{"id":3062,"date":"2018-01-22T16:34:12","date_gmt":"2018-01-22T14:34:12","guid":{"rendered":"http:\/\/www.infocomsecurity.gr\/?page_id=3062"},"modified":"2018-03-19T12:24:41","modified_gmt":"2018-03-19T10:24:41","slug":"8o-infocom-security","status":"publish","type":"page","link":"https:\/\/www.infocomsecurity.gr\/en\/8o-infocom-security\/","title":{"rendered":"8o Infocom Security"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:100px;--awb-padding-bottom:50px;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first\" style=\"--awb-bg-size:cover;--awb-margin-bottom:40px;width:30.6666%; margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><h3>8th INFOCOM SECURITY CONFERENCE<\/h3>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-top:0px;margin-bottom:35px;width:100%;max-width:170px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#e2e3e8;border-color:#e2e3e8;border-top-width:3px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-2\"><h3><em>18 \u2013 19 April 2018 \u2013\u00a0Dais Conference\u00a0Center<\/em><\/h3>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-two-third fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;width:65.3333%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-3\"><h3 style=\"text-align: center;\">GDPR is coming!<br \/>\nCyber Security\u2026 the day after!<\/h3>\n<p>The 8th Infocom Security event coincides with the \u201cyear of GDPR\u201d, as many call 2018, because of the imminent application -on March 25- of the well-known European General Data Protection Regulation (GDPR).<\/p>\n<p>This regulation compels all organizations and businesses to comply with a new framework of technical and organizational measures for the protection of personal data, and fines especially high amounts in cases of data breach and loss. Another significant development is the official establishment of the Data Protection Officer (DPO) position.<\/p>\n<p>However, the most essential and important change that GDPR brings, is that through its obligatory application, it sets the foundation for the creation of a really secure IT infrastructure in organizations and businesses.<\/p>\n<p>So, businesses should grab this opportunity and look to the day after, in relation to digital security and the protection of their IT systems and the data they manage. A day after when digital security professionals and specialists, are called upon to significantly contribute in guiding their organizations, in order to optimize important procedures, like:<\/p>\n<ul>\n<li>Risk assessment<\/li>\n<li>Security policies<\/li>\n<li>Security penetrations<\/li>\n<li>Users training<\/li>\n<li>Adoption of technology-based solutions and services<\/li>\n<\/ul>\n<p>As such, the 8th Infocom Security Conference, on 18 and 19 April, will focus on the immediate and necessary adjustments that businesses and organizations have to make, in order to comply with all aspects of GDPR, while looking to the day after and at the big picture, of information security.<\/p>\n<p>The main feature of the conference, this year as well, will be the multitude of subject content, combining a business approach to IT Security, along with a wider scientific and technological interest about cyber-security.<\/p>\n<p>Infocom Security will once again be an opportunity for you to keep informed about the evolution of digital threats, find out about trends and strategies developed in the sector of information security, get to know new data protection technologies and solutions, as well as meet up with people of this industry, from Greece and other countries, including peers, specialized scientists and researchers in this field.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-padding-bottom:20px;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-4\"><h3><span style=\"font-size: 30px;\">Security Workshops<\/span><\/h3>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-top:0px;margin-bottom:35px;width:100%;max-width:170px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#e2e3e8;border-color:#e2e3e8;border-top-width:3px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep fusion-clearfix\" style=\"float:left;margin-top:10px;margin-bottom:10px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-5\"><p>During the 8th Infocom Security, parallel workshops will take place, offering techniques and practical presentations by specialists about information security issues.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-6\"><h3><span style=\"font-size: 30px;\">Sponsor companies\u2019 expo<\/span><\/h3>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-top:0px;margin-bottom:35px;width:100%;max-width:170px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#e2e3e8;border-color:#e2e3e8;border-top-width:3px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep fusion-clearfix\" style=\"float:left;margin-top:10px;margin-bottom:10px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-7\"><p>During the 8th Infocom Security -like every year- there will be an expo for sponsor companies, giving visitors the opportunity to get in touch with businesses active in the country, in the sector of information security services and solutions, in order to stay informed face-to-face about all developments in this area, as well as their own activities.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-3062","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/3062","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/comments?post=3062"}],"version-history":[{"count":2,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/3062\/revisions"}],"predecessor-version":[{"id":3135,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/3062\/revisions\/3135"}],"wp:attachment":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/media?parent=3062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}