About the conference
SecureD & Under Control
The focus is on real technical solutions that raise security to the required level in practice.
We demonstrate how technically functioning solutions ensure a security level that meets regulatory requirements.
When Theory Meets Practice: Cyber Compliance 2026
Compliance with NIS2, ZInfV-1, and DORA requires clear, technically feasible steps—not more theory.
At the SecureD & Under Control conference, we focus on solutions that demonstrably raise an organization’s security level in real environments. We don’t talk about concepts, but about architectures, controls, and technical procedures used daily by system engineers, architects, CISOs, and IT content managers.
The focus is on real technical solutions that practically raise security to the required level.
We will present examples where the right combination of security functions creates a stable infrastructure, clear visibility, and control over key risk points. Such solutions enable the establishment of concrete, verifiable controls essential for managing modern threats and meeting regulatory requirements.
The event is intended for organizations that want to ensure a higher level of resilience and compliance and want to understand how to actually achieve this in practice.
You will gain direct insight into what works in real environments, how different technologies can be aligned, and how to ensure stable, verifiable, and regulation-compliant operation of critical systems.
The focus is on practical results, real examples, and technical integrations.
SecureD & Under Control—the conference where theory finally meets practice.

Leading speakers from security industry - keynotes from well-known industry leaders.

Enjoy the atmoshpere explicitly tailored to let you grow and learn - enjoy exciting workshops, lectures, and round table discussions on topics relevant to your industry.

Real-world solutions - resolve and address problem with technology of trusted industry leaders.
Program
More will be added as the Conference approaches, the Organizer reserves the rights to additional changes
January 26, Monday / Day 1 Workshops Track 1
12:30-13:00
Registration, Welcome, Snacks & Coffee
13:00-14:00
Secure web browsing and file downloads
14:00-15:00
Enabling Advanced Security Use Cases with Complete Network Visibility (for AI D&R or IDS)
15:15-17:00
Preventing Malware Entry via USB and Email
17:00-19:00
Chillout time
19:00-21:00
Dinner and beer tasting
January 26, Monday / Day 1 Workshops Track 2
12:30-13:00
Registration, Welcome, Snacks & Coffee
13:00-15:00
Catch the attacker with advanced protection – Live Capture the Flag Workshop
15:15-16:00
Do you know which vulnerable components your applications are built on?
16:15-17:00
Invisible. Unreachable. Secure.
17:00-19:00
Chillout time
19:00-21:00
Dinner and beer tasting
January 27, Tuesday / Day 2 Lectures
09:30-10:00
Registration, Welcome, Snacks & Coffee
10:00-10:20
Conference opening

Sebastjan Žiga Cof
Welcome speech

Andrej Golob
Co.Next Vision: Secured, Compliant, and Operational (SLO)
10:20-10:50
NIL
10:55-11:25
_
Gregor Osterman
Kako smo vpeljali Tickwall in (pre)(za)živeli (SLO)
11:25-11:55
SRC

Luka Pecher
Prehod v SaaS: Izzivi in koristi migracije Palo Alto NGFW v Strata Cloud Manager (SLO)
11:55-13:35
Lunch
13:35-14:05
OPSWAT

Łukasz Okólski
Day of a life of a file – File Security in motion (ENG)
14:05-14:35
Smartis

Matevž Kuhelj
Celovita vidljivost v IT/OT okoljih z Garland packet brokerji, Darktrace AI in integracijo v SIEM (SLO)
14:35 - 15:05
AITONIX

Biljana Andreeva
SD-WAN Migration Project Overview | From Legacy Limitations to a Future-Ready Network (ENG)
15:05-15:25
Odmor za kavo
15:25 - 15:55
Arhides

Daniel Bednjički & David Sahernik
Nevidni napadi, vidni nadzor: MetaDefender Core in Kiosk v praksi (SLO)
15:55- 16:55
Panel Discussion | From Breach to Recovery (SLO)

Dr. Izidor Golob
Univerza v Mariboru

Ksenija Montani
Javni zavod Lekarna Ljubljana

Dejan Dolar
HSE

Pija Kapitanovič
panel moderator
16:55-19:00
Chillout time
19:00
Dinner & Party
January 27, Tuesday / Day 2 Demo room
10:00-17:00
Demonstrations of solutions
January 28, Wednesday / Day 3 Lectures
09:00-09:30
Nodefusion

Hrvoje Kusulja
Microsoft Entra Conditional Access in Practice (ENG)
09:30-10:00
SolarWinds

Dmytro Borovyk
Securing the Core: Observability-Led Incident Response (ENG)
10:05-10:35
Viris

Milan Gabor
Varnost aplikacij 360°: zakaj SAST in varnost skozi celoten razvoj presegata penetracijske teste (SLO)
10:40-11:10
Garland Technology

Neil Wilkins
Unlocking Knowledge: Insights Through Case Studies (ENG)
11:10-11:30
Coffee break
11:30-12:00
Braineering

Marija Selak
Resilience Redefined | Disaster Avoidance – Old Idea, New Bling (ENG)
12:05-12:35
Conscia

Tom Kern
Zaznava in samodejna zajezitev varnostnih incidentov s Cortex XSOAR (SLO)
12:40-13:10
PULSEC

Saša Bundalo
Continuous Threat Exposure Management - From Continuous Visibility to Regulatory Compliance (ENG)
13:15-13:45
Palo Alto Networks

Žan Črnivec
Compliance versus Security. Why not both? Replacing Legacy SIEM with the Cortex XSIAM Security Operations Platform (SLO)
13:45-15:00
Lunch
15:00
Goodbye
January 28, Wednesday/ Day 3 Demo room
10:00-15:00
Demonstrations of solutions
Speakers
Workshops
Catch the attacker with advanced protection – Live Capture the Flag Workshop
A Hands-on Capture the Flag workshop allows participants experience real-world attack scenarios and practice detection and response in a controlled environment. The focus is on identifying attacker behavior, correlating events across multiple data sources, and responding to incidents using advanced security capabilities designed for modern enterprise environments.
Enabling Advanced Security Use Cases with Complete Network Visibility (for AI D&R or IDS)
Effective AI-based detection and response depend on accurate and complete network data. This workshop shows why full network visibility is essential for identifying and responding to threats. Participants will explore how comprehensive access to network traffic—including both external (north–south) and internal (east–west) communication—enhances anomaly detection, behavioural analysis, and response accuracy. The session also demonstrates how forwarding internal traffic to next-generation firewalls uncovers blind spots within the network, ensuring intrusions are detected across all areas and maximizing overall threat visibility.
Preventing Malware Entry via USB and Email
Removable media and email attachments remain common attack vectors. This workshop covers practical strategies to inspect, sanitize, and control files before they reach internal systems or users. Participants will learn how to safely manage USB usage and validate email attachments, minimizing the risk of malware infection and data compromise while maintaining normal operations and productivity.
Secure web browsing and file downloads
This session demonstrates how organizations can protect users from web-based threats during everyday browsing and file downloads. Participants will learn how web sessions and downloaded content can be controlled and inspected to reduce exposure to malicious websites, compromised files, and hidden threats, all without disrupting normal user workflows.
Do you know which vulnerable components your applications are built on?
Modern applications are built from numerous third-party and open-source components. This session highlights how hidden vulnerabilities in these components can impact application security and compliance. Participants will learn how to gain visibility into application composition and identify security risks throughout the software lifecycle, empowering organizations to take control over their application vulnerability.
Invisible. Unreachable. Secure.
This workshop focuses on reducing the attack surface by making critical services invisible and unreachable to unauthorized users. Participants will learn how to enforce strict access controls and minimize system exposure by default. The session demonstrates how limiting visibility and access at the network and service levels significantly reduces the risk of external attacks, lateral movement, and exploitation of unknown (0-day) vulnerabilities.
LOCATION
Terme Olimia
Zdraviliška Cesta 24
3254 Podčetrtek
Slovenia
Conference partners
TERA PARTNER

PARTNERS




















































