Agenda

9:00-9:15 Opening Remarks

Panel Discussion: From Technical Expert to Business Strategist: Bridging the gap between cybersecurity roles and business leadership

Cybersecurity professionals are no longer confined to technical roles—they are becoming pivotal business strategists. This panel will explore how CISOs and cybersecurity leaders can bridge the gap between technical expertise and business leadership, translating cyber risks into actionable insights, navigating personal accountability, and future-proofing their careers in an AI-driven world.

  • Translating cyber risk into business impact—how CISOs communicate threats in financial and operational terms
  • Reporting and quantifying cyber risks and incidents just like financial risks; new AI risks
  • Helping boards understand real impact, enabling better decisions

 

Panelists:

Nenad Popović, CISO, Addiko Bank 

Panel Discussion: Third-Party and Supply Chain Risk Management

With an increasing reliance on third-party vendors, companies must enforce stronger due diligence, continuous monitoring, and ensure suppliers meet cybersecurity standards to avoid regulatory penalties.

  • Lack of visibility: Difficulty in assessing the security posture of third-party vendors
  • Complex ecosystems: Managing risks across multi-tier supply chains
  • Emerging threats: AI, quantum computing, and IoT risks in supply chains
  • Compliance with the Cyber Resilience Act: Managing Third-Party Risks and Liabilities

 

Panelists:

Dr Milena Nikolić, Cybersecurity Contract Manager, Siemens Energy

Dejan Dušić, Group CISO, AikGroup

Panel Discussion: Cyber Threats in the EV Ecosystem: More Than Just a Car

  • How software-defined vehicles (SDVs) create new cybersecurity risks
  • Risks of malware-infected charging stations and supply chain vulnerabilities
  • Could ransomware lock drivers out of their own cars?
  • The rise of vehicle takeover attacks—exploiting remote control capabilities

 

Panelists:

Dušan Vučetić, CSOC Manager, Rivian 

Damir Avdić, Embedded Software Engineer, HTEC Group 

Panel Discussion: Insider Threats in the Banking Sector: Balancing Security, AI, and Compliance

Financial institutions face increasing risks from insider threats, whether through malicious intent, negligence, or compromised credentials. This panel will explore how banks can strengthen insider threat management, leverage AI-driven behavioural analytics, and meet new regulatory requirements

  • Main types of threats and challenges (malicious insiders, negligent insiders, compromised insiders)
  • Best practices for mitigating insider threats while balancing compliance, AI-driven monitoring, and employee training
  • Incident response and recovery (how banks should prepare for insider threat incidents)

Panelists:

Rajko Sekulović, Head of Operational Risk Management, Information Security and Business Continuity Directorate, Centralna banka Crne Gore

Miloš Kilibarda, Chief Security Officer, UniCredit Bank

Navigating the Legal and Technical Frontiers of Cybersecurity – NIS 2 and Beyond

  • Understanding of the regulatory landscape of cybersecurity, including the NIS2, and GDPR and national laws
  • Beyond Compliance – Cyber Risk Management & Criminal Liabilities
  • Criminal law aspects – when does a cybersecurity incident become a prosecutable offense?
  • Corporate liability – can executives be held responsible for non-compliance?

 

Panelists:

Nemanja Miljković, CIO & DPO, HORISEN Group

Filip Stojanović, Head of Cybersecurity at TLScontact | Computer Crime and Digital Evidence Committee at IACP (International Association of Chiefs of Police)

Cyber Resilience in Critical Industries: From Detection to Strategic Defense

Critical sectors such as energy, healthcare, finance, and manufacturing face relentless and increasingly sophisticated cyber threats. Ensuring resilience in these environments requires more than compliance—it demands advanced detection capabilities, deep visibility into network behavior, and rapid response to emerging anomalies.

This panel will explore how critical infrastructure operators are rethinking cybersecurity—from real-time anomaly detection in network traffic to integrating threat intelligence, managing legacy systems, and aligning with national resilience strategies.

Speaker: Natalia Semenova, AI Security Architect, NVIDIA

This session explores how threat probability models, behavioral analytics, and deep network traffic analysis—combined with AI and integrated security platforms—can empower SoC teams to detect, prioritize, and neutralize threats before they cause harm.

Use Cases & Challenges: Practical examples of integrating security platforms and overcoming unified threat intelligence complexities.

14:00-14:30 The AI-Powered Evolution and Cybersecurity

How AI and Machine Learning are reshaping cybersecurity: Preparing for the future

  • AI and ML are transforming cybersecurity (threat and anomaly detection, predictive analysis and automated incident response)
  • Preparation involves understanding AI’s capabilities, risks, and implementation challenges

We explore how AI is reshaping the cybersecurity profession, from enhancing operational efficiency to creating entirely new responsibilities and opportunities.

  • New skills and expertise required
  • Related certifications
  • New career paths emerging at the intersection of AI and cybersecurity
  • Redefining organisational structures

This panel will explore global developments in AI regulations, including the EU AI Act and national AI strategies.

  • Understanding of the legal and regulatory requirements for AI systems
  • Strategies to ensure compliance with privacy laws and emerging AI regulations
  • The ownership of AI-generated content and inventions
  • How AI systems interact with existing copyright and intellectual property laws

AI agents detecting anomalies and preventing cyberattacks in real time. Varying degrees of autonomy and intelligence, depending on their design and purpose.

This is a preliminary program and is subject to changes in timings and content.

Get your tickets on time

Days
Hours
Minutes
Seconds
Don't miss out - Register today!

Ticket prices

Regular

In-person-ticket
380 Monthly
  • Access: Sessions and Keynote Speeches​
  • Special Activities: CSS Cyberfy Workshop​
  • Networking Opportunities​
  • Meals and Refreshments​
  • Conference Materials​
  • Exhibition Acces​s

Early Bird

In-person-ticket
260 Monthly
  • Access: Sessions and Keynote Speeches
  • Special Activities: CSS Cyberfy Workshop
  • Networking Opportunities
  • Meals and Refreshments
  • Conference Materials
  • Exhibition Access
Exp. 20/9/25

Special

Corporate-ticket
280 Monthly
  • Join us with your Team and get the best deal
  • Limited number available
  • 3+
  • Networking Opportunities
  • Refreshments and Meals