{"id":9049,"date":"2026-04-20T14:36:00","date_gmt":"2026-04-20T11:36:00","guid":{"rendered":"https:\/\/www.infocomsecurity.gr\/?page_id=9049"},"modified":"2026-04-20T15:58:23","modified_gmt":"2026-04-20T12:58:23","slug":"workshops-session","status":"publish","type":"page","link":"https:\/\/www.infocomsecurity.gr\/en\/16th-infocom-security-29-30-april-2026\/workshops-session\/","title":{"rendered":"Workshops Session"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-padding-bottom:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-tabs fusion-tabs-1 classic nav-is-justified horizontal-tabs icon-position-left mobile-mode-accordion\" style=\"--awb-title-border-radius-top-left:0px;--awb-title-border-radius-top-right:0px;--awb-title-border-radius-bottom-right:0px;--awb-title-border-radius-bottom-left:0px;--awb-alignment:start;--awb-inactive-color:var(--awb-custom15);--awb-background-color:#ffffff;--awb-border-color:#ebeaea;--awb-active-border-color:#006b7f;\"><div class=\"nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-3bce4f83b7d733b943e\" aria-selected=\"true\" id=\"fusion-tab-1stdayagenda-wednesday29april\" href=\"#tab-3bce4f83b7d733b943e\"><h4 class=\"fusion-tab-heading\">1st Day Agenda - Wednesday 29 April<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-9faadc900c9a1dfe768\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-2nddayagenda-thursday30april\" href=\"#tab-9faadc900c9a1dfe768\"><h4 class=\"fusion-tab-heading\">2nd Day Agenda - Thursday 30 April<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-content\"><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-3bce4f83b7d733b943e\" aria-selected=\"true\" id=\"mobile-fusion-tab-1stdayagenda-wednesday29april\" href=\"#tab-3bce4f83b7d733b943e\"><h4 class=\"fusion-tab-heading\">1st Day Agenda - Wednesday 29 April<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix in active\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-1stdayagenda-wednesday29april\" id=\"tab-3bce4f83b7d733b943e\">\n\n<div class=\"table-1\">\n<table style=\"width: 100%; height: 579px;\" width=\"100%\">\n<thead>\n<tr style=\"height: 65px;\">\n<th style=\"width: 6.74847%; height: 65px;\" align=\"left\">&nbsp;<\/th>\n<th style=\"text-align: center; width: 44.4785%; height: 65px;\" colspan=\"2\" align=\"left\">\n<h3><span style=\"color: #ff6600;\"><strong>Hall 1<\/strong><\/span><\/h3>\n<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"text-align: center; width: 6.74847%; height: 24px;\" align=\"left\"><strong>Time<\/strong><\/td>\n<td style=\"text-align: center; width: 26.2754%; height: 24px;\" align=\"left\"><strong>Subject<\/strong><\/td>\n<td style=\"text-align: center; width: 18.2031%; height: 24px;\" align=\"left\"><strong>Speaker &#8211; Company<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 144px;\">\n<td style=\"width: 6.74847%; height: 144px;\" align=\"left\"><strong>10.30 &#8211; 11.30<\/strong><\/td>\n<td style=\"width: 26.2754%; height: 144px;\" width=\"238\"><strong><span style=\"color: #800000;\">Penetration Test Scope &#8211; Domain Misconfigurations &#8211; Phishing Techniques<\/span><\/strong><\/td>\n<td style=\"width: 18.2031%; height: 144px;\" align=\"left\"><strong>Giannis Daskalopoulos, <\/strong>Security Services Supervisor, <strong>Digital Sima<\/strong><\/p>\n<p><strong>Fotis Kalyvas,<\/strong> Senior Network &amp; Security Engineer, <strong>Digital Sima<br \/>\n<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 6.74847%; height: 56px;\" align=\"left\"><strong>11.30-12.30<\/strong><\/td>\n<td style=\"width: 26.2754%; height: 56px;\" align=\"left\"><strong><span style=\"color: #800000;\">Automating Microsoft 365 with Okta: Lifecycle, Licensing &amp; Workflows in Action<\/span><\/strong><\/td>\n<td style=\"width: 18.2031%; height: 56px;\" align=\"left\"><strong>Anna Kvetkina<\/strong>, Senior IAM Engineer &amp; OIM Team Lead &#8211; GR, Intragen by Nomios.<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"text-align: center; width: 51.227%; height: 24px;\" colspan=\"3\"><strong>12:30 &#8211; 13:30&nbsp; &nbsp;Break<\/strong><strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 6.74847%; height: 56px;\"><strong>13.30 &#8211; 14.30<\/strong><\/td>\n<td style=\"width: 26.2754%; height: 56px;\"><span style=\"text-decoration: underline;\"><a href=\"https:\/\/systecom.involve.me\/offsec-workshop\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"color: #800000; text-decoration: underline;\">Securing the AI Era: Inside OffSec&#8217;s OSAI Certification and What it Means for Your Business<\/span><\/strong><\/a><\/span><\/td>\n<td style=\"width: 18.2031%; height: 56px;\"><a href=\"https:\/\/systecom.involve.me\/offsec-workshop\" target=\"_blank\" rel=\"noopener\"><strong>Virginia Santos | <\/strong><strong>Regional Manager <\/strong><strong>at<\/strong><strong> OffSec<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/systecom.involve.me\/offsec-workshop\" target=\"_blank\" rel=\"noopener\"><strong>Gervin Appiah | Cybersecurity Trainer at OffSec<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/systecom.involve.me\/offsec-workshop\" target=\"_blank\" rel=\"noopener\"><strong>Michael Mancao | Cybersecurity Trainer at OffSec<\/strong><\/a><\/p>\n<p><strong>(<\/strong>on behalf of<strong> SysteCom)&nbsp;<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 80px;\">\n<td style=\"width: 6.74847%; height: 80px;\"><strong>14.30 &#8211; 15.30<\/strong><\/td>\n<td style=\"width: 26.2754%; height: 80px;\"><span style=\"text-decoration: underline;\"><a href=\"https:\/\/forms.office.com\/Pages\/ResponsePage.aspx?id=omFS_6zHAk6F8p1KHuJIPPsx3oHix0RMie1IUXBsN2xUMDZXOVBDVVBUQVY5MkZPTEdFUk1HQ05SRyQlQCN0PWcu\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #800000; text-decoration: underline;\"><strong>Cybersecurity by Design with Xcitium ZeroDwell: Moving from Detection to Prevention&nbsp;&nbsp;<\/strong><\/span><\/a><\/span><\/td>\n<td style=\"width: 18.2031%; height: 80px;\"><span style=\"text-decoration: underline;\"><a href=\"https:\/\/forms.office.com\/Pages\/ResponsePage.aspx?id=omFS_6zHAk6F8p1KHuJIPPsx3oHix0RMie1IUXBsN2xUMDZXOVBDVVBUQVY5MkZPTEdFUk1HQ05SRyQlQCN0PWcu\" target=\"_blank\" rel=\"noopener\"><strong>Amar Rathore<\/strong> Xcitium Head of Business &#8211; Europe<\/a><\/span><br \/>\n&amp;<br \/>\n<span style=\"text-decoration: underline;\"><a href=\"https:\/\/forms.office.com\/Pages\/ResponsePage.aspx?id=omFS_6zHAk6F8p1KHuJIPPsx3oHix0RMie1IUXBsN2xUMDZXOVBDVVBUQVY5MkZPTEdFUk1HQ05SRyQlQCN0PWcu\" target=\"_blank\" rel=\"noopener\"><strong style=\"font-family: inherit; font-size: inherit;\">Tic Tac Cyber <\/strong><span style=\"font-family: inherit; font-size: inherit;\">Security Team: <\/span><strong style=\"font-family: inherit; font-size: inherit;\">Nikos Papadopoulos &amp;&nbsp; Stelios Vardakas<\/strong><\/a><\/span><\/td>\n<\/tr>\n<tr style=\"height: 120px;\">\n<td style=\"width: 6.74847%; height: 120px;\"><strong>15.30 &#8211; 16.30<\/strong><\/td>\n<td style=\"width: 26.2754%; height: 120px;\"><a href=\"https:\/\/forms.office.com\/pages\/responsepage.aspx?id=omFS_6zHAk6F8p1KHuJIPPsx3oHix0RMie1IUXBsN2xUOU4yRUxGWFFQRFUzVkpCTUEyMFNMUERNOCQlQCN0PWcu&amp;route=shorturl\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span style=\"color: #800000; text-decoration: underline;\">Audit-Ready for NIS2, DORA and ISO 27001 with StartComply: Real-Time Compliance and Risk Visibility<\/span><\/strong><\/span><\/a><\/td>\n<td style=\"width: 18.2031%; height: 120px;\"><span style=\"text-decoration: underline;\"><a href=\"https:\/\/forms.office.com\/pages\/responsepage.aspx?id=omFS_6zHAk6F8p1KHuJIPPsx3oHix0RMie1IUXBsN2xUOU4yRUxGWFFQRFUzVkpCTUEyMFNMUERNOCQlQCN0PWcu&amp;route=shorturl\" target=\"_blank\" rel=\"noopener\"><strong>George Raikos,<\/strong> Chief Information Security Officer, <strong>Tic Tac<\/strong><\/a><\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/forms.office.com\/pages\/responsepage.aspx?id=omFS_6zHAk6F8p1KHuJIPPsx3oHix0RMie1IUXBsN2xUOU4yRUxGWFFQRFUzVkpCTUEyMFNMUERNOCQlQCN0PWcu&amp;route=shorturl\" target=\"_blank\" rel=\"noopener\"><strong>Panagiotis Pierros,<\/strong> Managing Director, <strong>Tic Tac<\/strong><\/a><\/span><\/td>\n<\/tr>\n<tr style=\"height: 10px;\">\n<td style=\"width: 6.74847%; height: 10px;\">&nbsp;<\/td>\n<td style=\"width: 26.2754%; height: 10px;\">&nbsp;<\/td>\n<td style=\"width: 18.2031%; height: 10px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"width: 100%; height: 589px;\">\n<thead>\n<tr style=\"height: 65px;\">\n<th style=\"width: 6.74847%; height: 65px;\" align=\"left\">&nbsp;<\/th>\n<th style=\"text-align: center; width: 44.4785%; height: 65px;\" colspan=\"2\" align=\"left\">\n<h3><span style=\"color: #ff6600;\"><strong>Hall 2<\/strong><\/span><\/h3>\n<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"text-align: center; width: 6.74847%; height: 24px;\" align=\"left\"><strong>Time<\/strong><\/td>\n<td style=\"text-align: center; width: 26.8916%; height: 24px;\" align=\"left\"><strong>Subject<\/strong><\/td>\n<td style=\"text-align: center; width: 17.5869%; height: 24px;\" align=\"left\"><strong>Speaker &#8211; Company<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 104px;\">\n<td style=\"width: 6.74847%; height: 104px;\" align=\"left\"><strong>10.30 &#8211; 11.30<\/strong><\/td>\n<td style=\"width: 26.8916%; height: 104px;\" width=\"238\"><span style=\"text-decoration: underline;\"><a href=\"https:\/\/channel-it.com\/manageengine-infocom-security-conference-2026\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"color: #800000; text-decoration: underline;\">Mastering privileged access management 2.0<\/span><\/strong><\/a><\/span><\/td>\n<td style=\"width: 17.5869%; height: 104px;\" align=\"left\"><span style=\"text-decoration: underline;\"><a href=\"https:\/\/channel-it.com\/manageengine-infocom-security-conference-2026\/\"><strong>Joseph Msallam,<\/strong> Senior ICT Team Leader &#8211; ManageEngine PAM360 Certified Product Professional, <strong>Channel IT<\/strong><\/a><\/span><\/td>\n<\/tr>\n<tr style=\"height: 144px;\">\n<td style=\"width: 6.74847%; height: 144px;\" align=\"left\"><strong>11.30 &#8211; 12.30<\/strong><\/td>\n<td style=\"width: 26.8916%; height: 144px;\" align=\"left\"><span style=\"text-decoration: underline;\"><a href=\"https:\/\/2fd1w9.share-eu1.hsforms.com\/20kJIdwQuQPaVaP7uJWh2JQ\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"color: #800000; text-decoration: underline;\">Stopping Data Leakage in the AI Era: A Hands-On DLP Workshop<\/span><\/strong><\/a><\/span><\/td>\n<td style=\"width: 17.5869%; height: 144px;\" align=\"left\">\n<p class=\"xmsonormal\"><span style=\"text-decoration: underline;\"><a href=\"https:\/\/2fd1w9.share-eu1.hsforms.com\/20kJIdwQuQPaVaP7uJWh2JQ\"><span style=\"color: black; text-decoration: underline;\">Lambros Katsonis &#8211; &nbsp;<b>Manager of Tech Solutions, Guardbyte<\/b><\/span><\/a><\/span><\/p>\n<p class=\"xmsonormal\"><span style=\"text-decoration: underline;\"><a href=\"https:\/\/2fd1w9.share-eu1.hsforms.com\/20kJIdwQuQPaVaP7uJWh2JQ\"><span style=\"color: black; text-decoration: underline;\"><strong>Panos Proussis<\/strong> &#8211; Technical Manager, <b>Guardbyte<\/b><\/span><\/a><\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"text-align: center; width: 51.227%; height: 24px;\" colspan=\"3\"><strong>12:30 &#8211; 13:30&nbsp; &nbsp;Break<\/strong><strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 144px;\">\n<td style=\"width: 6.74847%; height: 144px;\"><strong>13.30 &#8211; 14.30<\/strong><\/td>\n<td style=\"width: 26.8916%; height: 144px;\"><span style=\"color: #800000;\">Tangible Orchestration using <strong>Forti<\/strong>(net)<strong>SOAR<\/strong>: An <strong>ADACOM ROCaaS<\/strong>&nbsp;story<\/span><\/td>\n<td style=\"width: 17.5869%; height: 144px;\"><strong>Stamatis Mandilas,<\/strong> Security Operations Solutions Engineer, GR-CY-HU, <strong>Fortinet<\/strong><\/p>\n<p><strong>Emmanuel Papadakis,<\/strong> Threat Detection Engineering Team Lead, <strong>Adacom<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 50px;\">\n<td style=\"width: 6.74847%; height: 50px;\"><strong>14.30 &#8211; 15.30<\/strong><\/td>\n<td style=\"width: 17.5869%; height: 50px;\"><span style=\"text-decoration: underline;\"><a href=\"https:\/\/forms.cloud.microsoft\/Pages\/ResponsePage.aspx?id=TWu8Unk1_kujsImik93HPcp2xLRytdlCg6tjGqswUw1UOVpaM1ZVUU9UNFhOSTlZNU5DUjNFUFYwMS4u\"><strong><span style=\"color: #800000; text-decoration: underline;\">Decoding the Digital Masterpiece &#8211; Seeing Through the Fog of a Live<\/span><span style=\"color: #800000; text-decoration: underline;\"> Cyber Attack<\/span><\/strong><\/a><\/span><\/td>\n<td style=\"width: 17.5869%; height: 144px;\"><span style=\"text-decoration: underline;\"><a href=\"https:\/\/forms.cloud.microsoft\/Pages\/ResponsePage.aspx?id=TWu8Unk1_kujsImik93HPcp2xLRytdlCg6tjGqswUw1UOVpaM1ZVUU9UNFhOSTlZNU5DUjNFUFYwMS4u\"><strong>Catalin Alexandru<\/strong> MITREA- Sr. Sales Engineer, EMEA <strong>Bitdefender<\/strong> <\/a><\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/forms.cloud.microsoft\/Pages\/ResponsePage.aspx?id=TWu8Unk1_kujsImik93HPcp2xLRytdlCg6tjGqswUw1UOVpaM1ZVUU9UNFhOSTlZNU5DUjNFUFYwMS4u\"><strong>Vasilis Karavasilis<\/strong> \u2013 Sr. Presales Engineer <strong>Bitdefender Greece &amp; Cyprus<\/strong><\/a><\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 6.74847%; height: 24px;\"><strong>15.30 &#8211; 16.30<\/strong><\/td>\n<td style=\"width: 26.8916%; height: 24px;\">&nbsp;<\/td>\n<td style=\"width: 17.5869%; height: 24px;\">&nbsp;<\/td>\n<\/tr>\n<tr style=\"height: 10px;\">\n<td style=\"width: 6.74847%; height: 10px;\">&nbsp;<\/td>\n<td style=\"width: 26.8916%; height: 10px;\">&nbsp;<\/td>\n<td style=\"width: 17.5869%; height: 10px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-9faadc900c9a1dfe768\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-2nddayagenda-thursday30april\" href=\"#tab-9faadc900c9a1dfe768\"><h4 class=\"fusion-tab-heading\">2nd Day Agenda - Thursday 30 April<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-2nddayagenda-thursday30april\" id=\"tab-9faadc900c9a1dfe768\">\n\n<div class=\"table-1\">\n<table style=\"width: 100%; height: 327px;\" width=\"100%\">\n<thead>\n<tr style=\"height: 65px;\">\n<th style=\"width: 7.66529%; height: 65px;\" align=\"left\">&nbsp;<\/th>\n<th style=\"text-align: center; width: 50.4455%; height: 65px;\" colspan=\"2\" align=\"left\">\n<h3><span style=\"color: #ff6600;\"><strong>Hall 1<\/strong><\/span><\/h3>\n<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"text-align: center; width: 7.66529%; height: 24px;\" align=\"left\"><strong>Time<\/strong><\/td>\n<td style=\"text-align: center; width: 23.6325%; height: 24px;\" align=\"left\"><strong>Subject<\/strong><\/td>\n<td style=\"text-align: center; width: 26.813%; height: 24px;\" align=\"left\"><strong>Speaker &#8211; Company<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 72px;\">\n<td style=\"width: 7.66529%; height: 72px;\" align=\"left\"><strong>10.30 &#8211; 11.30<\/strong><\/td>\n<td style=\"width: 23.6325%; height: 72px;\" align=\"left\">&nbsp;<\/td>\n<td style=\"width: 26.813%; height: 72px;\" align=\"left\">&nbsp;<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 7.66529%; height: 24px;\"><strong> 11.30 &#8211; 12.30<\/strong><\/td>\n<td style=\"width: 23.6325%; height: 24px;\"><span style=\"color: #800000;\"><strong>From AI for Security to Security for AI: Autonomous Security Intelligence<\/strong><\/span><\/td>\n<td style=\"width: 26.813%; height: 24px;\"><strong>Marco Rottigni<\/strong> &#8211;&nbsp;SentinelOne Principal Solution Architect<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"text-align: center; width: 58.1108%; height: 24px;\" colspan=\"3\"><strong>12:30 &#8211; 13:30&nbsp; &nbsp;Break<\/strong><strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 7.66529%; height: 22px;\"><strong>13.30 &#8211; 14.30<\/strong><\/td>\n<td style=\"width: 23.6325%; height: 22px;\"><span style=\"color: #800000;\"><strong>To CISSP or not to CISSP ?<br \/>\n<\/strong><em>&#8220;Navigating the World\u2019s Premier Cybersecurity Leadership Certification&#8221;&nbsp;<\/em><strong><br \/>\n<\/strong><\/span><\/td>\n<td style=\"width: 26.813%; height: 22px;\"><strong>George Aslanidis &amp; Maria Mouriki | Members of ISC2 Hellenic Chapter&nbsp;<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 72px;\">\n<td style=\"width: 7.66529%; height: 72px;\"><strong>14.30 &#8211; 15.30<\/strong><\/td>\n<td style=\"width: 23.6325%; height: 72px;\">&nbsp;<\/td>\n<td style=\"width: 26.813%; height: 72px;\">&nbsp;<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 7.66529%; height: 24px;\">&nbsp;<\/td>\n<td style=\"width: 23.6325%; height: 24px;\">&nbsp;<\/td>\n<td style=\"width: 26.813%; height: 24px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"width: 100%; height: 302px;\">\n<thead>\n<tr style=\"height: 65px;\">\n<th style=\"width: 7.84196%; height: 65px;\" align=\"left\">&nbsp;<\/th>\n<th style=\"text-align: center; width: 50.2687%; height: 65px;\" colspan=\"2\" align=\"left\">\n<h3><span style=\"color: #ff6600;\"><strong>Hall 2<\/strong><\/span><\/h3>\n<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"text-align: center; width: 7.84196%; height: 24px;\" align=\"left\"><strong>Time<\/strong><\/td>\n<td style=\"text-align: center; width: 23.4557%; height: 24px;\" align=\"left\"><strong>Subject<\/strong><\/td>\n<td style=\"text-align: center; width: 26.813%; height: 24px;\" align=\"left\"><strong>Speaker &#8211; Company<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 72px;\">\n<td style=\"width: 7.84196%; height: 72px;\" align=\"left\"><strong>10.30 &#8211; 11.30<\/strong><\/td>\n<td style=\"width: 23.4557%; height: 72px;\" align=\"left\"><span style=\"color: #800000;\"><strong>Beyond the perimeter: The frictionless enterprise in practice, realized with Crowdstrike, Zscaler and Okta solutions.<\/strong><\/span><\/td>\n<td style=\"width: 26.813%; height: 72px;\" align=\"left\"><b>Constantinos Mpetsis<\/b>, Solutions Architect, <strong>Westcon<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 7.84196%; height: 24px;\"><strong>11.30 &#8211; 12.30<\/strong><\/td>\n<td style=\"width: 23.4557%; height: 24px;\"><span style=\"color: #800000;\"><strong>Locking the Door While Opening the Gate: A Dual Perspective on SD-WAN and SSE<\/strong> <\/span><\/td>\n<td style=\"width: 26.813%; height: 24px;\"><strong>Evi Kechagia &amp; George Pigiakis<\/strong><br \/>\nTechnical Solutions Architects, <strong>CISCO<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"text-align: center; width: 58.1107%; height: 24px;\" colspan=\"3\"><strong>12:30 &#8211; 13:30&nbsp; Break<\/strong><strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 45px;\">\n<td style=\"width: 7.84196%; height: 45px;\"><strong>13.30 &#8211; 14.30<\/strong><\/td>\n<td style=\"width: 23.4557%; height: 45px;\"><strong><span style=\"color: #800000;\">Think Like an Attacker: A Live Cyber Breach Simulation \u2014 See What Others Miss<\/span><\/strong><\/td>\n<td style=\"width: 26.813%; height: 45px;\"><strong>Christos Drigogias,<\/strong> CEO, <strong>Logstail<\/strong><br \/>\n&amp;<br \/>\n<strong>Ioannis Avdoulas,<\/strong> DevSecOps Engineer, <strong>Logstail<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 7.84196%; height: 24px;\"><strong>14.30 &#8211; 15.30<\/strong><\/td>\n<td style=\"width: 23.4557%; height: 24px;\">&nbsp;<\/td>\n<td style=\"width: 26.813%; height: 24px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":0,"parent":8845,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-9049","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/9049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/comments?post=9049"}],"version-history":[{"count":5,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/9049\/revisions"}],"predecessor-version":[{"id":9083,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/9049\/revisions\/9083"}],"up":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/8845"}],"wp:attachment":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/media?parent=9049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}