
RoglIT26 will take place in Thermana Laško, a venue that combines modern infrastructure and natural beauty. Thermana Laško on the banks of the Savinja River offers top-class facilities and comfort, creating the perfect setting for a rich conference experience for RoglIT26 participants.

Roglit26 Conference Agenda
CEO Speech
Keynote speech: Miha Mazzini
Guests: Ms. Tamara Slapar (Assistant Director of Information Technology and Telecommunications, Eles), Ms. Maja Požar Andrejašič (Director of REC), Mr. Tomaž Pihlar (IT Director, Akrapovič), Mr. Robert Sraka (Member of the Management Board, BigBang), Mr. Aleš Vičič (business and sports psychologist)
Moderator: Vladimir Djurdjič
Presentation of the new Chaty platform, an enterprise chatbot solution. The content covers the possibilities of using AI agents and chatbots in companies for workflow automation, customer support, and internal employee assistance. Includes a demo of Chaty usage in various scenarios (e.g., IT service helpdesk, HR assistant, support call center).
The lecture addresses key security risks of generative artificial intelligence and demonstrates the practical application of the Check Point Lakera solution for protecting AI applications in a real-world environment.
The presentation summarizes how local and hybrid cloud architectures enable data control, regulatory compliance, and safe deployment of AI workloads. The focus is on properly designed infrastructure, platform maturity, and human expertise as the foundation of operational independence and long-term security.
How AI solves challenges in transport and logistics. Examples include demand forecasting, vehicle route optimization, real-time inventory management, and the use of machine learning to improve supply chain efficiency. Emphasis is placed on the results of pilot projects with clients in the logistics industry.
Lenovo Hybrid AI offers pre-configured infrastructure solutions designed to simplify and accelerate the deployment of artificial intelligence in companies and organizations. Verified configurations, including servers, storage systems, GPUs, and network equipment, are designed to adapt to various needs, meaning we are talking about fully flexible solutions.
A lecture on how a corporate SOC (Security Operations Center) uses artificial intelligence for better defense against threats. It will be explained how machine learning and AI tools help in detecting security incidents, event correlation, and faster response to attacks. The speaker will share experiences with implementing AI tools for anomaly detection, automated alert analysis, and response orchestration. (Security operations centers are increasingly adopting AI solutions to improve threat detection, speed up incident investigations, and automate responses.)
A guest lecture by a partner specializing in contact center solutions. It focuses on how AI conversational bots and voice technologies improve customer support. The speaker presents examples of implementing virtual assistants in call centers, automatic speech recognition for call analysis, and omnichannel support (integration of chat, email, and phone with AI). He will discuss the effects: shorter response times, 24/7 support, cost reduction, and more satisfied users.
IBM Storage Defender ensures comprehensive protection and data resilience against security threats in modern hybrid IT environments. Using artificial intelligence, it enables proactive threat detection and rapid data recovery from verified healthy backups. The solution combines advanced detection methods and includes multi-layered protection such as immutable snapshots, air-gap copies, encryption, and a secure environment for verification and forensic analysis. The platform uses advanced AI and ML algorithms for faster anomaly detection including zero-day attacks and allows integration with Security Operations Centers and SIEM tools. Option to copy data to a remote Pro.Cloud location and implement a DR location for fast and reliable business recovery in case of outages or cyber incidents.
A lecture on how IoT and AI together drive smart factories. The speaker presents examples of deploying sensors and connected devices in production halls and using AI to optimize production processes (e.g., adjusting machine parameters in real-time based on data). Special emphasis will be on predictive maintenance: how AI can analyze sensor data to predict failures and equipment maintenance before downtime occurs. (With artificial intelligence, manufacturers have access to exactly such a proactive approach – a network of sensors and AI together predict service needs and thus prevent stoppages.)
Innovations in the field of ERP solutions (SAP) and the integration of AI into business processes. The discussion will cover the transition to SAP S/4HANA and how built-in AI/ML capabilities (e.g., predictive analytics, intelligent process automation in finance, procurement, etc.) bring more efficient operations. The speaker also presents examples of using chatbots and AI assistants within ERP (e.g., for user support or automatic execution of routine tasks in the system).
FortiDLP is a modern solution for preventing data leakage and managing internal risks, using artificial intelligence to provide immediate insight into the use and flow of sensitive data. The solution detects risky user behaviors in real-time, prevents accidental or malicious data exfiltration, and protects data on endpoints, in SaaS applications, cloud storage, and GenAI tools – without complex initial settings and static policies.
The next step in your data center represents a modern network architecture that enables greater dynamism for your business, security, and data center scalability. Cisco EVPN VXLAN simplifies network management, enables clear segmentation, and ensures high availability for modern applications and cloud services.
A concluding specialized lecture that looks broadly at the impact of AI on jobs and processes. The speaker discusses how AI tools take over routine and repetitive tasks (e.g., data entry, basic communication with customers) and how this frees up time for employees for more creative tasks. It also touches on the topic of culture in the AI era – how a company prepares employees for collaboration with AI tools, the need for new skills, and the importance of the human+AI combination in decision making.
Cisco ISE enables centralized access control that shows exactly who and what is on the network - down to the device type and its status. Regardless of how the user connects, via wire, wireless, or VPN, Cisco ISE will enforce a unified security policy. Cisco ISE is the foundation for zero trust and strengthens security, ensures visibility, and answers the eternal question: who is connected to my network and what security policy is in effect for them.
EDR in on-prem environments often does not give the full picture, so »invisible« services and lateral movement can remain out of focus, creating blind spots in detection and response. The lecture will present the architecture of the Trend Micro NDR solution in combination with XDR and show how network telemetry improves correlation and adds useful context. A practical example will also be presented, which is useful for both smaller companies and larger organizations.
A comprehensive overview of how companies approach risk management when introducing AI and cloud services. Covered topics include AI governance (management of AI algorithms, data control), ensuring compliance with upcoming EU regulations (AI Act), cyber risk management, and the importance of educating employees on the safe use of AI tools. The speaker emphasizes that due to new AI tools, proper risk management has become a priority for company leadership. They also describe how the company helps its clients establish safeguards (e.g., data access policies, verification of AI model outputs, security audits) for the safe use of artificial intelligence in business.
The lecture offers practical insight into how SAP is leveraging AI and embedding it across its portfolio. Concrete examples will show how AI supports business processes, improves decision-making, automates routine tasks, and brings greater efficiency and transparency to users. AI is also providing unified conversational User Interface across its portfolio increasing productivity and simplifying adoption. Focus will be on real-world use scenarios, and the added value AI brings to companies in everyday operations – no theory, with an emphasis on practice.
We will take a detailed look at various levels of web application protection with the Citrix Netscaler solution, which has become completely free for smaller users. We will present functionalities such as L7-DDOS, WAF, BOT, and other security solutions that offer superior defense against known and (as yet) unknown attacks.
Artificial intelligence opens up great opportunities but also brings questions: how to use LLM models while maintaining data security, low latency, and compliance? In this lecture, we show how to build a sovereign AI platform on your own equipment using Red Hat OpenShift. We will touch on why containerization is key for portability and reliable orchestration of AI workflows. The focus will be on practice: efficient use of hardware resources and CI/CD pipelines that connect development and production. The result: cloud agility – inside your data center and under total control over data.
Immutable backup in Veeam v13 places backup at the center of the IT environment's security architecture. Data cyber-resilience is no longer an add-on, but the default standard.
Boštjan Petelin, Igor Hostnik
With our experts (by prior appointment).











RoglIT26 will take place in Thermana Laško, a venue that combines modern infrastructure and natural beauty. Thermana Laško on the banks of the Savinja River offers top-class facilities and comfort, creating the perfect setting for a rich conference experience for RoglIT26 participants.

Roglit26 Conference Agenda
CEO Speech
Keynote speech: Miha Mazzini
Guests: Ms. Tamara Slapar (Assistant Director of Information Technology and Telecommunications, Eles), Ms. Maja Požar Andrejašič (Director of REC), Mr. Tomaž Pihlar (IT Director, Akrapovič), Mr. Robert Sraka (Member of the Management Board, BigBang), Mr. Aleš Vičič (business and sports psychologist)
Moderator: Vladimir Djurdjič
Presentation of the new Chaty platform, an enterprise chatbot solution. The content covers the possibilities of using AI agents and chatbots in companies for workflow automation, customer support, and internal employee assistance. Includes a demo of Chaty usage in various scenarios (e.g., IT service helpdesk, HR assistant, support call center).
The lecture addresses key security risks of generative artificial intelligence and demonstrates the practical application of the Check Point Lakera solution for protecting AI applications in a real-world environment.
The presentation summarizes how local and hybrid cloud architectures enable data control, regulatory compliance, and safe deployment of AI workloads. The focus is on properly designed infrastructure, platform maturity, and human expertise as the foundation of operational independence and long-term security.
How AI solves challenges in transport and logistics. Examples include demand forecasting, vehicle route optimization, real-time inventory management, and the use of machine learning to improve supply chain efficiency. Emphasis is placed on the results of pilot projects with clients in the logistics industry.
Lenovo Hybrid AI offers pre-configured infrastructure solutions designed to simplify and accelerate the deployment of artificial intelligence in companies and organizations. Verified configurations, including servers, storage systems, GPUs, and network equipment, are designed to adapt to various needs, meaning we are talking about fully flexible solutions.
A lecture on how a corporate SOC (Security Operations Center) uses artificial intelligence for better defense against threats. It will be explained how machine learning and AI tools help in detecting security incidents, event correlation, and faster response to attacks. The speaker will share experiences with implementing AI tools for anomaly detection, automated alert analysis, and response orchestration. (Security operations centers are increasingly adopting AI solutions to improve threat detection, speed up incident investigations, and automate responses.)
A guest lecture by a partner specializing in contact center solutions. It focuses on how AI conversational bots and voice technologies improve customer support. The speaker presents examples of implementing virtual assistants in call centers, automatic speech recognition for call analysis, and omnichannel support (integration of chat, email, and phone with AI). He will discuss the effects: shorter response times, 24/7 support, cost reduction, and more satisfied users.
IBM Storage Defender ensures comprehensive protection and data resilience against security threats in modern hybrid IT environments. Using artificial intelligence, it enables proactive threat detection and rapid data recovery from verified healthy backups. The solution combines advanced detection methods and includes multi-layered protection such as immutable snapshots, air-gap copies, encryption, and a secure environment for verification and forensic analysis. The platform uses advanced AI and ML algorithms for faster anomaly detection including zero-day attacks and allows integration with Security Operations Centers and SIEM tools. Option to copy data to a remote Pro.Cloud location and implement a DR location for fast and reliable business recovery in case of outages or cyber incidents.
A lecture on how IoT and AI together drive smart factories. The speaker presents examples of deploying sensors and connected devices in production halls and using AI to optimize production processes (e.g., adjusting machine parameters in real-time based on data). Special emphasis will be on predictive maintenance: how AI can analyze sensor data to predict failures and equipment maintenance before downtime occurs. (With artificial intelligence, manufacturers have access to exactly such a proactive approach – a network of sensors and AI together predict service needs and thus prevent stoppages.)
Innovations in the field of ERP solutions (SAP) and the integration of AI into business processes. The discussion will cover the transition to SAP S/4HANA and how built-in AI/ML capabilities (e.g., predictive analytics, intelligent process automation in finance, procurement, etc.) bring more efficient operations. The speaker also presents examples of using chatbots and AI assistants within ERP (e.g., for user support or automatic execution of routine tasks in the system).
FortiDLP is a modern solution for preventing data leakage and managing internal risks, using artificial intelligence to provide immediate insight into the use and flow of sensitive data. The solution detects risky user behaviors in real-time, prevents accidental or malicious data exfiltration, and protects data on endpoints, in SaaS applications, cloud storage, and GenAI tools – without complex initial settings and static policies.
The next step in your data center represents a modern network architecture that enables greater dynamism for your business, security, and data center scalability. Cisco EVPN VXLAN simplifies network management, enables clear segmentation, and ensures high availability for modern applications and cloud services.
A concluding specialized lecture that looks broadly at the impact of AI on jobs and processes. The speaker discusses how AI tools take over routine and repetitive tasks (e.g., data entry, basic communication with customers) and how this frees up time for employees for more creative tasks. It also touches on the topic of culture in the AI era – how a company prepares employees for collaboration with AI tools, the need for new skills, and the importance of the human+AI combination in decision making.
Cisco ISE enables centralized access control that shows exactly who and what is on the network - down to the device type and its status. Regardless of how the user connects, via wire, wireless, or VPN, Cisco ISE will enforce a unified security policy. Cisco ISE is the foundation for zero trust and strengthens security, ensures visibility, and answers the eternal question: who is connected to my network and what security policy is in effect for them.
EDR in on-prem environments often does not give the full picture, so »invisible« services and lateral movement can remain out of focus, creating blind spots in detection and response. The lecture will present the architecture of the Trend Micro NDR solution in combination with XDR and show how network telemetry improves correlation and adds useful context. A practical example will also be presented, which is useful for both smaller companies and larger organizations.
A comprehensive overview of how companies approach risk management when introducing AI and cloud services. Covered topics include AI governance (management of AI algorithms, data control), ensuring compliance with upcoming EU regulations (AI Act), cyber risk management, and the importance of educating employees on the safe use of AI tools. The speaker emphasizes that due to new AI tools, proper risk management has become a priority for company leadership. They also describe how the company helps its clients establish safeguards (e.g., data access policies, verification of AI model outputs, security audits) for the safe use of artificial intelligence in business.
The lecture offers practical insight into how SAP is leveraging AI and embedding it across its portfolio. Concrete examples will show how AI supports business processes, improves decision-making, automates routine tasks, and brings greater efficiency and transparency to users. AI is also providing unified conversational User Interface across its portfolio increasing productivity and simplifying adoption. Focus will be on real-world use scenarios, and the added value AI brings to companies in everyday operations – no theory, with an emphasis on practice.
We will take a detailed look at various levels of web application protection with the Citrix Netscaler solution, which has become completely free for smaller users. We will present functionalities such as L7-DDOS, WAF, BOT, and other security solutions that offer superior defense against known and (as yet) unknown attacks.
Artificial intelligence opens up great opportunities but also brings questions: how to use LLM models while maintaining data security, low latency, and compliance? In this lecture, we show how to build a sovereign AI platform on your own equipment using Red Hat OpenShift. We will touch on why containerization is key for portability and reliable orchestration of AI workflows. The focus will be on practice: efficient use of hardware resources and CI/CD pipelines that connect development and production. The result: cloud agility – inside your data center and under total control over data.
Immutable backup in Veeam v13 places backup at the center of the IT environment's security architecture. Data cyber-resilience is no longer an add-on, but the default standard.
Boštjan Petelin, Igor Hostnik
With our experts (by prior appointment).









