September 16, 2021 | 23 Technology Conference Smart Com

Applying Tech & Knowledge for Higher Efficiency

00
Days
00
Hours
00
Minutes
00
Seconds

RENOWNED ICT EVENT WHY THIS CONFERENCE

A ‘must-to-attend’ professional event with 23-year tradition brings ground breaking ICT technologies, trends and approaches that will shape the state of cyber security, networking and business critical systems in the coming years.

Since the first Technology Conference in 1999 it is our aim and passion to share knowledge, promote professional discussion, exchange different opinions and demonstrate how ICT can support business growth.

TRENDS

It delivers the most up-to date concepts, insights and solutions from the industry, which will soon radically change the way we work and with which you can keep pace with rapid business changes in the digital era.

1

SESSIONS

Advance your career by gaining new knowledge, learning a new skill or taking a deeper dive into topics throughtout three parallel speaking tracks with incredibly relevant content. 100% worth of your time.

2

NETWORKING

It brings together IT professionals, like-minded people, where new ideas are born. You can find latest and best practices in all aspects of ICT that you can implement quickly and easily in your daily work.

3

GIFTING

Last but not least, relaxed atmosphere, inspiring guests and stories, fantastic entertainment and the best gifts and gadgets any tech enthusiast would love for the best possible event experience.

4

SPEAKERS

Cutting-Edge ICT Tactics and Strategies, From Leading Experts

Rajko Novak

Chief Executive Officer

Peter Ceferin

Chief Technical Officer

Janko Kersnik

Solution Architect Manager

Žiga Perko

Networking Solutions Expert

Matjaž Katarinčič

Head of Cyber Security Department

Boris Krajnc

CEH and Cyber Security Expert

Žiga Špiček

Cyber Security Expert

Igor Štih

Solutions Architect Manager

Brane Zupan

Development Engineer

Klaus Samardžić

Senior Engineer

Conference Agenda

We have again prepared carefully selected content

JOIN US Live event, 16. 09. 2021

This year's edition will be again something special. You will be able to listen live keynote and invited presentation as well as three case study presentations. There will be a plenty of time for networking and connecting with other IT professionals.

10:00 - 10:30

Attendee registration

Registration and networking ☕

10:30 - 10:40

Welcome speech

Introduction & Welcome Address by the Chief Technical Officer and Programme Chair

speaker-1

Peter Ceferin

10:40 - 10:50

Keynote presentation

speaker-1

Rajko Novak

10:50 - 11:10

Invited presentation

speaker-1

TBA

11:10 - 11:30

Case study presentation

Best practices with implementing a technology solution: cyber security

speaker-1

TBA

11:30 - 11:50

Case study presentation

Best practices with implementing a technology solution: industrial and business critical systems

speaker-1

TBA

11:50 - 12:10

Case study presentation

Best practices with Implementing a technology solution: networking

speaker-1

TBA

12:10 - 13:30

Conference closing

Networking and prize draw 🎁

THREE GREAT SESSIONS Available in advance

Other speaking presentations from Smart Com and invited experts will be prerecorded and available in advance. Any questions you may have you will be able to address them to our expert at live event on September 16.

Recording

XDR – What it is and how it differs from SIEM and EDR

SIEM and sometimes EDR (Endpoint Detection ad Response) are used to analyze security events. They are capable of collecting individual alarms, but do not have a complete picture of the attack. XDR (Extended Detection and Response) is able to capture and monitor all events and activities across the entire IT stack including endpoint, network and cloud providing broader perspective. In the relationship to the MITRE ATT&CK framework security engineers and analysts can respond faster and more accurately.

speaker-1

Janko Kersnik

Recording

Managed services for cyber-security resilience

Nowadays, companies that want to reduce information security risks, quickly become to the point where they do not know how to react, especially in more complex situations. It mostly depends on which level of the maturity model company is, on technologies and processes they implement and lastly on expert knowledge employees possess. Presentation will cover cyber security managed services which Smart Com as a security partner can provide.

speaker-1

Matjaž Katarinčič

Recording

Juniper Networks partner presentation

speaker-1

TBA

Recording

Network detection and response for cloud services

The adoption of cloud-based technology and services is rapidly growing, bringing both advantages and disadvantages. The advantages include flexibility, reducing costs, scalability and accessibility. On the other side disadvantages include network dependence, server location and most important security of cloud services, especially in terms of data protection. For that reason rapid detection and prevention of incidents are crucial in cloud environments.

speaker-1

Žiga Špiček

Recording

Vectra partner presentation

speaker-1

TBA

Recording

Design of cyber security mechanisms in OT

Operational systems(OT) in critical infrastructure are increasingly exposed to cyber threats, and their resilience to cyber threats, which are becoming more specialized in OT, is historically much lower than IT systems, where most efforts have been made to increase security in recent years. Therefore, it is necessary to establish mechanisms that enable the visibility and detection of any deviations, cyber threats and incidents in OT systems in real time. It is necessary to design the establishment of such mechanisms vith the view of architecture, topology of the OT system itself and adding the functionality of the systems providing anomaly detection and response systems up to the application layer in OT systems.

speaker-1

Peter Ceferin

Recording

Protecting distribution transformer substations from cyber threats

The importance of protecting communication in critical infrastructure it has to move onto the next level. Hackers with social engineering tactics or other attack vectors could take control over the most critical processes, which are still very vulnerable due to poor cyber security. The speaker will present an example of taking control of the MODBUS and IEC 60870-5-104 protocols, and how to protect critical infrastructure against such attacks.

speaker-1

Boris Krajnc

Recording

Extreme Networks partner presentation

speaker-1

TBA

Recording

Fabric-based networks for critical infrastructure

As in IT networks, it is also necessary to ensure seamless, safe and flexible operation of all services in ICS networks in critical infrastructure. The growing number of connected devices in ICS environments, which need to communication to various systems, has to be properly supported by ICT network. Fabric-based networks are a great choice as they provide functionalities that are becoming indispensable in ICS environments. In terms of security, flexibility and management, fabric networks are becoming the standard in critical infrastructure as well.

speaker-1

Igor Štih

Recording

Nozomi Networks partner presentation

speaker-1

TBA

Recording

Data centers and hyper-converged infrastructure

speaker-1

Žiga Perko

Recording

New approaches in automation of the ICT infrastructure

The management of the information and communication infrastructure is a complex problem that we at Smart Com have tackled with new approaches and new technologies. We designed a modular, event-based platform with a common data bus which provides flexibility and scalability that other automation tools cannot achieve. Currently, this platform enables the initial configuration and upgrade of devices, which provides better quality of services. New modules are being developed that will enable the automatic capture of the communication infrastructure and performance of repetitive tasks, thus relieving system administrators in your environment.

speaker-1

Brane Zupan

speaker-2

Nejc Slabe

Recording

Nutanix partner presentation

speaker-1

TBA

Recording

Indoor Location Services and Wi-Fi

Location information has become an essential part of the new information services. Gartner predicts rapid growth for Indoor Location Services industry. Among three most used 'Indoor Location Services' based on known location information – Asset visibility, Wayfinding and User Engagement, I think final one is the most innovative. The majority technology systems require 'beacon' device to provide 'Indoor Location Services'. If you come close to a 'beacon' with a smartphone which has the appropriate application activated, it can provide you with the latest information related to a specific location for example inside an airport, hospital, shops... Innovative technological solutions enable the installation of Wi-Fi systems that do not require a 'beacon' to offer 'User Engagement' services. How do they achieve this? You will find the answer at this presentation.

speaker-1

Klaus Samardžić

Recording

Juniper Networks partner presentation

speaker-1

TBA

VENUE Four Points by Sheraton Ljubljana Mons

Pot za Brdom 4,
1000 Ljubljana

Conference participants are entitled to use the parking facilities free of charge.

Latest news

Galerija

Lorem ipsum

Our supporters

We are proud to be working with some of the industry’s leading companies, whose valued support enables us to create outstanding conference experience

Media partners

GET EXPERIENCE

Shift your perspective on digital business

How you transform your business as technology, consumer, habits industry dynamic s change? Find out from those leading the charge.

Conference organizer

Didn't find all the information? We're always on hand and happy to help.