The S4 conference is the leading conference on the future of OT and ICS cybersecurity. The best way to understand how S4 is different is to attend! Help us ‘Create the Future’ of OT/IoT Security.
Keep reading to see how you can interact with our team on-site and stay tuned for more updates. We can’t wait to see you at the new Tampa location!
Stop by our Prime Room on Level Four (same level as main stage)
The Evolution of Nation State Actors and Implications for Cyber Defenses: A Fireside Chat
Speaker: Raymond A. “Tony” Thomas III
General, U.S. Army, Retired, and Former Commander of U.S. Special Operations Command (USSOCOM)
In 2025, the energy sector is expected to face a perfect storm of cybersecurity challenges, driven by rising geopolitical tensions, a surge in sophisticated nation-state attacks, and the tightening grip of regulatory mandates.
Emerging regulations like NERC’s INSM (Internal Network Security Monitoring) standard and the EU’s NIS2 Directive will demand greater visibility, segmentation, and continuous monitoring across operational technology environments.
This panel will bring together industry leaders to discuss the realities of safeguarding grid resilience while managing compliance burdens. Attendees will gain insight into how to future-proof their security posture and striking the right balance between operational continuity and regulatory compliance.
ICS Security at Scale: Risk-based Prioritization and Remediation
As ICS environments grow more connected, vulnerabilities, alerts, and threats vary widely in their impact on operational and cyber risk. In this session, we’ll explore how organizations can apply quantifiable risk-based prioritization and remediation strategies to focus on the OT and IoT security issues that matter most - balancing vulnerabilities, active threats, and operational impact. And we’ll take a look at where risk-based techniques are going next.
Embarking on an OT security project is a unique challenge that requires the right blend of people, processes, and technology to navigate the complexities of operational environments.
In this session, we will explore the critical phases of managing an OT security project—from initial planning and scoping to team selection, process alignment, and technology evaluation. Drawing from real-world experiences, we will discuss how to evaluate and prioritize resources, align processes with project objectives and operational constraints, choose technologies that meet OT security needs while minimizing disruption and foster collaboration across multidisciplinary teams.
Attendees will walk away with new tools and strategies to manage an OT security project successfully. Join us to learn how to transform planning into execution and achieve the cybersecurity outcomes that matter.
DoD has much to do to make progress in OT cyber resilience. The Department of the Air Force has established the Cyber Resiliency Office for Control Systems (CROCS), the first dedicated organization to address the growing cyber threats targeting Air Force and Space Force operational technology, control systems, and installation critical infrastructure. Topics covered include “Will Zero Trust work in OT?”, “What exactly will CROCS do?” and “3 pitfalls to avoid in applying cyber to DoD OT.
"Effectively communicating operational risk to non-technical executives is a high-stakes challenge, particularly in critical infrastructure sectors.
Ken will share his strategies for framing cybersecurity risk in cyber-physical environments. From bridging the technical-to-business language gap to gaining buy-in for long-term investments, he’ll reveal what works, what doesn’t, and how to adapt your messaging to address evolving threats.
Attendees will walk away with an understanding of how to elevate technical conversations into risk conversations to drive meaningful security outcomes for the business."
Today’s security teams are inundated with data from diverse sources - alerts, logs, threat feeds, and incident reports. The challenge isn’t a lack of information; it’s finding actionable intelligence within all this data.
Enter AI: a powerful ally in the fight to identify, prioritize, and mitigate risks that matter most to your organization.
This session explores how AI-driven technologies are reshaping the way we approach risk management, empowering security teams to work smarter, not harder. We’ll delve into practical applications of AI in threat detection, vulnerability assessment, and contextual risk prioritization, helping teams cut through the noise and focus on what truly matters.
You’re invited! Join us for beverages & light snacks in the Nozomi Cabana Prime Room. Mix and mingle, take a demo and grab some swag, we'll bring the beach!
Live demo session: With 80% of new IoT deployments wirelessly connected, wireless devices have vastly increased the attack surface, putting critical infrastructure at risk of cyberattacks and disruptions to operations.
To secure their OT networks, security teams need visibility into wirelessly connected assets.
That’s why we created Guardian Air, the industry’s first wireless sensor for OT environments. Guardian Air can help reduce attack options by providing much-needed visibility into wireless-enabled devices, which until now could only be detected once connected to the wired network.
Nozomi Arc Embedded in Mitsubishi Electric PLCs makes it possible for the first time ever for organizations to monitor east-west activity in order to detect and respond to cyber incidents at the PLC level. This proactive approach strengthens operational resilience, reduces downtime, protects critical infrastructure, and maintains process integrity
Think you are up to the challenge of stumping one of our experts? Grab your S4 lunch and head down to the Nozomi Prime room to take on our Nozomi team with the hardest questions you can think of. Whether it’s about the Nozomi platform or any OT use cases, come with your questions or challenges! We’ll have some prizes too, especially if your question can’t be answered in 3 min or less.
Nozomi Networks is proud to sponsor the Women in ICS Event for another year. Join us on February 11th for a night of great conversations, engaging speakers and networking with women in ICS!
Register HereNozomi Networks Gets Hacky with Security at S4