26. Technology Conference Smart Com

Stay Ahead of the Curve

10 – 11 October 2024 | Postojna Cave Park

00
Days
00
Hours
00
Minutes
00
Seconds

26th time in a row ABOUT THE EVENT

Don’t miss the traditional technology conference again this year, which returns with an amazing program.

Explore the leading networking technologies and cyber security solutions for IT and OT environment and learn how they can impact your business. Unleash groundbreaking ideas and tools to stay ahead of the curve and improve business performance.

This year’s conference will be full of top industry speakers, exclusive content and unforgettable experiences, so secure your place.

INSIGHTS

Game-changing ideas, cutting-edge advancements, and groundbreaking solutions revolutionizing the future of work. Discover how you can respond to dynamic changes in a complex business environment.

1

IDEAS

Master practical skills and gain real-world knowledge through hands-on workshops led by industry experts. Learn from Slovenian companies who've conquered similar challenges and get ready to conquer yours!

2

OPPORTUNITES

Connect with a vibrant community of IT professionals facing similar challenges and opportunities and gain valuable insights. Spark new ideas, share experiences, and unlock your full potential.

3

EXPERIENCES

Get ready to network, learn, and laugh! Our conference offers a dynamic social scene alongside insightful presentations. Make new friends, create lasting memories, and leave feeling inspired.

4

FEATURED SPEAKERS

Benefit from a wide range of knowledge from renowned experts and gain new perspective.

Jure Remškar

Chief Executive Officer

Peter Ceferin

Chief Technical Officer

Janko Kersnik

Head of Cybersecurity Department

Marko Cizelj

Head of Networking Department

Matevž Mulej

Ekspert za kibernetsko varnost

Žiga Perko

Solution Architect Manager

Igor Štih

Solution Architect Manager

Sławomir Karaś

Senior Partner System Engineer

Luka Horvat

Network Expert

Marko Verdnik

Network Engineer

Matija Mandarić

Sales Engineer

Adriel Regueira Suárez

Senior Regional Sales Engineer

AGENDA

Practical insights, new trends, breakthrough ideas and practical tools to help you stay ahead of the curve.

Day one | 10 October 2024 Equip yourself for the challenges ahead

Dive deep into cutting-edge networking technologies and cybersecurity solutions through expert presentations. Gain insights from Slovenian companies leading the way and build your network with fellow professionals.

08:20 - 09:00

Attendee registration

Registration and morning coffee

09:00 - 09:20

Welcome address

Introduction & Welcome Addresses

speaker-1

Jure Remškar

speaker-2

Peter Ceferin

09:30 - 11:00

CYBERSECURITY PANEL

09:30 - 09:50

Securing DNS - why and how?

In today's digital world, DNS security is the cornerstone of business resilience. Cybercriminals know this, and they're relentlessly targeting DNS services to gain access to your most critical data.
Protecting your DNS requires a holistic approach that goes beyond securing the DNS itself. You also need to safeguard other IT resources using DNS protection.

 

This insightful presentation will delve into the threats that lurk in the DNS landscape, outline a comprehensive security strategy, and showcase the robust solutions offered by the Infoblox platform.

 

Don't miss this opportunity to learn how to fortify your DNS defenses and protect your business from the ever-evolving cyber threats.

speaker-1

Janko Kersnik

09:50 - 10:10

Juniper Networks partner presentation

speaker-1

Sławomir Karaś

10:10 - 10:35

Success story discussion

10:35 - 11:00

Success story discussion

11:00 - 11:30

Coffee break

11:30 - 13:00

NETWORKING PANEL

11:30 - 11:50

When networks, security mechanisms and cloud services become a cyber fortress

In today's dynamic business landscape, ICT networks are no longer just about bandwidth. They're the backbone of your digital operations, connecting users, devices, and applications across wired, wireless, and remote environments.

 

Securing these networks is a complex challenge. Traditional approaches based on network perimeters are no longer effective. You need a more robust solution that integrates security into the very fabric of your network.

 

Enter Zero Trust Network Access (ZTNA), a transformative approach that grants access based on user identity, not network location. ZTNA empowers you to:
  • Secure your network from the inside out, regardless of user location or device
  • Simplify network access management and
  • Enhance resilience against cyberattacks.

speaker-1

Žiga Perko

11:50 - 12:10

Extreme Networks partner presentation

speaker-1

TBA

12:10 - 12:35

Success story discussion: Upgrade of the wired and wireless network at Melamin d.d. Kočevje

speaker-1

TBA

12:35 - 13:00

Success story discussion

13:00 - 14:00

Lunch break

14:00 - 15:30

BUSINESS CRITICAL SYSTEM (OT/ICS) PANEL

14:00 - 14:20

Master the comprehensive approach to designing robust OT/ICS/IoT systems

In the face of escalating cyber threats, protecting critical infrastructure has become a top priority. But traditional cybersecurity approaches often fall short in the unique OT/ICS environment. What's needed is a holistic strategy that seamlessly integrates networking and cybersecurity, ensuring robust protection from the ground up.

 

By adopting a comprehensive approach to OT/ICS cybersecurity, you can:
  • Protect your critical assets from the inside out, addressing the specific vulnerabilities of OT/ICS systems
  • Leverage networking technologies and cybersecurity mechanisms specifically tailored for OT environments
  • Implement reference architectures and best practices to ensure a secure and resilient infrastructure.

speaker-1

Peter Ceferin

14:20 - 14:40

Nozomi Networks partner presentation

speaker-1

Adriel Regueira Suárez

14:40 - 15:05

Success story discussion: OT network upgrade at energy distribution system Elektro Gorenjska

15:05 - 15:30

Success story discussion

15:30 - 16:00

Roundtable debate: NIS 2 Directive

16:00

Conference closing

Networking and prize draw

Three parallel workshops Day two | 11 October 2024

Improve your skills in interactive workshops led by experienced professionals.

08:30 - 09:00

Attendee registration

09:00 - 10:00

Breakfast with NOKIA; Quantum Safe Networks

speaker-1

TBA

10:00 - 11:30

Hands-on workshop: Applying VisionOne technology to cyber protection

Step into the shoes of an Incident Responder for a few hours and learn how they analyze incidents, piece together the puzzle, and defend against existing or future attacks. Additionally, you will see how with the right tools, this job can truly be done in such a short timeframe.
This will be a CTF-style workshop, with the curiosity that it is a defensive CTF, which is not common; typically, you can find Red Team tasks, i.e., offensive tasks, online. Through solving various tasks, participants will familiarize themselves with tactics and techniques that attackers use in targeted attacks, including phishing emails, script usage for system access, and running malicious code in RAM. How to detect, stop, and prevent such attacks.
To participate in the workshop, you need a laptop with an Internet browser installed.

speaker-1

Matija Mandarić

speaker-2

Janko Kersnik

speaker-3

Matevž Mulej

11:30 - 12:00

Coffee break

12:00 - 13:00

Hands-on workshop - continued

Step into the shoes of an Incident Responder for a few hours and learn how they analyze incidents, piece together the puzzle, and defend against existing or future attacks. Additionally, you will see how with the right tools, this job can truly be done in such a short timeframe.

 

This will be a CTF-style workshop, with the curiosity that it is a defensive CTF, which is not common; typically, you can find Red Team tasks, i.e., offensive tasks, online. Through solving various tasks, participants will familiarize themselves with tactics and techniques that attackers use in targeted attacks, including phishing emails, script usage for system access, and running malicious code in RAM. How to detect, stop, and prevent such attacks.

 

To participate in the workshop, you need a laptop with an Internet browser installed.

speaker-1

Matija Mandarić

speaker-2

Janko Kersnik

speaker-3

Matevž Mulej

13:00 - 14:00

Lunch and conference closing

08:30 - 09:00

Attendee registration

09:00 - 10:00

Breakfast with NOKIA; Quantum Safe Networks

speaker-1

TBA

10:00 - 11:30

Hands-on workshop: Typical Use Cases for Firewall Installation

Elevate Your Firewall Expertise
Dive into the practical world of firewall configuration and gain hands-on experience in setting up typical firewall scenarios. This immersive workshop will guide you through essential firewall configurations and related services, empowering you to tackle a wide range of use cases.
Key takeaways:
  • Master the art of firewall configuration.
  • Explore industry-leading firewall solutions from Juniper Networks and Sophos.
  • Develop the skills to handle diverse firewall use cases.

speaker-1

Marko Cizelj

speaker-2

Luka Horvat

11:30 - 12:00

Coffee break

12:00 - 13:00

Hands-on workshop - continued

Elevate Your Firewall Expertise

 

Dive into the practical world of firewall configuration and gain hands-on experience in setting up typical firewall scenarios. This immersive workshop will guide you through essential firewall configurations and related services, empowering you to tackle a wide range of use cases.

 

Key takeaways:
  • Master the art of firewall configuration.
  • Explore industry-leading firewall solutions from Juniper Networks and Sophos.
  • Develop the skills to handle diverse firewall use cases.

speaker-1

Marko Cizelj

speaker-2

Luka Horvat

13:00 - 14:00

Lunch and conference closing

08:30 - 09:00

Attendee registration

With morning coffee

09:00 - 10:00

Breakfast with NOKIA; Quantum Safe Networks

speaker-1

TBA

10:00 - 11:30

Hands-on workshop: Achieving a Secure OT Environment with Firewalls and ADS OT Integration

Embark on a hands-on journey to fortify OT security with Fortinet firewalls and Nozomi Networks ADS.
In this immersive workshop, you will:
  • Gain in-depth knowledge of Fortinet firewalls and their role in OT security.
  • Configure and manage Fortinet firewalls in a practical OT environment.
  • Integrate Fortinet firewalls with the Nozomi Networks ADS system for comprehensive OT network visibility and control.
By the end of the workshop, you will be equipped with the skills and expertise to effectively safeguard your OT environment from evolving cyber threats.

speaker-1

Igor Štih

speaker-2

Marko Verdnik

speaker-3

Peter Ceferin

11:30 - 12:00

Coffee break

12:00 - 13:00

Hands-on workshop - continued

Embark on a hands-on journey to fortify OT security with Fortinet firewalls and Nozomi Networks ADS.

 

In this immersive workshop, you will:
  • Gain in-depth knowledge of Fortinet firewalls and their role in OT security.
  • Configure and manage Fortinet firewalls in a practical OT environment.
  • Integrate Fortinet firewalls with the Nozomi Networks ADS system for comprehensive OT network visibility and control.

 

By the end of the workshop, you will be equipped with the skills and expertise to effectively safeguard your OT environment from evolving cyber threats.

speaker-1

Igor Štih

speaker-2

Marko Verdnik

speaker-3

Peter Ceferin

13:00 - 14:00

Lunch and conference closing

VENUE Postojna Cave Park

Jamska cesta 28
6230 Postojna

We have secured the lowest hotel rates for all attendees in Postojna Cave Hotel Jama. Make a reservation as soon as possible.

Free parking available for all conference attendees!

 

Najnovejše novice

Galerija 2023

Vznemirljiva izkušnja 25. Tehnološke konference Smart Com je za nami! Hvala vsem, ki ste jo sooblikovali!

OUR SUPPORTERS

Stay ahead of the curve in collaboration with leading global companies in the industry.

GET EXPERIENCE

Shift your perspective on digital business

Lorem ipsum dolor sit amet, consectetur adipiscing elit. 

Your partner

Didn't find all the information? We're always on hand and happy to help.