{"id":8307,"date":"2025-03-20T14:34:56","date_gmt":"2025-03-20T12:34:56","guid":{"rendered":"https:\/\/www.infocomsecurity.gr\/?page_id=8307"},"modified":"2025-03-27T17:43:59","modified_gmt":"2025-03-27T15:43:59","slug":"workshops-schedule","status":"publish","type":"page","link":"https:\/\/www.infocomsecurity.gr\/en\/workshops-schedule\/","title":{"rendered":"Workshops Schedule"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-padding-bottom:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-tabs fusion-tabs-1 classic nav-is-justified horizontal-tabs icon-position-left mobile-mode-accordion\" style=\"--awb-title-border-radius-top-left:0px;--awb-title-border-radius-top-right:0px;--awb-title-border-radius-bottom-right:0px;--awb-title-border-radius-bottom-left:0px;--awb-alignment:start;--awb-inactive-color:var(--awb-custom15);--awb-background-color:#ffffff;--awb-border-color:#ebeaea;--awb-active-border-color:#006b7f;\"><div class=\"nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-dab0b436684877cbf98\" aria-selected=\"true\" id=\"fusion-tab-1stdayschedule\u2013wednesdayapril2nd\" href=\"#tab-dab0b436684877cbf98\"><h4 class=\"fusion-tab-heading\">1st Day Schedule \u2013 Wednesday April 2nd<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-35afa1b3d2e7793d58f\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-2nddayschedule\u2013thursdayapril3rd\" href=\"#tab-35afa1b3d2e7793d58f\"><h4 class=\"fusion-tab-heading\">2nd Day Schedule \u2013 Thursday April 3rd<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-content\"><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-dab0b436684877cbf98\" aria-selected=\"true\" id=\"mobile-fusion-tab-1stdayschedule\u2013wednesdayapril2nd\" href=\"#tab-dab0b436684877cbf98\"><h4 class=\"fusion-tab-heading\">1st Day Schedule \u2013 Wednesday April 2nd<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix in active\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-1stdayschedule\u2013wednesdayapril2nd\" id=\"tab-dab0b436684877cbf98\">\n\n<div class=\"table-1\">\n<table style=\"width: 100%;\" width=\"100%\">\n<thead>\n<tr>\n<th style=\"width: 6.74847%;\" align=\"left\">&nbsp;<\/th>\n<th style=\"text-align: center; width: 44.4785%;\" colspan=\"2\" align=\"left\">\n<h3><span style=\"color: #ff6600;\"><strong>HALL 1<\/strong><\/span><\/h3>\n<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center; width: 6.74847%;\" align=\"left\"><strong>\u03a9\u03a1\u0391<\/strong><\/td>\n<td style=\"text-align: center; width: 26.8916%;\" align=\"left\"><strong>\u0398\u03ad\u03bc\u03b1<\/strong><\/td>\n<td style=\"text-align: center; width: 17.5869%;\" align=\"left\"><strong>\u0395\u03b9\u03c3\u03b7\u03b3\u03b7\u03c4\u03ae\u03c2 \u2013 \u0395\u03c4\u03b1\u03b9\u03c1\u03af\u03b1<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 6.74847%;\" align=\"left\"><strong>10.30 &#8211; 11.30<\/strong><\/td>\n<td style=\"width: 26.8916%;\" width=\"238\"><span style=\"color: #800000;\"><strong>Usual Findings for Penetration Test<\/strong><\/span><\/td>\n<td style=\"width: 17.5869%;\" align=\"left\"><strong>Giannis Daskalopoulos,<\/strong> Head of Security Services, Digital Sima<\/p>\n<p><strong>Fotis Kalyvas,<\/strong> Senior Network &amp; Security Engineer, Digital Sima<strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 6.74847%;\" align=\"left\"><strong>11.30-12.30<\/strong><\/td>\n<td style=\"width: 26.8916%;\" align=\"left\"><strong><span style=\"color: #800000;\">Bridging the Gap: Integrating Endpoint Security with SIEM Intelligence<\/span><\/strong><\/td>\n<td style=\"width: 17.5869%;\" align=\"left\"><strong>Romanus Raymond Prabhu,<\/strong> Director of Product Support, <strong>ManageEngine <\/strong><\/p>\n<p><strong>Joseph Msallam, Senior Engineer, Channel IT Ltd<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center; width: 51.227%;\" colspan=\"3\"><strong>12:30 &#8211; 13:30&nbsp; &nbsp;\u0394\u03b9\u03ac\u03bb\u03b5\u03b9\u03bc\u03bc\u03b1<\/strong><strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 6.74847%;\"><strong>13.30 &#8211; 14.30<\/strong><\/td>\n<td style=\"width: 26.8916%;\"><strong><span style=\"color: #800000;\">From Spreadsheets to Success: Optimizing Your Third-Party Risk Management Program<\/span><\/strong><\/td>\n<td style=\"width: 17.5869%;\"><strong>Stathis Mavrovouniotis<\/strong>&nbsp;\u2013 ITGRC Business Unit Manager,&nbsp;<strong>SYNTAX IT Inc<\/strong><\/p>\n<p><strong>Skylar Jones<\/strong>&nbsp;\u2013 Director, Partner and Alliances,&nbsp;<strong>ProcessUnity<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 6.74847%;\"><strong>14.30 &#8211; 15.30<\/strong><\/td>\n<td style=\"width: 26.8916%;\"><strong><span style=\"color: #800000;\">Mission: Compliance \u2013 Navigating NIS2 with Automation &#8211; Startcomply.com<\/span><\/strong><\/td>\n<td style=\"width: 17.5869%;\"><strong>Giorgos Raikos,<\/strong> Chief Information Security Officer, <strong>Tic Tac<\/strong><\/p>\n<p><strong>Panagiotis Pierros,<\/strong> Managing Director, <strong>Tic Tac<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 6.74847%;\"><strong>15.30 &#8211; 16.30<\/strong><\/td>\n<td style=\"width: 26.8916%;\"><strong><span style=\"color: #800000;\">One Platform to Secure Them All \u2013 Acronis Cyber Security Platform &#8211; You don&#8217;t need many tools for Cyber Security if you find the right tool<\/span><\/strong><\/td>\n<td style=\"width: 17.5869%;\"><strong>Giannis Tzimos, <\/strong>Head of Cybersecurity Department, <strong>Tic Tac<\/strong><\/p>\n<p><strong>Stelios Vardakas, <\/strong>Information Technology Support Engineer<strong>, Tic Tac<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 6.74847%;\"><strong>16.30 \u2013 17.15<\/strong><\/td>\n<td style=\"width: 26.8916%;\"><strong><span style=\"color: #800000;\">Threat and Response in Action: Cortex XDR, XSOAR &amp; NGFW with 7-Days Lab Access<\/span><\/strong><\/td>\n<td style=\"width: 17.5869%;\"><strong>Spyros Kasapis<\/strong>, Solution Architect Palo Alto Networks, <strong>Westcon<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"width: 100%;\">\n<thead>\n<tr>\n<th style=\"width: 6.74847%;\" align=\"left\">&nbsp;<\/th>\n<th style=\"text-align: center; width: 44.4785%;\" colspan=\"2\" align=\"left\">\n<h3><span style=\"color: #ff6600;\"><strong>HALL 2<\/strong><\/span><\/h3>\n<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center; width: 6.74847%;\" align=\"left\"><strong>\u03a9\u03a1\u0391<\/strong><\/td>\n<td style=\"text-align: center; width: 26.8916%;\" align=\"left\"><strong>\u0398\u03ad\u03bc\u03b1<\/strong><\/td>\n<td style=\"text-align: center; width: 17.5869%;\" align=\"left\"><strong>\u0395\u03b9\u03c3\u03b7\u03b3\u03b7\u03c4\u03ae\u03c2 \u2013 \u0395\u03c4\u03b1\u03b9\u03c1\u03af\u03b1<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 6.74847%;\" align=\"left\"><strong>10.30 &#8211; 11.30<\/strong><\/td>\n<td style=\"width: 26.8916%;\" width=\"238\"><strong>API protection at it\u2019s best with AI-powered defense and&nbsp;centralized client-side protection.<\/strong><\/td>\n<td style=\"width: 17.5869%;\" align=\"left\">\n<p class=\"elementtoproof\" style=\"background: white;\"><strong><span style=\"font-size: 11.0pt; color: #242424;\">Angelos <\/span><\/strong><span style=\"font-size: 11.0pt; color: #242424;\"><strong>Dometios<\/strong> &#8211; <\/span><span style=\"font-size: 11.0pt; color: #242424;\">Senior Named Account Manager, <strong>F5<\/strong><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background: white;\"><strong><span style=\"font-size: 11.0pt; color: #242424;\">Konstantinos <\/span><\/strong><span style=\"font-size: 11.0pt; color: #242424;\"><strong>Betsis<\/strong> &#8211;&nbsp;<\/span><span style=\"font-size: 11.0pt; color: #242424;\">Solution Architect F5, <strong>Westcon<\/strong><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 6.74847%;\" align=\"left\"><strong>11.30 &#8211; 12.30<\/strong><\/td>\n<td style=\"width: 26.8916%;\" align=\"left\"><strong><span style=\"color: #800000;\">From Oops to Outage: How DLP Saves the Day<\/span><\/strong><\/td>\n<td style=\"width: 17.5869%;\" align=\"left\"><strong>Lambros Katsonis<\/strong>, Solutions Director, <strong>Guardbyte<\/strong><\/p>\n<p><strong>Andreei Rogovets<\/strong>, Vice President, <strong>GTB Technologies<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center; width: 51.227%;\" colspan=\"3\"><strong>12:30 &#8211; 13:30&nbsp; &nbsp;\u0394\u03b9\u03ac\u03bb\u03b5\u03b9\u03bc\u03bc\u03b1<\/strong><strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 6.74847%;\"><strong>13.30 &#8211; 14.30<\/strong><\/td>\n<td style=\"width: 26.8916%;\"><span style=\"color: #800000;\"><strong>Automate your third party risk management program with BitSight VRM<\/strong><\/span><\/td>\n<td style=\"width: 17.5869%;\"><strong>Sofia Michailidou<\/strong>, Technology Consultant, <strong>Systecom <\/strong><\/p>\n<p><strong>Angelos Triantafyllou,<\/strong> Technology Consultant, <strong>Systecom<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 6.74847%;\"><strong>14.30 &#8211; 15.30<\/strong><\/td>\n<td style=\"width: 26.8916%;\"><strong><span style=\"color: #800000;\">Don\u2019t gamble with your crypto assets! Addressing data breaches and navigating the Post-Quantum shift<\/span><\/strong><\/p>\n<hr>\n<p><span style=\"color: #800000;\"><strong>Holistic Security Strategies: Monitoring Third Party Access and Managing Privileged Accounts<\/strong><\/span><\/td>\n<td style=\"width: 17.5869%;\"><strong>Mark Balsom,&nbsp;<\/strong>Director of Technical Sales Consulting,<strong>&nbsp;Entrust<\/strong><\/p>\n<hr>\n<p><strong>Andreas Tsiokanos<\/strong>, PreSales Product Specialist,<strong> BeSecure<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 6.74847%;\"><strong>15.30 &#8211; 16.30<\/strong><\/td>\n<td style=\"width: 26.8916%;\"><strong><span style=\"color: #800000;\">Silverfort Live: How to Stop Lateral Movement Before It Starts<\/span><\/strong><\/td>\n<td style=\"width: 17.5869%;\"><strong>Ofer Breda<\/strong>, Sales Engineer, EMEA, Silverfort, NSS<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 6.74847%;\"><strong>16.30 \u2013 17.15<\/strong><\/td>\n<td style=\"width: 26.8916%;\"><strong><span style=\"color: #800000;\">Transform your IT, with AI-Native operations and support across infrastructure, SD-WAN &amp; Security domains with MIST AI<\/span><\/strong><\/td>\n<td style=\"width: 17.5869%;\"><strong>Matthew Bouris<\/strong>, Partner Success Manager, <strong>Westcon<\/strong><\/p>\n<p><strong>Aris Georgakas<\/strong>, Sr. Consulting Sales Engineer, <strong>Juniper Networks<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-35afa1b3d2e7793d58f\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-2nddayschedule\u2013thursdayapril3rd\" href=\"#tab-35afa1b3d2e7793d58f\"><h4 class=\"fusion-tab-heading\">2nd Day Schedule \u2013 Thursday April 3rd<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-2nddayschedule\u2013thursdayapril3rd\" id=\"tab-35afa1b3d2e7793d58f\">\n\n<div class=\"table-1\">\n<table style=\"width: 100%; height: 327px;\" width=\"100%\">\n<thead>\n<tr style=\"height: 65px;\">\n<th style=\"width: 7.66529%; height: 65px;\" align=\"left\">&nbsp;<\/th>\n<th style=\"text-align: center; width: 50.4455%; height: 65px;\" colspan=\"2\" align=\"left\">\n<h3><span style=\"color: #ff6600;\"><strong>HALL 1<\/strong><\/span><\/h3>\n<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"text-align: center; width: 7.66529%; height: 24px;\" align=\"left\"><strong>\u03a9\u03a1\u0391<\/strong><\/td>\n<td style=\"text-align: center; width: 23.6325%; height: 24px;\" align=\"left\"><strong>\u0398\u03ad\u03bc\u03b1<\/strong><\/td>\n<td style=\"text-align: center; width: 26.813%; height: 24px;\" align=\"left\"><strong>\u0395\u03b9\u03c3\u03b7\u03b3\u03b7\u03c4\u03ae\u03c2 \u2013 \u0395\u03c4\u03b1\u03b9\u03c1\u03af\u03b1<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 72px;\">\n<td style=\"width: 7.66529%; height: 72px;\" align=\"left\"><strong>10.30 &#8211; 11.30<\/strong><\/td>\n<td style=\"width: 23.6325%; height: 72px;\" align=\"left\"><strong><span style=\"color: #800000;\">Beyond the Product \u2013 An Essential Process for the Security of Digital Identities<\/span><\/strong><\/td>\n<td style=\"width: 26.813%;\" align=\"left\"><strong><strong>Russell McDermott,&nbsp;<\/strong><\/strong>Senior Solutions Engineer EMEA, NETWRIX<br \/>\n(on behalf of ICOS)<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 7.66529%; height: 24px;\"><strong> 11.30 &#8211; 12.30<\/strong><\/td>\n<td style=\"width: 23.6325%; height: 24px;\"><strong><span style=\"color: #800000;\">Guarding the Gates: Data Privacy Governance and Risk Mitigation Through Threat Detection and Response<\/span><\/strong><\/td>\n<td style=\"width: 26.813%;\"><strong>Vito Volpini<\/strong>, Principal Solution Consultant,&nbsp;<strong>OpenText<\/strong><\/p>\n<p><strong>Miguel Est\u00e9vez<\/strong>, Principal Solution Consultant,&nbsp;<strong>OpenText<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"text-align: center; width: 58.1108%; height: 24px;\" colspan=\"3\"><strong>12:30 &#8211; 13:30&nbsp; &nbsp;\u0394\u03b9\u03ac\u03bb\u03b5\u03b9\u03bc\u03bc\u03b1&nbsp;<\/strong><strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 7.66529%; height: 22px;\"><strong>13.30 &#8211; 14.30<\/strong><\/td>\n<td style=\"width: 23.6325%; height: 22px;\"><strong><span style=\"color: #800000;\">DORA Regulation: Myth, reality and solutions<\/span><\/strong><\/td>\n<td style=\"width: 26.813%; height: 22px;\"><strong>Stylianos Christoforou<\/strong> &#8211; Attorney at technology issues, Partner at <strong>INFONET SYSTEMS<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 72px;\">\n<td style=\"width: 7.66529%; height: 72px;\"><strong>14.30 &#8211; 15.30<\/strong><\/td>\n<td style=\"width: 23.6325%; height: 72px;\"><strong><span style=\"color: #800000;\">A Compliance Toolkit for the Hands-On CISO &#8211; Managing all your Needs in a Practical Manner<\/span><\/strong><\/td>\n<td style=\"width: 26.813%; height: 72px;\"><strong>\u0394\u03b7\u03bc\u03ae\u03c4\u03c1\u03b7\u03c2 \u0393\u03b5\u03c9\u03c1\u03b3\u03af\u03bf\u03c5<\/strong>&nbsp;\u2013 Chief Security Officer,&nbsp;<strong>ALPHABIT<\/strong><br \/>\n<strong>\u03a3\u03c0\u03cd\u03c1\u03bf\u03c2 \u03a0\u03b9\u03c4\u03b9\u03ba\u03ac\u03c1\u03b7\u03c2 \u2013&nbsp;<\/strong>Information Security Consultant,&nbsp;<strong>ALPHABIT<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 7.66529%; height: 24px;\"><strong>15.30 &#8211; 16.30<\/strong><\/td>\n<td style=\"width: 23.6325%; height: 24px;\"><strong><span style=\"color: #800000;\">Close Security Gaps Faster: How VMaaS Accelerates Remediation<\/span><\/strong><\/td>\n<td style=\"width: 26.813%; height: 24px;\"><strong>Ioannis Karygiannis, <\/strong>Lead Cyber Security Engineer,<strong> Netcompany<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"width: 100%;\">\n<thead>\n<tr>\n<th style=\"width: 7.84196%;\" align=\"left\">&nbsp;<\/th>\n<th style=\"text-align: center; width: 50.2687%;\" colspan=\"2\" align=\"left\">\n<h3><span style=\"color: #ff6600;\"><strong>HALL 2<\/strong><\/span><\/h3>\n<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center; width: 7.84196%;\" align=\"left\"><strong>\u03a9\u03a1\u0391<\/strong><\/td>\n<td style=\"text-align: center; width: 23.4557%;\" align=\"left\"><strong>\u0398\u03ad\u03bc\u03b1<\/strong><\/td>\n<td style=\"text-align: center; width: 26.813%;\" align=\"left\"><strong>\u0395\u03b9\u03c3\u03b7\u03b3\u03b7\u03c4\u03ae\u03c2 \u2013 \u0395\u03c4\u03b1\u03b9\u03c1\u03af\u03b1<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 7.84196%;\" align=\"left\"><strong>10.30 &#8211; 11.30<\/strong><\/td>\n<td style=\"width: 23.4557%;\" align=\"left\"><strong><span style=\"color: #800000;\">Deep dive on SentinelOne platform with a platform demo<\/span><\/strong><\/td>\n<td style=\"width: 26.813%;\" align=\"left\"><strong>Carlos Pay\u00e9s, <\/strong>Sr Manager, Solution Engineering,<strong> SentinelOne <\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 7.84196%;\"><strong>11.30 &#8211; 12.30<\/strong><\/td>\n<td style=\"width: 23.4557%;\"><strong><span style=\"color: #800000;\">Deep Dive on Recorded Future Threat Intelligence Platform<\/span><\/strong><\/td>\n<td style=\"width: 26.813%;\"><strong>Brugnoli Max<\/strong>, Sales Engineer, <strong>Recorded Future<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center; width: 58.1107%;\" colspan=\"3\"><strong>12:30 &#8211; 13:30&nbsp; &nbsp;\u0394\u03b9\u03ac\u03bb\u03b5\u03b9\u03bc\u03bc\u03b1&nbsp;<\/strong><strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 7.84196%;\"><strong>13.30 &#8211; 14.30<\/strong><\/td>\n<td style=\"width: 23.4557%;\"><strong><span style=\"color: #800000;\">Why I became a hacker: Empowering teams, people and customer security<\/span><\/strong><\/td>\n<td style=\"width: 26.813%;\"><strong>Panagiotis Fyskilis, <\/strong>Senior Penetration Tester,<strong> NVISO<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 7.84196%;\"><strong>14.30 &#8211; 15.30<\/strong><\/td>\n<td style=\"width: 23.4557%;\"><strong><span style=\"color: #800000;\">NIS2 in Action: From Compliance to Cyber Resilience<\/span><\/strong><\/td>\n<td style=\"width: 26.813%;\"><strong>Constantinos Mourikis<\/strong>, Senior Solutions Architect, Odyssey<\/p>\n<p><strong>Charis Makris<\/strong>, Senior GRC Specialist, Odyssey<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 7.84196%;\"><strong>15.30 &#8211; 16.30<\/strong><\/td>\n<td style=\"width: 23.4557%;\">&nbsp;<\/td>\n<td style=\"width: 26.813%;\">Westcon<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-8307","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/8307","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/comments?post=8307"}],"version-history":[{"count":20,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/8307\/revisions"}],"predecessor-version":[{"id":8399,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/8307\/revisions\/8399"}],"wp:attachment":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/media?parent=8307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}