27. Technology Conference Smart Com

On the right side of the rubicon

09 – 10 October 2025 | Rimske terme

00
Days
00
Hours
00
Minutes
00
Seconds

27th time in a row About the event

Don’t miss the traditional technology conference again this year, that will amaze once again.

Explore the leading networking technologies and cyber security solutions for IT and OT environment and learn how they can impact your business. Unleash groundbreaking ideas and tools to take the right side of the rubicon, align with those who are actively shaping long-term resilience and a secure future.

This year’s conference will be full of top industry speakers, exclusive content and unforgettable experiences, so secure your spot.

INSIGHT

Game-changing ideas, cutting-edge advancements, and groundbreaking solutions revolutionizing the future of work. Discover how you can respond to dynamic changes in a complex business environment.

1

IDEAS

Master practical skills and gain real-world knowledge through hands-on workshops led by industry experts. Learn from Slovenian companies who've conquered similar challenges and get ready to conquer yours!

2

OPPORTUNITIES

Connect with a vibrant community of IT professionals facing similar challenges and opportunities and gain valuable insights. Spark new ideas, share experiences, and unlock your full potential.

3

EXPERIENCES

Get ready to network, learn, and laugh! Our conference offers a dynamic social scene alongside insightful presentations. Make new friends, create lasting memories, and leave feeling inspired.

4

Speakers

Leverage the broad expertise of renowned professionals and gain new perspectives.

Jure Remškar

Chief Executive Officer

Peter Ceferin

Chief Technical Officer

Igor Mlakar

Chief Operations Officer

Janko Kersnik

Head of Cybersecurity Department

Marko Cizelj

Head of Networking Department

Gregor Zupan

Service Delivery Manager

Igor Štih

Solution Architect Manager

Luka Horvat

Network Expert

Marko Verdnik

Network Engineer

Gašper Voda

Cyber security engineer

Agenda

Discover the key technologies that are already reshaping cybersecurity defense, connectivity, and resilience in the digital world.

Day one Visions and solutions for a secure digital future

Dive deep into cutting-edge networking technologies and cybersecurity solutions through expert presentations. Gain insights from Slovenian companies leading the way and build your network with fellow professionals.

08:20 - 09:00

Attendee registration

Registration and morning coffee

09:00 - 09:10

Welcome addresses

speaker-1

Jure Remškar

speaker-2

Peter Ceferin

09:10 - 09:30

Keynote presentation

speaker-1

TBA

09:40 - 11:00

CYBERSECURITY PANEL

Broadening the Cybersecurity Perimeter – From Firewalls to the Implementation and Management of XDR Technologies

09:40 - 10:00

Under the Hood: The Technology Powering Managed Detection and Response (MDR)

MDR has evolved beyond basic 24/7 alert filtering; it is now a cloud-adapted integration of endpoint telemetry, network sensors, threat intelligence feeds, and AI-powered analytics — all delivered as a service.
In this technically in-depth overview, we will break down the stack required to build a modern architecture for MDR services: data collection and normalization, streaming detection logic, machine learning enrichment, automated containment workflows, and investigation tools involving human expertise.

speaker-1

Janko Kersnik

10:50 - 10:20

Juniper Networks partner presentation

speaker-1

TBA

10:20 - 10:40

ZInfV-1 in Practice: Insights and Challenges in Adapting to the new Information Security Act

The Information Security Act (ZInfV-1) requires significant organizational adjustments and a shift in mindset. This presentation offers a practical insight into the implementation of mandatory measures — from management accountability to supply chain risk management.
Through real examples, we will highlight how the law impacts organizational operations and why the correct approach lies in comprehensive organizational adaptation, not merely formal or technical 'quick fixes'.

speaker-1

Igor Mlakar

10:40 - 11:00

Success story discussion

speaker-1

TBA

11:00 - 11:30

Coffee break

11:40 - 13:20

NETWORKING PANEL

Automation, Security, and AI as Core Components of Network Architectures – From Management to Connectivity

11:40 - 12:00

The Future of Managed Services: Artificial Intelligence, Zero Trust, Automation, and DevSecOps

The managed services of the future will support business decision-making. IT is no longer just a support function – it is a proactive partner in optimization, growth, and innovation.

speaker-1

Gregor Zupan

12:00 - 12:20

Extreme Networks partner presentation

speaker-1

TBA

12:20 - 12:40

Nokia partner presentation

speaker-1

TBA

12:30 - 13:00

Success story discussion

speaker-1

TBA

13:00 - 13:20

Success story discussion

speaker-1

TBA

13:20 - 14:20

Lunch break

14:20 - 15:50

BUSINESS CRITICAL SYSTEM (OT/ICS) PANEL

Artificial Intelligence and Cloud Platforms in ICS/OT

14:30 - 14:50

Securing Confidential Data in the Cloud: ICS/OT System Management within a SaaS Platform

We will address a (still) taboo topic: Can we — and if so, how — securely manage and monitor sensitive industrial control systems using a cloud-based SaaS platform without exposing proprietary data? Is cloud-based management always appropriate, and where is it not?
Using the Nozomi Networks Vantage platform as a case study, we will explore encrypted sensor gateways, real-time transmission of anonymized metadata, regionally restricted storage, and role-based access controls that preserve confidentiality while providing real-time asset visibility, AI-enhanced threat analytics, and scalable incident response across distributed OT environments.

speaker-1

Peter Ceferin

14:50 - 15:10

Nozomi Networks partner presentation

speaker-1

TBA

15:10 - 15:30

Success story discussion - ELES

Round Table Discussion on Implementing an Anomaly Detection System (ADS):
  • Andrej Matko, Process Applications Specialist and LISO OT (Local Information Security Officer), ELES
  • Peter Ceferin, CTO, Smart Com

15:30 - 15:50

Success story discussion Elektro Ljubljana

speaker-1

TBA

Three parallel workshops Day two

Improve your skills in interactive workshops led by experienced professionals.

08:30 - 09:00

Attendee registration

09:00 - 10:30

Hands-on workshop: Managing Cyber Risk Exposure with the Trend Micro CREM Platform

"Join this hands-on workshop for an in-depth presentation of Trend Micro CREM (Cyber Risk Exposure Management), an advanced solution within the Trend Vision One™ platform. Through a practical, hands-on demonstration, participants will gain a deep understanding of how the CREM solution operates and its role in a comprehensive, proactive approach to managing cyber risks."

speaker-1

Janko Kersnik

10:30 - 11:00

Coffee break

11:00 - 12:30

Hands-on workshop - continued

"Join this hands-on workshop for an in-depth presentation of Trend Micro CREM (Cyber Risk Exposure Management), an advanced solution within the Trend Vision One™ platform. Through a practical, hands-on demonstration, participants will gain a deep understanding of how the CREM solution operates and its role in a comprehensive, proactive approach to managing cyber risks."

speaker-1

Janko Kersnik

12:30 - 13:30

Lunch and conference closing

08:30 - 09:00

Attendee registration

09:00 - 10:30

Hands-on workshop: Has the CLI Been Forgotten in Network Systems?

Despite the availability of various automation-supported management systems, the CLI is still used for managing network devices and systems. We will demonstrate when to use the CLI interface for network management and operations through practical examples with Extreme Networks, Juniper Networks, and Sophos systems.
To participate in the workshop, you will need a laptop with an internet browser installed.

speaker-1

Marko Cizelj

speaker-2

Luka Horvat

10:30 - 11:00

Coffee break

11:00 - 12:30

Hands-on workshop - continued

Despite the availability of various automation-supported management systems, the CLI is still used for managing network devices and systems. We will demonstrate when to use the CLI interface for network management and operations through practical examples with Extreme Networks, Juniper Networks, and Sophos systems.
To participate in the workshop, you will need a laptop with an internet browser installed.

speaker-1

Marko Cizelj

speaker-2

Luka Horvat

12:30 - 13:30

Lunch and conference closing

08:30 - 09:00

Attendee registration

With morning coffee

09:00 - 10:30

Hands-on workshop: Building a Defensible Architecture in ICS/OT Networks and Leveraging a SaaS-Based Management Platform

Following an initial 30-minute theoretical introduction, you will explore how to effectively establish a secured OT environment through a demonstration in a demo setting, using Fortinet firewalls specifically tailored for industrial environments. The focus will be on integration with the Nozomi Networks and its Vantage - SaaS-based OT/IoT cybersecurity platform, that unifies asset inventory, network visibility, threat detection, and risk analysis into a central cloud console.

speaker-1

Peter Ceferin

speaker-2

Igor Štih

speaker-3

Marko Verdnik

10:30 - 11:00

Coffee break

11:00 - 12:30

Hands-on workshop - continued

Following an initial 30-minute theoretical introduction, you will explore how to effectively establish a secured OT environment through a demonstration in a demo setting, using Fortinet firewalls specifically tailored for industrial environments. The focus will be on integration with the Nozomi Networks and its Vantage - SaaS-based OT/IoT cybersecurity platform, that unifies asset inventory, network visibility, threat detection, and risk analysis into a central cloud console.

speaker-1

Ivan Krajačić

speaker-2

Peter Ceferin

speaker-3

Igor Štih

speaker-4

Marko Verdnik

12:30 - 13:30

Lunch and conference closing

LOKACIJA Rimske terme

Toplice 10
3272 Rimske toplice

We have secured the lowest hotel rates for all attendees in Rimske terme. Make a reservation as soon as possible.

Free parking in the garage available for all conference attendees!

Najnovejše novice

Photo gallery

This is how we enjoyed ourselves last year!

Our supporters

On the right side of the rubicon in collaboration with leading global companies in the industry.

GET EXPERIENCE

Shift your perspective on digital business

Lorem ipsum dolor sit amet, consectetur adipiscing elit. 

Your partner

Didn't find all the information? We're always on hand and happy to help.

Smart Com
Privacy Preference Center

When you visit our website, it may store or retrieve information on your browser in the form of cookies.

You can choose to allow and not to allow different types of cookies. Click on the category headings to find out more and change your preferences.

Cookie details.