{"id":9050,"date":"2026-04-20T14:35:14","date_gmt":"2026-04-20T11:35:14","guid":{"rendered":"https:\/\/www.infocomsecurity.gr\/?page_id=9050"},"modified":"2026-04-20T15:34:52","modified_gmt":"2026-04-20T12:34:52","slug":"plenary-session","status":"publish","type":"page","link":"https:\/\/www.infocomsecurity.gr\/en\/16th-infocom-security-29-30-april-2026\/plenary-session\/","title":{"rendered":"Plenary Session"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-padding-bottom:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-tabs fusion-tabs-1 classic nav-is-justified horizontal-tabs icon-position-left mobile-mode-accordion\" style=\"--awb-title-border-radius-top-left:0px;--awb-title-border-radius-top-right:0px;--awb-title-border-radius-bottom-right:0px;--awb-title-border-radius-bottom-left:0px;--awb-alignment:start;--awb-inactive-color:var(--awb-custom15);--awb-background-color:#ffffff;--awb-border-color:#ebeaea;--awb-active-border-color:#006b7f;\"><div class=\"nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-f7e4f8ac9693eaa53fb\" aria-selected=\"true\" id=\"fusion-tab-1stdayagenda\u2013wednesday29april\" href=\"#tab-f7e4f8ac9693eaa53fb\"><h4 class=\"fusion-tab-heading\">1st Day Agenda \u2013 Wednesday 29 April<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-fcbf3769d4eb2988ecc\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-2nddayagenda\u2013thursday30april\" href=\"#tab-fcbf3769d4eb2988ecc\"><h4 class=\"fusion-tab-heading\">2nd Day Agenda \u2013 Thursday 30 April<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-content\"><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-f7e4f8ac9693eaa53fb\" aria-selected=\"true\" id=\"mobile-fusion-tab-1stdayagenda\u2013wednesday29april\" href=\"#tab-f7e4f8ac9693eaa53fb\"><h4 class=\"fusion-tab-heading\">1st Day Agenda \u2013 Wednesday 29 April<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix in active\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-1stdayagenda\u2013wednesday29april\" id=\"tab-f7e4f8ac9693eaa53fb\">\n<p><span style=\"text-decoration: underline; color: #0000ff;\"><strong>09:00 \u2013 09:30 \u2013 Admittance &#8211; Registration<\/strong><\/span><\/p>\n<p><span style=\"text-decoration: underline; color: #0000ff;\"><strong>09:30 \u2013 10:00 \u2013 Commencement &#8211; Opening Speeches<\/strong><\/span><\/p>\n<p><strong>Dimitris Papastergiou<\/strong> \u2013 Minister of Digital Governance<\/p>\n<p><strong>Dr. Giannis Pavlosoglou<\/strong> \u2013 Vice Governor, National Cybersecurity Authority<\/p>\n<p><strong>Vasilios Bertanos<\/strong> \u2013 Police Brigadier, Commander, Cyber Crime Division, Hellenic Police<\/p>\n<p><span style=\"color: #0000ff;\"><strong><u>10:00 \u2013 12:30 \u2013 1st session<\/u><\/strong><\/span><span style=\"color: #ff6600;\"><strong><br \/>\n<\/strong><\/span><\/p>\n<p><span style=\"color: #000080;\"><strong>Navigating the Cyber Threat Landscape<\/strong><\/span><br \/>\n<span style=\"color: #000080;\"><strong>Risk Management, Security Strategy and Organizational Resilience<\/strong><\/span><\/p>\n<p>In the constantly evolving landscape of cyber threats, organizations and businesses are called upon to redefine their strategies for protecting their digital infrastructures. This section will focus on modern approaches to risk management, threat analysis and forecasting practices, as well as cybersecurity services that support the protection of complex and hybrid environments. Experts from consulting firms, integrators, and security service providers will present strategies that combine technological and organizational approaches to strengthen organizational resilience. The session will highlight how the collaboration of technology, processes, and the human factor can create a robust protection framework against continuously evolving cyber threats.<\/p>\n<p><span style=\"color: #800000;\"><strong>From Alert to Risk: The Evolution from Security Operation Center to Risk Operations Center<\/strong><\/span><strong><br \/>\n<\/strong><b>Nikitas Kladakis<\/b>&nbsp;\u2013 General Manager, <strong>ADACOM<\/strong><strong>&nbsp;<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Connected But Protected<\/span><\/strong><br \/>\n<strong>Antonis Paravalos &#8211;<\/strong> Cybersecurity &amp; Network Unit Manager &#8211; Solutions Architect, <strong>PERFORMANCE TECHNOLOGIES<\/strong><br \/>\n<strong>Vardis Vasilantonakis<\/strong>&nbsp;&#8211; HPE Networking Country Manager, Greece &amp; Cyprus at <strong>HPE<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">From Visibility to Action &#8211; Closing the Cyber Risk Gap<\/span><br \/>\n<\/strong><strong>Stavros Kirikos &#8211; <\/strong>CEO &amp; Co-Founder,<strong> MIND THE HACK<br \/>\n<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>\u0399<\/strong><\/span><strong><span style=\"color: #800000;\">s Secrets sprawl the breach you haven\u2019t discovered yet?<\/span><br \/>\n<\/strong><b>Michalis Zervakis<\/b> &#8211; \u0397ead of Platforms, <strong>INFINITUM S.A.<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">From Policy to Detection: Cracking the Code of Cyber Resilience<\/span><\/strong><br \/>\n<strong>Socrates Kelesoglou &#8211; <\/strong>SOC Manager | Red Team Leader, <strong>SPACE HELLAS<\/strong><br \/>\n<strong>Alexandros Mavromatos<\/strong> &#8211; GRC Manager,&nbsp; <strong>SPACE HELLAS<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Assume Breach: Stopping Real Attacks Before They Spread<\/strong><\/span><br \/>\n<strong>Panagiotis Pierros,<\/strong> Managing Director <strong>TICTAC<\/strong><br \/>\n<strong>Amar Rathore<\/strong> &#8211; Xcitium Head of Business &#8211; Europe<\/p>\n<p><strong><span style=\"color: #800000;\">AI\u2019s Achilles\u2019 Heel<\/span><br \/>\n<\/strong><b>Constantinos Vouzoplis<\/b> &#8211; Cybersecurity Lead, <strong>ACCENTURE<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Proactive Cyber Insurance as a Driver of Cyber Resilience<\/span><br \/>\n<\/strong><b>Nikos Georgopoulos<\/b> &#8211; Digital Risk Insurance Broker, <strong>CROMAR INSURANCE BROKERS SA<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">From Leonardo Di Caprio to Leonardo Da Vinci: 10 tips on how to fit the entire cybersecurity world onto one door<\/span><\/strong><br \/>\n<strong>Chara Vasiliadou<\/strong> &#8211; Cyber Security, Strategy &amp; Commercial Solutions Director, <strong>CENOBE &nbsp;&amp; QUALCO GROUP&nbsp;<\/strong><\/p>\n<p>Moderator : <strong>Christos Kotsakas<\/strong> &#8211; Journalist, Manager at <strong>INFOCOM<\/strong><\/p>\n<p><span style=\"color: #0000ff;\"><strong><u>12:30 \u2013 13:15 \u2013 BREAK<\/u><\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff;\"><strong><u>13:15 \u2013 15:30 \u2013 2nd session<\/u><\/strong><strong><u><br \/>\n<\/u><\/strong><\/span><\/p>\n<p><strong><span style=\"color: #000080;\">Next-Generation Cyber Defense<\/span><\/strong><br \/>\n<strong><span style=\"color: #000080;\">AI-Driven Security, Zero Trust Architectures and Advanced Protection Technologies<\/span><\/strong><\/p>\n<p>The rapid evolution of technology creates new opportunities but also new challenges for cybersecurity. In the second session of the first day, modern technological approaches and solutions that enhance the protection of digital infrastructures will be presented. Representatives from vendors and technology companies will showcase tools and platforms that leverage artificial intelligence, automation, and advanced security architectures such as Zero Trust, SASE, MDR, and XDR. Through real-world examples and contemporary practices, it will be demonstrated how new technologies contribute to building a more resilient digital ecosystem capable of addressing modern forms of cyberattacks.<\/p>\n<p><strong><span style=\"color: #800000;\">The Identity ROI: Reduce Risk and Cost with Okta\u2019s Platform Approach<\/span><br \/>\n<\/strong><strong>Manuel Belmonte<\/strong> &#8211; Regional Alliances Manager, <strong>Okta<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>\u0397 \u0391\u03bd\u03b1\u03b3\u03ad\u03bd\u03bd\u03b7\u03c3\u03b7 \u03c4\u03b7\u03c2 \u039a\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1\u03c2<\/strong> <\/span><br \/>\n<strong>Sissy Rousia<\/strong> \u2013 Business Development Manager <strong>Bitdefender Greece &amp; Cyprus<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Your AI Is Leaking Data\u2014You Just Don\u2019t Know It Yet<\/span><br \/>\n<\/strong><strong>Lambros Katsonis<\/strong> &#8211; Manager of Tech Solutions, <strong>GUARDBYTE<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Fortify your defenses, protect your business from threats<\/span><br \/>\n<\/strong><strong>Stelios Gerardis<\/strong> \u2013 Sales Manager, <strong>NSS<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">The transition to Zero Trust Network Access \u2013 A holistic approach by WatchGuard<\/span><br \/>\n<\/strong><strong>Antonis Kalochristianakis<\/strong> &#8211; Sales Director, <strong>DIGITAL SIMA<br \/>\n<\/strong><strong>Marina Nikolaou &#8211;<\/strong> Channel Account Manager Greece &amp; Cyprus, <strong>WATCHGUARD TECHNOLOGIES INC<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Decoding the network: From visibility to resiliance with <\/strong><strong>Axence <\/strong><strong>nVision<br \/>\n<\/strong><\/span><b>Nefeli Tzika<\/b> &#8211; Sales Team Leader, <strong>ORTHOLOGY&nbsp;<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Netop Remote Control, Agentic AI Remote Control, and compliance with the<\/strong><\/span><strong><span style=\"color: #800000;\"> NIS2 Directive<\/span><br \/>\n<\/strong><strong>Michalis Chatzilias &#8211; <\/strong>&nbsp;CEO, <strong>AKEYDOR GROUP<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Privileged Access Management: Trust Less, Control More<\/span><br \/>\n<\/strong><b>George Tsatsakis<\/b> &#8211; Technical Presales Engineer, <strong>CYSOFT<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">The SentinelOne Advantage: Redefining Cybersecurity for the AI Era<\/span><br \/>\n<\/strong><strong>Paolo Cecchi<\/strong>&nbsp;&#8211; VP of Sales, Mediterranean&nbsp;region, <strong>SENTINELONE<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Protecting Privilege on IT and OT environments<\/span><br \/>\n<\/strong><strong>George Kouimintzis \u2013 <\/strong>Commercial Director, <strong>NSS<\/strong><\/p>\n<p>Moderator : <strong>Vangelis Xanthakis, <\/strong>Journalist<\/p>\n<p><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\"><strong>15:30 \u2013 16:30 \u2013 3rd session<\/strong><\/span><\/span><strong><br \/>\n<\/strong><\/p>\n<p><strong><span style=\"color: #000080;\">Building the Cybersecurity Workforce for Tomorrow<\/span><\/strong><br \/>\n<span style=\"color: #000080;\"><strong><em>Education, Research and Talent Development<\/em><\/strong><\/span><span style=\"color: #333399;\"><strong>&nbsp;<\/strong><\/span><\/p>\n<p>The growing demand for specialized cybersecurity professionals creates significant challenges as well as opportunities for education and research. In the panel of the first day, the role of universities, research centers, and the labor market in shaping a new cybersecurity skills ecosystem will be discussed. Representatives from academia, companies, and institutional bodies will explore ways to strengthen the connection between education and the labor market, the development of new study programs, and the career prospects of emerging professionals in the field.<\/p>\n<p><em>Keynote Speech:<\/em><br \/>\n<strong><span style=\"color: #800000;\">Elevating Cyber Workforce and Professional Development<\/span><\/strong><br \/>\n<strong>Nikos Niskopoulos<\/strong> &#8211; &nbsp;Chief Operations Director , <strong>SysteCom S.A.<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Discussion Panel<\/span><\/strong><\/p>\n<p><span style=\"text-decoration: underline; color: #0000ff;\"><strong>16:30 \u2013 17:00 \u2013 Networking&nbsp;<\/strong><\/span><\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-fcbf3769d4eb2988ecc\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-2nddayagenda\u2013thursday30april\" href=\"#tab-fcbf3769d4eb2988ecc\"><h4 class=\"fusion-tab-heading\">2nd Day Agenda \u2013 Thursday 30 April<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-2nddayagenda\u2013thursday30april\" id=\"tab-fcbf3769d4eb2988ecc\">\n<p><span style=\"text-decoration: underline;\"><strong><span style=\"color: #0000ff; text-decoration: underline;\">09:00 \u2013 09:30 \u2013 Admittance Registration<\/span><\/strong><\/span><\/p>\n<p><span style=\"text-decoration: underline; color: #0000ff;\"><strong>09:30 \u2013 10:00 \u2013 Commencement &#8211; Opening Speeches<\/strong><\/span><\/p>\n<p><b>Maria Mouriki <\/b>\u2013 Board Member, <strong>ISC2 Hellenic Chapter<\/strong><\/p>\n<p><span style=\"color: #0000ff;\"><strong><u>10:00 \u2013 12:30 \u2013 1st session<\/u><\/strong><strong><u><br \/>\n<\/u><\/strong><\/span><\/p>\n<p><strong><span style=\"color: #000080;\">Enhancing Cyber Resilience Across Critical Sectors and All Verticals<\/span><\/strong><br \/>\n<em><strong><span style=\"color: #000080;\">Security Strategies, Regulatory Compliance, \u0391\u0399 and Protection of Key Industries<\/span><\/strong><\/em><\/p>\n<p>As organizations across all sectors increasingly rely on complex technological ecosystems, cybersecurity becomes a critical pillar of business continuity and regulatory compliance. In the first session of the second day, strategies for protecting critical infrastructures, incident management, and enhancing operational resilience will be examined across sectors such as banking, telecommunications, energy, public sector, healthcare, industry, logistics, and all vertical markets. Executives from consulting firms, integrators, and security service providers will present practices and methodologies that leverage artificial intelligence and advanced analytics for the prevention, detection, and effective response to threats. At the same time, discussion will focus on how organizations can adapt to the requirements of the NIS2 Directive, DORA, and other European security standards, strengthening governance, compliance, and overall resilience in an environment of continuously increasing risks.<\/p>\n<p><strong><span style=\"color: #800000;\">Cybersecurity in Transition: Trends, Compliance, and the Rise of GRC<\/span><br \/>\n<\/strong><strong>Dr. Theodoros Ntouskas \u2013 <\/strong>Managing Director,<strong>&nbsp;ICT PROTECT&nbsp;<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Algosystems Managed SecOps \u2013 Share the load!<\/span><br \/>\n<\/strong><strong>Dimitris Paronis &#8211; &nbsp;<\/strong>Head of Network Engineering, <strong>ALGOSYSTEMS<br \/>\n<\/strong><strong>Anna Mpoumpa &#8211; <\/strong>&nbsp;Network Engineer, <strong>ALGOSYSTEMS<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>The importance of incident response and digital forensics readiness in a ransomware era<br \/>\n<\/strong><\/span><strong>Anargyros Chrysanthou &#8211; <\/strong>CEO, Founder,<strong> VITAL DIGITAL FORENSICS<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Unlocking Cyber Resilience excellence<\/span><br \/>\nDimitris Theodoropoulos,<\/strong> Regional Director CEE and Country Manager for Greece, <strong>COMMVAULT<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Cyber Resilience as a Discipline of Control: A Defense Perspective in the Age of AI<\/span><br \/>\n<\/strong><b>Christos Drigogias<\/b> &#8211; CEO, <strong>LOGSTAIL<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>\u201cAI\u2026for the masses<\/strong>\u201d<\/span><br \/>\n<b>Michalis Alexiou<\/b> &#8211; IT &amp; IS Product Manager &#8211; Senior Auditor, <strong>T\u00dcV NORD HELLAS<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Control Human Risk: The Missing Layer in Cybersecurity<\/span><br \/>\n<\/strong><b>George Aslanidis<\/b> &#8211; &nbsp;Cybersecurity Architecture &amp; Solutions Manager, <strong>CYBER NOESIS<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Cyber<\/strong><strong>&#8211;<\/strong><\/span><strong><span style=\"color: #800000;\">Resilience Synergy Network<\/span><br \/>\n<\/strong><strong>Christos Gizelis &#8211;<\/strong> PhD &#8211; Principal Innovation Analyst, \u0399\u03a4 Innovation Center, <strong>OTE GROUP OF COMPANIES<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Cybersecurity requirements for products entering the EU market<\/strong><\/span><br \/>\n<b>Dimitris Glynos<\/b> \u2013 Director, <strong>INTWAVE<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>DORA in action: When a <\/strong><strong>Cyber <\/strong><strong>Incident tests an organization&#8217;s resilience<\/strong><\/span><strong><br \/>\n<\/strong><b>Achilleas Viennas<\/b> &#8211; Senior Cybersecurity Instructor, <strong>LEARNING ACTORS<\/strong><strong>&nbsp;<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>EU&#8217;s new Cyber Resilience Act: obligations and challenges<br \/>\n<\/strong><\/span><strong>Nikos Fotiou<\/strong> \u2013 CEO, <strong>EXCID<\/strong><strong>&nbsp;<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Natural Disasters and \u0399\u03a4: Defeat fear, achieve availability<\/span><br \/>\n<\/strong><strong>Nikolaos Stergiotis &#8211; <\/strong>IT Manager, <strong>Papagianni Bros. S.A.<\/strong><\/p>\n<p>Moderator : <strong>Christos Kotsakas<\/strong> &#8211; Journalist, Manager at <strong>INFOCOM<\/strong><\/p>\n<p><span style=\"color: #0000ff;\"><strong><u>12:30 \u2013 13:15 \u2013 BREAK<\/u><\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff;\"><strong><u>13:15 \u2013 15:00 \u2013 2nd session<\/u><\/strong><\/span><\/p>\n<p><span style=\"color: #000080;\"><strong>The Future of Cybersecurity Technologies<br \/>\n<em>Platforms, AI, Automation and Intelligent Security Ecosystems<\/em><\/strong><\/span><\/p>\n<p>The new generation of cybersecurity technologies is transforming the way organizations protect and manage their digital infrastructures. This section will present innovative platforms, tools, and solutions that are shaping the future of digital security, leveraging artificial intelligence, automation, advanced analytics, threat intelligence, and intelligent security ecosystems. Representatives of international vendors and technology companies will present practical use cases and modern architectures, demonstrating how new technologies can improve visibility, enhance the effectiveness of security teams, and create a more secure, resilient, and intelligent digital environment. The session combines strategy, technology, and practical application, highlighting the trends that will define the future of digital protection.<\/p>\n<p><span style=\"color: #800000;\"><strong>Reading Between the Lines: Automating Phishing Investigations with AI at Scale<br \/>\n<\/strong><\/span><strong>Konstantinos Soursos \u2013 <\/strong>Principal Security Automation Engineer, <strong>NVISO<\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Beyond Human Identity: The Dawn of Agentic Security<\/strong><\/span><br \/>\n<strong>Constantina Syntila<\/strong> -Cyber Security Regional Sales Manager, Greece | Balkans | CEE, <strong>CISCO<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Don\u2019t Just Adopt AI. Lead It Securely with TrendAI!&nbsp;<\/span><\/strong><br \/>\n<strong>Paris Kaskas<\/strong> &#8211; Sr. Cyber Security Solutions Engineer &#8211; <strong>TRENDAI<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Securing AI Agents at the Speed of Identity<\/span><br \/>\nOfer Breda<\/strong> &#8211; Sales Engineer, <strong>SILVERFORT<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Radware: Intelligent Security that Keep your Business Continuity<\/span><\/strong><br \/>\n<strong>Shimon Barel<\/strong>, Country Manager for Turkey, Greece, Cyprus, and Malta, <strong>RADWARE<\/strong><\/p>\n<p><strong><span style=\"color: #800000;\">Cyber Range &amp; Cyber Physical \u03a3\u03c5\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1: \u0395\u03ba\u03c0\u03b1\u03af\u03b4\u03b5\u03c5\u03c3\u03b7 \u03ba\u03c5\u03b2\u03b5\u03c1\u03bd\u03bf\u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1\u03c2 \u03c3\u03c4\u03b7\u03bd \u03b5\u03c0\u03bf\u03c7\u03ae \u03c4\u03b7\u03c2 \u03a4\u03b5\u03c7\u03bd\u03b7\u03c4\u03ae\u03c2 \u039d\u03bf\u03b7\u03bc\u03bf\u03c3\u03cd\u03bd\u03b7\u03c2.<\/span><\/strong><br \/>\n<strong>Mariana Mazi<\/strong> &#8211; Center for Research and Technology Hellas <strong>(CERTH)<\/strong><\/p>\n<p>Moderator :<strong> Dimitris Skiannis<\/strong>, Journalist<\/p>\n<p><strong><span style=\"color: #800000;\">Cybersecurity Act 2: Economic and technological implications for the EU<\/span><\/strong><em><strong><br \/>\nDiscussion Panel<br \/>\n<\/strong>Participants :<br \/>\n<\/em><\/p>\n<p><strong>Christos Xenakis &#8211;<\/strong> Cybersecurity Professor &#8211; <strong>University of Piraeus<\/strong><br \/>\n<strong>Dimitra Liveri &#8211; <\/strong>Head of Resilience of Critical Sectors Unit Acting head of Policy Monitoring and Analysis &#8211;<strong>ENISA<\/strong><br \/>\n<strong>Ioannis Alexakis &#8211;<\/strong> General Manager of Staff Planning, <strong>National Cybersecurity Authority<\/strong><br \/>\n<strong>Tasos Syrmalis &#8211; <\/strong>Information Security GRC Section Manager,<strong> Business Security &amp; Continuity OTE Group<\/strong><\/p>\n<p>Moderator : <strong>Stella Tsitsoula,<\/strong> President, <strong>Hellenic Cybersecurity Institute<\/strong><\/p>\n<p><span style=\"color: #0000ff;\"><span style=\"text-decoration: underline;\"><strong>15:00 \u2013 16:00 \u2013 3rd session<\/strong><\/span><span style=\"color: #ff6600;\"><strong><br \/>\n<\/strong><\/span><\/span><\/p>\n<p><span style=\"color: #000080;\"><strong>The Human Side of Cybersecurity<br \/>\n<em>Professional Challenges, Burnout and Psychological Resilience in Security Operations<\/em><\/strong><\/span><\/p>\n<p>Behind every cybersecurity system are people who work daily in a high-responsibility and high-pressure environment. In the panel of the second day, the human dimensions of the cybersecurity profession will be highlighted. Industry professionals will discuss the challenges faced by security teams, such as constant vigilance against threats, handling critical incidents, and the need for continuous training. At the same time, issues such as professional burnout, psychological pressure, and ways to strengthen mental resilience will be examined. The discussion will emphasize the importance of supporting the human factor for the effective operation of cybersecurity organizations.<\/p>\n<p><strong><span style=\"color: #800000;\">Discussion Panel<\/span><\/strong><\/p>\n<p><span style=\"text-decoration: underline; color: #0000ff;\"><strong>16:00 \u2013 16:30 \u2013 Conclusion &#8211; Networking<\/strong><\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":0,"parent":8845,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-9050","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/9050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/comments?post=9050"}],"version-history":[{"count":6,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/9050\/revisions"}],"predecessor-version":[{"id":9074,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/9050\/revisions\/9074"}],"up":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/8845"}],"wp:attachment":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/media?parent=9050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}