23 Technology Conference Smart Com

Applying Tech & Knowledge for Higher Efficiency

00
Days
00
Hours
00
Minutes
00
Seconds

RENOWNED ICT EVENT WHY THIS CONFERENCE

A ‘must-to-attend’ professional event with 23-year tradition brings ground breaking ICT technologies, trends and approaches that will shape the state of cyber security, networking and business critical systems in the coming years.

Since the first Technology Conference in 1999 it is our aim and passion to share knowledge, promote professional discussion, exchange different opinions and demonstrate how ICT can support business growth.

TRENDS

It delivers the most up-to date concepts, insights and solutions from the industry, which will soon radically change the way we work and with which you can keep pace with rapid business changes in the digital era.

1

SESSIONS

Advance your career by gaining new knowledge, learning a new skill or taking a deeper dive into topics throughtout three parallel speaking tracks with incredibly relevant content. 100% worth of your time.

2

NETWORKING

It brings together IT professionals, like-minded people, where new ideas are born. You can find latest and best practices in all aspects of ICT that you can implement quickly and easily in your daily work.

3

GIFTING

Last but not least, relaxed atmosphere, inspiring guests and stories, fantastic entertainment and the best gifts and gadgets any tech enthusiast would love for the best possible event experience.

4

SPEAKERS

Cutting-Edge ICT Tactics and Strategies, From Leading Experts

dr. Uroš Svete

Acting Director, Government Information Security Office

Rajko Novak

Chief Executive Officer

Peter Ceferin

Chief Technical Officer

Janko Kersnik

Solution Architect Manager

Žiga Perko

Networking Solutions Expert

Matjaž Katarinčič

Head of Cyber Security Department

Boris Krajnc

CEH and Cyber Security Expert

Igor Štih

Solutions Architect Manager

Žiga Špiček

Cyber Security Expert

Brane Zupan

Development Engineer

Klaus Samardžić

Senior Engineer

Damjan Rajh

Senior Engineer

Sergio Leoni

Regional Sales Director

Sławomir Karaś

Senior Partner System Engineer

Igor Sikorski

Regional Sales Manager CEE

Emre Kurtman

Senior Systems Engineer

Pawel Kocimowski

Senior Systems Engineer

Conference Agenda

We have again prepared carefully selected content

NEWEST TECHNOLOGY Live sessions

This year's edition was something special. You were able to listen live keynote and invited presentation as well as three case study presentations. There was a plenty of time for networking and connecting with other IT professionals.

10:00 - 10:30

Attendee registration

Registration and networking ☕

10:30 - 10:40

Welcome speech

Introduction & Welcome Address by the Chief Technical Officer and Programme Chair

speaker-1

Peter Ceferin

10:40 - 10:50

Keynote presentation

speaker-1

Rajko Novak

10:50 - 11:10

Global Cybersecurity Challenges in the Light of Information Security

speaker-1

dr. Uroš Svete

11:10 - 11:30

Design of cyber security mechanisms in OT

The management of the information and communication infrastructure is a complex problem that we at Smart Com have tackled with new approaches and new technologies. We designed a modular, event-based platform with a common data bus which provides flexibility and scalability that other automation tools cannot achieve. Currently, this platform enables the initial configuration and upgrade of devices, which provides better quality of services. New modules are being developed that will enable the automatic capture of the communication infrastructure and performance of repetitive tasks, thus relieving system administrators in your environment.

speaker-1

Peter Ceferin

11:30 - 11:50

XDR – What it is and how it differs from SIEM and EDR

SIEM and sometimes EDR (Endpoint Detection ad Response) are used to analyze security events. They are capable of collecting individual alarms, but do not have a complete picture of the attack. XDR (Extended Detection and Response) is able to capture and monitor all events and activities across the entire IT stack including endpoint, network and cloud providing broader perspective. In the relationship to the MITRE ATT&CK framework security engineers and analysts can respond faster and more accurately.

speaker-1

Janko Kersnik

11:50 - 12:10

Data centers and hyper-converged infrastructure

speaker-1

Žiga Perko

12:10 - 13:30

Conference closing

Networking and prize draw 🎁

THREE GREAT SESSIONS Available in advance

Other speaking presentations from Smart Com and invited experts were prerecorded and available in advance.

Recording

Managed services for cyber-security resilience

Nowadays, companies that want to reduce information security risks, quickly become to the point where they do not know how to react, especially in more complex situations. It mostly depends on which level of the maturity model company is, on technologies and processes they implement and lastly on expert knowledge employees possess. Presentation will cover cyber security managed services which Smart Com as a security partner can provide.

speaker-1

Matjaž Katarinčič

Recording

On the Road to SASE – Juniper Threat Aware Network

Secure Access Service Edge (SASE) is the threat-aware network for the cloud era. As the security and the network converge and applications move to the cloud, it’s critical for IT teams to use all connection points on the network to protect against attacks, while providing quick access to services from anywhere. During the session we will discuss Juniper vision and the security portfolio evolution related to SASE and on-premises scenarios.

speaker-1

Sławomir Karaś

Recording

Network detection and response for cloud services

The adoption of cloud-based technology and services is rapidly growing, bringing both advantages and disadvantages. The advantages include flexibility, reducing costs, scalability and accessibility. On the other side disadvantages include network dependence, server location and most important security of cloud services, especially in terms of data protection. For that reason rapid detection and prevention of incidents are crucial in cloud environments.

speaker-1

Žiga Špiček

Recording

Cross-Platform Cyberdefence in realtime

speaker-1

Daniel Vollmer

Recording

Protecting distribution transformer substations from cyber threats

The importance of protecting communication in critical infrastructure it has to move onto the next level. Hackers with social engineering tactics or other attack vectors could take control over the most critical processes, which are still very vulnerable due to poor cyber security. The speaker will present an example of taking control of the MODBUS and IEC 60870-5-104 protocols, and how to protect critical infrastructure against such attacks.

speaker-1

Boris Krajnc

Recording

Road to Infinite Enterprise

speaker-1

Emre Kurtman

Recording

Fabric-based networks for critical infrastructure

As in IT networks, it is also necessary to ensure seamless, safe and flexible operation of all services in ICS networks in critical infrastructure. The growing number of connected devices in ICS environments, which need to communication to various systems, has to be properly supported by ICT network. Fabric-based networks are a great choice as they provide functionalities that are becoming indispensable in ICS environments. In terms of security, flexibility and management, fabric networks are becoming the standard in critical infrastructure as well.

speaker-1

Igor Štih

Recording

A short Overview of the "real world" about Visibility and Real-time Security in OT and IoT environments

speaker-1

Sergio Leoni

Recording

Proactive protection for OT systems

IT (business environment) and OT (operational environments) convergence brings new security risks, especially as some industrial control systems include legacy and unpatched systems and outdated devices that are highly vulnerable to modern security threats. Therefore, it is necessary to strengthen security mechanisms before consolidating industrial and business processes. In other case failure of individual components or the entire industrial environment can have disastrous results at critical infrastructure organizations.

speaker-1

Damjan Rajh

Recording

New approaches in automation of the ICT infrastructure

The management of the information and communication infrastructure is a complex problem that we at Smart Com have tackled with new approaches and new technologies. We designed a modular, event-based platform with a common data bus which provides flexibility and scalability that other automation tools cannot achieve. Currently, this platform enables the initial configuration and upgrade of devices, which provides better quality of services. New modules are being developed that will enable the automatic capture of the communication infrastructure and performance of repetitive tasks, thus relieving system administrators in your environment.

speaker-1

Brane Zupan

speaker-2

Nejc Slabe

Recording

Modern, software based Data Center design with Nutanix

speaker-1

Igor Sikorski

Recording

Indoor Location Services and Wi-Fi

Location information has become an essential part of the new information services. Gartner predicts rapid growth for Indoor Location Services industry. Among three most used 'Indoor Location Services' based on known location information – Asset visibility, Wayfinding and User Engagement, I think final one is the most innovative. The majority technology systems require 'beacon' device to provide 'Indoor Location Services'. If you come close to a 'beacon' with a smartphone which has the appropriate application activated, it can provide you with the latest information related to a specific location for example inside an airport, hospital, shops... Innovative technological solutions enable the installation of Wi-Fi systems that do not require a 'beacon' to offer 'User Engagement' services. How do they achieve this? You will find the answer at this presentation.

speaker-1

Klaus Samardžić

Recording

Apstra: efficiency in the DC

The presentation explains how the Apstra software can be used in datacenter environments to provide an intent-based layer for the EVPN-based deployment.

speaker-1

Pawel Kocimowski

VENUE Four Points by Sheraton Ljubljana Mons

Pot za Brdom 4,
1000 Ljubljana

Conference participants are entitled to use the parking facilities free of charge.

Latest news

Gallery

23rd edition brought wonderful moments. Take a look at event highlights.

Our supporters

We are proud to be working with some of the industry’s leading companies, whose valued support enables us to create outstanding conference experience

Media partners

GET EXPERIENCE

Shift your perspective on digital business

How you transform your business as technology, consumer, habits industry dynamic s change? Find out from those leading the charge.

Conference organizer

Didn't find all the information? We're always on hand and happy to help.