IT Security Conference

Novi Sad, Serbia

25.-26. October 2022

TICKETS

IT Security Conference

Novi Sad, Serbia

25.-26. October 2022

TICKETS

About the conference

We are happy to meet again!


Leading annual regional IT security conference is back, and it will take place on 25 th and 26 th of October 2022! As this city becomes the center of IT and innovation in this part of Europe, SecureD Conference will be held in Novi Sad, Serbia, where we are expecting over 200 attendees from the region. Fast rollout of new services, as a result of digital transformation, creates constant security challenges in several segments of corporate IT infrastructure. At the conference we will address challenges, which IT and security teams are facing from several aspects. Provided ideas and solutions will help your companies overcome these issues with best possible outcome. Don’t miss out the discussion on pressing cyber security challenges, creating industry synergies between IT security leaders in a collaborative effort to safeguard your assets. Expect to be inspired, educated, and energized with new ideas to apply to your organization as part of

this 2-day conference in cyber security!

Leading speakers from security industry - keynotes from well-known industry leaders.

Enjoy the atmoshpere explicitly tailored to let you grow and learn - enjoy exciting workshops, lectures, and round table discussions on topics relevant to your industry.

Real-world solutions - resolve and address problem with technology of trusted industry leaders.

Create very high quality videos using your own mobile phone.

View your videos in great quality on multiple screen sizes.

Learn and develop - improve your knowledge and skills. New information, current standpoints or fresh insights.

Meaningful networking - go one-on-one with leading security IT managers professionals and specialists from the region and boost your network.

Speakers

More will be added as the Conference approaches

Name Surname

Company

Name Surname

Company

Name Surname

Company

Name Surname

Company

Name Surname

Company

Company

Name Surname

Name Surname

Company

Thorsten Schäfer

DataCore

Rod Hawkins

Glasswall

Mirko Panić

Japi Com

Danijel Jovanović

Japi Com

Piotr Kałuza

Sycope

Vladimir Vučenić

Net++

Name Surname

Company

Name Surname

Company

Name Surname

Company

Name Surname

Company

Name Surname

Company

Company

Name Surname

Name Surname

Company

Marija Selak

Braineering

Milan Gabor

Viris

Remik Sieminski

SolarWinds

Hugo Fleischman

Portnox

Vladislav Jovanović

DDOR

Goran Milev

Integra solution

Goran Chamurovski

Integra solution

Goran Chamurovski

Integra solution

Vedran Franjić

Palo Alto Netoworks

Jakub Jiricek

Palo Alto Networks

Jure Lah

Palo Alto Networks

Tomek Pietrzyk

Palo Alto Networks

Goran Chamurovski

Integra solution

Arthur Dinevich

Skybox Security

Avi Corfas

Skybox Security

Srdjan Vranić

Co.Next

Aleksandar Lukić

Co.Next

Lubos Chovan

Palo Alto Networks

Program

More will be added as the Conference approaches, the Organizer reserves the rights to additional changes

October 25, Tuesday / Day 1

08:30-10:00

Registration

10:00-10:30

Conference opening

Sebastjan Žiga Cof & Srdjan Vranić

Co.Next

Jure Lah

Welcome speech

10:30-11:15 

Palo Alto Networks keynote

Jure Lah & Tomek Pietrzyk

"Trends in building a security system - response to changes in our environment"

11:20-11:50 

Skybox Security

Avi Corfas

De-risking IT/OT convergence

11:55-12:25 

Glasswall

Rod Hawkins

Zero-trust file protection

12:30-13:30 

Lunch

13:30-14:00 

Portnox

Hugo Fleischman

Portnox CLEAR, Cloud-Native NAC

14:05-14:35 

Braineering

Marija Selak

Napredno otkrivanje pretnji, a.k.a. Lov na veštice, juče i danas

14:40-15:10

Net++

Vladimir Vučinić

Palo Alto Networks Firewall u praksi

15:10-15:40

Coffee break

15:40-16:10

Datacore

Thorsten Schäfer

Multi-Layered Protection for Unstructured Data

16:15-17:15

Motivational Speaker

Marko Stojanović

Komunikator = Gladijator

20:30

Eat'n'IT Party

Euterpa band

Workshops

11:20 - 12.25

Palo Alto Networks

Jakub Jiricek

Capture the Flag

12:30-13:30 

Lunch

13:30 - 14.35

Palo Alto Networks

Jakub Jiricek

Capture the Flag

14:40 - 15.10

Palo Alto Networks Virtual world

Lubos Chovan & Vedran Franjić

VMs, CNs, Panorama

15:10-15:40

Coffee break

15:40 - 16.10

Palo Alto Networks

Srdjan Vranić

How to secure IoT infrastructure

October 26, Wednesday / Day 2

9:30-10:00 

SolarWinds

Remik Sieminski

SolarWinds Hybrid Cloud Observability

10:05-10:35 

SolarWinds

Goran  Milev & Goran Chamurovski

Transform IT services through SolarWinds

10:40-11:10 

Sycope

Piotr Kałuża

See the Invisible

11:10-11:40 

Coffee break

11:40-12:10 

Japi Com

Danijel Jovanović & Mirko Panić

Implementacija Palo Alto firewall rešenja u energetskom sektoru 

12:15-12:45 

Micro Focus

Andrej Bruketa

12:45-13:45 

Lunch

13:45-14:15 

DDOR Novi Sad

Vladislav Jovanović

Palo Alto Networks Case study

14:20-15:20 

Viris

Milan Gabor

Don't fail at next pentest

15:20-16:00 

Goodbye ceremony

Workshops

9:30-10:00 

Palo Alto Networks

Aleksandar Lukić

How to configure SD-WAN

10:05-11:10 

Palo Alto Networks

Aleksandar Lukić

Troubleshooting

11:10-11:40 

Coffee break

11:40-12:45

Skybox Security

Arthur Dinevich

Vulnerability Management and Prioritization in IT and OT environment

12:45-13:45 

Lunch

13:45-15:20

Configuring Palo Alto Networks NGFW

Srdjan Vranić

Best Practice alias PCNSE preparation

NEWS

Get the latest to stay on track

by Palo Alto Networks 13 Oct, 2022
Knowing that a chain is as strong as its weakest link businesses spearheading digital transformation are choosing Palo Alto Networks to safeguard their most valuable assets. One of them is ClusterPower, a leading Romanian cloud service provider, whose customers can now launch innovative new services more quickly, safe in the knowledge their underlying data is secure, fast, and reliable. What sets Palo Alto Networks apart from other leading network security providers? How does ClusterPower manage risk and maximize opportunities with Palo Alto Networks? Find out more about SecureD22 General Sponsor’s Proactive and intelligent strategy to keep networks safe.
by Skybox 11 Oct, 2022
Cost Savings and Business Benefits Enabled By Skybox Security Posture Management Platform. A The Total Economic Impact™ Study Commissioned By Skybox Security. Learn how Forrester Consulting estimates the business value of Skybox including: A 142% ROI of the Skybox Security Posture Management Platform A 55% reduction in the risk of a significant data breach. A 50% decrease in downtime for mission-critical assets. A 20% increase in efficiencies for the security operations team. A 50% reduction of external audit resource time. A 30% increase in productivity of security analysts when conducting audit and compliance activities. A $329,000 savings in an enhanced and streamlined security stack. Forrester Consulting interviewed four Skybox Security customers to assess the business benefits they have received from the Security Posture Management Platform . Through the representative interviews and financial analysis, Forrester found that a composite organization experiences benefits of $3.78 million over three years versus costs of $1.56 million, adding up to a net present value (NPV) of $2.21 million and an ROI of 142%. Before investing in Skybox, customers noted how their organizations struggled with these common challenges: Inability to prioritize vulnerabilities and extensive remedial work. Interviewees discussed how their previous solutions to address threat and vulnerability management did not have the capabilities to distinguish or understand the criticality of threats across their IT and OT networks. This led to increased workloads across internal teams that were unable to keep pace with assessed vulnerabilities or with proper prioritization. Additionally, the potential threat of a significant data breach could have devastating consequences from a financial and brand standpoint. Evolving needs for a centralized security system. Prior solutions were focused on a smaller scope or regional security, which limited their visibility to enterprise level threats and gave rise to shadow IT internally. The principal network engineer at an IT security company discussed their company’s previous issues and the Skybox Platform’s influence: “Our challenge was to figure out visibility. One of the first products that we brought in after we did a bake-off was Skybox because it filled the void that we didn’t have from our own products. There was no centralized group that was looking at these issues.” Inflated costs and inadequate data to support increasing audit and compliance needs. Companies were forced to manage internal policies and firewalls through complex and manual processes. Disjointed or missing data and limited reporting led to longer external and internal audits while exposing the company to compliance risk or having to pay external fines for audit failures. When looking for a solution to address these challenges and ultimately choosing Skybox, customers searched for a solution that would enable them to do the following and more: Establish an organization-wide governance process for reviewing and prioritizing vulnerabilities and threats across IT and OT environments. Increase operational efficiencies through the reduction of menial work. Improve risk management and assessment. Prevent significant data breaches. Expand visibility, data, and critical audit logs to gain key government compliance standards and enable long-term growth. Utilize superior functionality and user experience.
Show More

Regular

after October 12

110 EUR

*price already includes  VAT

Conference + Workshops

130 EUR

*price already includes  VAT

Regular

after October 12

110 EUR

*price already includes  VAT

Conference + Workshops

130 EUR

*price already includes  VAT

LOCATION

ACCOMODATION

Sheraton Novi Sad****

Polgar Andraša 1, Novi Sad

BOOK ACCOMODATION

Conference partners

GENERAL PARTNER

GIGA PARTNERS

MEGA PARTNER

SPONSORS

Share by: