{"id":6800,"date":"2023-03-16T14:53:52","date_gmt":"2023-03-16T12:53:52","guid":{"rendered":"https:\/\/www.infocomsecurity.gr\/?page_id=6800"},"modified":"2023-03-16T14:54:56","modified_gmt":"2023-03-16T12:54:56","slug":"13th-infocom-security-26-amp-27-april-2023","status":"publish","type":"page","link":"https:\/\/www.infocomsecurity.gr\/en\/13th-infocom-security-26-amp-27-april-2023\/","title":{"rendered":"13th Infocom Security &#8211; 26 &#038; 27 April 2023"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-bottom:0px;--awb-background-color:var(--awb-color7);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-bottom:0px;--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:36;line-height:1.33;\">13th InfoCom Security 2023<\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:28;line-height:1.91;\"><em>Conference &amp; Expo<\/em><\/h3><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-padding-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-bottom:0px;--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:var(--awb-custom13);--awb-margin-bottom:25px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:36;line-height:1.33;\">The Power of AI in Cyber Security<\/h1><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:22;--minFontSize:22;line-height:1.5;\">26 &amp; 27 April<br \/>\nAthens Conservatory<\/h4><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>The significant impact of Artificial Intelligence on the digital world and on many aspects of our professional, social and personal lives today, is undeniable. Cybersecurity, as a field of application for all technological trends, could only be significantly affected by the continuous development of AI.<\/p>\n<p>Through the central notion of \u201cThe Power of AI in Cyber Security\u201d, the 13th Infocom Security \u2013 the leading event in the field of IT technologies and a reference point in Greece for information security \u2013 will highlight all developments in Cyber Security, in the age of Artificial Intelligence\u2019s rise, the rapid development of Digital Transformation, and the ever-increasing quantitative and qualitative threats in cyberspace.<\/p>\n<p>At the same time, in the renewed and excellent space of the ATHENS CONSERVATORY where it will be held, it will be a meeting point for the large community of IT executives and professionals, and of course for the market in the field of Digital Security technological solutions and services.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.25;\">AI: Friend or Foe?<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-top:0px;margin-bottom:35px;width:100%;max-width:170px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#e2e3e8;border-color:#e2e3e8;border-top-width:3px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-2\"><p>Artificial Intelligence is one of the main pillars of the 4th Industrial Revolution, but like any new technological achievement, it can have both positive and negative effects. So, on one hand, cybercriminals can use smarter ways and more advanced malware tools to break into IT infrastructures \u2013 with well-known, quite negative consequences \u2013 while on the other hand, artificial intelligence can provide systems and solutions with the ability to effectively respond to cyber-attacks in a minimum of time with maximum efficiency.<\/p>\n<p>High on the news agenda today is ChatGPT and other OpenAI applications, raising serious concerns about their use in terms of data protection and the potential to create various forms of malware, such as sophisticated and more dangerous ransomware.<\/p>\n<p>So, the rising challenges are great, both for specialist professionals and for companies providing protection solutions. The solution, again, can come through AI technologies, developing innovative intelligent systems that will automate the analysis procedures of any malicious activity.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.25;\">Exploring a safer digital world<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-top:0px;margin-bottom:35px;width:100%;max-width:170px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#e2e3e8;border-color:#e2e3e8;border-top-width:3px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-3\"><p>Answers to all of the above dilemmas, as well as a number of other critical issues, like the special treatment of threats in many vertical markets such as industry, supply chain, shipping, tourism, critical infrastructure, etc., will be given by the speakers of the themed sections, discussion panels and workshops, that will be held during the two days of Infocom Security, with the aim of covering all of the important aspects and emerging trends in Cyber Security, as resources to explore and build a safer technological ecosystem.<\/p>\n<p>The new approach to identity management, the evolution of security in the cloud and the Internet of Things (IoT), the best managed security service delivery (MSSP), the development of zero-trust architecture models, and protection of Hybrid Work (SASE) as well as the key role of the human factor and professionals in the field (as usual), the achievement of maximum resilience, awareness and privacy through Governance, Risk and Compliance (GRC), will be some of the key points that we will have the opportunity to highlight through the content of this year\u2019s conference.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.25;\">Sponsor Companies Expo<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-top:0px;margin-bottom:35px;width:100%;max-width:170px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#e2e3e8;border-color:#e2e3e8;border-top-width:3px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-4\"><p>Just like every year, during Infocom Security 2023, a parallel exhibition of the sponsor companies will be held, giving visitors the opportunity to get in touch with companies active in the field of digital security services and solutions, in order to meet with their executives and learn about their activities, and about all-around developments in the field.<\/p>\n<p>InfoCom Security, having gained universal recognition by the entire specific market, brings together every year the most important and largest Greek companies in the field, as well as leading global brands that support the event, and participate both in terms of content and exhibition.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.25;\">Networking for a large community of professionals<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-top:0px;margin-bottom:35px;width:100%;max-width:170px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#e2e3e8;border-color:#e2e3e8;border-top-width:3px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-5\"><p>The large community of IT and technology professionals from all walks of life that has helped build the Infocom Security conference and the IT Security Professional magazine, will have the opportunity to meet again in a new, refreshed space, covering the demands of this top event.<\/p>\n<p>The Athens Conservatory on April 26 &amp; 27 is expected to become a meeting and networking place for IT department executives (CTOs, CIOs, CISOs, IT Managers, IT Auditors \u2013 Engineers \u2013 Administrators, Risk &amp; Compliance Managers, DPOs, etc.) from companies and organizations of all vertical markets in the Private and Public sectors, as well as professionals from the IT channel, companies active in the implementation of projects and the provision of IT solutions and services, as well as for many academics, scientists and researchers.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":6796,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-6800","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/6800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/comments?post=6800"}],"version-history":[{"count":2,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/6800\/revisions"}],"predecessor-version":[{"id":6802,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/6800\/revisions\/6802"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/media\/6796"}],"wp:attachment":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/media?parent=6800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}