26. Technology Conference Smart Com

Stay Ahead of the Curve

10 – 11 October 2024 | Postojna Cave Park

00
Days
00
Hours
00
Minutes
00
Seconds

26th time in a row ABOUT THE EVENT

Don’t miss the traditional technology conference again this year, which returns with an amazing program.

Explore the leading networking technologies and cyber security solutions for IT and OT environment and learn how they can impact your business. Unleash groundbreaking ideas and tools to stay ahead of the curve and improve business performance.

This year’s conference will be full of top industry speakers, exclusive content and unforgettable experiences, so secure your place.

INSIGHTS

Game-changing ideas, cutting-edge advancements, and groundbreaking solutions revolutionizing the future of work. Discover how you can respond to dynamic changes in a complex business environment.

1

IDEAS

Master practical skills and gain real-world knowledge through hands-on workshops led by industry experts. Learn from Slovenian companies who've conquered similar challenges and get ready to conquer yours!

2

OPPORTUNITES

Connect with a vibrant community of IT professionals facing similar challenges and opportunities and gain valuable insights. Spark new ideas, share experiences, and unlock your full potential.

3

EXPERIENCES

Get ready to network, learn, and laugh! Our conference offers a dynamic social scene alongside insightful presentations. Make new friends, create lasting memories, and leave feeling inspired.

4

FEATURED SPEAKERS

Benefit from a wide range of knowledge from renowned experts and gain new perspective.

Jure Remškar

Chief Executive Officer

Peter Ceferin

Chief Technical Officer

Igor Mlakar

Chief Operations Officer

Janko Kersnik

Head of Cybersecurity Department

Marko Cizelj

Head of Networking Department

Matevž Mulej

Cyber Security Expert

Žiga Perko

Solution Architect Manager

Igor Štih

Solution Architect Manager

Sławomir Karaś

Senior Partner System Engineer, Juniper Networks

Luka Horvat

Network Expert

Marko Verdnik

Network Engineer

Matija Mandarić

Sales Engineer, Trend Micro

Adriel Regueira Suárez

Senior Regional Sales Engineer, Nozomi Networks

Lassi Luukas

Head of Eastern Europe & Nordics, Extreme Networks

Marta Buffa

Optics Business Development Lead, Nokia

Beno Zakrajšek

Solution Architect Manager

Brane Zupan

Development Engineer

Uroš Žust

Partner, IT Assurance & Advisory, Mazars IT

Boštjan Tušar

Chief Information & Sustainability Officer, Hidria

dr. Matjaž Drev

Development Associate, Healthcare Informatics, National institute of Public Health

Ivan Krajačić

Systems Engineer, Fortinet

AGENDA

Practical insights, new trends, breakthrough ideas and practical tools to help you stay ahead of the curve.

Day one Equip yourself for the challenges ahead

Dive deep into cutting-edge networking technologies and cybersecurity solutions through expert presentations. Gain insights from Slovenian companies leading the way and build your network with fellow professionals.

08:20 - 09:00

Attendee registration

Registration and morning coffee

09:00 - 09:20

Welcome address

Introduction & Welcome Addresses

speaker-1

Jure Remškar

speaker-2

Peter Ceferin

09:30 - 10:35

CYBERSECURITY PANEL

09:30 - 09:50

Securing DNS - why and how?

In today's digital world, DNS security is the cornerstone of business resilience. Cybercriminals know this, and they're relentlessly targeting DNS services to gain access to your most critical data.
Protecting your DNS requires a holistic approach that goes beyond securing the DNS itself. You also need to safeguard other IT resources using DNS protection.

 

This insightful presentation will delve into the threats that lurk in the DNS landscape, outline a comprehensive security strategy, and showcase the robust solutions offered by the Infoblox platform.

 

Don't miss this opportunity to learn how to fortify your DNS defenses and protect your business from the ever-evolving cyber threats.

speaker-1

Janko Kersnik

09:50 - 10:10

Juniper NAC is Back - the Mist Access Assurance redefines NAC with Cloud and AI

The Network Access Control (NAC) is the latest expansion of Juniper Mist AI-driven enterprise portfolio. Access Assurance is our cloud-based NAC service that enables enterprises to easily enforce secure network authentication and authorization without the challenges associated with on-premises NAC.
Getting rid of on-premises NAC provides a streamlined client-to-cloud user experience, inherent high-availability services and greater resilience, as well as automatic feature updates and bug fixes. It’s simple, secure and scalable with no downtime for upgrades and tackles the complexity and poor scalability of legacy solutions.
A single pane of glass offers end-to-end visibility for all parts of the network driven by Mist AI. Access control is not a bolt-on feature; it’s purposefully built into the Juniper Mist cloud to provide scalability and simplicity that complements the full-stack management and day-to-day operations of an enterprise’s Wi-Fi access points, wired switches and SD-WAN. The Marvis™ AI engine also leverages access data for anomaly detection to provide actionable metrics.

speaker-1

Sławomir Karaś

10:10 - 10:35

Success story discussion SIJ

10:35 - 11:05

Roundtable debate: NIS 2 Directive

How to approach compliance with the NIS 2 Directive?

 

We will get answers to these and other relevant questions about the new directive from our amazing panelists:
  • Boštjan Tušar, Chief Information & Sustainability Officer at Hidria
  • Jani Recer, Head of quality and sustainability, Borzen
  • Matjaž Drev, PhD, Development Associate (cyber security and personal data protection) Healthcare Informatics, National institute of Public Health
  • Igor Mlakar, Chief Operations Officer, Smart Com
The discussion will be led by Uroš Žust, aPRIS, CISA, CISM, CISSP, PMP; partner at Mazars IT d.o.o.

11:05 - 11:35

Coffee break

11:35 - 12:40

NETWORKING PANEL

11:35 - 11:55

When networks, security mechanisms and cloud services become a cyber fortress

In today's dynamic business landscape, ICT networks are no longer just about bandwidth. They're the backbone of your digital operations, connecting users, devices, and applications across wired, wireless, and remote environments.

 

Securing these networks is a complex challenge. Traditional approaches based on network perimeters are no longer effective. You need a more robust solution that integrates security into the very fabric of your network.

 

Enter Zero Trust Network Access (ZTNA), a transformative approach that grants access based on user identity, not network location. ZTNA empowers you to:
  • Secure your network from the inside out, regardless of user location or device
  • Simplify network access management and
  • Enhance resilience against cyberattacks.

speaker-1

Žiga Perko

11:55 - 12:15

Extreme Networks partner presentation: Above and over the traditional SDN!

Joint the session and hear how industry’s most agile and resilient SDN architecture is moving to the future with Extreme UZTNA and Extreme AI Expert and how Extreme Labs is bringing together industry’s top names in AI development like Intel, Microsoft and AWS! In this session you will see live demo and technology preview of Extreme AI Expert!

speaker-1

Lassi Luukas

12:15 - 12:40

Success story discussion Melamin

Upgrade of the wired and wireless network at Melamin d.d. Kočevje

speaker-1

TBA

12:40 - 13:40

Lunch break

13:40 - 15:20

BUSINESS CRITICAL SYSTEM (OT/ICS) PANEL

13:40 - 14:00

Master the comprehensive approach to designing robust OT/ICS/IoT systems

In the face of escalating cyber threats, protecting critical infrastructure has become a top priority. But traditional cybersecurity approaches often fall short in the unique OT/ICS environment. What's needed is a holistic strategy that seamlessly integrates networking and cybersecurity, ensuring robust protection from the ground up.

 

By adopting a comprehensive approach to OT/ICS cybersecurity, you can:
  • Protect your critical assets from the inside out, addressing the specific vulnerabilities of OT/ICS systems
  • Leverage networking technologies and cybersecurity mechanisms specifically tailored for OT environments
  • Implement reference architectures and best practices to ensure a secure and resilient infrastructure.

speaker-1

Peter Ceferin

14:00 - 14:20

Unlocking the Future of Cyber-Physical Systems Cybersecurity

Nozomi Networks partner presentation

speaker-1

Adriel Regueira Suárez

14:20 - 14:45

Success story discussion Elektro Gorenjska

OT network upgrade at energy distribution system Elektro Gorenjska

14:55 - 15:10

Success story discussion ELES

15:10

Conference closing

Networking and prize draw

18:00

Postojna Cave tour

19:30

Evening reception at Magdalena restaurant

Three parallel workshops Day two

Improve your skills in interactive workshops led by experienced professionals.

08:30 - 09:00

Attendee registration

09:00 - 10:00

Breakfast with NOKIA: Quantum-Safe Networks – Secure now the future of your networks

speaker-1

Marta Buffa

10:00 - 11:30

Hands-on workshop: Applying VisionOne technology to cyber protection

Step into the shoes of an Incident Responder for a few hours and learn how they analyze incidents, piece together the puzzle, and defend against existing or future attacks. Additionally, you will see how with the right tools, this job can truly be done in such a short timeframe.
This will be a CTF-style workshop, with the curiosity that it is a defensive CTF, which is not common; typically, you can find Red Team tasks, i.e., offensive tasks, online. Through solving various tasks, participants will familiarize themselves with tactics and techniques that attackers use in targeted attacks, including phishing emails, script usage for system access, and running malicious code in RAM. How to detect, stop, and prevent such attacks.
To participate in the workshop, you need a laptop with an Internet browser installed.

speaker-1

Matija Mandarić

speaker-2

Janko Kersnik

speaker-3

Matevž Mulej

11:30 - 12:00

Coffee break

12:00 - 13:00

Hands-on workshop - continued

Step into the shoes of an Incident Responder for a few hours and learn how they analyze incidents, piece together the puzzle, and defend against existing or future attacks. Additionally, you will see how with the right tools, this job can truly be done in such a short timeframe.

 

This will be a CTF-style workshop, with the curiosity that it is a defensive CTF, which is not common; typically, you can find Red Team tasks, i.e., offensive tasks, online. Through solving various tasks, participants will familiarize themselves with tactics and techniques that attackers use in targeted attacks, including phishing emails, script usage for system access, and running malicious code in RAM. How to detect, stop, and prevent such attacks.

 

To participate in the workshop, you need a laptop with an Internet browser installed.

speaker-1

Matija Mandarić

speaker-2

Janko Kersnik

speaker-3

Matevž Mulej

13:00 - 14:00

Lunch and conference closing

08:30 - 09:00

Attendee registration

09:00 - 10:00

Breakfast with NOKIA: Quantum-Safe Networks – Secure now the future of your networks

speaker-1

Marta Buffa

10:00 - 11:30

Hands-on workshop: Typical Use Cases for Firewall Installation

Elevate Your Firewall Expertise
Dive into the practical world of firewall configuration and gain hands-on experience in setting up typical firewall scenarios. This immersive workshop will guide you through essential firewall configurations and related services, empowering you to tackle a wide range of use cases.
Key takeaways:
  • Master the art of firewall configuration.
  • Explore industry-leading firewall solutions from Juniper Networks and Sophos.
  • Develop the skills to handle diverse firewall use cases.

speaker-1

Marko Cizelj

speaker-2

Luka Horvat

11:30 - 12:00

Coffee break

12:00 - 13:00

Hands-on workshop - continued

Elevate Your Firewall Expertise

 

Dive into the practical world of firewall configuration and gain hands-on experience in setting up typical firewall scenarios. This immersive workshop will guide you through essential firewall configurations and related services, empowering you to tackle a wide range of use cases.

 

Key takeaways:
  • Master the art of firewall configuration.
  • Explore industry-leading firewall solutions from Juniper Networks and Sophos.
  • Develop the skills to handle diverse firewall use cases.

speaker-1

Marko Cizelj

speaker-2

Luka Horvat

13:00 - 14:00

Lunch and conference closing

08:30 - 09:00

Attendee registration

With morning coffee

09:00 - 10:00

Breakfast with NOKIA: Quantum-Safe Networks – Secure now the future of your networks

speaker-1

Marta Buffa

10:00 - 11:30

Hands-on workshop: Achieving a Secure OT Environment with Firewalls and ADS OT Integration

Embark on a hands-on journey to fortify OT security with Fortinet firewalls and Nozomi Networks ADS.
In this immersive workshop, you will:
  • Gain in-depth knowledge of Fortinet firewalls and their role in OT security.
  • Configure and manage Fortinet firewalls in a practical OT environment.
  • Integrate Fortinet firewalls with the Nozomi Networks ADS system for comprehensive OT network visibility and control.
By the end of the workshop, you will be equipped with the skills and expertise to effectively safeguard your OT environment from evolving cyber threats.

speaker-1

Ivan Krajačić

speaker-2

Peter Ceferin

speaker-3

Igor Štih

speaker-4

Marko Verdnik

11:30 - 12:00

Coffee break

12:00 - 13:00

Hands-on workshop - continued

Embark on a hands-on journey to fortify OT security with Fortinet firewalls and Nozomi Networks ADS.

 

In this immersive workshop, you will:
  • Gain in-depth knowledge of Fortinet firewalls and their role in OT security.
  • Configure and manage Fortinet firewalls in a practical OT environment.
  • Integrate Fortinet firewalls with the Nozomi Networks ADS system for comprehensive OT network visibility and control.

 

By the end of the workshop, you will be equipped with the skills and expertise to effectively safeguard your OT environment from evolving cyber threats.

speaker-1

Ivan Krajačić

speaker-2

Peter Ceferin

speaker-3

Igor Štih

speaker-4

Marko Verdnik

13:00 - 14:00

Lunch and conference closing

VENUE Postojna Cave Park

Jamska cesta 28
6230 Postojna

We have secured the lowest hotel rates for all attendees in Postojna Cave Hotel Jama. Make a reservation as soon as possible.

Free parking available for all conference attendees!

 

Najnovejše novice

Photo gallery

We have concluded yet another successful Technology Conference Smart Com. Our sincere thanks to all who contributed to its success!

OUR SUPPORTERS

Stay ahead of the curve in collaboration with leading global companies in the industry.

GET EXPERIENCE

Shift your perspective on digital business

Lorem ipsum dolor sit amet, consectetur adipiscing elit. 

Your partner

Didn't find all the information? We're always on hand and happy to help.