Co.Next Day with the leading theme Data Center and Perimeter Security

Co.Next Day II, second exclusive event in a row, this time with the leading theme Data Center and Perimeter Security will be held on November 7, 2023, between 10:00 and 14:00  at the Cubo Golf Smlednik venue. Our  vendors will gather on the sunny side of the Alps to present their latest services and products, competitive advantages, and applicability that helps protect and manage your operations and business.

We’ll enjoy the company of some renowned vendors such as: Palo Alto Networks, Micro Focus, Sycope, Skybox Security, and Garland Technology.

Join us to learn about their solutions and listen as they address the following questions and issues:

• How to maximize protection by combining Data Center Security and Perimeter Security?
• How to stop unknown and never-before seen attacks?
• How to gain complete control over network security?
• How to identify vulnerabilities?
• How to understand what’s happening in your network at all times?
• How to make authentication work for your business?

Take advantage of what Co.Next Day II holds for you, learn about new information, and find the solutions that will work for you and your organization.



10:00-10:30  |  Initial stretching of laughing muscles
Tin Vodopivec

10:30-11:00  |  Co.Next opening speech: DC Security vs Perimeter Security

Data Center security safeguards critical data, applications, and infrastructure within a centralized facility. It employs a multi-layered approach, including biometric access control, surveillance, and advanced firewalls. In contrast, perimeter security emphasizes protecting the network’s boundaries, relying on firewalls and intrusion detection systems.

DC security offers comprehensive protection within the facility, while Perimeter Security guards against external threats. They are both essential but differ in scope. To maximize protection, combining both strategies is crucial for every organization to create a strong defense against insider and outsider threats in an ever-evolving landscape of cyberattacks.

Sebastjan Žiga Cof, Managing Director of Co.Next d.o.o.

11:00-11:30  |  PANW: How to stop and address rising newly – never seen before attacks?

In the last few years, trends in cybersecurity have changed, and due to a variety of reasons, we can see the rise of new attacks that easily evade traditional cybersecurity solutions and cause organizations to become compromised. Stopping unknown never seen before attacks should be the main focus of each organization. The presentation will give us an insight into how Palo Alto Networks is creating and implementing new methods to prevent these types of attacks.

Vedran Franjić, Cybersecurity Engineer at Palo Alto Networks

11:30-12:00  |  Sycope: See The Invisible: Gaining Full Control Over Your Network Security

Having firewalls and antivirus systems in the infrastructure is a matter of course. However, they do not give complete control over network security. The firewall does not monitor all network traffic, and the antivirus system, for obvious reasons, will not protect printers or other devices that are not workstations or servers. So, how do you get an insight into what is happening in the corporate IT environment?

During this presentation, you will learn what devices are used to get complete control over network traffic, how to collect and analyze this data, and how to detect threats based on artifacts left in network traffic by malware.

Piotr Kałuża, Solution Architect at Sycope

12:00-12:30  |  Coffee break

12:30-13:00  |  Skybox Security: Vulnerability is like a tax, everyone has it

Identifying vulnerabilities in IT infrastructure is crucial for maintaining robust cybersecurity. Prioritization ensures that critical vulnerabilities are addressed promptly, reducing the risk of breaches. This approach prevents potential exploitation and data breaches, safeguarding sensitive information and maintaining the integrity and reliability of the entire IT ecosystem.

How to identify vulnerabilities and how to address them promptly will be presented by
Srdjan Vranić, Technical Director at Co.Next d.o.o.

13:00-13:30  |  Garland Technology: Visibility into OT and IT networks

While operational technology controls equipment, information technology controls data, and the lecture will provide you with an insight on how to have a clear understanding of what’s happening in your network at all times from a Garland Technology company representative, who is an industry leader in IT and OT network solutions for enterprises, critical infrastructures, and government agencies worldwide.

Neil Wilkins, Technical Director for EMEA at Garland Technology

13:30-14:00  |  Micro Focus: Making Authentication Work For Your Business

If you were spending hours on education to find out which are the latest innovations in authentication with specific use cases, take advantage of this lecture.

Andrej Bruketa, Business Development Manager at Micro Focus

14:00-16:00  |  Lunch and Networking



Take advantage of what the Co.Next Day II holds for you, learn about new information, and find the solutions that will work for you and your organization.

Reserve your seat today!