Agenda

Registration is set to begin at 8AM sharp so we kindly ask all attendees to show up on time. Thank you

Dive into the intricacies of a significant hack, dissecting its magnitude and significance. Best practices for incident management
• Optimal responses and key takeaways
• Challenges encountered by security professionals

Cyber criminals target businesses of all sizes. How to protect your business?

• Implement cybersecurity basics to reduce the risk of cyber attacks & train your employees

• Implementing measures to protect privacy & IP assets from theft or unauthorized access by cybercriminals

• Prevention and Incident Response Planning

• Identity Security, Endpoint Security, and Database Protection

  • Nenad Popović, CISO, Addiko Bank
  • Duško Martić, Head of Content Security, United Group
  • Nikola Begović, Security Specialist, CEMA, SEE – Adriatic region, Microsoft
  • Đorđe Krivokapić, ICT Law Professor and co-founder of SHARE Foundation (moderator)
  • How are industry players coping with lack of qualified human resources and gender gap?
  • How are cybersecurity teams organized? Best practices and effective models.
  • Navigating the Life of a CISO: Combatting Pressure and Burnout

 

Moderator: Sanja Kekić, President, Women4Cyber Serbia

Jasmin Azemović, CISO, HTEC Group

A chance for all attendees to meet up, chat and exchange their experiences.

Explore the heightened vulnerability of Fintech organizations to outsider threats

• Strategies for Identifying Primary Risk Sources
• Cloud Ecosystem: Effective Third-Party Risk Management
• E-banking and Mobile app security/evaluation and testing

  • Denis Darabašić, CISO, AIK Banka
  • Miloš Krunić, CISO NLB Lease&Go Slovenia, Serbia & N. Macedonia

The role of machine learning algorithms in threat detection and response, the ethical implications of AI in cyber operations, and strategies for bolstering cyber resilience in the face of sophisticated AI-enabled threats.

• Analyzing the industries targeted by over 50% of ransomware attacks: banking, retail, and utilities, alongside the broader impact on other sectors
• Assessing best practices in different industries to combat ransomware threats
• Defining liability boundaries: Where do responsibilities lie in ransomware scenarios?
• Examining societal implications: Considerations beyond financial impact in dealing with ransomware incidents

As cyber threats evolve, social engineering emerges as a potent weapon exploited by cybercriminals to exploit vulnerabilities within organizations. Join us to delve into the rise of social engineering tactics, specifically phishing attacks, and understand why vigilance is paramount in today’s cybersecurity landscape.


• Unveiling Social Engineering Attacks: Exploring the landscape of social engineering and the deceptive techniques employed by cybercriminals to exploit human vulnerabilities.
• The Anatomy of a Phishing Attack: Understanding how phishing attacks leverage trust, imitating credible sources, and employing persuasive scenarios to deceive individuals into divulging sensitive information.
• The Human Element in Cybersecurity: Recognizing that not all hacks involve keyboards, emphasizing the role of human error as a significant factor in successful social engineering attacks.
• Strategies for Prevention: Exploring proactive measures and best practices to prevent and mitigate social engineering attacks, including user education, robust security protocols, and technological solutions.

Ina Poljak, Psychologist, Consultant & Author

A chance to get some food and keep the networking going.

• The fusion of humanity and technology: Implications for security evolution
• Attention on developing tools to detect and mitigate the impact of deepfakes

Dragan Pleskonjić, Founder, Glog AI

Jasmin Azemović, CISO/University Professor, HTEC Group

This panel offers a comprehensive exploration of cybersecurity from a legal perspective, covering crucial aspects:

• Laws and Regulatory Frameworks: Examine the evolving legal landscape governing cybersecurity. Gain insights into NIS2 regulative and national laws addressing cybercrime, data breaches, and cross-border data flow.

• Privacy in the Digital Era

Senad Džananović, Director of Cybersecurity, Zira

Another chance to get to know other attendees and get some refreshment.

Unlocking the potential of hyperscale cloud providers such as AWS, Azure, and GCP offers rapid product deployment. However, the challenge remains in striking a balance between speed and adhering to compliance, managing risks, and combating a growing array of security threats. Can CNAPP pave the way for simplified cloud-native cybersecurity?
• Uncovering obstacles to achieving cloud-native security
• Evaluating the effectiveness of various cybersecurity tooling strategies: CSPM, KSPM, CIEM,
CWPP, IaC, EDP, HIPS, and the emerging CNAPP
• The struggles and barriers for Cyber Security Teams within the standard DevOps framework

•  Strategic Positioning: Discussing comprehensive strategies and solutions for securing digital transformation addressing complex challenges in modern infrastructure.

Time to wrap up the Cyber security Summit with a few closing remarks.

This is a preliminary program and is subject to changes in timings and content.

Get your tickets on time

Days
Hours
Minutes
Seconds
Don't miss out - Register today!

Ticket prices

Regular

In-person-ticket
350 Monthly
  • Access: Sessions and Keynote Speeches​
  • Special Activities: CSS Cyberfy Workshop​
  • Networking Opportunities​
  • Meals and Refreshments​
  • Conference Materials​
  • Exhibition Acces​s

Early Bird

In-person-ticket
260 Monthly
  • Access: Sessions and Keynote Speeches
  • Special Activities: CSS Cyberfy Workshop
  • Networking Opportunities
  • Meals and Refreshments
  • Conference Materials
  • Exhibition Access
Exp. 6/9/24

Special

Corporate-ticket
Group price Monthly
  • Join us with your Team and get the best deal
  • Limited number available