practical guidance, offering actionable steps to build, strengthen, and sustain an effective OT cyber protection program in modern industrial operations.
International taler 1:
Ryan Davis, Sr. Director, Enterprise Sales, Acronis
10.00 – 10.15 Pause
10.15 – 11.00 OT-IT – fra kaos til struktur .. og uventet besøg!
Udviklingen fra kaos til struktur i samarbejdet, og hvordan et zero day exploit alligevel gav uventet besøg.
Kundetaler 2:
Jesper Bolin, Teknisk chef & Lars B. Jensen, Drift & SRO Vordingborg Forsyning
11.00 – 11:45 Overraskelse
11.45 – 13.00 Frokost
13.00 – 13.45 Cyber Security er ikke et system kapløb
Udpegelsen som kritisk infrastruktur af højeste karakter stiller store krav til Ørsteds OT drifts- & cyber sikkerhed. Hør hvordan kombinationen af logisk og fysisk cyber sikkerhed anvendes, hvordan worst case strategien blev udarbejdet og hvordan alt peger ind mod hele tiden at være leveringsdygtige.
Kundetaler 3:
Ørsted, OT Sikkerhed
13.45 – 14.15 SAMSIKs rolle i det nationale beredskab og cybersikkerheden – med et kort blik på det aktuelle trusselsbillede Morten Bro Kontorchef
14.15 – 14.30 Pause
14.30 – 15.00 OT-sikkerhed er ikke nok
Selv velbeskyttede OT-miljøer kan bringe kritiske funktioner i knæ gennem fysiske hændelser, leverandøradgang eller sektorafhængigheder. Oplægget ser på hvad CER-direktivet ændrer, og hvorfor resiliens kræver mere end klassisk OT-sikkerhed.
Fagekspert:
Andreas P. Norstedt Sikkerhedsrådgiver, DBI
15.00 – 16.00 2026 OT Threat Landscape: Three Forces Every OT Defender Must Address
The OT threat landscape is evolving quickly, making it more difficult than ever to protect our industrial environments.
International taler 2:
Markus Mueller, Field CISO Nozomi Networks
16.00 – 16.10 Afslutning – Tak for i år SecuriOT

Vil du med til vores 5 års jubilæum med OT Security Summit, så meld dig allerede til nu og vi vender tilbage til dig, når programmet ligger klar.

Nyhedsbrev og kontakt
Accept *
Vælg dine favoritemner blandt disse 4 emner:
Vælg dine Tech Talks blandt disse 8:
Pre-booking tilmelding *

Eventet er forbeholdt nuværende og potentielle kunder samt samarbejdspartnere til SecuriOT. 'No-show' uden afbud vil udløse en faktura på kr. 600,00

OT Security Summit 2026

Middag og overnatning den 15. april

Sidste års succes med at holde en kundemiddag den 15. april og tilbyde overnatning gentages, så du får det fulde udbytte af begge dage – både fagligt og netværksmæssigt.

Du er derfor inviteret til at deltage i en hyggelig netværksmiddag, og der er mulighed for at overnatte på Hotel Trinity til næste dag.

Middagen består af en 3-retters menu til DKK 425 inkl. moms, og overnatning tilbydes til DKK 995 inkl. moms. Både middag, drikkevarer og overnatning er med egen betaling, og bookes direkte via nedenstående link.

SecuriOT d. 15-16 april 2026 | Trinity Hotel & Konference Center

Hotel Trinity

Partnere

Cyolo Logo
SensorFu Logo
Acronis Backup Solution