Agenda

9:00-9:15 Keynote: The most common failures of organizations in responding to cyber incidents — and how CERTs can lead cyber incident response?
  • Common omissions in incident response: real-world examples and lessons learned
  • Why most incident response plans fail to establish a clear escalation framework for cyber crises
  • The missing mandate: who has the authority to declare a cyber crisis?
  • When cyber crises are mismanaged as purely technical IT problems instead of strategic threats

 

Keynote speaker: Dr Marko Krstić, Head of Cybersecurity Division and National CERT Affairs, RATEL 

Panel Discussion: From Technical Expert to Business Strategist: Bridging the gap between cybersecurity roles and business leadership

Cybersecurity professionals are no longer confined to technical roles—they are becoming pivotal business strategists. This panel will explore how CISOs and cybersecurity leaders can bridge the gap between technical expertise and business leadership, translating cyber risks into actionable insights, navigating personal accountability, and future-proofing their careers in an AI-driven world.

  • Translating cyber risk into business impact—how CISOs communicate threats in financial and operational terms
  • Reporting and quantifying cyber risks and incidents just like financial risks; new AI risks
  • Helping boards understand real impact, enabling better decisions

 

Panelists:

Nenad Popović, CISO, Addiko Bank 

Marko Gulan, Cybersecurity Advisor to the Boards, vCISO, Risk Management | OT/ICS Cybersecurity

Moderator: Sanja Kekić, President, Women4Cyber

Panel Discussion: Third-Party and Supply Chain Risk Management

With increasing reliance on third-party vendors, the lack of strong TPRM practices leads not only to regulatory penalties but also to systemic risks, operational disruptions, and loss of trust across the supply chain

  • The growing importance of TPRM – why third-party risk management is becoming essential for resilience, continuity, and trust in global supply chains.
  • Complex ecosystems: Managing risks across interconnected suppliers, sub-suppliers, and service providers in a rapidly evolving threat landscape.
  • Assessment and contractual safeguards – combining supplier assessments with cybersecurity annexes in supply contracts to identify, mitigate, and legally enforce risk controls.
  • Compliance with evolving regulations – ensuring alignment with different acts and directives, with a particular focus on NIS2 and the Cyber Resilience Act (CRA).

 

Panelists:

Dr Milena Nikolić, Cybersecurity Contract Manager, Siemens Energy

Dejan Dušić, Group CISO, AikGroup

Danilo Damjanović,

Andrej Stojić, Director of Cyber Security Integrations, Oktacron

Panel Discussion: Cyber Threats in the EV Ecosystem: More Than Just a Car

  • How software-defined vehicles (SDVs) create new cybersecurity risks
  • Risks of malware-infected charging stations and supply chain vulnerabilities
  • Could ransomware lock drivers out of their own cars?
  • The rise of vehicle takeover attacks—exploiting remote control capabilities

 

Panelists:

Dušan Vučetić, CSOC Manager, Rivian 

Damir Avdić, Embedded Software Engineer, HTEC Group 

Panel Discussion: Insider Threats in the Banking Sector: Balancing Security, AI, and Compliance

Financial institutions face increasing risks from insider threats, whether through malicious intent, negligence, or compromised credentials. This panel will explore how banks can strengthen insider threat management, leverage AI-driven behavioural analytics, and meet new regulatory requirements

  • Main types of threats and challenges (malicious insiders, negligent insiders, compromised insiders)
  • Best practices for mitigating insider threats while balancing compliance, AI-driven monitoring, and employee training
  • Incident response and recovery (how banks should prepare for insider threat incidents)

Panelists:

Jelena Radovanović, Assistant Director, Centre for Information Systems Supervision, National Bank of Serbia

Rajko Sekulović, Head of Operational Risk Management, Information Security and Business Continuity Directorate, Centralna banka Crne Gore

Miloš Kilibarda, Chief Security Officer, UniCredit Bank

Radoslav Jovanović, CISO, Nova banka AD Banja Luka

Navigating the Legal and Technical Frontiers of Cybersecurity – NIS 2 and Beyond

  • Understanding of the regulatory landscape of cybersecurity, including the NIS2, and GDPR and national laws
  • Beyond Compliance – Cyber Risk Management & Criminal Liabilities
  • Criminal law aspects – when does a cybersecurity incident become a prosecutable offense?
  • Corporate liability – can executives be held responsible for non-compliance?

 

Panelists:

Nemanja Miljković, CIO & DPO, HORISEN Group

Filip Stojanović, Head of Cybersecurity at TLScontact | Computer Crime and Digital Evidence Committee at IACP (International Association of Chiefs of Police)

Marija Veselinović, Associate Legal Counsel -Former Yugoslavia Region, Huawei

Moderator: Bogdan Ivanišević, Partner, BDK Advokati

Through a game-like experience, participants will see how SmartFish detects and prevents credential entry and file downloads from unverified domains — showcasing in real time how the platform protects users from cyber threats.

Speaker: Natalia Semenova, AI Security Architect, NVIDIA

By Developico

Modern and secure software development at MozzartBet.
 
This presentation highlights an optimal platform solution built with OpenShift and DevOps tools, covering the secure development lifecycle and clear lines of team responsibility. Additionally, it discusses key security components and outlines future plans for platform adoption.
 
Key next steps include service migrations, pipeline improvements,  security centric approach and focus on  technical debt.
 
Speaker: Čedomir Novaković, CTO, MozzartBet

This session explores how threat probability models, behavioral analytics, and deep network traffic analysis—combined with AI and integrated security platforms—can empower SoC teams to detect, prioritize, and neutralize threats before they cause harm.

Use Cases & Challenges: Practical examples of integrating security platforms and overcoming unified threat intelligence complexities

Panelists:

Dragan Pleskonjić, Founder & CEO, GLOG.AI

Jasmin Azemović, CISO, HTEC

14:00-14:45 Women Leaders in Cybersecurity: Inspiring Role Models

This session brings together successful women from the world of cybersecurity who will share their experiences, challenges, and career lessons. The goal is to provide female students and pupils with inspiration, practical advice, and a clear understanding of how to build their future in this industry.

  • Global opportunities and visibility – how to take advantage of opportunities for international projects, conferences, scholarships, and networking. The importance of public speaking, writing articles, and participating in competitions.
  • Path into cybersecurity – beginnings, which obstacles to overcome, and how to find your specialization.
  • Career lessons – what they would do differently if starting today, and how to make better decisions early in your career.
  • Challenges for women in the industry – stereotypes, prejudices, invisible barriers, and how to overcome them.
  • Balancing technical and leadership roles – what it’s like to transition from technical to managerial positions.
  • How to choose a mentor – criteria, how to find the right mentor in the industry, maintaining a good mentor–mentee relationship, and the importance of having multiple mentors throughout your career.

 

Women Leaders in Cybersecurity:

  • Sanja Kekić, President, Women4Cyber
  • Diana Gligorijević, Co-Founder, TeleGroup
  • Mina Tomić, CISO, A1 Srbija
  • Jelena Bratić, Senior Security Cloud Solution Architect, Microsoft
  • Ana Kaplarević-Mališić, Assistant Professor, Department for Mathematics and Informatics, Faculty of Science, Univesity of Kragujevac

We explore how the rapid integration of Artificial Intelligence is transforming the cybersecurity landscape — from advanced threat detection to new vectors of risk and regulation. This round table brings together experts to discuss the balance between innovation, governance, and responsible AI deployment in securing the digital future.

  • Artificial Intelligence and Machine Learning in Transforming Cybersecurity — from threat and anomaly detection to predictive analysis and automated incident response, with applications across various industries and sectors.
  • AI agents that detect anomalies and prevent cyberattacks in real time — operating at different levels of autonomy and intelligence depending on their design and purpose.
  • Preparing for the future: understanding the capabilities, risks, and challenges of AI system implementation.
  • Legal & Regulatory Framework for AI Systems — clear understanding of laws and regulations applicable throughout the AI lifecycle (design, training, deployment, monitoring), including the EU AI Act and national frameworks.
    Ownership of AI-generated content and inventions — updated approach to intellectual property: defining ownership of model outputs, eligibility of AI-assisted works for copyright protection, and managing rights under evolving legal standards.

This is a preliminary program and is subject to changes in timings and content.

Get your tickets on time

Days
Hours
Minutes
Seconds
Don't miss out - Register today!

Ticket prices

Regular

In-person-ticket
380 Monthly
  • Access: Sessions and Keynote Speeches​
  • Special Activities: CSS Cyberfy Workshop​
  • Networking Opportunities​
  • Meals and Refreshments​
  • Conference Materials​
  • Exhibition Acces​s

Early Bird

In-person-ticket
260 Monthly
  • Access: Sessions and Keynote Speeches
  • Special Activities: CSS Cyberfy Workshop
  • Networking Opportunities
  • Meals and Refreshments
  • Conference Materials
  • Exhibition Access
Exp. 20/9/25

Special

Corporate-ticket
280 Monthly
  • Join us with your Team and get the best deal
  • Limited number available
  • 3+
  • Networking Opportunities
  • Refreshments and Meals