{"id":5618,"date":"2022-06-20T15:30:20","date_gmt":"2022-06-20T12:30:20","guid":{"rendered":"https:\/\/www.infocomsecurity.gr\/?page_id=5618"},"modified":"2022-06-20T15:30:20","modified_gmt":"2022-06-20T12:30:20","slug":"12o-infocom-security-6-amp-7-july-2022","status":"publish","type":"page","link":"https:\/\/www.infocomsecurity.gr\/en\/12o-infocom-security-6-amp-7-july-2022\/","title":{"rendered":"12o Infocom Security &#8211; 6 &#038; 7 July 2022"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-padding-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p style=\"text-align: center;\">The largest event in Greece about <strong>IT Security<\/strong> and <strong>Data Protection<\/strong>, organized by <strong>Smart Press<\/strong> and supported by the <strong>IT Security Professional magazine<\/strong>, returns in physical format on <strong>July 6 and 7, 2022, at the Divani Caravel Hotel in Athens<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>InfoCom Security reunites the community of IT professionals with the Cyber Security market <\/strong><\/p>\n<p style=\"text-align: center;\">The 12th iteration of InfoCom Security Conference, the leading event that is a <strong>reference point for the IT sector and technology professionals in Greece<\/strong>, will highlight for one more year, through its multifaceted content, all developments in Cyber Security, and at the same time, its expo area will be <strong>a meeting point of the large community of executives and IT professionals<\/strong>, and of course the market of technological solutions and services in IT Security.<\/p>\n<\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-1 content-boxes-clean-vertical content-left content-boxes-icon-on-top\" style=\"--awb-backgroundcolor:var(--awb-color6);--awb-body-color:#ffffff;--awb-title-color:#ffffff;--awb-margin-top:50px;--awb-margin-bottom:0px;--awb-hover-accent-color:#ffffff;--awb-circle-hover-accent-color:#ffffff;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:var(--awb-color6);border-color:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"slideInUp\" data-animationDuration=\"1.0\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/3-2-200x200.jpg\" width=\"200\" height=\"200\" alt=\"\" \/><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:1.91;\">Honoring the Legacy of Alan Turing (1912 \u2013 1954)<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>This year, the 12th Infocom Security Conference has as its main theme, and honors, the legacy of <strong>Alan Matheson Turing<\/strong> (110 years since his birth), the English mathematician who is considered the father of computer science, and essentially of information technology and artificial intelligence, which among others, developed many cryptanalysis techniques, and as is well known for, broke through many German codes in World War II, as well as the Enigma encryption machine, enabling the Allies to win important battles that were critical to the outcome and shorter duration of the war.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.25;\">We explore trends and highlight solutions and strategies!<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-top:0px;margin-bottom:35px;width:100%;max-width:170px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#e2e3e8;border-color:#e2e3e8;border-top-width:3px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-2\"><p>Those who visit and participate in this year&#8217;s Infocom Security, will have the opportunity to attend, as always, a <strong>two-day full program of speeches, presentations<\/strong>, <strong>panel discussions<\/strong> and <strong>workshops<\/strong>. With a professional, scientific and research approach, the conference will cover once more, a rich pool of topics, exploring in depth all the trends that shape the current <strong>cybersecurity environment<\/strong>, and present solutions and proposals. Specifically, through the content of the conference, we will highlight among other things:<\/p>\n<\/div><ul style=\"--awb-size:16px;--awb-iconcolor:var(--awb-color7);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">The current challenges that organizations face, regarding the risks to their IT infrastructure and data.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">The new security strategies, based on the landscape of threats today, but also the influence of the adoption of Digital Transformation.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">The development of an integrated model of data governance, which leads to the overall strengthening of the resilience of organizations, in order to be able to deal with any unexpected events.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">The modern technological solutions, tools and services that strengthen the protection of companies against sophisticated attacks.<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">The key role of the human factor and the contribution of professionals in building a safer digital world and in promoting Cyber Security Awareness.<\/div><\/li><\/ul><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.25;\">Exhibition for Companies &amp; Business Meetings<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-top:0px;margin-bottom:35px;width:100%;max-width:170px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#e2e3e8;border-color:#e2e3e8;border-top-width:3px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-3\"><p>Once again, as part of Infocom Security 2022, there will be a <strong>parallel exhibition of sponsor companies,<\/strong> giving visitors the opportunity to get in touch with businesses operating in the field of services and solutions on digital security, to meet with executives, and keep up to date about their activities and all developments in the field.<\/p>\n<p>InfoCom Security has been distinguished for many years through the <strong>total recognition<\/strong> it receives from this whole industry, with the largest and largest Greek companies in the field participating in it, as well as leading foreign brands that support the event.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.25;\">A great community and a major networking opportunity<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-top:0px;margin-bottom:35px;width:100%;max-width:170px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#e2e3e8;border-color:#e2e3e8;border-top-width:3px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-4\"><p>After a while, the large professional, technological, research and academic communities from the field of information technology and beyond, with people from all professional ranks and positions, and from companies and organizations from all vertical markets, brought together by the Infocom Security conference and the IT Security Professional magazine, have the opportunity to meet again in one place.<\/p>\n<p>The Conference is attended and viewed every year by executives of IT departments (CTOs, CIOs, CISOs, Cyber Security Managers, Specialists, Operators, IT Managers, IT Auditors, IT Engineers, Risk &amp; Compliance Managers etc.), from companies and organizations of the Private and Public Sectors, covering all vertical markets, as well as professionals from the IT sector, companies active in the implementation of projects and the provision of IT solutions and services, as well as many academics, scientists and researchers.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-flex-start fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:40px;width:100%;max-width:70%;\"><div class=\"fusion-separator-border sep-shadow\" style=\"--awb-height:20px;--awb-amount:20px;background:radial-gradient(ellipse at 50% -50% , #e0dede 0px, rgba(255, 255, 255, 0) 80%) repeat scroll 0 0 rgba(0, 0, 0, 0);background:-webkit-radial-gradient(ellipse at 50% -50% , #e0dede 0px, rgba(255, 255, 255, 0) 80%) repeat scroll 0 0 rgba(0, 0, 0, 0);background:-moz-radial-gradient(ellipse at 50% -50% , #e0dede 0px, rgba(255, 255, 255, 0) 80%) repeat scroll 0 0 rgba(0, 0, 0, 0);background:-o-radial-gradient(ellipse at 50% -50% , #e0dede 0px, rgba(255, 255, 255, 0) 80%) repeat scroll 0 0 rgba(0, 0, 0, 0);\"><\/div><\/div><div class=\"fusion-text fusion-text-5\"><h4 style=\"text-align: center;\">\u03a4\u03b1 \u03c3\u03c5\u03bd\u03ad\u03b4\u03c1\u03b9\u03b1 \u03c0\u03bf\u03c5 \u03b4\u03b9\u03bf\u03c1\u03b3\u03b1\u03bd\u03ce\u03bd\u03b5\u03b9 \u03b7 Smart Press \u03c3\u03b5 \u03b5\u03c4\u03ae\u03c3\u03b9\u03b1 \u03b2\u03ac\u03c3\u03b7 \u03b5\u03af\u03bd\u03b1\u03b9:<\/h4>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_6 1_6 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:11.52%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:11.52%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.infocomworld.gr\" target=\"_blank\" aria-label=\"infocom-world\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"300\" height=\"200\" alt=\"Infocom World Conference\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/infocom-world.jpg\" class=\"img-responsive wp-image-5336\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/infocom-world-200x133.jpg 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/infocom-world.jpg 300w\" sizes=\"(max-width: 640px) 100vw, (max-width: 640px) 100vw, 200px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_6 1_6 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:11.52%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:11.52%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.infocomsecurity.gr\" target=\"_blank\" aria-label=\"Infocom-Security\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"300\" height=\"200\" alt=\"Infocom Security\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/Infocom-Security.jpg\" class=\"img-responsive wp-image-5338\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/Infocom-Security-200x133.jpg 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/Infocom-Security.jpg 300w\" sizes=\"(max-width: 640px) 100vw, (max-width: 640px) 100vw, 200px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_6 1_6 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:11.52%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:11.52%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.securityproject.gr\" target=\"_blank\" aria-label=\"security-project-300&#215;149-1\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"300\" height=\"149\" alt=\"Security Project\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/security-project-300x149-1.png\" class=\"img-responsive wp-image-5340\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/security-project-300x149-1-200x99.png 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/security-project-300x149-1.png 300w\" sizes=\"(max-width: 640px) 100vw, (max-width: 640px) 100vw, 200px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_6 1_6 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:11.52%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:11.52%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.mcw.gr\" target=\"_blank\" aria-label=\"mobile-connected-world\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"150\" height=\"150\" alt=\"Mobile Connected World\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2017\/01\/mobile-connected-world-150x150.png\" class=\"img-responsive wp-image-2082\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2017\/01\/mobile-connected-world-66x66.png 66w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2017\/01\/mobile-connected-world-150x150.png 150w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_6 1_6 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:11.52%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:11.52%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-5 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.e-businessworld.gr\" target=\"_blank\" aria-label=\"ebiz &#8211; social\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"300\" height=\"117\" alt=\"E-business &amp; Social Media\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2017\/01\/ebiz-social-300x117.png\" class=\"img-responsive wp-image-2083\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2017\/01\/ebiz-social-200x78.png 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2017\/01\/ebiz-social.png 300w\" sizes=\"(max-width: 640px) 100vw, (max-width: 640px) 100vw, 200px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_6 1_6 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:11.52%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:11.52%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-6 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.hoteltech.gr\" target=\"_blank\" aria-label=\"hotel-tech\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"157\" alt=\"Hotel Tech\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2017\/01\/hotel-tech-1.png\" class=\"img-responsive wp-image-2136\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2017\/01\/hotel-tech-1-200x126.png 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2017\/01\/hotel-tech-1.png 250w\" sizes=\"(max-width: 640px) 100vw, (max-width: 640px) 100vw, 200px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-flex-start fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:30px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:30px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\"><h4 style=\"text-align: center;\">\u03a4\u03b1 \u03ad\u03bd\u03c4\u03c5\u03c0\u03b1 \u03ba\u03b1\u03b9 \u03b7\u03bb\u03b5\u03ba\u03c4\u03c1\u03bf\u03bd\u03b9\u03ba\u03ac \u03922\u0392 \u03c0\u03b5\u03c1\u03b9\u03bf\u03b4\u03b9\u03ba\u03ac \u03c3\u03c4\u03bf \u03c4\u03bf\u03bc\u03ad\u03b1 \u03c4\u03bf\u03c5 ICT \u03ba\u03b1\u03b9 Security \u03c4\u03b7\u03c2 Smart Press \u03b5\u03af\u03bd\u03b1\u03b9:<\/h4>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-7 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.itsecuritypro.gr\" target=\"_blank\" aria-label=\"it-security-pro\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"300\" height=\"71\" alt=\"IT Professional Security\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/it-security-pro.jpg\" class=\"img-responsive wp-image-5342\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/it-security-pro-200x47.jpg 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/it-security-pro.jpg 300w\" sizes=\"(max-width: 640px) 100vw, (max-width: 640px) 100vw, 300px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-8 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.securitymanager.gr\" target=\"_blank\" aria-label=\"logo-370\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"370\" height=\"117\" alt=\"Security Manager\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/logo-370.jpg\" class=\"img-responsive wp-image-5344\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/logo-370-200x63.jpg 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/logo-370.jpg 370w\" sizes=\"(max-width: 640px) 100vw, (max-width: 640px) 100vw, 370px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-9 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.infocom.gr\" target=\"_blank\" aria-label=\"INFOCOM-300&#215;62-1\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"300\" height=\"62\" alt=\"Infocom\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/INFOCOM-300x62-1.png\" class=\"img-responsive wp-image-5346\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/INFOCOM-300x62-1-200x41.png 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/INFOCOM-300x62-1.png 300w\" sizes=\"(max-width: 640px) 100vw, (max-width: 640px) 100vw, 300px\" \/><\/a><\/span><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-5618","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/5618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/comments?post=5618"}],"version-history":[{"count":2,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/5618\/revisions"}],"predecessor-version":[{"id":5620,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/5618\/revisions\/5620"}],"wp:attachment":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/media?parent=5618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}