Ta spletna stran hrani piškotke, da bi vam zagotovili boljšo uporabniško izkušnjo in popolno funkcionalnost te strani.
Analitične piškotke uporabljamo s storitvijo Google Analytics, samo z vašo privolitvijo.
Sprejemam
Zavrnitev
Več informacij
Pojdi na vsebino
NT konferenca
22. - 24. september 2025
Navigacija
Vpišite se
Vprašalniki
Spored
Poslovna mreža
NT konferenca
NT konferenca
NTK Posel
NTK Tehnologija
Novice
Poslovna mreža
Arhiv predavanj
Prijava
Individualna prijava
Skupinska prijava
Sponzorji
Postanite sponzor
Info
Nastanitev
Pogosta vprašanja
Podpora za uporabnike
Kontakt
English
Facebook
Twitter
LinkedIn
YouTube
Instagram
Vpišite se
E-naslov
Geslo
Zapomni si me
Registrirajte se
Pozabil/a sem geslo
Urnik
/ Defender
.NET Framework
Active Directory
ASP.NET
Azure IaaS
Azure PaaS
Azure Stack / Azure pack
Containers
Copilot
Defender
DevOps
Dynamics 365
Dynamics 365
EMS
Entra
Exchange Server
Fabric
GDPR
Github
HTML
Hyper-V
Infrastructure-As-Code
Linux
Microsoft 365
Office 365
OneDrive
Open Source
OpenAI
Power Apps
Power Automate
Power BI
PowerShell
Project
SharePoint
SQL Server
System Center
Teams
Visual Studio
Web development
Windows 10
Windows 11
Windows Server
Windows Store
Xamarin
Jasmin Azemović
Fortifying Software Projects: Neutralizing Security Incidents with Mitigation Steps
TECH
200
NSI
Miha Pihler
Microsoft Defender for Endpoint
TECH
300
HCL
Saša Kranjac
Your data in hands of Microsoft 365 Copilot
TECH
200
NSI
Nataša Klenovšek Arh
Share your bloody indicators!
TECH
100
NSI
Jakob Premrn
From Lures to Labyrinths: The Role of Deception in Modern Cyber Security
TECH
300
NSI
Jure Jereb
Do you PAW 2.0? Cloud edition
TECH, NETW
300
NSI
Nikola Begovic
·
Darko Vukovic
Securing the Future: Microsoft Copilot for Security & XDR Synergy
TECH
200
NSI
Jan Češčut
·
Matej Jagodic
Zaščita pred Adversary-in-the-Middle napadi: Kako se hitro in učinkovito izogniti neželenim posrednikom
TECH, NETW
300
NSI
Miha Pihler
·
Gregor Spagnolo
Varnostni incidenti na Slovenskem
TECH
200
SRV
Grzegorz Tworek
How I created 10 mln of viruses
TECH
200
NSI
Tomislav Poljak
Most common hacker techniques (MITRE ATT&CK) and safeguarding privileged identities
TECH
300
NSI
Tadej Bajc
·
Oliver Nikolić
Do more with Less! Microsoft Security.
TECH, NETW
200
NSI
Miha Pihler
·
Milan Gabor
Red vs Blue: Hekanje Microsoft PKI infrastrukture: Od gesel v svet certifikatov
TECH
300
NSI
Erik Blažica
Ali je Azure Arc prihodnost upravljanja on-premise okolja?
TECH, NETW
100
SRV
Nataša Klenovšek Arh
Is getting IOCs from malware analysis really that hard?
TECH
300
NSI
Milan Gabor
5 vstopnih točk v vašo domeno
TECH
300
NSI
Vlatko Ivanovski
Mastering DevOps Security with GitHub Advanced Security and Defender for DevOps
TECH
200
DOA