{"id":8287,"date":"2025-03-20T11:25:07","date_gmt":"2025-03-20T09:25:07","guid":{"rendered":"https:\/\/www.infocomsecurity.gr\/?page_id=8287"},"modified":"2025-03-31T15:36:52","modified_gmt":"2025-03-31T12:36:52","slug":"plenary-schedule","status":"publish","type":"page","link":"https:\/\/www.infocomsecurity.gr\/en\/15th-infocom-security-02-03-april-2025\/plenary-schedule\/","title":{"rendered":"Plenary Schedule"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-padding-bottom:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-tabs fusion-tabs-1 classic nav-is-justified horizontal-tabs icon-position-left mobile-mode-accordion\" style=\"--awb-title-border-radius-top-left:0px;--awb-title-border-radius-top-right:0px;--awb-title-border-radius-bottom-right:0px;--awb-title-border-radius-bottom-left:0px;--awb-alignment:start;--awb-inactive-color:var(--awb-custom15);--awb-background-color:#ffffff;--awb-border-color:#ebeaea;--awb-active-border-color:#006b7f;\"><div class=\"nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-5ff90f3935b5baf1e54\" aria-selected=\"true\" id=\"fusion-tab-1stdayschedule\u2013wednesdayapril2nd\" href=\"#tab-5ff90f3935b5baf1e54\"><h4 class=\"fusion-tab-heading\">1st Day Schedule \u2013 Wednesday April 2nd<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-b0e2e13a35aa3ccf20c\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-2nddayschedule\u2013thursdayapril3rd\" href=\"#tab-b0e2e13a35aa3ccf20c\"><h4 class=\"fusion-tab-heading\">2nd Day Schedule \u2013 Thursday April 3rd<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-content\"><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-5ff90f3935b5baf1e54\" aria-selected=\"true\" id=\"mobile-fusion-tab-1stdayschedule\u2013wednesdayapril2nd\" href=\"#tab-5ff90f3935b5baf1e54\"><h4 class=\"fusion-tab-heading\">1st Day Schedule \u2013 Wednesday April 2nd<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix in active\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-1stdayschedule\u2013wednesdayapril2nd\" id=\"tab-5ff90f3935b5baf1e54\">\n<p><span style=\"text-decoration: underline; color: #0000ff;\"><strong>09:00 \u2013 09:30 \u2013 Registration \/ Check-in<\/strong><\/span><\/p>\n<p><span style=\"text-decoration: underline; color: #0000ff;\"><strong>09:30 \u2013 10:00 \u2013 Intro Speeches<\/strong><\/span><\/p>\n<p><strong>Dimitris Papastergiou<\/strong> \u2013 Minister of Digital Governance<\/p>\n<p><strong>Dr. Yiannis Pavlosoglou<\/strong> \u2013 Deputy Commander of the National Cybersecurity Authority<\/p>\n<p>Brigadier General<strong> Vasilios Bertanos<\/strong> \u2013 Director of the Cybercrime Unit of the Hellenic Police<\/p>\n<p><span style=\"color: #0000ff;\"><strong><u>10:00 \u2013 12:30 \u2013 1st session<\/u><\/strong><\/span><span style=\"color: #ff6600;\"><strong><br \/>\n<\/strong><\/span><\/p>\n<p><span style=\"color: #333399;\"><strong>The Evolution of Cyber Threats in the era of \u0391\u0399<\/strong><strong><br \/>\nRethinking Cybersecurity: From Reactive Defense to Proactive Protection<\/strong><\/span><\/p>\n<p><strong><span style=\"color: #800000;\">From Detection to Action: Transforming Security with NG-SOC for IT and OT critical infrastructures!<\/span><br \/>\n<\/strong><strong>Antonis Paravalos &#8211; <\/strong>CyberSecurity &amp; Network Manager,<strong> PERFORMANCE<br \/>\n<\/strong><strong>Giorgos Tsarouchas &#8211; <\/strong>Senior Incident Responder,<strong> Threatscene<\/strong><strong>&nbsp;<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">0Days and Zero Trust, Protection Right at the Source<\/span><br \/>\n<\/strong><b>Giannis Pavlidis<\/b> &#8211; Senior Security Architect, <strong>UNI SYSTEMS<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">From Threats to Insights: The Role of AI in Cyber Threat Intelligence<\/span><br \/>\n<\/strong><strong>Nikitas Kladakis \u2013 <\/strong>General Manager,<strong>&nbsp;ADACOM<\/strong><strong>&nbsp;<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Zero Trust: The Key to Sustainable Cyber Resilience <\/span><br \/>\n<\/strong><strong>Andreas Lalos<\/strong>&nbsp;&#8211; Professional Services Director,<strong> BESECURE<\/strong><strong>&nbsp;<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>AI-Powered Attacks Move Fast. Future-Proof Your Cybersecurity Before It\u2019s Too Late<\/strong><\/span><br \/>\n<strong>Andreas Konstantinidis<\/strong> \u2013 Managed Services Director, <strong>ODYSSEY<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Industrial Shield: Comprehensive OT Security Strategy<\/span><\/strong><br \/>\n<strong>Dimitris Tsaktsiras<\/strong> &#8211; Cybersecurity Solutions Manager, <strong>Space Hellas<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Cybersecurity \u00c0 la carte<br \/>\n<\/strong><\/span><b>Kostas Papadatos <\/b>\u2013 &nbsp;Founder &amp; Managing Director,<strong>&nbsp;CYBER NOESIS<\/strong><strong>&nbsp;<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">\u039c\u03cd\u03b8\u03bf\u03b9 &amp; \u03b1\u03bb\u03ae\u03b8\u03b5\u03b9\u03b5\u03c2 \u03b3\u03b9\u03b1 \u03c4\u03b7\u03bd \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1 \u03c4\u03c9\u03bd \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03c9\u03bd \u03ba\u03b1\u03b9 \u03cc\u03c7\u03b9 \u03bc\u03cc\u03bd\u03bf<\/span><br \/>\nTryphon Amer &#8211; &nbsp;<\/strong>General Manager, <strong>T\u00dc<\/strong><strong>V <\/strong><strong>AUSTRIA <\/strong><strong>TRUST <\/strong><strong>IT<\/strong><strong>&nbsp;<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Breaking Bad: Cyber Edition<\/strong>&nbsp;\u2013 <strong>How insider threats, misconfigurations, and bad practices can break your security<\/strong><\/span><br \/>\n<b>Panagiotis Pierros<\/b> \u2013 Managing Director,&nbsp;<strong>TICTAC CYBER SECURITY<\/strong><strong>&nbsp;<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Reliable and scalable operations for increased customer trust with AI-Driven, Advanced Zero Trust Security extended to the Network<\/strong><\/span><br \/>\n<strong>Eli Kendel<\/strong>&nbsp;\u2013 Regional Territory Manager,&nbsp;<strong>Extreme Networks<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Streamlined Security Operations: Reducing Noise, Enhancing Response, Improving Business Resilience<\/strong><\/span><br \/>\n<strong>George Kitson<\/strong> \u2013 Partner Manager at <strong>Security HQ<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Unveiling the Greek market cybersecurity landscape | The State Of Cybersecurity<\/strong><\/span><br \/>\n<strong>Dimitris Fatsiletos &#8211; <\/strong>Sales Manager,<strong> PYLONES<\/strong><strong>&nbsp;<\/strong><\/p>\n<p><span style=\"color: #0000ff;\"><strong><u>12:30 \u2013 13:15 \u2013 Break<\/u><\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff;\"><strong><u>13:15 \u2013 15:15 \u2013 2nd session<\/u><\/strong><strong><u><br \/>\n<\/u><\/strong><\/span><\/p>\n<p><span style=\"color: #333399;\"><strong>Beyond Traditional Security: How Emerging Technologies Redefine Cyber Protection<br \/>\n<em>AI, SASE, XDR, DLP, MDR &amp; Zero Trust in Action<\/em><\/strong><\/span><\/p>\n<p><span style=\"color: #800000;\"><strong>Secure Access Service Edge (SASE): Future-Proofing Enterprise Security<\/strong><\/span><br \/>\n<b>Marios Poupoulekou<\/b> &#8211; Security Analyst, <strong>ACCENTURE<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Beyond Firewalls: The Critical Role of DLP in Modern Cybersecurity<\/span><\/strong><br \/>\n<strong>Lambros Katsonis<\/strong> &#8211; Solutions Director, <strong>GUARDBYTE<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Embracing OT Security Journey: Blending Innovation with Battle-Tested Defense<br \/>\n<\/strong><\/span><strong>Christos Alexopoulos<\/strong> &#8211; Principal Cyber Security Engineer, <strong>NETCOMPANY<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Connecting and Protecting Organizations in the AI Era<br \/>\n<\/strong><\/span><strong>Lothar Renner<\/strong> &#8211; Managing Director, EMEA, <strong>CISCO SECURITY<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Your Risks Are Unique. So Why Isn\u2019t Your Security?<br \/>\n<\/strong><\/span><strong>Gabriel Mazarache &#8211; Technical<\/strong> Product Manager,<strong> BITDEFENDER<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Exploring the Heart of Cybersecurity Operations<\/span><br \/>\nJoseph Msallam &#8211; <\/strong>Senior Engineer, <strong>CHANNEL IT Ltd<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Outsource your response function with Sophos MDR<\/span><br \/>\n<\/strong><b>Stelios Gerardis<\/b> &#8211; Sales Manager, <strong>NSS<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>The Identity Security Blind spots &#8211; Threats and Modern Security approach<br \/>\n<\/strong><\/span><strong>Roy Akerman<\/strong> &#8211; VP Identity Security Strategy, <strong>SILVERFORT<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>XDR, NDR \u03ba\u03b1\u03b9 NIS 2 Compliance. \u03a0\u03bb\u03b5\u03bf\u03bd\u03b5\u03ba\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1 \u03ba\u03b1\u03b9 \u03bc\u03b5\u03b9\u03bf\u03bd\u03b5\u03ba\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1 \u03c4\u03b7\u03c2 \u03b5\u03bd\u03b9\u03b1\u03af\u03b1\u03c2 \u03c0\u03bb\u03b1\u03c4\u03c6\u03cc\u03c1\u03bc\u03b1\u03c2<\/strong><\/span><br \/>\n<strong>Antonis Kalochristianakis<\/strong> &#8211; Sales Director, <strong>DIGITAL SIMA<\/strong><br \/>\n<strong>Marina Nikolaou<\/strong> &#8211; Channel Account Manager, <strong>WATCHGUARD<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Ivanti Neurons &#8211; DEX: Breaking Down Barriers Between IT &amp; Security<\/strong><\/span><br \/>\n<strong>Sara Gamba &#8211; <\/strong>Senior Security &amp; UEM Solutions Sales,<strong> IVANTI<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Product Security: from concept to market, and beyond<\/span><br \/>\n<\/strong><b>Dimitris Glynos<\/b> \u2013 Director, <strong>INTWAVE<\/strong><\/p>\n<p><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\"><strong>15:15 \u2013 16:00 \u2013 3rd session<\/strong><\/span><\/span><strong><br \/>\n<\/strong><\/p>\n<p><span style=\"color: #333399;\"><strong>SOC 360<sup>O<\/sup>: A Holistic Approach to Cyber Threat Management<br \/>\nFrom Visibility to Victory: Maximizing Security Operations Centers Effectiveness<\/strong><\/span><\/p>\n<p><span style=\"color: #800000;\"><em><strong>Debate Panel:&nbsp;<\/strong><\/em><\/span><\/p>\n<p><strong>Katerina Zervonikolaki<\/strong> &#8211; Security, Business Development Lead, <strong>PERFORMANCE<\/strong><\/p>\n<p><strong>Lefteris Karavaras<\/strong> &#8211; SOC Operations Manager, <strong>ADACOM<\/strong><\/p>\n<p><strong>Andreas Konstantinidis<\/strong> &#8211; Managed Services Director, <strong>ODYSSEY<\/strong><\/p>\n<p><strong>Socrates Kelesoglou<\/strong> &#8211; SOC Manager, <strong>SPACE HELLAS<\/strong><\/p>\n<p><strong>Tryphon Amer<\/strong> &#8211; General Manager,&nbsp; <strong>T\u00dcV AUSTRIA Trust IT<\/strong><\/p>\n<p><strong>\u039a\u03b1\u03c4\u03b5\u03c1\u03af\u03bd\u03b1 \u0396\u03b5\u03c1\u03b2\u03bf\u03bd\u03b9\u03ba\u03bf\u03bb\u03ac\u03ba\u03b7<\/strong>, Security, Business Development Lead,&nbsp;<strong>PERFORMANCE<\/strong><\/p>\n<p><strong>\u039b\u03b5\u03c5\u03c4\u03ad\u03c1\u03b7\u03c2 \u039a\u03b1\u03c1\u03b1\u03b2\u03ac\u03c1\u03b1\u03c2 \u2013&nbsp;<\/strong>&nbsp;SOC Operations Manager,&nbsp;<strong>ADACOM<\/strong><\/p>\n<p><strong>\u0391\u03bd\u03c4\u03c1\u03ad\u03b1\u03c2 \u039a\u03c9\u03bd\u03c3\u03c4\u03b1\u03bd\u03c4\u03b9\u03bd\u03af\u03b4\u03b7\u03c2<\/strong>&nbsp;\u2013 Managed Services Director,&nbsp;<strong>ODYSSEY<\/strong><\/p>\n<p><strong>\u03a3\u03c9\u03ba\u03c1\u03ac\u03c4\u03b7\u03c2 \u039a\u03b5\u03bb\u03ad\u03c3\u03bf\u03b3\u03bb\u03bf\u03c5<\/strong>, SOC Manager,&nbsp;<strong>SPACE HELLAS<\/strong><\/p>\n<p><strong>\u03a4\u03c1\u03cd\u03c6\u03c9\u03bd \u0386\u03bc\u03b5\u03c1 \u2013&nbsp;<\/strong>\u0393\u03b5\u03bd\u03b9\u03ba\u03cc\u03c2 \u0394\u03b9\u03b5\u03c5\u03b8\u03c5\u03bd\u03c4\u03ae\u03c2,&nbsp;&nbsp;<strong>T\u00dcV AUSTRIA Trust IT<\/strong><\/p>\n<p>Moderator: <strong>Stella Tsitsoula,<\/strong> Vice President Women4Cyber Greece, Founder RED.comm<\/p>\n<p><span style=\"text-decoration: underline; color: #0000ff;\"><strong>16:00 \u2013 16:30 \u2013 Networking<\/strong><\/span><\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-b0e2e13a35aa3ccf20c\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-2nddayschedule\u2013thursdayapril3rd\" href=\"#tab-b0e2e13a35aa3ccf20c\"><h4 class=\"fusion-tab-heading\">2nd Day Schedule \u2013 Thursday April 3rd<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-2nddayschedule\u2013thursdayapril3rd\" id=\"tab-b0e2e13a35aa3ccf20c\">\n<p><span style=\"text-decoration: underline; color: #0000ff;\"><strong>09:00 \u2013 09:30 \u2013 Registration \/ Check-in<\/strong><\/span><\/p>\n<p><span style=\"text-decoration: underline; color: #0000ff;\"><strong>09:30 \u2013 10:00 \u2013 Intro Speeches<\/strong><\/span><\/p>\n<p><strong>Constantina Syntila<\/strong> &#8211; \u03a0\u03c1\u03cc\u03b5\u03b4\u03c1\u03bf\u03c2 \u0394.\u03a3, <strong>ISC2 Hellenic Chapter<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Space Infrastructure Cybersecurity: an opportunity we cannot waste<\/span><\/strong><br \/>\n<strong>Athanasios Staveris Polykalas &#8211; <\/strong>Senior AI &amp; Cybersecurity Consultant<\/p>\n<p><span style=\"color: #0000ff;\"><strong><u>10:00 \u2013 12:30 \u2013 1st session<\/u><\/strong><strong><u><br \/>\n<\/u><\/strong><\/span><\/p>\n<p><strong><span style=\"color: #ff6600;\"><span style=\"color: #000080;\">Navigating the Evolving Cybersecurity Framework: Challenges &amp; Best Practices<\/span><br \/>\n<span style=\"color: #000080;\">Cyber Resilience in Vertical Markets: Moving Beyond Compliance<\/span><\/span><\/strong><\/p>\n<p><em>Fireside Chat:<\/em><strong><br \/>\n<\/strong><strong><span style=\"color: #800000;\">Cyber Risk as a Business Risk<\/span><br \/>\n<\/strong><b>Demosthenes Georgakopoulos<\/b> &#8211; Managing Director,<strong> SYSTECOM<\/strong><strong>&nbsp;<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">A Comprehensive Cybersecurity Risk and Compliance Management Framework<\/span><br \/>\n<\/strong><strong>Theodoros Douskas &#8211; <\/strong>Managing Director,<strong> ICT PROTECT<\/strong><strong>&nbsp;<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>GRC and TPRM on <\/strong><strong>a<\/strong><strong>utopilot<\/strong><strong>?<\/strong><strong> Master Risk, Stay in Control, and Actually Have a Life<\/strong><\/span><strong><span style=\"color: #800000;\">!<\/span><br \/>\n<\/strong><strong>Dimitris Georgiou &#8211; <\/strong>&nbsp;MSc CPFA CPSP CISSP \u2013 Chief Security Officer-Partner,<strong> ALPHABIT CYBERSECURITY<\/strong><strong>&nbsp;<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Zero Trust in action: \u039c\u03b9\u03b1 \u03a3\u03c4\u03c1\u03b1\u03c4\u03b7\u03b3\u03b9\u03ba\u03ae \u03a0\u03c1\u03bf\u03c3\u03ad\u03b3\u03b3\u03b9\u03c3\u03b7 \u03b3\u03b9\u03b1 \u03c4\u03bf\u03c5\u03c2 \u03bf\u03c1\u03b3\u03b1\u03bd\u03b9\u03c3\u03bc\u03bf\u03cd\u03c2<\/strong><\/span><br \/>\n<strong>Alexandros Karadimitris &#8211; <\/strong>Cybersecurity Team Lead,<strong> EMPIST<\/strong><strong>&nbsp;<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Artificial Intelligence &#8211; Fool or Genius?<\/span><br \/>\n<\/strong><strong>Michalis Alexiou &#8211; <\/strong>IT &amp; IS Product Manager &#8211; Senior Auditor,<strong> T\u00dcV HELLAS (T\u00dcV NORD) S.A.<\/strong><strong>&nbsp;<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">From Spreadsheets to Success: Optimizing Your Third-Party Risk Management Program<\/span><br \/>\n\u03a3\u03c4\u03ac\u03b8\u03b7\u03c2 \u039c\u03b1\u03c5\u03c1\u03bf\u03b2\u03bf\u03c5\u03bd\u03b9\u03ce\u03c4\u03b7\u03c2<\/strong>&nbsp;\u2013 ITGRC Business Unit Manager,&nbsp;<strong>SYNTAX IT Inc<br \/>\nConstantine Malaxos &#8211; <\/strong>VP, Global Partners and Alliances, <strong>ProcessUnity<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>\u0391<\/strong><strong>re you human or not? Navigating an ongoing malicious campaign&#8230;<\/strong><\/span><strong><br \/>\n<\/strong><b>Anargyros Chrysanthou<\/b> \u2013 CEO, Founder,&nbsp;<strong>V4ENSICS<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Business Continuity on Microsoft Cloud<\/strong><\/span><br \/>\n<strong>Elpida Rouka<\/strong> &#8211; &nbsp;Cyber Security Manager &#8211; Cloud Security, <strong>NVISO<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Proactive Cyber Insurance<\/span><br \/>\n<\/strong><b>Nikos Georgopoulos<\/b> &#8211; Digital Risks Insurance Broker <strong>CROMAR<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">The need for legal support to comply with DORA<\/span><br \/>\nStylianos Christoforou<\/strong> &#8211; Attorney at technology issues, Partner at <strong>INFONET SYSTEMS<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Rising Shields: Onboarding and Upskilling the New Cyber Workforce<\/span><br \/>\n<\/strong><b>Achilleas Viennas<\/b> &#8211; Senior Cybersecurity Instructor, <strong>LEARNING ACTORS<\/strong><\/p>\n<p><span style=\"color: #0000ff;\"><strong><u>12:30 \u2013 13:15 \u2013 Break<\/u><\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff;\"><strong><u>13:15 \u2013 15:00 \u2013 2nd session<\/u><\/strong><\/span><\/p>\n<p><span style=\"color: #000080;\"><strong>Smart and Tailor-Made Security Solutions in the Cyber Battlefield<br \/>\n<\/strong><strong>Attack, <\/strong><strong>Defense, <\/strong><strong>and <\/strong><strong>the <\/strong><strong>Future <\/strong><strong>of <\/strong><strong>Cyberwar<\/strong><\/span><\/p>\n<p><span style=\"color: #800000;\"><strong>ICOS: The True Value in IT Distribution<br \/>\n<\/strong><\/span><strong>Norberto Gazzoni<\/strong> &#8211; Regional Account Manager, <strong>ICOS<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Empowering Resilience &amp; Compliance: How OpenText Cybersecurity Drives Digital Transformation<\/span><\/strong><br \/>\n<strong>Pierpaolo Ali<\/strong> &#8211; Director Southern Europe, <strong>OPENTEXT<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Reduce your attack surface using Keeper technology!<\/span><\/strong><br \/>\n<strong>Giorgos Kouimintzis<\/strong> &#8211; Commercial Manager, <strong>NSS<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Preventing Data Exfiltration: A 360-Degree DLP Strategy for End-to-End Security from Cloud to Endpoint<\/strong><\/span><br \/>\n<strong>Maurizio Taglioretti<\/strong>&nbsp;\u2013 Regional Director South Eastern and Eastern Europe,&nbsp;<strong>NETWRIX<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Behavioral biases in security adoption and social engineering attacks<\/span><\/strong><br \/>\n<strong>Daniel Gold \u2013<\/strong> Head of Neuro Research, Neuro Research and Marketing Techniques, <strong>KASPERSKY<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Remote Access Redefined: The AnyDesk Advantage<br \/>\n<\/strong><\/span><strong>Kelvin de Bruyn<\/strong> &#8211; Channel Account Manager, <strong>ANYDESK<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Platform Approach to Comprehensive Cybersecurity<\/strong><\/span><br \/>\n<strong>Carlos Pay\u00e9s<\/strong> &#8211; Sr. Manager, Solution Engineering, <strong>SentinelOne<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Intelligence led security programs<\/strong><\/span><br \/>\n<strong>Javier Carreras<\/strong> &#8211; Sales Manager Southern Europe, <strong>Recorded Future<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Ingecom Ignition: Now in Greece, Leading the Way in Cybersecurity<\/strong><\/span><br \/>\n<strong>Sergio Manidi<\/strong> \u2013 Regional Manager South East Europe, <strong>INGECOM<\/strong><\/p>\n<p><span style=\"color: #0000ff;\"><span style=\"text-decoration: underline;\"><strong>15:00 \u2013 16:00 \u2013 3rd session<\/strong><\/span><span style=\"color: #ff6600;\"><strong><br \/>\n<\/strong><\/span><\/span><\/p>\n<p><strong>CISO 2.0: Leading Cybersecurity in the Age of Digital Transformation and AI<br \/>\nBeyond Compliance: The CISO\u2019s Role in Building Cyber Resilience&#8221;<\/strong><\/p>\n<p><span style=\"text-decoration: underline; color: #0000ff;\"><strong>16:00 \u2013 16:30 \u2013 Conclusion &#8211; Networking<\/strong><\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":8112,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-8287","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/8287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/comments?post=8287"}],"version-history":[{"count":15,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/8287\/revisions"}],"predecessor-version":[{"id":8409,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/8287\/revisions\/8409"}],"up":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/8112"}],"wp:attachment":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/media?parent=8287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}