PS5 details: Is there a risk that hackers will exploit them?
inet infosec

PS5 details: Is there a risk that hackers will exploit them?

Sony's game developer and creator, Mark Cerny, gave some details about the new PS5 console. In one...
Read More
infosec

Cisco warns of vulnerabilities in 9000 series routers

Cisco has released 31 security tips this week, but has focused users on "critical" patches for ...
Read More
infosec

HP: Adds the Sure Sense malware blocker to its new devices

HP announced a series of updates and new features for PCs, as well as the official HP release ...
Read More
infosec

Covering vacancies in hacker security

Incidents of online attacks are increasing day by day. Previously no such attention was paid. After the incident with the ...
Read More
infosec

Oracle: New Critical Patch Update fixes 297 vulnerabilities

Oracle releases a collection of patches for multiple critical security vulnerabilities. The update contains 297 new security fixes ...
Read More
Latest Posts

9o INFOCOM SECURITY 17 - 18 April 2019: Conference Program

The EthiHak Competition will be held for 4 in the context of the Infocom Security Conference where in collaboration with the Secnews.gr team, young mainly "Ethical hackers"Will compete by testing their information security skills by detecting weaknesses in IT systems and infrastructures. 9o INFOCOM SECURITY will be held from 17 - 18 April 2019 at the Dais Conference Center in Maroussi. The conference program follows.

1 Day - Wednesday 17 / 4

09: 00 - 09: 30 - Entry - Records

09: 30 - 10: 00 - Start - Greetings

Costas Nostis - Chairman of the Organizing Committee

Konstantinos Menoudakos - President of the Personal Data Protection Authority

Michalis Sakkas - Vice President of Communication Assurance Authority

Vasilis Papakostas - Director of Electronic Crime Prosecution, EL.AS

10: 00 - 12: 15 - 1 section

The Cybersecurity Challenges in a High Digital Density World - The Need for a Holistic Approach

For an organization or business to be effective and productive. in the new world of absolute digital transformation, it must above all best manage the security of its information systems with a new modern approach that will holistically address the challenges of the era. In 1 the 1 session of the conference day, Risk Management Companies, Digital Security Services, Consulting, and Integrator projects will talk about security requirements in the new digital era and highlight the best risk and protection strategies based on new technology tools and managed services.

Finally, is the glass half-empty or half full?

Dr. Konstantinos Papapanagiotou - Senior Manager, Cyber ​​Security Solutions, OTE Group

ClearSkies: The power of a continuously evolving platform

Irene Selia - Business Development Manager, ClearSkies, Odyssey

OT Phone Home

Argyris Makrygeorgou - Head of Managed Cybersecurity Services, Algosystems

SOAR in Managed Detection and Response: The Perfect Match

Dionysia Adamopoulou - Product Owner, Enorasys SOCStreams, ENCODE

Information Resilience in the Age of Business 4.0

Notis Iliopoulos - Director of GRC & Assurance at ADACOM

Advance Threat Hunting 24 × 7: Fighting Cybercrime with Artificial Intelligence

Nikitas Kladakis - Director of Information Security, Netbull

The protection of an organization's assets starts with a secure, trusted identity

Andreas Chiosakos - Presales Product Specialist, Besecure

Fuels the Road to the Cloud and Beyond - How our Customers Solve Real Problems

Aristides Ziras - Presales Technical Account Manager, Cysoft

Coordinator: Vlassis Amanatidis - IT Security Professional Editor-in-Chief

12: 15 - 13: 00 - Time out

13: 00 - 15: 00 - 2th module

Understanding the True Value of Cyber ​​Protection Technologies - Future Proof and Tailor Made Solutions

It is true that all research and forecasts on trends in digital security show a continuous development of attacks, both quantitatively and qualitatively. The assessment of all, is that available protection technologies should now be adapted to the evolution of emerging threats as well as to the particular needs of each organization as it evolves digitally. Greek and foreign experts will inform 2 about how we can understand the true value of digital security solutions in the market by investing in technologies that will boost productivity and simplify business processes in digital transformation.

Appropriate growth in sales and marketing B2B in the Cyber ​​domain Security which creates goodwill

Georgios Nolas - Dermentzoglou - Marketing Director, Manager's Office

Cyber ​​security innovations that matter

Moti Sagey - Head of Strategic Marketing, Check Point

Anatomy of cyberattack - forensics made simple with Artificial Intelligence

Peter Skondro - Senior Sales Engineer, Sophos

Evolve Siem

Bernard Montel - Presale Manager, RSA

Digital Transformation: Cure-all, Placebo or Poison Pill?

Vassilis Iliopoulos - Senior Account Manager Pronet (Fortinet Partner)

Security in the IoT & OT Era

Enrico Rossi - Sales Regional Manager, Center & South Italy, ForeScout Technologies

IT Security and Risk: recommendations to secure IT's IT landscape with SIEM

Abishek Surendra Babu - Senior Presales Consultant at ManageEngine

Multifactor authentication as a service - Secure & Simple by Watchguard

Antonis Kalohristianakis - Commercial Director, Digital Sima

Pwned! (or not?) - The need for and effectiveness of Cyber ​​Deception

Andreas Dakas - Illicium Product Manager, NeuroSoft

Confident, Faster, More Strategic Third-Party Cyber ​​Risk Management

Marco Pereira - EMEA Commercial Team Leader, BitSight Technologies

Coordinator : Vangelis Xanthakis, Journalist, Infocom

15: 00 - 16: 30 - 3 section

Do not be the Next Victim of Cyber ​​Crime - What to Do and What Not to Do!

Cybercrime in all its aspects is in line with wider technological developments and is often a step ahead. Attackers use technology trends to broaden their reach. Ransomware threats, crypto-mining, cryptojacking, Blockchain, Social Engineering, Phishing, AI and Machine Learning, and Internet malware in general, are always on the agenda. The speakers of the unit that will close 1 day will highlight the contemporary forms of cyber crime and will inform us what we should and what we should not do to become the next victims of the attackers!

The Insider Threat

Rigas Angelou - Information Security Consultant, Networking Solutions Division, Space Hellas

Panayiotis Georgiou - Information Security Specialist, Networking Solutions Division, Space Hellas

Blockchain and its inherent security features

Stavroula Kambouridou - Technology Adviser to the Governor of the Bank of Greece

Cyber ​​Insurance v4.0

Nikos Georgopoulos - Cyber ​​Privacy Risks Advisor, Cromar Coverholder at LLOYD'S

Fraud techniques for businesses and organizations via the internet - best practices for protection

Anastasios Papathanassiou & Giorgos Germanos, EL.AS Officers, Electronic Crime Prosecutor's Office, Doctoral students in Informatics

Data Governance as an enabler for data driven companies, strategy & transformation

Stamatis Pasas, Susp. Doctor of Panteion University, IT GRC Specialist

The New Era CISO - Fantasy Unicorn or Superhero? A first 100 days roadmap

Panayiotis Kalantzis - Cyber ​​Security & Data Privacy Expert

Coordinator: Dimitris Skiannis, Journalist, Digital Life

16: 30 - 17: 00 - Happy Hour - Light Lunch

2 Day - Thursday 18 / 4

09: 00 - 09: 30 - Entry - Records

09: 30 - 09: 45 - Start - Greetings

Dimitris Patsos - Chairman of the Board (ISC) 2 Hellenic Chapter

Christos Koziaris - ISACA Athens Chapter

Spyros Tassis - President of the Hellenic Association for the Protection of Privacy

09: 45 - 10: 00 - Keynote Speech

The landscape of cyber-threats: present state and trends

Dr. Louis Marinos - Risk / Threat Management - ENISA

10: 00 - 12: 15 - 1 section

Leading and Creating Cyber ​​Trust in Business - Best Practices and Processes

In spite of the many incidents of critical corporate data that see the light of publicity and others that are not known, companies and organizations - regardless of size and category - that remain unprepared for dealing with online threats, are not few! Creating trust-based, three-pronged processes - people - technologies for a secure environment in the evolving digital world of industry 4.0, is imperative. Those businesses who manage to innovate and build confidence in cyberspace will gain a direct competitive advantage. The best practices and procedures leading to this goal will be analyzed by the 1 speakers of 2's day conference session.

Security and Privacy to Communications Providers. A modern perspective of the Authority

Vassilis Stathopoulos - Communications Privacy Authority (ADAE)

Top 10 most common problems in implementing GDPR

Andreas Veneris - Innovation Manager - IT Governance Consultant, PRIORITY QUALITY CONSULTANTS SA

Ransomware …they live among us . Ways of coping and protection

Panagiotis Pierros - General Manager, Tictac Laboratories

Michalis Michigos - Data Recovery Engineer / IT Director, Tictac Laboratories

Tassos Abatzoglou - Managing Director, IQ insurance quality Insurance Brokers

Visibility equals Defense vol.4: An IoT story

Hlias Angelidis - Technical Director of Informatics and Communications, Algosystems

Secure your Transformation with Intelligence

Panagiotis Kouris - CEO, Office Line

Estimating the cost of Cyber ​​Crime

Dr. Theodoros Rokkas - CTO, inCITES Consulting

Securing the Containerized Microservices

Dimitris Pikoulas - Manager, Accenture

IBM Security - Fearless in the face of uncertainty

Valia Demesticha - IBM Security Sales Greece & Cyprus

Coordinator: Vlassis Amanatidis - Chief Editor of IT Security Professional

12: 15 - 13: 00 - Time out

13: 00 - 15: 00 - 2 section

The Need for an Integrated Cyber ​​Security Vision - A 360o Effective Strategy Implementation

The nature of today's attacks and cyber threats in general, as well as the modern integrated IT business ecosystem, creates the need for an 360 strategy to effectively implement security with the aim of enhancing the resilience of the IT infrastructure as a whole and all the individual points endpoint, network, email, cloud, applications, identity). Executives from Greece and abroad, active in the development of technology solutions for security, will develop in this section their proposals on how the vision of integrated and unified protection can be realized.

Stairway to Cloud or Highway to Hell?

Konstantina Koukou - Security Engineer, Check Point

Trend Micro Deep Security-AI in your Data Center

Angeliki Filippopoulou, Manager, Greece, Cyprus, Malta, Trend Micro

Threat Hunting: Keeping Organized Safe, Protected and Resilient When Malware Is No Longer a Problem

Lampros Katsonis - Presales & Technical Manager, Panda Security

Security is a mindset

Yannis Pavlidis - Technical Manager, ESET Hellas

Modern threats require smart protection!

Angelo Gentili - Business Development Director, PartnerNet

Bitdefender: The Art of War!

Philippos Melissourgos - Security Executive, Bitdefender Greece

Does the apps that run your business also your Achilles' heel

Roee Abaiov, Cyberark Account Executive, Israel & Balkans

Removing the privilege from privileged accounts

Tim Reeve - Sales Engineer, Thycotic

Human-Centric Security for the Era Of Digital Transformation

Nick Nicolescu - SEE Territory Manager, Forcepoint

Moderator: Vangelis Xanthakis, Journalist, Infocom

15: 00 - 15: 45 - 3 section

GDPR: One Year Later: What impact did it have so far? - The critical role of DPO

Introductory Speech

Dr. Leonidas Kanellos - President of the Pan-Hellenic Network of Data Protection Professionals (DPO Network)

Discussion panel

Data protection in the light of the European General Regulation GDRP, almost one year after its implementation point and the establishment of the Data Protection Officer, continues to be of great concern to organizations and businesses of every activity and scale of scale, citizens, but also the whole society. So how does compliance with the regulation evolve? To what extent are GDPR projects completed and meet the requirements? What is the modern role of DPO? This and other relevant questions will be answered by DPOs and compliance officers on GDPR in a discussion panel to be held at the 3 thematic section.

Coordinator:

Spyros Tassis - Attorney-at-law, LLM, President of the Hellenic Association for the Protection of Privacy

Participants:

Athanasios Kosmopoulos - Data Protection Officer, Ministry of Digital Policy, Telecommunications and Information

Athena Burka - Data Protection Officer, ENISA

Vassilis Vassilopoulos - Data Protection Officer, ERT

Fotini Papathanasiou - Data Protection Officer, OTE Group

Evangelos Michaloliakos - Chief Executive Officer, AQS - Business Consultants

15: 45 - 16: 15 - 4 section

The fake News on the Internet - their legal, political and social impact - methods and techniques of prevention

Discussion panel

The phenomenon of public disinformation, also known as "fake news" or "hoax", has taken on new dimensions in the digital age, largely due to its huge dispersion potential (bots and so on) and due to other features of the internet; , in particular, social networks. False news (now) leads public opinion to decisions about politics, economy, health, etc. Scientists with different specialties and perspectives are involved in a research project at the University of Western Attica to prevent and curb "fake news".

Coordinator:

Dr. Fotios Spyropoulos - Attorney at law, Doctor of Law, University of Athens, postdoctoral research at the University of Western Attica

Participants:

Aristotle Komotrekas - IT scientist, Dr. University of Patras, researcher at the University of Western Attica

Evangelia Androulaki - Attorney-at-law, forensic scientist (master), Researcher at the University of Western Attica

Nikolaos Karagiannis - Lawyer, forensic scientist (master), researcher at the University of Western Attica

Angela Sardelianou - Attorney-at-law, Senior Associate «Spyropoulos law firm»

* The present presentation takes place in the framework of the post-doctoral research on "Hoaxes and spreading false news - Survey on False News Security via the Internet and the economic and technical dimension of the phenomenon - Legal and de lege ferenda", funded from the General Secretariat for Research and Technology (GSRT) and Hellenic Foundation for Research and Innovation (ELIDEK) - Hellenic Foundation for Research and Innovation (HFRI) (project no. 80529) Host University of Western Attica .

16: 15 - 16: 30 - Announcement of Results and Awards Award for the competition Ethihak 2019

16: 30 - 17: 00 - Happy Hour - Light Lunch

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *