This is a preliminary program and is subject to changes in timings and content.
Registration is set to begin at 8AM sharp so we kindly ask all attendees to show up on time. Thank you
Dive into balancing cybersecurity strategies for maximum protection
• Optimal responses and key takeaways
Marko Krstić, Head of Cybersecurity Division and National CERT Affairs at Regulatory Authority for Electronic Communications and Postal Services (RATEL)
Cyber criminals target businesses of all sizes. How to protect your business?
• Implement cybersecurity basics to reduce the risk of cyber attacks & train your employees
• Prevention and Incident Response Planning
• Identity Security, Endpoint Security, and Multi-factor Authentication
• Implementing measures to IP assets from theft
Moderator: Sanja Kekić, President, Women4Cyber Serbia & Assistant Director for Client Delivery, Cedars International
Jasmin Azemović, CISO, HTEC Group
Uroš Babić, Security Team Lead, Crayon
Mina Tomić, CISO, A1
A chance for all attendees to meet up, chat and exchange their experiences.
Explore the heightened vulnerability of Fintech organizations to outsider threats
• Strategies for Identifying Primary Risk Sources
• Effective Third-Party Risk Management
• E-banking and Mobile app security/evaluation and testing
• Digital Operational Resilience Act (DORA)
The role of machine learning algorithms in threat detection and response, the ethical implications of AI in cyber operations, and strategies for bolstering cyber resilience in the face of sophisticated AI-enabled threats.
Dan White, Service Delivery Manager, Fuse CS
Mihajlo Topić, Cyber Defense Security Analyst, Fuse CS
As cyber threats evolve, social engineering emerges as a potent weapon exploited by cybercriminals to exploit vulnerabilities within organizations. Join us to delve into the rise of social engineering tactics, specifically phishing attacks, and understand why vigilance is paramount in today’s cybersecurity landscape.
• Unveiling Social Engineering Attacks: Exploring the landscape of social engineering and the deceptive techniques employed by cybercriminals to exploit human vulnerabilities.
• The Anatomy of a Phishing Attack: Understanding how phishing attacks leverage trust, imitating credible sources, and employing persuasive scenarios to deceive individuals into divulging sensitive information.
• The Human Element in Cybersecurity: Recognizing that not all hacks involve keyboards, emphasizing the role of human error as a significant factor in successful social engineering attacks.
Ina Poljak, Psychologist, Consultant & Author
Uroš Babić, Security Team Lead, Microsoft Security MVP, MCT, Crayon
Marko Gulan, Independent Cyber Security Consultant
A chance to get some food and keep the networking going.
• The fusion of humanity and technology: Implications for security evolution
• Detection and remediation of security vulnerabilities in software code using ML & AI
• Attention on developing tools to detect and mitigate the impact of deepfakes
Dragan Pleskonjić, Founder, Glog AI
Jasmin Azemović, CISO/University Professor, HTEC Group
This panel offers a comprehensive exploration of cybersecurity from a legal perspective, covering crucial aspects:
• Laws and Regulatory Frameworks: Examine the evolving legal landscape governing cybersecurity. Gain insights into NIS2 regulative, CRA and national laws addressing cybercrime, data breaches, critical infrastructure and supply chain security.
• Privacy in the Digital Era
Senad Džananović, Director of Cybersecurity, Zira
Dr Milena Nikolić, Cybersecurity Contract Manager, Siemens Energy
Moderator: Bogdan Ivanišević, Senior Partner, BDK Advokati
Another chance to get to know other attendees and get some refreshment.
• Strategic Positioning: Discussing comprehensive strategies and solutions for securing digital transformation addressing complex challenges in modern infrastructure.
Time to wrap up the Cyber security Summit with a few closing remarks.
This is a preliminary program and is subject to changes in timings and content.
Cyber Security Summit© 2024 All Rights Reserved.