5th OT Cybersecurity Conference by INTEC with Honeywell

  • SNFCC – Book Castle, Athens
5th OT Cybersecurity Conference by INTEC with Honeywell

The 5th OT Cybersecurity Conference, hosted by INTEC in collaboration with Honeywell, brought together Greece’s top minds in operational technology (OT) security for a landmark event at the iconic SNFCC Book Castle in Athens. This annual gathering has cemented itself as the definitive forum for OT cybersecurity professionals, and the 2025 edition delivered on all fronts: expert insights, cutting-edge technologies, and real-world solutions for protecting critical infrastructure.

A high caliber kick-off: Thought leadership from the top

The day began with a warm welcome from George Tzavelas, Managing Director of INTEC, who highlighted the increasing complexity and interconnectedness of OT systems and the cybersecurity implications that follow.

This was followed by an official address from Yiannis Pavlosoglou, Vice Governor at the National Cybersecurity Authority (NCSA) of Greece. His message emphasized the role of public-private collaboration in defending critical infrastructure and aligning with European cybersecurity directives, particularly NIS2, which became a central theme of the day.

The audience was then treated to an insightful session from Konstantinos Moulinos, an Information Security Expert at ENISA (the European Union Agency for Cybersecurity), who provided an expert breakdown of NIS2 legislation and its implications for OT security compliance, governance, and risk assessment.

An expert-driven agenda with global depth and local relevance

What followed was a line-up of deeply informative and well-structured sessions by Honeywell’s top professionals with decades of field experience and a portfolio of over 7,000 OT cybersecurity projects delivered in 130+ countries.

Key topics and sessions

  • Cybersecurity lifecycle management & incident response: Presented by Konstantin Rogalas, Cyber Security Business Leader for Europe, this session offered a strategic blueprint for implementing and maintaining robust OT cybersecurity programs. His focus on outcome-based approaches helped align technical strategies with operational goals.

  • OT cybersecurity awareness & training: Led by Rajan Patil, Global Manager of OT Cybersecurity Training at Honeywell, this session emphasized human factors—addressing how awareness and continuous training are vital layers of defense in an OT environment.

  • OT disaster recovery planning: A practical talk by Saltanat Mashirova, who detailed how organizations can ensure resilience and business continuity through well-structured disaster recovery protocols tailored specifically for OT systems.

  • Cyber watch & real-time monitoring:

    Florin Dumitru delivered a compelling session on OT threat intelligence and the use of advanced monitoring tools to anticipate and respond to anomalies in critical infrastructure systems.

A stand-out moment: The live OT cyber-attack simulation

Arguably the most anticipated part of the day was the Live OT Cyber Attack Demonstration, delivered by Talib Usmani, ICS/OT Red Team Penetration Tester at Honeywell.

This high-impact session simulated an actual cyber intrusion into an OT environment, showcasing both the tactics of attackers and the defensive countermeasures required to mitigate real-world threats. For many attendees, this was a vivid, eye-opening experience that brought the risks of inaction into sharp focus.

From pivoting between IT and OT networks to exploiting human error and configuration flaws, the demonstration emphasized how layered and realistic today’s threats are and why incident response must be well-drilled and deeply integrated into operational frameworks.

Workshops: From theory to practice

In the afternoon, the conference shifted to hands-on engagement, offering two highly specialized workshops:

  1. Risk analysis methodology for OT systems: Participants learned how to apply structured risk assessment methodologies tailored to OT environments, bridging industry best practices with practical use cases.

  2. Cybersecurity HAZOP and bow-tie scenarios: This workshop introduced attendees to HAZOP (Hazard and Operability Study) methods and the Bow-Tie framework, both essential tools for visualizing and mitigating cyber risk in critical process systems.

CISO panel discussion: Real talk from industry leaders

The final major session was the CISO Panel Discussion, where leading cybersecurity professionals from across Greek industry gathered to share perspectives and challenges from the frontlines.

Moderated by George Stamoulis of Honeywell, the discussion touched on topics such as cross-sectoral collaboration, talent development, supply chain risk, and resilience in the face of ransomware threats.

The diverse backgrounds of the panelists enriched the conversation, offering attendees practical wisdom from sectors as varied as energy, transportation, metallurgy, and logistics.

Conclusion and a look-ahead

The day concluded with closing remarks and an outlook for 2025, emphasizing the need for ongoing engagement, education, and evolution in the face of rapidly advancing cyber threats.

Key takeaways are:

  • NIS2 compliance is not optional - and preparation must start now.

  • Live attack simulations help bridge the gap between theory and readiness.

  • Training and human awareness remain core pillars of defense.

  • Workshops and panel sessions provide invaluable peer-to-peer learning.

  • Collaboration across sectors and disciplines is critical for resilient OT systems.

We thank all speakers, panelists, attendees, and our partner Honeywell for making the 5th OT Cybersecurity Conference such a landmark event. With increasing threats and new regulations on the horizon, our shared commitment to OT security has never been more important.

If you want to continue the dialogue about innovation and collaboration in OT cybersecurity, reach out to us at This email address is being protected from spambots. You need JavaScript enabled to view it. and we will be happy to discuss.

You May also Like

Image