Sponsors
May 19th – 20th, 2026 // San Diego, California

SSH Communications Security is a global leader in defensive cybersecurity solutions. Founded in 1995, we secure critical data and communications between systems, automated applications, and people for governments and enterprises in finance, retail, and industrial segments all around the world.

TXOne Networks offers cybersecurity solutions that ensure the reliability and safety of industrial control systems and operational technology environments through the OT zero trust methodology. TXOne Networks works together with both leading manufacturers and critical infrastructure operators to develop practical, operations-friendly approaches to cyber defense.

Keyfactor brings digital trust to the hyper-connected world with identity-first security for every machine and human. By simplifying PKI, automating certificate lifecycle management, and securing every device, workload, and thing, Keyfactor helps organizations move fast to establish digital trust at scale — and then maintain it. In a zero-trust world, every machine needs an identity and every identity must be managed.

XONA provides leading zero-trust user access control and analytics platform for operational technology. XONA enables workforces of employees, contractors and vendors to be more productive and more secure while reducing operational costs. XONA seamlessly and securely enables access to critical systems and applications, reducing cyber risks and increasing operational efficiency.

Nozomi Networks accelerates digital transformation by protecting the world’s critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on us to minimize risk and complexity while maximizing operational resilience.

Elisity is a leap forward in network segmentation, leading the effort to achieve Zero Trust maturity, prevent risks, and reduce complexity. The platform rapidly discovers devices, automates classification, and applies dynamic, identity-based microsegmentation policies in real-time using existing infrastructure. Founded in 2019, Elisity serves Fortune 500 customers.

Claroty empowers industrial, healthcare, commercial, and public sector organizations to secure all cyber-physical systems in their environments: the Extended Internet of Things (XIoT). The company’s unified platform integrates with customers’ existing infrastructure to provide a full range of controls for visibility, risk and vulnerability management, network protection, threat detection, and secure remote access.

Keystrike detects APT living-off-the-land. Historically, APT compromised passwords and/or devices, but today, APT compromise sessions. Attacking sessions bypasses identity controls, like MFA and PAM, and evades anomaly detection by EDR and IPS. To detect APT, Keystrike validates how individual commands are created. Keystrike’s approach differentiates malicious from legitimate commands, in active and authenticated sessions, even when APT have hijacked privileged accounts.

Secomea defends the factory floor with Secure Remote Access designed for OT. Access, control, and protect your OT environments remotely, providing essential security for essential operations. Trusted by over 8,000 customers around the globe. Together, we make manufacturing the most secure industry in the world.

Dispel is a leading provider of automated, network-level, moving target defenses. Customers are using our technology to provide secure remote access to industrial control systems and legacy infrastructure, and provide non-attributable resources for threat intelligence teams. Our products now help protect hundreds of thousands of users across multiple industries and sectors.

Black & Veatch is a global EPC and consulting company with 100+ years of experience on innovation in sustainable infrastructure. With 15+ years of experience in Industrial Cybersecurity, we help to keep OT assets safe through Cyber Asset Lifecycle Management. No matter where you are in your industrial cybersecurity journey, we work in the design, development & implementation of cyber programs that optimize operations, enhance safety, maximize efficiencies and minimize costs.