customize

November, 2018

201806Nov12:0016:304th Internet Security Day12:00 - 16:30

Event Details

When: Tuesday, November 6, 12:00–16:30

Where: Upper Level Library

Organized by: Management Information Systems Society and Information Technology Society

Which are the top cyber security concerns businesses face today?

Given the cyber threat landscape, how well a cyber security program protects organizational assets?

Join us for an insightful discussion with distinguished professionals on cyber security trends and issues the world can expect in 2019.


Mr. Lampros Katsonis

Presales and Technical Manager of Panda Security

Topic: “Cyber Security Landscape”

Cyber Security has become a major point of interest the past few years. After the 9/11 attacks, terrorist attacks have been shifted on the digital cyberspace seeking to extract highly sensitive data from commercial corporations, government and even individual persons. The current cyber security landscape requires the firms not only to be able to adapt to new challenges but also to prevent a number of evolving threats. In such a dynamic environment, challenges’ complexity in the cybersecurity domain has become of high importance since threats are constantly evolving.


Mr. Konstantinos Vavousis

Strategic Manager, TRUST INFORMATION TECHNOLOGIES

Topic: “Applied Cybersecurity – IT Security in Practice”

Ways to recognize security threats, hacking and malicious users. Discussion about the role of the human factor in IT security. Analysis of online attacks and the latest trends in malware. The ethical perspective of IT security breaching. Demonstration of real-time hacking methods via Facebook, Gmail and through malicious USB drives. Payloads and the potential victims.

This presentation is only for academic purposes and the goal is to get in touch with the phenomenon of live hacking in order to prevent it and protect IT systems and infrastructures.


Mr. Spyros Kollias – Byte Computer SA

Senior Software Architect & Security Engineer for Byte Computer SA

Topic: “Asymmetric Cryptography, PKI & Applications

Asymmetric cryptography is capable of creating a chain of trust, which is being used to build instantly powerful trust between 2 entities (natural or legal or systemic). Public Key Infrastructures (PKIs) are able to provide this chain of trust by using asymmetric cryptography and providing various services such as cryptography, digital signing, authentication etc.”

Time Slot on program Description
11:30 – 12:15 Registration / Networking
12:15 – 13:00 Mr. Lampros Katsonis – Panda Security
13:00 – 13:45 Mr. Konstantinos Vavousis – TRUST-IT
13:45 – 14:30 Coffee Break / Networking
14:30 – 15:15 Mr. Spyros Kollias – Byte Computer SA
15:15 – 16:30 Panel Discussion

 

X
X