S4x26
Feb 23-26 | Miami South Beach
Forescout is a Prime Room Sponsor inside the Moon Room this year at S4x26 at the Loews Miami Beach Hotel!
We’ll have a lineup of fun and informative experiences waiting for you—think unique giveaways (yes, the witty stickers are back!), live demos including our fan-favorite Windmill demo, a flyaway kit, insightful sessions with customers and partners, and a Monday evening party to kick if all off! See details below.
Stop by the Moon Room to cool off from the Miami sun by crafting your own “dirty soda”—our playful, SCADA-themed refreshment bar featuring:
- SCADA Soda
- Malware Mist
- ICS Sip
- Resilience Root Beer
Swing by, say hello, and recharge with us!
Kick Off S4 with a Poolside Sunset Social!
Monday, February 23
7:00pm- 9:00pm
Join us for an unforgettable evening at the iconic National Hotel in Miami, where art‑deco skyline meets the ocean breeze.
Enjoy handcrafted cocktails, elevated bites, and Miami ambiance as we ease into the excitement of S4. We’re bringing together the security community for a relaxed networking experience by the pool to spark conversations and build momentum for the week ahead.
Kick Back After the Cabanas with a Refreshing Beverage
Wednesday, February 25
4:30pm – 7:00pm
Unwind in style as we gather at the iconic Gale Hotel for an evening designed to recharge you after a full day of S4 and the Cabana sessions.
Just one block from the Surfcomber, Dolce Italian at the Gale Hotel, sets the perfect backdrop for relaxed conversations, light bites, and craft cocktails. Join industry peers, reconnect with colleagues, and keep the S4 momentum going in a warm, easygoing atmosphere that’s ideal for building meaningful connections.
Check out our session on "Honeypots for Threat Intelligence"
Tuesday, February 24 at 2:00pm | Stage 3
Honeypots can help you understand the threat landscape and the risk to your organization. These deception systems have been around for a long time and we have used them to capture relevant attacks such as ransomware starting from RDP-enabled workstations, automated exploits from botnets against OT devices, manual exploits on industrial routers, complete attack chains from initial access to defacement of HMIs, as well as new payloads, scanning activity and interactions with OT protocols.
In this talk, we will discuss what kind of data can be obtained from honeypots, how that becomes threat intelligence and how asset owners can leverage data from existing honeypots or deploy their own using open-source tools to enhance their threat intelligence, detection and hunting programs.
Monday, Feb 23
Case Study: Built for the Impossible: OT Security Rolled Out to 1000+ Sites Globally
3:30pm – 3:45pm
A firsthand look at how a global automotive manufacturer overcame complex architecture, regional variation, and tight constraints to deploy OT security across 1,000+ sites—covering challenges, execution, and a scalable global model.
Rethinking Secure Remote Operations: The OT-Ready Access Model
4:30pm – 4:45pm
Learn how Forescout and Xona use bi-directional integration to turn OT remote access into a controlled, monitored workflow—showing how secure access models enable precise, accountable maintenance and field operations.
Inside the Evolving OT Threat Landscape: What AI Is Changing Next
5:30pm – 5:45pm
A forward-looking session led by Daniel Dos Santos, a leading OT security researcher, exploring new discoveries, emerging attack techniques, and AI-driven trends shaping today’s OT threat landscape and what’s ahead.
Tuesday, February 24
Transforming NERC CIP-015-1 from Compliance Burden to Proven Control
8:30am – 8:45am
A practical look at NERC CIP-015-1 and how its approach extends beyond electric utilities. Forescout delivers visibility and policy enforcement, while Keysight ensures OT traffic reaches the right tools—eliminating blind spots.
Case Study: From Alert Overload to Operational Clarity
10:30am – 10:45am
A customer case study on building disciplined SOC operations—how alert noise was reduced, priorities clarified, and structured workflows established to bring focus, consistency, and purpose to daily security operations.
Interactive Challenge: Hack the PLC and Defend it
12:30pm – 1:00pm
Join Siemens Energy and Forescout for a hands-on session where attendees send real malicious commands to simulated PLCs, then learn how to detect the attack, assess blast radius, and apply mitigations.
Case Study: Advancing OT Cyber Resilience in US Energy Utilities with Forescout, ServiceNow & Templar Shield
3:00pm – 3:15pm
A major U.S. electric utility partnered with Templar Shield, ServiceNow OTM/OTVR, and Forescout to raise OT visibility from 20% to 90%+, unify IT/OT risk management, speed response, and accelerate compliance.
Wednesday, February 25
Case Study: Visibility Costs You Money. Control Gives You Value. A story about segmentation for OT
8:30am – 8:45am
A real customer story showing how going beyond visibility enabled confident segmentation. Forescout removed operational risk through policy testing and scaling, reusing existing security tools to build IEC 62443–aligned zones.
Stopping OT Attacks Before They Start—with Forescout and NVIDIA
10:30am – 10:45am
Learn how visibility, threat insights, accelerated computing, and AI reveal OT attack paths early, enabling proactive defense and advancing the future of OT cybersecurity.
Thursday, February 26
Anatomy of Hacktivist Attacks: Understanding and Mitigating Emerging Threats
8:30am – 8:45am
Daniel discusses the growing threat to OT posed by hacktivists and the measures organizations can take now, such as eliminating default credentials, segmenting OT networks, and targeted threat detection.
Case Study: Zero Trust Made Practical: Bringing DoW Principles to Industrial Environments
10:30am – 10:45am
See how the DoW applies Comply-to-Connect principles in industrial environments—verifying every device, validating every connection, and enforcing precise access across critical systems.
Book a Meeting
Schedule a 1:1 conversation with Forescout executives to dive deeper into our OT offerings and explore how we can support your organization. To book your session, contact your account manager or email [email protected].
One Platform.
Built to Protect What Can't Fail
Complete coverage nobody else delivers.
Other OT security solutions stop at visibility and detection. We go further. We don’t just show you what’s wrong. We help you act – contain threats, enforce policy, and continuously improve your security posture across IT, OT, IoMT, and CPS environments.