6th Infocom Security 2016
Upgrade your Knowledge
Protect your Business
April 6 – 7, 2016
Divani Caravel Hotel, Athens
The 6th Infocom Security Conference will be once more the top annual event for Information Security in Greece as it makes the difference, adding one more day to the official program and significally upgrading its content.
It is more than true that the digital world becomes more and more complex every day; as a consequence, dangers threatening information security increase in number and complexity.
Nothing stays still in cyberspace for long… Cybercriminals tend to develop their skills continuously and combine their forces in the most professional manner; they exchange know-how and information and they are quick to introduce new, advanced tools in order to attack and break through the networks of organizations and enterprises, hoping for economic or any other kind of benefits.
The IT ecosystem is under re-construction, a holistic one! Information infrastructure surely remains the most important factor, as it is necessary for the optimum operation of every modern organization. The changes taking place lately to the philosophy and modelling of these infrastructures have, on one hand, reinforced the functions and productivity of the entrepreneurial procedures but, at the same time, they have caused an increased demand in the field of information security…
Under these circumstances, i.e. the constantly changing landscape of threats as well as the complete restructuring of information infrastructure, there is an urgent need for a never ending upgrade of IT administrators’ knowledge level and not only, in order to play their role, each one of them, protecting the operational integrity and the information vaults of their employers.
The goal of the 6th Infocom Security Conference, that will take place at Divani Caravel Hotel in Athens, on the 6th & 7th of April, 2016, under the motto Upgrade your Knowledge – Protect Your Business, is to highlight this need in the most explicit and profound way.
Wednesday, April 6
1st session: Preventing Cyber Attacks in an ever-changing IT World
Nowadays, changes in IT infrastructures as well as continuous quantitative and qualitative expansion of threats influence more than anything else digital performance of enterprises and big organizations. IT environment is in a state of total resetting, as new trends in enterprise apps and operations are being adopted, while at the same time cyber-criminals never cease developing new and highly advanced tools for cyber-attacks, in order to infiltrate big organizations networks and get economic or other kind of benefits. New trends and better risk management paradigms, in order to avert cyber-attacks in a continuously changing environment, are the main subjects of the speakers in the 1st session of this conference.
2nd session: Connect and Protect
One of the most important digital security challenges that CIOs of enterprises and big organizations are faced with, every day, is connectivity of all infrastructures, mobile devices, applications and -generally speaking- every operation in the enterprise, including the upcoming revolution sparked by Internet of Things (ΙοΤ). All relevant data get transferred and stored either in real or in virtual infrastructures in an open, remotely accessible environment. This session will focus on the modern know-how of global security vendors and the various ways their valuable experience is being translated into solutions and services protecting customers’ networks from modern cyber-threats.
3rd session: The art of Human Hacking!
More often than not, the one thing evil-minded hackers need to exploit is not some technical failure in an IT system, but some gullible and naive people on whom they apply what is widely known as Social Engineering! This is the art of psychological guidance of people that makes them reveal confidential information, depending on the kind of attack the hacker wants to launch. According to researchers, this is the most common hacking method, nowadays. During the first day of the conference, top researchers will talk extensively about Social Engineering techniques and the countermeasures that users need to take, in order to protect themselves. There will also be additional presentations on other methods that hackers use, in order to obtain non-authorized access to IT systems.
Thursday, April 7
1st session: An integrated approach to security in the Organization
Nowadays, the protection of critical data and IT infrastructures in enterprises and organizations alike, is very high in the scale of demand. Yet, first of all, we have to understand the complex environment which has been shaped by the modern trends in IT, as well as the expansion and development of threats. In this session, representatives from Risk Management Companies, Integrators and Digital Security Services Providers will describe the complex environment in this field and prove the value of a holistic approach against those risks, within the IT environment of various organizations.
2nd session: Smart ways to make your data more secure
There is no doubt that one of the utmost necessities in many organizations is flexibility of applications and operations to the benefit of productivity. The adoption of cloud computing, mobility and other IT trends allows on one hand business procedures to become more flexible and efficient, but on the other it raises many questions regarding critical data security. In order to ensure that data will remain protected, while the enterprise enjoys the benefits of new trends exploitation, there is a need of smart and integrated solutions, like the ones presented in this session.
3rd session: Ethical Hacking: To know your enemy, you must become one of them
Upon hearing the word “hacker” most people have a negative reaction; however they should know that hacking is necessary to the security of IT systems. Ethical hackers or “white hats” use exactly the same techniques with the evil-minded hackers in order to penetrate into a lone computer or a network, in a mission on behalf of their owners, so they can pin-point possible technical failures their evil pals may exploit and propose ways to repair them, closing any “back doors”. The 3rd session of the second day at Infocom Security is devoted to Ethical Hacking, Penetration Testing as well as the research part of IT security. For the first time in Greece, well-recognised scientists will present tools, methods and research results on ΙΤ Security!
Ethihak Contest – A Hacking contest in a real environment
An innovative contest will take place, during the 6th Infocom Security Conference, presenting all applicants with the opportunity to test their skills via cyber attacks simulation, in order to grade the security status of information and communication systems – the prize for the winner will be announced soon! The scope of this contest is to increase awareness of the networked users on the issue of modern cyber threats and attacks, as well as offer them a hands-on practice in the application of different attack tools against a real target. The Ethihak contest will take place in a real environment which will be set up by security specialists inside the Conference premises.
Reference Point and steady growth
Infocom Security Conference –organised by Smart Press, along with IT Security Professional and Infocom magazines– attracted more than 1500 attendees last year and was gladly supported by 45 sponsors; the plenary sessions and the parallel workshops covered the majority of the “hot” topics in this field.
Infocom Security Conference is regarded nowadays as the most important annual event on Information Security in Greece and the reference point for the evolution in this field. Every year, since 2011, it has demonstrated a steady growth depicted by the attendance statistics, as well as the general acceptance by IT market professionals and the scientific and tech communities.