Hero image - People connected

PEOPLE ABOVE TECHNOLOGY

A conference that brings together leading experts in the field of security, focusing on people and their role in cyber security.
May 8-9, 2025
Vodice, Croatia
Hotel Imperial

Join us at the
S//:TOP conference

The "S//:TOP Conference - People Above Technology" will be organized by Konfa Media and Quattro5 Solutions, with media support from Zaštita, on May 8-9, 2025, at the "Imperial" Hotel in Vodice.

A CONFERENCE DIFFERENT FROM OTHERS

The S//:TOP conference is not just a place for learning – it is a platform for generating new ideas, connecting with industry leaders, and an opportunity to test your skills in real time.

Incognito logo
Hacking Challenges

Red and Blue Team face-off in a real-world environment

Workshop icon
Workshops and Lectures

Best practices, the latest technologies, and security challenges. Workshops for solution implementation.

Hackathon icon
Hackathon Live

Practical challenges and solutions for modern cyber threats

Expert icon
Top Experts

CISO/CSO - Lecture on Ethical and Unethical Hacking

Conference image
Shield with lock
Conference hall full of peopleVodice from abovePeople talking on conference
Unlock new opportunities: Connect, learn, and grow at
S//:TOP conference

Here, we don't just engage in mere conversations – we focus on innovation, creativity, and securing the future. This is a conference that brings together leading experts in the field of security, with a focus on people and their role in cybersecurity.

Networking icon
Networking
Connecting with leading industry experts
Lapotp icon
Learning
Gaining new knowledge and skills
Bulb icon
Inspiring
Insights into the latest trends and technologies
Progress report icon
Growing
Career development and professional growth
Innovations
Three Steps to Excellent Cyber Security
The three-step cyber security process focuses on fraud detection, preparation for cyber attacks, and incident response. By following these steps, organizations can enhance their defense and effectively manage crises.
Person preparing for cyber attack
Fraud Detection
How does technology help in detecting insurance fraud?
Hacker in front of laptop
Preparing for a Cyber Attack
Strategies and tactics for preventing and responding to a cyber attack
People in front of laptop
Incident Response
Examples of incident response and crisis management through communication
Shield with key

SCHEDULE OF LECTURES

7th May // Wednesday
Arrival and gathering (possible registration until 7 PM).
CISO/CSO event - by invitation only
8th May // Thursday
09:00 – 09:30
Registration and Sign-in
09:30 – 09:40
Conference Opening
09:40 – 10:00
Brigadier Daor Dabo, Commander of the Cyber Space Command (ZzKP), Ministry of Defence
10:20 – 10:40
1:1 conversation with a hacker
10:40 – 11:00
Zlatan Morić, Algebra
Preparation for the tabletop exercise for all participants
11:00 – 11:30
Coffee break
11:30 – 12:10
TOP Panel discussion: Hybrid Geopolitical Challenges
Experts from different industries - Europe's dependence on American and Israeli security solutions
12:10 – 12:30
Olympic gold (Barbara Matić and Petar Metličić)
1:1 conversation
12:30 – 12:45
The Godfather Bojan Ždrnja, Infigo IS
12:45 – 13:05
Rob Janssens, Hikvision Europe
From Reactive to Proactive: Transforming Security Approaches
13:05 – 14:05
Lunch
14:05 – 14:20
Dorić and Čerkez, ATO Engineering and Končar Digital
How industrial plants are protected and why we protect them
14:20 – 14:40
Andrej Anđelić, Rubrik
Cyber resilience as the key to financial security
14:40 – 15:00
Stellar Cyber
Solutions in one box
15:00 – 15:20
Paul Franka, Delinea
PAM, BAM, BAM, It’s done!
15:20 – 16:00
Panel discussion
CSO challenges (top CSOs)
20:00
Dinner: Konoba Imperial Hotel
9th May // Friday
09:30 – 10:10
Zlatan Morić, Algebra
Lecture – table top exercise for all participants
10:20 – 10:30
Davor Hrestak, Ministry of Internal Affairs of the Republic of Croatia
Cyberattacks - the weakest link
10:30 – 10:50
Quattro5Solutions
What good is protection when your supplier is leaky – local solution
10:50 – 11:20
Coffee break
11:20 – 11:50
Sven Škrgatić vs Milan Parat
Do sectors even collaborate?
11:50 – 12:10
CREAPLUS
How AI and automation shape security strategies
12:10 – 12:30
Expert lecture - Ante Knezović and Jelena Tomuliča
Guarding Platform/MySecuritas app
12:30 – 12:50
Coro
12:50
Conference Closing and Lunch
Dress code: More casual than business
Shield with lock
Practical solutions for real problems
Learn how financial institutions and the telecommunications industry protect themselves from cyber threats through practical solutions, and how they set standards and norms in building a resilient digital environment.
Shield icon
Defense against cyber threats
Practical workshops on protection from modern cyber threats
Dollar bills icon
Protection of financial institutions
Fighting fraud and protecting financial data
Progress report icon
Standards implementation
Workshops on the practical application of security standards
Old mobile phone icon
Security in the telecommunications industry
Protection of telecommunications infrastructure and customer data
Conference hall full of people
Hotel exterior image
Location
Hotel Imperial
Star iconStar iconStar icon
Location icon
Put Vatroslava Lisinskog 2
Hotel Imperial is located on the coast of the tourist town of Vodice, with its own pebble beach.
Parking icon
Parking
Pool icon
Pool
Wi-Fi icon
Wifi
We invite you to become part of conference
If you wish to join the conference or become a sponsor, please fill out the application form or order form provided in the links below.