{"id":8845,"date":"2026-02-08T20:11:59","date_gmt":"2026-02-08T18:11:59","guid":{"rendered":"https:\/\/www.infocomsecurity.gr\/?page_id=8845"},"modified":"2026-02-08T20:18:50","modified_gmt":"2026-02-08T18:18:50","slug":"16th-infocom-security-29-30-april-2026","status":"publish","type":"page","link":"https:\/\/www.infocomsecurity.gr\/en\/","title":{"rendered":"16th Infocom Security &#8211; 29 &#038; 30 April 2026"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-bottom:0px;--awb-background-color:var(--awb-custom_color_1);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-bottom:0px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:36;line-height:1.33;\">16th InfoCom Security 2026<\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:-8px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:28;line-height:1.91;\"><em>Conference &amp; Expo<\/em><\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-padding-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-bottom:0px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color7);--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.25;\"><p>The Da Vinci Code of Cybersecurity<br \/>\n\u201cFrom Renaissance to Resilience\u201d<\/p><\/h2><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color7);--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:22;--minFontSize:22;line-height:1.5;\">April 29 &amp; 30<br \/>\nAthens Conservatoire<\/h4><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-animated\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-padding-bottom:40px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" data-animationType=\"fadeInUp\" data-animationDuration=\"0.3\" data-animationOffset=\"top-into-view\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1 awb-text-cols fusion-text-columns-2\" style=\"--awb-columns:2;--awb-column-spacing:2em;--awb-column-min-width:300px;\"><p><strong>Leonardo da Vinci was not merely a brilliant artist; he was the first true systems thinker in history. In an era of Renaissance, when knowledge was breaking free from the constraints of tradition, Da Vinci studied the world as a unified system: machines, the human body, nature, and defense functioned as interconnected parts of a larger mechanism. His designs were not aimed solely at creation, but also at anticipation, protection, and resilience in the face of the unknown.<\/strong><\/p>\n<p><strong>In our time, the Digital Renaissance &#8211; driven by technologies such as cloud computing, artificial intelligence, IoT and OT systems, and interconnected operational infrastructures &#8211; is radically reshaping the way organizations and societies function. However, this progress is accompanied by multiple, evolving threats that require not only technological solutions but also strategic thinking, resilience, and collaboration on every level. Just as Leonardo da Vinci combined art with science, modern cybersecurity today requires the use of advanced technological tools while remaining fundamentally grounded in human creativity and knowledge.<\/strong><\/p>\n<p><strong>The 16th InfoCom Security returns once again to capture all contemporary developments, highlight major challenges, and open dialogue on all critical issues related to cybersecurity, offering information, knowledge, and networking opportunities to a broad community of professionals in the field of Information Security. Through this year\u2019s distinctive central concept, InfoCom Security 2026 will operate as a dynamic and interactive platform for decoding modern cybersecurity &#8211; from digital systems architecture and artificial intelligence to crisis management, protection of critical infrastructures, and strategic thinking.<\/strong><\/p>\n<p><strong>InfoCom Security has always been much more than a conference; it is a forum for knowledge exchange, reflection, and growth. With keynote speeches, panel discussions, workshops, and the presence of leading market companies in its exhibition area, it approaches modern challenges on multiple levels &#8211; from integrating security into overall business strategy to developing human skills and strengthening a data protection culture.<\/strong><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-bottom:4%;--awb-background-color:var(--awb-color2);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:35px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.25;\">Discovering the Secrets of Security towards the Journey to Resilience<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-top:0px;margin-bottom:35px;width:100%;max-width:170px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#e2e3e8;border-color:#e2e3e8;border-top-width:3px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-2\"><p>By linking the concept \u201cThe Da Vinci Code of Cybersecurity\u201d with the spirit and content of InfoCom Security, this year\u2019s event will decode the ability to \u201cread\u201d threat patterns before they become attacks, to understand the structures of the modern digital ecosystem of businesses and organizations, and to apply protective technological tools that do not merely react, but anticipate.<\/p>\n<p>Just as Da Vinci designed defensive mechanisms centuries before their implementation, modern cybersecurity is called upon to think ahead of its time, requiring:<\/p>\n<ul>\n<li>A holistic understanding of today and tomorrow\u2019s challenges<\/li>\n<li>Critical and creative thinking by leaders and professionals<\/li>\n<li>Strategic integration of security into business operations<\/li>\n<li>Flexible compliance within a dynamic regulatory environment<\/li>\n<\/ul>\n<p>The rationale behind \u201cFrom Renaissance to Resilience\u201d represents a journey from the inspiration of the Renaissance to today\u2019s practical resilience &#8211; where knowledge is transformed into experience and technological innovation into robust security.<\/p>\n<p>This journey reinforces the culture behind InfoCom Security &#8211; at a time when everything relies on digital infrastructures, and artificial intelligence is taking on a dominant role in shaping productive and operational processes-seeking comprehensive security strategies, innovative solutions that combine technology and the human factor, and best practices that lead to compliance, security, and resilience.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:40px;--awb-border-radius-top-right:40px;--awb-border-radius-bottom-right:40px;--awb-border-radius-bottom-left:40px;--awb-overflow:hidden;--awb-padding-top:0px;--awb-padding-bottom:20px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-padding-right:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#0075c9;--awb-bg-color-hover:#0075c9;--awb-bg-size:cover;--awb-border-radius:40px 40px 40px 40px;--awb-margin-bottom:0px;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-top:35px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:28;line-height:1.91;\">Content Unfolding on Multiple Levels<\/h3><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-text-color:var(--awb-color1);\"><p>During the two-day 16th InfoCom Security 2026, participants will have the opportunity to explore an expanded range of current topics across multiple levels.<\/p>\n<p>The main conference program will feature keynote speeches by institutional representatives, presentations by market experts, and panel discussions between executives from leading organizations and industry professionals.<\/p>\n<p>At the same time, visitors will -as always- have the opportunity to attend workshops held in dedicated rooms, offering in-depth, hands-on analysis of modern solutions, applications, and services.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"2560\" height=\"1020\" title=\"25a\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/25a-scaled.jpg\" alt class=\"img-responsive wp-image-8834\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/25a-200x80.jpg 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/25a-400x159.jpg 400w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/25a-600x239.jpg 600w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/25a-800x319.jpg 800w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/25a-1200x478.jpg 1200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/25a-scaled.jpg 2560w\" sizes=\"(max-width: 800px) 100vw, 1200px\" \/><\/span><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.25;\">Sponsors\u2019 Exhibition of Leading Cybersecurity Companies<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-top:0px;margin-bottom:35px;width:100%;max-width:170px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#e2e3e8;border-color:#e2e3e8;border-top-width:3px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-4\"><p>At InfoCom Security 2026, the exhibition area becomes a central meeting place for visitors and market executives. Conference sponsors will have the opportunity to present their activities, solutions, and innovations, while also discussing prospects for collaboration with top industry executives.<\/p>\n<p>Every year, InfoCom Security brings together the largest and most distinguished brands from Greece and abroad in the field of cybersecurity, covering projects, services, and end-to-end solutions. With universal market recognition, the InfoCom Security exhibition constitutes the most important opportunity of outreach and networking for the Cyber Security sector in Greece.<\/p>\n<p>Professional meetings and personal contacts, taking place throughout the event, are of particular importance, offering opportunities for the exchange of knowledge, experience, and best practices with leading industry professionals.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"2500\" height=\"1236\" title=\"25b\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/25b.jpg\" alt class=\"img-responsive wp-image-8836\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/25b-200x99.jpg 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/25b-400x198.jpg 400w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/25b-600x297.jpg 600w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/25b-800x396.jpg 800w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/25b-1200x593.jpg 1200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/25b.jpg 2500w\" sizes=\"(max-width: 800px) 100vw, 1200px\" \/><\/span><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-9 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:16px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.25;\">The Largest Gathering of Cybersecurity Experts<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-top:0px;margin-bottom:35px;width:100%;max-width:170px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#e2e3e8;border-color:#e2e3e8;border-top-width:3px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-5\"><p>InfoCom Security 2026 once again brings together the entire community of IT and security professionals &#8211; from in-house executives (CTOs, CIOs, CISOs, IT Managers, Engineers, Administrators, Risk &amp; Compliance Managers, DPOs) and IT solution providers, to academics, scientists, and researchers.<\/p>\n<p>At the established annual industry meeting in the Athens Conservatoire, on April 29 &amp; 30, all participants will have the opportunity to exchange knowledge, experience, and best practices, strengthening networking and the resilience of the Cybersecurity ecosystem in Greece.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-bottom:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"1081\" height=\"481\" title=\"g\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/g.jpg\" alt class=\"img-responsive wp-image-8838\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/g-200x89.jpg 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/g-400x178.jpg 400w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/g-600x267.jpg 600w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/g-800x356.jpg 800w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2026\/01\/g.jpg 1081w\" sizes=\"(max-width: 800px) 100vw, 1081px\" \/><\/span><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-11 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-flex-start fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:40px;width:100%;max-width:70%;\"><div class=\"fusion-separator-border sep-shadow\" style=\"--awb-height:20px;--awb-amount:20px;background:radial-gradient(ellipse at 50% -50% , #e0dede 0px, rgba(255, 255, 255, 0) 80%) repeat scroll 0 0 rgba(0, 0, 0, 0);background:-webkit-radial-gradient(ellipse at 50% -50% , #e0dede 0px, rgba(255, 255, 255, 0) 80%) repeat scroll 0 0 rgba(0, 0, 0, 0);background:-moz-radial-gradient(ellipse at 50% -50% , #e0dede 0px, rgba(255, 255, 255, 0) 80%) repeat scroll 0 0 rgba(0, 0, 0, 0);background:-o-radial-gradient(ellipse at 50% -50% , #e0dede 0px, rgba(255, 255, 255, 0) 80%) repeat scroll 0 0 rgba(0, 0, 0, 0);\"><\/div><\/div><div class=\"fusion-text fusion-text-6\"><h4 style=\"text-align: center;\">Organization<\/h4>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/smartpress.gr\/\" target=\"_blank\" aria-label=\"smartpress-logo-new\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"300\" height=\"89\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/smartpress-logo-new-300x89.jpg\" alt class=\"img-responsive wp-image-6787\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/smartpress-logo-new-200x59.jpg 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/smartpress-logo-new-400x118.jpg 400w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/smartpress-logo-new.jpg 600w\" sizes=\"(max-width: 640px) 100vw, (max-width: 640px) 100vw, 300px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-flex-start fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:30px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:30px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7\"><h4 style=\"text-align: center;\">Print and digital B2B media of the ICT and Security sectors by Smart Press that support the conference:<\/h4>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-5 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.itsecuritypro.gr\" target=\"_blank\" aria-label=\"logo-itsecurity\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"350\" height=\"100\" alt=\"IT Professional Security\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2024\/03\/logo-itsecurity.png\" class=\"img-responsive wp-image-7501\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2024\/03\/logo-itsecurity-200x57.png 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2024\/03\/logo-itsecurity.png 350w\" sizes=\"(max-width: 640px) 100vw, (max-width: 640px) 100vw, 350px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-6 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.infocom.gr\" target=\"_blank\" aria-label=\"INFOCOM-300&#215;62-1\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"300\" height=\"62\" alt=\"Infocom\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/INFOCOM-300x62-1.png\" class=\"img-responsive wp-image-5346\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/INFOCOM-300x62-1-200x41.png 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2022\/05\/INFOCOM-300x62-1.png 300w\" sizes=\"(max-width: 640px) 100vw, (max-width: 640px) 100vw, 300px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-15 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-7 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.securitymanager.gr\" target=\"_blank\" aria-label=\"Logo Security white sm\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"624\" height=\"227\" alt=\"Security Manager\" src=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/Logo-Security-white-sm.jpg\" class=\"img-responsive wp-image-6789\" srcset=\"https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/Logo-Security-white-sm-200x73.jpg 200w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/Logo-Security-white-sm-400x146.jpg 400w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/Logo-Security-white-sm-600x218.jpg 600w, https:\/\/www.infocomsecurity.gr\/wp-content\/uploads\/2023\/03\/Logo-Security-white-sm.jpg 624w\" sizes=\"(max-width: 640px) 100vw, (max-width: 640px) 100vw, 400px\" \/><\/a><\/span><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-8845","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/8845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/comments?post=8845"}],"version-history":[{"count":4,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/8845\/revisions"}],"predecessor-version":[{"id":8850,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/8845\/revisions\/8850"}],"wp:attachment":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/media?parent=8845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}