Recommended Event: Are you the MVP of cybersecurity? Maryland, US, June 1-3, 2026

ICS/SCADA Cybersecurity Symposium 2026

Basic Event Info

Event Type Conference
Organizer Smart Grid Observer
Event Date 16 June 2026
Visit Event Visit Event

Location

US State Illinois
City Chicago

Event Details

Event Format Physical
Size 101 - 300 approximate delegates
Conference Focus Threat Intelligence and Response

Participation Opportunities

Registration (Cost) Not Free
Speaking Opportunities Yes
Speaking Category Pay-To-Speak

Event Description

The 2nd ICS/SCADA Cybersecurity Symposium, taking place in June 2026 in Chicago, is structured to provide critical infrastructure operators with essential knowledge and actionable strategies for navigating the complex landscape of cybersecurity threats. This event delivers a thorough examination of the latest technologies and methodologies, ensuring that asset owners are well-prepared to address the unique challenges associated with ICS/SCADA infrastructures. The Symposium stands out as a vital resource for professionals seeking to strengthen their cybersecurity posture in an era of increasing digital threats.

Comprehensive Coverage of Key Cybersecurity Topics

The Symposium offers an extensive agenda covering a wide array of subjects crucial for the protection of critical infrastructure. Participants will explore the current landscape of advanced persistent threats (APTs) at the nation-state level, as well as defense-in-depth strategies specifically designed for ICS/SCADA environments. The program also addresses compliance with regulatory requirements, protection against ransomware, and the development of robust network security architectures. Attendees will gain exposure to innovative solutions such as deception technology and other emerging advancements in the field.

  • The integration of machine learning and artificial intelligence in ICS cybersecurity
  • Securing cloud-connected operational technology (OT) assets
  • Managing the convergence of IT and OT networks
  • Implementing software-defined perimeters for secure remote access
  • Mitigating supply chain risks and controlling communication pathways
  • Applying network monitoring and centralized security analytics
  • Promoting public-private collaboration and information exchange
  • Analyzing case studies and extracting lessons from various industry sectors

Target Audience and Professional Engagement

This Symposium is designed for a broad spectrum of professionals tasked with safeguarding and managing critical infrastructure. The audience includes cybersecurity network managers, engineers, control systems users, researchers, executive leaders, technology vendors, operations managers, and consultants. Each attendee will have the opportunity to interact with industry experts and solution providers, fostering a collaborative environment for knowledge exchange and professional growth.

Interactive Sessions and Networking Benefits

The event’s interactive format is structured to facilitate meaningful discussions and the sharing of practical insights among peers. Group sessions will focus on addressing pressing challenges and identifying effective strategies for mitigation. The agenda is curated by practitioners and innovators from the critical infrastructure sector, ensuring that the content remains both objective and highly relevant. Numerous networking opportunities are available, enabling participants to connect with solution providers, share best practices, and refine their cybersecurity approaches through real-world case studies.

Specialized Emphasis on ICS/SCADA and OT Security

Unlike general cybersecurity conferences, this Symposium is dedicated to the specific needs of ICS asset operators and those managing operational technologies in the United States. The event addresses the distinct challenges faced by industrial control systems and smart infrastructure, providing attendees with practical insights and strategies to enhance the security and resilience of their environments. Participants will leave equipped with the knowledge required to implement effective cybersecurity measures tailored to their unique operational contexts.