Hero image - People connected

PEOPLE ABOVE TECHNOLOGY

A conference that brings together leading experts in the field of security, focusing on people and their role in cyber security.
May 8-9, 2025
Vodice, Croatia
Hotel Imperial

Join us at the
S//:TOP conference

The "S//:TOP Conference - People Above Technology" will be organized by Konfa Media and Quattro5 Solutions, with media support from Zaštita, on May 8-9, 2025, at the "Imperial" Hotel in Vodice.

A CONFERENCE DIFFERENT FROM OTHERS

The S//:TOP conference is not just a place for learning – it is a platform for generating new ideas, connecting with industry leaders, and an opportunity to test your skills in real time.

Incognito logo
Hacking Challenges

Red and Blue Team face-off in a real-world environment

Workshop icon
Workshops and Lectures

Best practices, the latest technologies, and security challenges. Workshops for solution implementation.

Hackathon icon
Hackathon Live

Practical challenges and solutions for modern cyber threats

Expert icon
Top Experts

CISO/CSO - Lecture on Ethical and Unethical Hacking

Conference image
Shield with lock
Conference hall full of peopleVodice from abovePeople talking on conference
Unlock new opportunities: Connect, learn, and grow at
S//:TOP conference

Here, we don't just engage in mere conversations – we focus on innovation, creativity, and securing the future. This is a conference that brings together leading experts in the field of security, with a focus on people and their role in cybersecurity.

Networking icon
Networking
Connecting with leading industry experts
Lapotp icon
Learning
Gaining new knowledge and skills
Bulb icon
Inspiring
Insights into the latest trends and technologies
Progress report icon
Growing
Career development and professional growth
Innovations
Three Steps to Excellent Cyber Security
The three-step cyber security process focuses on fraud detection, preparation for cyber attacks, and incident response. By following these steps, organizations can enhance their defense and effectively manage crises.
Person preparing for cyber attack
Fraud Detection
How does technology help in detecting insurance fraud?
Hacker in front of laptop
Preparing for a Cyber Attack
Strategies and tactics for preventing and responding to a cyber attack
People in front of laptop
Incident Response
Examples of incident response and crisis management through communication
Shield with key

SCHEDULE

May 7th // Wednesday
Arrival and gathering (registration available until 7 PM).
16:00-17:00
Welcome Cocktail
CISO/CSO event - invitation only (but there's always someone who sneaks in without an invite).
May 8th // Thursday
9:00-10:00
Registration and Welcome
Participant check-in, catching up with colleagues you haven't seen in a while, distribution of promo packages
10:00 – 10:20
Conference opening ceremony
Opening speech by the organizer, starting with "I will be brief"
10:20 – 10:40
The key guest for whom many have come
TBD
10:40 – 11:00
1:1 conversation with hacker (if police don't caught him before)
11:00 – 11:30
Coffee and some baked goods
Vendor Workshops
Parallel to the 12-hour program in separate rooms, find out why, for example, Lidija Bačić is unfamiliar with XDR, EDR, SOAR, SIEM, email security, and
11:30 – 12:50
TOP Panel discussion (the shortest panel ever, after which most people head out of the hotel)
Experts from different industries (CSO-CISO) publicly discuss the situation of how NIS2/DORA has been adopted both here and there.
12:50 – 14:00
Time for lunch
14:00 – 14:20
Red VS Blue Team Lecture
The common language of Blue & Red Teams, where they diverge and why they don't get along
14:20 – 14:40
The CEO talks about investments in Security and why cost-cutting should not be an option in this area
15:00 – 15:30 (Room 1.)
Financial institutions - examples of money laundering and fraud prevention – A place where many might get an idea of how to do less work in life
15:00 – 15:30 (Room 2.)
Critical infrastructure protection - examples of best practices, Končar – HEP
16:00 – 17:00
Welcome coctail (if there are too many interested, we’ll add a non-alcoholic cocktail to the menu)
A memorable dinner at an unforgettable restaurant (fish, meat, whatever you prefer).
Party at the café – the first one to leave buys a round for everyone
May 9th // Friday
09:00 – 09:20
Double coffee after the party
09:20 – 10:20
Lecture – table top exercise for all participants (those who don't attend won't be able to register for the 2026 conference) – the host is the esteemed professor Morić
10:20 - 10:40
How industrial facilities are protected and why we protect them in the first place
Advanced Workshop
10:40 – 11:00
Another coffee so people don’t fall asleep
11:00 - 11:20
Lecture – This will be TOP (we saved it for the end so that everyone doesn't leave)
11:20 – 11:40
Expert lecture, because the others were considered unprofessional
12:00
Closing of the conference and another treat for the attendees
Dress code: More casual than business
Shield with lock
Practical solutions for real problems
Learn how financial institutions and the telecommunications industry protect themselves from cyber threats through practical solutions, and how they set standards and norms in building a resilient digital environment.
Shield icon
Defense against cyber threats
Practical workshops on protection from modern cyber threats
Dollar bills icon
Protection of financial institutions
Fighting fraud and protecting financial data
Progress report icon
Standards implementation
Workshops on the practical application of security standards
Old mobile phone icon
Security in the telecommunications industry
Protection of telecommunications infrastructure and customer data
Conference hall full of people
Hotel exterior image
Location
Hotel Imperial
Star iconStar iconStar icon
Location icon
Put Vatroslava Lisinskog 2
Hotel Imperial is located on the coast of the tourist town of Vodice, with its own pebble beach.
Parking icon
Parking
Pool icon
Pool
Wi-Fi icon
Wifi
We invite you to become part of conference
If you wish to join the conference or become a sponsor, please fill out the application form or order form provided in the links below.