Get to know the technologies and innovative solutions that shape the future
- Cyber Security
- Network Security
- Cloud Security
- Disaster Recovery & Business Continuity
- Data Security
- App Security
- Endpoint Security
- Identity and Access Management
- Cloud Services
- Cloud Platforms
- Cloud Computing
- Cloud Infrastructure
- Hybrid and Multi-Cloud Architecture
- Edge Computing and Cloud Integration
- Cloud-Native Architecture and Microservices
- Serverless Computing
- AI
- Deep Learning
- Computer Vision
- Natural Language Processing
- Generative AI and LLMs
- AI Ethics and Responsible AI
- AI in Edge Computing
- AI-Powered Cybersecurity
- Explainable AI (XAI) and Interpretable Models
Join us at TechHosted11
Over the past decade, TechHosted has gathered more than 164 speakers–top experts willing to share their extensive knowledge and perspectives with our participants.
Besides being a hub for experts from leading IT companies and the business community, TechHosted is a place where you can get the latest information from the IT industry. TechHosted11 addresses important new topics that shape today's world and brings new keynote speakers.
Keynote speakers 2025
Srđan Krčo
Co-founder/CEO of DunavNETSrđan Krčo is an entrepreneur, innovator, and scientist. From the start of his career at the Faculty of Technical Sciences (FTN) in Novi Sad until today, he has had one foot in the business world and the other in academia.
Find out more
Goran Obradović
Director of Business Development, ORION TelekomGoran Obradović is a seasoned executive and AI strategist with more than 25 years of leadership experience across ICT, telecommunications, media, life sciences, and manufacturing.
Find out moreagenda
techhosted11
Led by ideas inspired by Tech
01.10.2025.
Registration & Coffee
Opening remarks
Keynote - AI is getting into everything
AI is getting into everything these days, from office operations and business analytics to customer support, smart cities, and even agriculture. We all want it to work perfectly—solving every problem we can think of (and some we can't) at a friendly price.
Through the experiences of DunavNET, from the first production chatbot we launched just a few months after ChatGPT appeared, to projects in agriculture, urban environments, and scientific research, we'll share what really works, what doesn't, and why. This will be a candid, first-hand look at the line between the big promises of AI and its real-world results.
Fortinet Now!
After 25 successful years since it was founded, Fortinet firmly grew to global leader in cyber security products and solutions, and also as brand widely recognized in helping organizations and companies worldwide to strengthen their safety and security in time of digital transformation, where it is recognized as most trusted vendor.
During the presentation, current position, vision and roadmap of future Fortinet development as cyber-security global leader will be reviewed and why Fortinet is number one choice in almost all industry verticals.
Tackling new Data Protection Law challenges with Fortinet
Bosnia and Herzegovina adopted a new Data Protection Law in 2025, aligning its data protection framework with the EU's General Data Protection Regulation (GDPR). In this presentation the focus will be on real life use cases and mapping different security products to new Data Protection Law. Although, full compliance to the new law is a long process requiring a lot of effort from both legal, management, security and IT teams, this presentation will show how companies can leverage Fortinet’s experience and products to overcome IT security compliance challenges. FortiDLP, FortiSIEM and FortiSOAR will be the focus of this presentations but many other products can be used to help companies achieve the full Data Protection Law compliance so feel free to challenge and ask questions during the Q&A part of the presentation.
Cisco Secure Firewall – Enhancing Operational Efficiency and Security
With threats becoming more sophisticated, applications growing increasingly complex, and management surpassing human scale, traditional firewalling methods are no longer enough. Hybrid Mesh Firewall solution goes beyond conventional approaches, unifying environments and integrating fine-grained security controls to protect applications wherever they reside. Prepare for disruption in NGFW market with distributed Firewalls.
Coffee break & Snack break
HPE Virtualization - Your Freedom to Choose
HPE VM Essentials is a software package that helps small and medium-sized businesses streamline virtualization and private cloud, with predictable costs. The package allows for centralized management, security, and scalability, reducing the risk of unplanned expenses and optimizing resource utilization for greater efficiency and IT budget control.
Challenges in Managing Remote Privileged Access – BeyondTrust PRA Solution
Managing Remote Privileged Access – How to overcome lack of visibility, user resistance, complexity, and facilitate integration with diverse environments. How to address account management, prevent excessive privilege assignment during remote access by external collaborators and employees, without using VPN. BeyondTrust approach and Privileged Remote Access capabilities.
Coffee break
AI-Powered protection for all users, apps, and devices
The recent rise in challenges that organizations face in securing internet and application access for a distributed, hybrid workforce while undergoing a digital transformation journey has exposed the shortcomings in existing technologies.
Today, you use a VPN for your internal applications or connect directly to the internal network and then go through an MPLS or VPN network to reach often critical applications located in the cloud. In fact, even your data in your public cloud is often connected via a dedicated link. But in the world of Zscaler, users can only access the specific applications they need for their work, and only those applications.
The presentation will introduce a central management system that optimally connects an authenticated user exclusively with the resource or application they have the right to access. It includes strict security checks at the highest level, some of which are patented by Clico, to prevent system compromise and potential data loss.
Lenovo in the AI world
Lenovo is a leading global technology company that's making big investments in artificial intelligence (AI). We create smart servers, data centers, and personal computers with built-in AI support. We also partner with companies like NVIDIA and Intel to make sure our AI capabilities are optimized.
Our ThinkSystem and ThinkEdge servers are designed to handle demanding tasks like machine learning, computer vision, and big data analysis. We provide AI solutions for various industries, including healthcare, finance, manufacturing, and education, to help businesses boost efficiency, security, and sustainability.
Our goal is to use AI to create smarter technology for everyone.
Quiz & Rewards
Lunch, Networking & Cocktails
TechHosted11 party – Powered by LENOVO
techhosted11
Led by ideas inspired by Tech
02.10.2025.
Registration & Coffee
Day 2 introduction
The Human–AI Partnership: Redefining Leadership in the Age of Artificial Intelligence
AI is not replacing leaders — it is reshaping leadership itself. This keynote explores how the partnership between human creativity and machine intelligence is transforming decision-making, culture, and the very definition of leadership.
Kaspersky Next XDR Optimum: cutting-edge cybersecurity solution
Kaspersky Next XDR Optimum is a new addition to Kaspersky Next, Kaspersky’s flagship product line for businesses of all sizes. This new solution is suitable predominantly for small and medium-sized companies with established IT infrastructure and moderate cybersecurity budgets which are often managed by larger IT teams or small security units. This solution offers comprehensive, manageable protection backed by AI and world leading expertise. In addition to robust endpoint security and automatic threat response, Kaspersky Next XDR Optimum delivers affordable, user-friendly detection and response tools that effectively identify, analyze, and neutralize evasive threats, with flexible deployment options for both cloud and on-premise environments.
Journey to zero-trust security with Cisco
Zero Trust is a widely discussed security concept today. It means that all users and their devices, including those within an organization in the so-called "trusted" segment of the information system, must undergo appropriate, continuous security verification and inspection. This involves proper authentication, authorization, and advanced security checks before and after granting controlled access to the corporate data network, server/storage infrastructure, as well as business files or applications.
Would you like to learn more about the basic principles of the Cisco Zero Trust model, the advanced Cisco Secure technologies that shape a modern ZT environment, and the philosophy of a layered approach to cybersecurity through various Cisco Secure integrations? Don't miss this opportunity!
Coffee break & Snack Break
Navigating the AI-Powered Cybersecurity Frontier: Emerging Trends and Palo Alto Networks` Response
This presentation explores the rise of AI-powered cyber threats—from deepfakes to intent-driven attacks—and the industry’s shift toward unified security platforms, XDR, and quantum readiness. It highlights how Palo Alto Networks addresses these challenges through an AI-driven platform strategy, strategic acquisitions like CyberArk and Protect AI, secure browser adoption, OT security innovations, and quantum-resilient roadmaps. By integrating identity, cloud, and network defense into a single ecosystem, Palo Alto Networks is redefining cybersecurity to provide stronger visibility, faster response, and future-proof resilience in an AI-driven threat landscape.
One Size Doesn't Fit All: Choosing Your Virtualization Platform
The virtualization vendor market is in motion, with many acquisitions and numerous changes in implementation approaches, licensing models, and a variety of “new” offerings entering the market. It seems that many users of IT infrastructure perceive this period as a time for change, or at least for a thorough analysis of the current state and a restructuring of their own architecture.
Fsas Technologies can help you reshape your virtual infrastructure. Our broad portfolio puts us in a position to provide you with unbiased advice and co-create a solution that perfectly fits the needs of your organization.
We help you to:
- Understand which modern technologies and solutions are available, and how they enable you to think and/or act differently
- Gain insights into the latest developments regarding best practices and technology options
- Design an effective virtualization architecture and then select the right mix of products to implement it.
Protection without compromise: Synology’s complete data security solutions
Introducing Synology’s data security solutions – from small and medium businesses to enterprises and data centers. Our unique operating system that supports backup and storage devices provides ease of use, flexibility to grow with your business, and reliable performance for distributed teams. With integrated artificial intelligence, Synology enables maximum productivity and a secure future for your IT infrastructure.
Coffee break
Keep Your Data Safe & Achieve Cyber Resilience
The goal of the lecture is to explain Commvault view on the modern risks related to your data and business continuity. Besides that, it will be explained what the Commvault approach is how to tackle issues with data and application protection and how to achieve maximum resilience in case of cyber-attacks. In modern world, cyber resilience is more than just creation of additional copies of data.
Accelerate your AI innovation with Dell solutions
Discover how Dell’s comprehensive AI solutions empower organizations to accelerate innovation and realize business outcomes with the Dell AI Factory. The presentation highlights Dell PowerEdge servers as a foundation for AI adoption, enabling high-performance, scalable, and energy-efficient infrastructure across on-premises, cloud, and edge environments. PowerEdge servers support demanding AI workloads, from inferencing to fine-tuning and data processing, delivering significant cost savings compared to public cloud and efficient integration with leading technologies like NVIDIA GPUs. With validated designs, sustainability, and security at the forefront, Dell ensures your organization can confidently operationalize AI and drive transformative value.
Quiz & Rewards
Lunch, Networking & Cocktails
techhosted11
Led by ideas inspired by Tech
03.10.2025.
Registration & Coffee
Day 3 Workshops introduction
TechHosted11 Workshops
At TechHosted11, certified experts from the most renowned IT companies share knowledge that will elevate your technical and business skills.
1 workshop
03.10.2025.
Učionica 1Fortinet: Fortinet Advanced Analytics
2 workshop
03.10.2025.
Učionica 2Cisco: Cisco Secure Access – Capture The Flag
3 workshop
03.10.2025.
Učionica 2Palo Alto: Meet Prisma Access Browser
4 workshop
03.10.2025.
Učionica 1Fortinet: Application Delivery Without Limits
5 workshop
03.10.2025.
Učionica 2HPE: HPE Morpheus VM Essentials
6 workshop
03.10.2025.
Kaspersky: Kaspersky MDR Deep Dive
Before
the conference
01 - 03 October 2025.
Veljka Mlađenovića bb, Lanaco Technological Center, Banja Luka, Bosnia and Herzegovina
IT managers, technology enthusiasts, and technology entrepreneurs looking for information on innovations, trends and technologies
Lectures will be held in English and Serbian
During
the conference
On conference day, remember to bring the QR code you received by email during registration.
Parking will be provided for all participants in front of TC Lanaco..
Please always keep your accreditations visible.
Take a short break between lectures and have coffee and tasty snacks. Use the breaks to get to know other conference participants.
Connect with speakers and experts in the Chill Zone.
After each block of lectures, make sure to participate in the quiz. It's not just a fun activity, but also a chance to win one of the valuable prizes.
Every year, we provide new gastronomic delicacies you can enjoy during the conference.
After
the conference
Our speakers are accomplished professionals in their fields of expertise. Send us a request if you need a professional perspective or a business-to-business meeting.
If you need an expert opinion or would like to arrange a specially organized meeting, please send us an inquiry at marketing@lanaco.com.
After the conference, we organize special events related to technologies, products, and topics of importance to the IT and business community.