{"id":7450,"date":"2024-02-27T15:05:02","date_gmt":"2024-02-27T13:05:02","guid":{"rendered":"https:\/\/www.infocomsecurity.gr\/?page_id=7450"},"modified":"2024-03-05T15:57:36","modified_gmt":"2024-03-05T13:57:36","slug":"14th-infocom-security-10-amp-11-april-2024","status":"publish","type":"page","link":"https:\/\/www.infocomsecurity.gr\/en\/14th-infocom-security-10-amp-11-april-2024\/","title":{"rendered":"14th Infocom Security &#8211; 10 &#038; 11 April 2024"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-bottom:0px;--awb-background-color:#950202;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-bottom:0px;--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:36;line-height:1.33;\">14th InfoCom Security 2024<\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:28;line-height:1.91;\"><em>Conference &amp; Expo<\/em><\/h3><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-padding-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-bottom:0px;--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:var(--awb-color7);--awb-margin-bottom:15px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:36;line-height:1.33;\">The Hybrid World of Cybersecurity<\/h1><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color7);--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:22;--minFontSize:22;line-height:1.5;\"><p>April 10 &amp; 11<br \/>\nAthens Conservatory<\/p><\/h4><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-animated\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-padding-bottom:40px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" data-animationType=\"fadeInUp\" data-animationDuration=\"0.3\" data-animationOffset=\"top-into-view\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1 awb-text-cols fusion-text-columns-2\" style=\"--awb-columns:2;--awb-column-spacing:2em;--awb-column-min-width:300px;\"><p><strong>2024, for most global analysts, but also for many players in the Greek market of the wider IT sector, is a particularly important year for Cyber Security that will bring a new set of challenges and opportunities. The growing needs to protect technological infrastructures as well as the requirements to comply with regulatory frameworks for cyber security will create conditions for even greater development and a stronger field of action for companies in the sector. This dynamic will be reflected in many ways at this year\u2019s 14th Infocom Security<\/strong><\/p>\n<p><strong>The 14th iteration of the leading event in Greece for the field of Cyber Security, is coming once again this year, aiming to highlight all critical aspects of the modern hybrid world, as it has been shaped in recent years, to analyze the important trends that we are called to address in security management and present best practices, integrated solutions, innovative services and new regulatory guidelines to strengthen the defenses of organizations against emerging sophisticated threats.<\/strong><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.25;\">Cybersecurity is Not Just an IT Issue. It&#8217;s a Business Issue!<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-top:0px;margin-bottom:35px;width:100%;max-width:170px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#e2e3e8;border-color:#e2e3e8;border-top-width:3px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-2\"><p>Today, cyber security represents more than protecting a company\u2019s information and critical data with technological tools. It has evolved into a catalytic factor for strengthening resilience, and a pillar of development and strengthening the competitive advantage of every organization.<\/p>\n<p>The key point that in recent years has greatly diversified approaches to cyber security, constantly updating the policies, models and measures applied, is undoubtedly the transition of the ecosystem \u2013 of business functions as a whole, not just technological infrastructures \u2013 to a hybrid world. The highly interconnected environment in which we live and work, combined with the adoption of ever more new technologies, such as Hybrid Cloud, IoT and Artificial Intelligence, are breaking down the boundaries between the physical and digital worlds, enhancing productivity, collaboration and automation of processes and operations.<\/p>\n<p>At the same time, however, the ever-increasing correlation of each operational function of each organization with digital infrastructures, combined with increasingly more sophisticated attacks in cyberspace, that we could say now constitute hybrid threats, put all the necessary inhouse and outsourcing on full alert protection mechanisms, that an organization must have in place and further enhance the role of security professionals, in order to more effectively address the risks that lurk.<\/p>\n<p>All the latest developments that shape the landscape of new cyberthreats worldwide, modern technological tools and services developed to upgrade the defense of organizations focused on AI, the new European regulatory framework for cyber security supported by the NIS2 directive, and the key role that Security is called upon to play in the Hybrid World, in broader terms, are the topics we will highlight at the 14th InfoCom Security 2024, which will take place for the second time in the excellent space of the Athens Conservatory on April 10-11, and is expected, just like every year, to be an annual summit for a large community of executives and professionals in the field of Information Technology, and of course the market of technological solutions and services in Cyber Security.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:40px;--awb-border-radius-top-right:40px;--awb-border-radius-bottom-right:40px;--awb-border-radius-bottom-left:40px;--awb-overflow:hidden;--awb-padding-top:0px;--awb-padding-bottom:20px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-padding-right:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#0075c9;--awb-bg-color-hover:#0075c9;--awb-bg-size:cover;--awb-border-radius:40px 40px 40px 40px;--awb-margin-bottom:0px;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-top:35px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:28;line-height:1.91;\">Designing the Cybersecurity Roadmap through a multi-level event<\/h3><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-text-color:var(--awb-color1);\"><p>During the two-day 14th InfoCom Security 2024, we will cover an extensive field of topics that will unfold on multiple levels, namely through keynote speeches, presentations and discussion panels, that will take place in the main session, analyses that will delve into comprehensive solutions and services in the parallel workshops, as well as networking and professional meetings, which will take place in the large exhibition area where booths of participating sponsor companies will be located.<\/p>\n<p>The content of InfoCom Security, will be shaped as always, by leading Greeks as well as international experts from institutional bodies, global organizations and of course professionals from companies more broadly related to the security sector in the digital world, delving into multiple issues, such as:<\/p>\n<ul>\n<li>The catalytic effect of Artificial Intelligence on cyber security at the level of defenders as well as attackers!<\/li>\n<li>Global efforts to combat Ransomware, Phishing and APT attacks are constantly evolving based on tools available through the Dark Web.<\/li>\n<li>The network security requirements of hybrid organizations, with a focus on Secure Access Service Edge (SASE), Zero-Trust, as well as Identity and Access Management (IAM).<\/li>\n<li>The best technology tools for Cloud, Email, Application, Operation Technologies, IoT and Supply Chain security.<\/li>\n<li>How important Endpoint Detection and Response (EDR) \u2013 Managed Detection and Response (MDR) \u2013 Extended Detection and Response (XDR) \u2013 Data Leakage Prevention (DLP) solutions are, and what they offer for an effective cyber security strategy.<\/li>\n<li>The critical role of Managed Security Service Providers (MSSP) and Security Operation Centers (SOC) in large organizations, as well as small and medium enterprises.<\/li>\n<li>What the new regulatory frameworks of the NIS2 and DORA directives bring, and how to achieve compliance with them.<\/li>\n<li>How are the efforts to protect personal data and the implementation of the GDPR progressing.<\/li>\n<li>How does Cyber Insurance today affect the resilience of organizations, ensure their business continuity, and create a competitive advantage.<\/li>\n<li>How has the critical role of Information Security Officers been shaped today, and what are the consequences of the lack of human resources, by professionals in the field of Cyber Security with the appropriate skills.<\/li>\n<\/ul>\n<p><em>Based on these topics, all Infocom Security speakers will have the opportunity to contribute to the design of the cyber security road map, that we will have to follow today and, in the years, to come.<\/em><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.25;\">Sponsor Companies Expo<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-top:0px;margin-bottom:35px;width:100%;max-width:170px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#e2e3e8;border-color:#e2e3e8;border-top-width:3px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-4\"><p>Just like every year, as a part of Infocom Security, a parallel exhibition of participating sponsor companies will take place, giving visitors the opportunity to get in touch with the most important and largest Greek companies active in the field of services and integrated solutions for cyber security, in order to meet with their executives and learn about their activities, as well as all developments in this field.<br \/>\nInfoCom Security, having earned the universal recognition of the entire security market, brings together every year the most important and largest Greek companies in this field, as well as leading global brands that support the event and participate in both content and exhibition.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-image-element in-legacy-container\" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"2016\" height=\"752\" title=\"1K7A1179 (002)\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2024\/01\/1K7A1179-002.jpg\" alt class=\"img-responsive wp-image-7379\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2024\/01\/1K7A1179-002-200x75.jpg 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2024\/01\/1K7A1179-002-400x149.jpg 400w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2024\/01\/1K7A1179-002-600x224.jpg 600w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2024\/01\/1K7A1179-002-800x298.jpg 800w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2024\/01\/1K7A1179-002-1200x448.jpg 1200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2024\/01\/1K7A1179-002.jpg 2016w\" sizes=\"(max-width: 800px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.25;\">Networking of a large community of professionals<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-top:0px;margin-bottom:35px;width:100%;max-width:170px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#e2e3e8;border-color:#e2e3e8;border-top-width:3px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-5\"><p>The large community of professionals in the field of IT and technology in general, of all professional levels and positions, which has contributed in the creation of the Infocom Security conference and the IT Security Professional magazine, will have the opportunity to meet again in a space that meets the requirements of such a top-tier event.<\/p>\n<p>The Athens Conservatory on April 10 &amp; 11 is expected to become a meeting and networking place for IT department executives (CTOs, CIOs, CISOs, IT Managers, IT Auditors \u2013 Engineers \u2013 Administrators, Risk &amp; Compliance Managers, DPOs, etc.) from companies and organizations of all vertical markets of the private and public sectors, as well as professionals from the IT channel, companies active in the implementation of projects and the provision of IT solutions and services, as well as many academics, scientists and researchers.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-9 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.25;\">Infocom Security is not just a conference&#8230; it\u2019s an experience!<\/h2><\/div><div class=\"fusion-video fusion-youtube fusion-aligncenter\" style=\"--awb-max-width:600px;--awb-max-height:360px;--awb-width:100%;\" data-autoplay=\"1\"><div class=\"video-shortcode\"><div class=\"fluid-width-video-wrapper\" style=\"padding-top:60%;\" ><iframe title=\"YouTube video player 1\" src=\"https:\/\/www.youtube.com\/embed\/wOqD8Una3NY?wmode=transparent&autoplay=0\" width=\"600\" height=\"360\" allowfullscreen allow=\"autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture;\"><\/iframe><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-flex-start fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:40px;width:100%;max-width:70%;\"><div class=\"fusion-separator-border sep-shadow\" style=\"--awb-height:20px;--awb-amount:20px;background:radial-gradient(ellipse at 50% -50% , #e0dede 0px, rgba(255, 255, 255, 0) 80%) repeat scroll 0 0 rgba(0, 0, 0, 0);background:-webkit-radial-gradient(ellipse at 50% -50% , #e0dede 0px, rgba(255, 255, 255, 0) 80%) repeat scroll 0 0 rgba(0, 0, 0, 0);background:-moz-radial-gradient(ellipse at 50% -50% , #e0dede 0px, rgba(255, 255, 255, 0) 80%) repeat scroll 0 0 rgba(0, 0, 0, 0);background:-o-radial-gradient(ellipse at 50% -50% , #e0dede 0px, rgba(255, 255, 255, 0) 80%) repeat scroll 0 0 rgba(0, 0, 0, 0);\"><\/div><\/div><div class=\"fusion-text fusion-text-6\"><h4 style=\"text-align: center;\">Organization<\/h4>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/smartpress.gr\/\" target=\"_blank\" aria-label=\"smartpress-logo-new\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"300\" height=\"89\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/smartpress-logo-new-300x89.jpg\" alt class=\"img-responsive wp-image-6787\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/smartpress-logo-new-200x59.jpg 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/smartpress-logo-new-400x118.jpg 400w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/smartpress-logo-new.jpg 600w\" sizes=\"(max-width: 640px) 100vw, (max-width: 640px) 100vw, 300px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-flex-start fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:30px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:30px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7\"><h4 style=\"text-align: center;\">\u03a4The printed and digital B2B media of the ICT and Security sector of Smart Press supporting the conference:<\/h4>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.itsecuritypro.gr\" target=\"_blank\" aria-label=\"logo-itsecurity\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"350\" height=\"100\" alt=\"IT Professional Security\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2024\/03\/logo-itsecurity.png\" class=\"img-responsive wp-image-7501\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2024\/03\/logo-itsecurity-200x57.png 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2024\/03\/logo-itsecurity.png 350w\" sizes=\"(max-width: 640px) 100vw, (max-width: 640px) 100vw, 350px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.infocom.gr\" target=\"_blank\" aria-label=\"INFOCOM-300&#215;62-1\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"300\" height=\"62\" alt=\"Infocom\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/INFOCOM-300x62-1.png\" class=\"img-responsive wp-image-5346\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/INFOCOM-300x62-1-200x41.png 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/INFOCOM-300x62-1.png 300w\" sizes=\"(max-width: 640px) 100vw, (max-width: 640px) 100vw, 300px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-5 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.securitymanager.gr\" target=\"_blank\" aria-label=\"Logo Security white sm\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"624\" height=\"227\" alt=\"Security Manager\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/Logo-Security-white-sm.jpg\" class=\"img-responsive wp-image-6789\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/Logo-Security-white-sm-200x73.jpg 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/Logo-Security-white-sm-400x146.jpg 400w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/Logo-Security-white-sm-600x218.jpg 600w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/Logo-Security-white-sm.jpg 624w\" sizes=\"(max-width: 640px) 100vw, (max-width: 640px) 100vw, 400px\" \/><\/a><\/span><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-7450","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/7450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/comments?post=7450"}],"version-history":[{"count":2,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/7450\/revisions"}],"predecessor-version":[{"id":7504,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/7450\/revisions\/7504"}],"wp:attachment":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/media?parent=7450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}