INFOSEK 2008 - Nova Gorica
22. - 23. 11. 2007
Read the past conference participants opinions.

Interesting, current, good selected topics. For the next time come with me, to avoid to feel sorry when I will be resuming its contents.

Mladen Terčelj, NLB d.d.
Konferenca INFOSEK

INFOSEK 2015 Conference
Secure Your World

Join us and connect to the world of Information Security through Slovenia! 

Okrogla miza
November, 18-20, 2018

Nova Gorica, hotel Perla


Join us for the thirteenth successful year of INFOSEK.

Come interact and learn with information security professionals from around the world about the latest trends, events and issues in information security and information risk management.

  • Meet and Interact with our world-class speakers
  • See leading products from vendors who can show you the latest technology and skills
  • Connect and collaborate with hundreds of other Information Security and Information Risk Management professionals from around the world.


Prometheus: Analyzing WebInject-based Information Stealers
Andrea Continella, Politecnico di Milano

Dev/Ops/Sec - Changing Security for the benefit of collaboration and speed
Daniel Blander, Techtonica

Closed-loop automation for preventing threats in IT environments
Jakub Jiricek, S4E CHS d.o.o.

How to manage evolving threats on evolving ICT assets across Enterprise
Marek Skalicky, Adria data d.o.o.

Be aware of your crown jewels and make sure they are well protected
Albin Penič, TREND MICRO

Laterally pwning Windows
Bojan Ždrnja, INFIGO IS d.o.o.

Monitor your company information after a Public Data Leak
David Calligaris, Emaze

IBM Security Intelligence Platform for Big Data
Rok Kosem in Sebastjan Štucl, IBM Slovenija, d.o.o.

Perfect fit: GRC and SOC
Mehrina Ahmed, Augmen Consulting and Jan Anisimowicz, C&F Sp. z o.o.

Towards ransomware-resilient operating systems
Andrea Continella, Politecnico di Milano

Evaluating Vulnerabilities - Doing it Better
Daniel Blander, Techtonica

The roll of Computer Incident Response Teams in National information security with focus on Montenegro case
Dusan Krkotic, Ministry for Information Society and Telecommunications, Montenegro

A Typical Approach for Pentesting a Vehicle (Part 1)
Sebastian Biehler, ERNW

Next Generation Digital Banking and Retail enabled with Secure Identities
Hila Meller, CA Technologies

A Typical Approach for Pentesting a Vehicle (Part 2)
Sebastian Biehler, ERNW

So You Want to be the CSO
Daniel Blander, Techtonica

Kerberos Golden Ticket
Toni Uranjek, HirtgenLog management techniques

Log management techniques
Dusan Krkotic, Ministry for Information Society and Telecommunications, Montenegro

Cyber-Secure Your Car
Tadej Vodopivec, Comtrade d.o.o.

App Ray - Balancing privacy with data connection
Zsolt Nemeth, Camphora Consulting

The Rise of Cyber Crimes
Per Sundbye, PwC Partner


Around the world in 7 business advices
Julien Coustaury, Fil Rouge Capital

Do you know where and when your data leaks?
Saša Jušić, Infigo IS d.o.o.
Your Network is compromised – Deal with it! Why is a SOC so important
Richard Nichols, RSA, The Security Division of EMC

Internet insurance in Slovenia
Jacob Westerlaken, Adriatic Slovenica d.d.

Dev/Ops - Lessons on Implementing Dev/Ops
Daniel Blander, Techtonica

Beyond Good Advice
Mehrina Ahmed, Augmen Consulting

Business Intelligence that every CIO must use to make purchasing and other decisions in the IT department
Indraneel Bardhan, EOS intelligence