IT Security Conference

Terme Olimia, Slovenija

26.-28. January 2026

TICKETS

IT Security Conference

Terme Olimia, Slovenia

26. - 28. January 2026

TICKETS

About the conference

SecureD & Under Control


The focus is on real technical solutions that raise security to the required level in practice.
We demonstrate how technically functioning solutions ensure a security level that meets regulatory requirements.


When Theory Meets Practice: Cyber Compliance 2026
Compliance with NIS2, ZInfV-1, and DORA requires clear, technically feasible steps—not more theory.
At the SecureD & Under Control conference, we focus on solutions that demonstrably raise an organization’s security level in real environments. We don’t talk about concepts, but about architectures, controls, and technical procedures used daily by system engineers, architects, CISOs, and IT content managers.
The focus is on real technical solutions that practically raise security to the required level.
We will present examples where the right combination of security functions creates a stable infrastructure, clear visibility, and control over key risk points. Such solutions enable the establishment of concrete, verifiable controls essential for managing modern threats and meeting regulatory requirements.
The event is intended for organizations that want to ensure a higher level of resilience and compliance and want to understand how to actually achieve this in practice.
You will gain direct insight into what works in real environments, how different technologies can be aligned, and how to ensure stable, verifiable, and regulation-compliant operation of critical systems.
The focus is on practical results, real examples, and technical integrations.


SecureD & Under Control—the conference where theory finally meets practice.

Leading speakers from security industry - keynotes from well-known industry leaders.

Enjoy the atmoshpere explicitly tailored to let you grow and learn - enjoy exciting workshops, lectures, and round table discussions on topics relevant to your industry.

Real-world solutions - resolve and address problem with technology of trusted industry leaders.

Learn and develop - improve your knowledge and skills. New information, current standpoints or fresh insights.

Meaningful networking - go one-on-one with leading security IT managers professionals and specialists from the region and boost your network.

  • 2 full days of conference sessions
  • 2 delicious lunches
  • 1 exclusive dinner
  • 1 unforgettable party


158€


  • 1 day of in-depth technical workshops
  • 2 days of conference program
  • 2 delicious lunches
  • 2 exclusive dinners
  • 1 unforgettable party

220€


Program

More will be added as the Conference approaches, the Organizer reserves the rights to additional changes

January 26, Monday / Day 1 Workshops Track 1

12:30-13:00

Registration, Welcome, Snacks & Coffee

13:00-14:00 

Secure web browsing and file downloads

14:00-15:00 

Enabling Advanced Security Use Cases with Complete Network Visibility (for AI D&R or IDS)

15:15-17:00 

Preventing Malware Entry via USB and Email 

17:00-19:00 

Chillout time

19:00-21:00

Dinner and beer tasting

January 26, Monday / Day 1 Workshops Track 2

12:30-13:00

Registration, Welcome, Snacks & Coffee

13:00-15:00 

Catch the attacker with advanced protection – Live Capture the Flag Workshop

15:15-16:00 

Do you know which vulnerable components your applications are built on?

16:15-17:00 

Invisible. Unreachable. Secure.

17:00-19:00 

Chillout time

19:00-21:00 

Dinner and beer tasting

January 27, Tuesday / Day 2 Lectures

09:30-10:00

Registration, Welcome, Snacks & Coffee

10:00-10:20

Conference opening

Sebastjan Žiga Cof

Welcome speech

Andrej Golob

 Co.Next Vision: Secured, Compliant, and Operational  (SLO)

10:20-10:50 

NIL

Blaž Zupančič

Napredne varnostne funkcije v praksi: Prisma Access Browser kot orodje za regulativno skladnost (SLO)

10:55-11:25

_

Gregor Osterman

Kako smo vpeljali Tickwall in (pre)(za)živeli (SLO)

11:25-11:55

SRC

Luka Pecher

Prehod v SaaS: Izzivi in koristi migracije Palo Alto NGFW v Strata Cloud Manager (SLO)

11:55-13:35

Lunch

13:35-14:05

OPSWAT

Łukasz Okólski

Day of a life of a file – File Security in motion (ENG)

14:05-14:35

Smartis

Matevž Kuhelj

Celovita vidljivost v IT/OT okoljih z Garland packet brokerji, Darktrace AI in integracijo v SIEM (SLO)

14:35 - 15:05

AITONIX

Biljana Andreeva

SD-WAN Migration Project Overview | From Legacy Limitations to a Future-Ready Network (ENG)

15:05-15:25

Odmor za kavo

15:25 - 15:55

Arhides

Daniel Bednjički & David Sahernik

Nevidni napadi, vidni nadzor: MetaDefender Core in Kiosk v praksi (SLO)

15:55- 16:55

Panel Discussion | From Breach to Recovery (SLO)

Dr. Izidor Golob

Univerza v Mariboru

Ksenija Montani

Javni zavod Lekarna Ljubljana

Dejan Dolar

HSE

Pija Kapitanovič

panel moderator

16:55-19:00

Chillout time

19:00

Dinner & Party

January 27, Tuesday / Day 2 Demo room

10:00-17:00 

Demonstrations of solutions

January 28, Wednesday / Day 3 Lectures

09:00-09:30

Nodefusion

Hrvoje Kusulja

Microsoft Entra Conditional Access in Practice (ENG)

09:30-10:00 

SolarWinds


Dmytro Borovyk

Securing the Core: Observability-Led Incident Response (ENG)

10:05-10:35

Viris

Milan Gabor

Varnost aplikacij 360°: zakaj SAST in varnost skozi celoten razvoj presegata penetracijske teste (SLO)

10:40-11:10

Garland Technology

Neil Wilkins

Unlocking Knowledge: Insights Through Case Studies (ENG)

11:10-11:30

Coffee break

11:30-12:00 

Braineering

Marija Selak

Resilience Redefined | Disaster Avoidance – Old Idea, New Bling (ENG)

12:05-12:35 

Conscia

Tom Kern

Zaznava in samodejna zajezitev varnostnih incidentov s Cortex XSOAR (SLO)

12:40-13:10

PULSEC

Saša Bundalo

Continuous Threat Exposure Management - From Continuous Visibility to Regulatory Compliance (ENG)

13:15-13:45

Palo Alto Networks

Žan Črnivec

Compliance versus Security. Why not both? Replacing Legacy SIEM with the Cortex XSIAM Security Operations Platform (SLO)

13:45-15:00

Lunch

15:00

Goodbye

January 28, Wednesday/ Day 3 Demo room

10:00-15:00 

Demonstrations of solutions

Speakers

Luka Pecher

SRC d.o.o.

Gregor Osterman

_

Hrvoje Kusulja

Nodefusion

Neil Wilkins

Garland Technology

Blaž Zupančič

NIL

Tom Kern

Conscia

Marija Selak

Braineering

Andrej Golob

Co.Next

Srđan Vranjić

Co.Next

Pavle Petrović

Co.Next

Dmytro Borovyk

SolarWinds

Saša Bundalo

Pulsec

Łukasz Okólski

OPSWAT

Matevž Kuhelj

Smartis

Milan Gabor

Viris

Danijel Bednjički

Arhides

David Sahernik

Arhides

Biljana Andreeva

AITONIX

Žan Črnivec

Palo Alto Networks

Workshops

Catch the attacker with advanced protection – Live Capture the Flag Workshop


A Hands-on Capture the Flag workshop allows participants experience real-world attack scenarios and practice detection and response in a controlled environment. The focus is on identifying attacker behavior, correlating events across multiple data sources, and responding to incidents using advanced security capabilities designed for modern enterprise environments.


Enabling Advanced Security Use Cases with Complete Network Visibility (for AI D&R or IDS)


Effective AI-based detection and response depend on accurate and complete network data. This workshop shows why full network visibility is essential for identifying and responding to threats. Participants will explore how comprehensive access to network traffic—including both external (north–south) and internal (east–west) communication—enhances anomaly detection, behavioural analysis, and response accuracy. The session also demonstrates how forwarding internal traffic to next-generation firewalls uncovers blind spots within the network, ensuring intrusions are detected across all areas and maximizing overall threat visibility.


Preventing Malware Entry via USB and Email


Removable media and email attachments remain common attack vectors. This workshop covers practical strategies to inspect, sanitize, and control files before they reach internal systems or users. Participants will learn how to safely manage USB usage and validate email attachments, minimizing the risk of malware infection and data compromise while maintaining normal operations and productivity.


Secure web browsing and file downloads


This session demonstrates how organizations can protect users from web-based threats during everyday browsing and file downloads. Participants will learn how web sessions and downloaded content can be controlled and inspected to reduce exposure to malicious websites, compromised files, and hidden threats, all without disrupting normal user workflows.


Do you know which vulnerable components your applications are built on?


Modern applications are built from numerous third-party and open-source components. This session highlights how hidden vulnerabilities in these components can impact application security and compliance. Participants will learn how to gain visibility into application composition and identify security risks throughout the software lifecycle, empowering organizations to take control over their application vulnerability.


Invisible. Unreachable. Secure.


This workshop focuses on reducing the attack surface by making critical services invisible and unreachable to unauthorized users. Participants will learn how to enforce strict access controls and minimize system exposure by default. The session demonstrates how limiting visibility and access at the network and service levels significantly reduces the risk of external attacks, lateral movement, and exploitation of unknown (0-day) vulnerabilities.

LOCATION

 Terme Olimia

 Zdraviliška Cesta 24

 3254 Podčetrtek

 Slovenia


Conference partners

TERA PARTNER

PARTNERS