2nd Day Schedule – Thursday 19/4

2nd Day Schedule – Thursday 19/4 2018-03-22T11:50:08+00:00

09:00 – 09:30 – Gathering – Registration

09:30 – 10:00 – Commencement – Introductions

10:00 – 12:00 – 1st Section: Choosing and Implementing the Right Information Security and Risk Management Strategy
Conditions are now mature for a new strategy about data protection, and the GDPR comes to give a push even further towards this direction. A great opportunity opens up, for businesses and organizations to select and implement a new plan of digital security and risk management, customized to their own needs, while keeping in mind the compliance requirements, as well as the whole landscape of creeping risks. Companies that consult on, control and implement digital security projects, play a very important role in the selection, shape and implementation of this one plan that will deal effectively with every breach incident. Representatives of these companies, as well as IT department managers, will highlight in this section, the ways to select and implement such plans.

12:00 – 12:30 – Break

12:30 – 14:30 – 2nd Section: Smarter Cyber Defence Against Advanced Cyber Threats
Definitions such as: Artificial Intelligence, Cyber Threat Intelligence, Machine and Deep Learning, IoT, Smart and Next-Gen Security, are now a proper part of our lives, especially when it comes to digital security. In what degree do these definitions essentially affect digital security and are not just another marketing tool? How far apart are theory and practice for a really “smart” defense against evolved threats and updated ransomware attacks? Just how smart new solutions developed by manufacturers actually are, and how well can they help comply with the GDPR? Corporate managers from Greece and abroad, specializing in the development of technological solutions about security, will answer all of these questions for us, in this section.

14:30 – 16:00 – 3rd Section: The Rising Face of Cyber-Crime
Cybercrime changes shapes all the time. Attackers and malicious hackers constantly invent new ways to penetrate corporate networks. Ransomware attacks, the Dark Web, cyber-warfare, online organized crime, social engineering, phishing, as well as issues concerning security in social media, fake news and BitCoin, are high in the current agenda. So, in which way does the rising face of cybercrime affect today’s landscape? How ready are we to deal with these challenges? Speakers in the conference’s closing section, will highlight all critical aspects of cybercrime and talk to us about ways to fight it, penetration testing methods and the role of ethical hackers in enhancing defense mechanisms.