When: Tuesday, November 6, 12:00–16:30 Where: Upper Level Library Organized by: Management Information Systems Society and Information Technology Society Which are the top cyber security concerns businesses face today? Given the cyber threat landscape, how well a cyber
When: Tuesday, November 6, 12:00–16:30
Where: Upper Level Library
Organized by: Management Information Systems Society and Information Technology Society
Which are the top cyber security concerns businesses face today?
Given the cyber threat landscape, how well a cyber security program protects organizational assets?
Join us for an insightful discussion with distinguished professionals on cyber security trends and issues the world can expect in 2019.
Mr. Lampros Katsonis
Presales and Technical Manager of Panda Security
Topic: “Cyber Security Landscape”
Cyber Security has become a major point of interest the past few years. After the 9/11 attacks, terrorist attacks have been shifted on the digital cyberspace seeking to extract highly sensitive data from commercial corporations, government and even individual persons. The current cyber security landscape requires the firms not only to be able to adapt to new challenges but also to prevent a number of evolving threats. In such a dynamic environment, challenges’ complexity in the cybersecurity domain has become of high importance since threats are constantly evolving.
Mr. Konstantinos Vavousis
Strategic Manager, TRUST INFORMATION TECHNOLOGIES
Topic: “Applied Cybersecurity – IT Security in Practice”
Ways to recognize security threats, hacking and malicious users. Discussion about the role of the human factor in IT security. Analysis of online attacks and the latest trends in malware. The ethical perspective of IT security breaching. Demonstration of real-time hacking methods via Facebook, Gmail and through malicious USB drives. Payloads and the potential victims.
This presentation is only for academic purposes and the goal is to get in touch with the phenomenon of live hacking in order to prevent it and protect IT systems and infrastructures.
Mr. Spyros Kollias – Byte Computer SA
Senior Software Architect & Security Engineer for Byte Computer SA
Topic: “Asymmetric Cryptography, PKI & Applications
Asymmetric cryptography is capable of creating a chain of trust, which is being used to build instantly powerful trust between 2 entities (natural or legal or systemic). Public Key Infrastructures (PKIs) are able to provide this chain of trust by using asymmetric cryptography and providing various services such as cryptography, digital signing, authentication etc.”
|Time Slot on program||Description|
|11:30 – 12:15||Registration / Networking|
|12:15 – 13:00||Mr. Lampros Katsonis – Panda Security|
|13:00 – 13:45||Mr. Konstantinos Vavousis – TRUST-IT|
|13:45 – 14:30||Coffee Break / Networking|
|14:30 – 15:15||Mr. Spyros Kollias – Byte Computer SA|
|15:15 – 16:30||Panel Discussion|