{"id":631,"date":"2024-12-10T11:00:52","date_gmt":"2024-12-10T11:00:52","guid":{"rendered":"https:\/\/digitalagency.com.cy\/?page_id=631"},"modified":"2025-03-28T13:20:46","modified_gmt":"2025-03-28T11:20:46","slug":"agenda","status":"publish","type":"page","link":"https:\/\/cybersecurity.imhbusiness.com\/2025\/agenda\/","title":{"rendered":"Agenda"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"631\" class=\"elementor elementor-631\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d0f0b52 e-con-full e-flex e-con e-parent\" data-id=\"3d0f0b52\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3c55fe4d e-con-full e-flex e-con e-child\" data-id=\"3c55fe4d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e5a3a0a elementor-widget elementor-widget-heading\" data-id=\"e5a3a0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Agenda<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-48d7f89c e-flex e-con-boxed e-con e-child\" data-id=\"48d7f89c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3670fd21 e-con-full e-flex e-con e-child\" data-id=\"3670fd21\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b02ef2a dc-has-condition dc-condition-contains elementor-widget elementor-widget-shortcode\" data-id=\"1b02ef2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"event-agenda\"><div class=\"cssportal-grid\"><div class=\"agenda-header\"><div class=\"div1\" style=\"color: #000000;\">08:30 - 09:15<\/div><div class=\"div2\" style=\"color: #09ace2;\">Registrations<\/div><\/div><\/div><div class=\"cssportal-grid\"><div class=\"agenda-header\"><div class=\"div1\" style=\"color: #000000;\">09:15 - 09:20<\/div><div class=\"div2\" style=\"color: #09ace2;\">Introduction by the Chairperson of the Conference<\/div><\/div><div class=\"speaker-container\"><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/04\/WEB2.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/aglaia-nicolaou\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/06\/AGLAIA-NICOLAOU-1-150x150.jpg\" alt=\"Aglaia Nicolaou\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/aglaia-nicolaou\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>Aglaia Nicolaou<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/aglaia-nicolaou\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">Secretary &amp; SheLeadsTech Liaison, ISACA Cyprus Chapter<\/a><\/p><\/div><\/div><\/div><\/div><\/div><div class=\"cssportal-grid\"><div class=\"agenda-header\"><div class=\"div1\" style=\"color: #000000;\">09:20 - 09:30<\/div><div class=\"div2\" style=\"color: #09ace2;\">Welcome Address<\/div><\/div><div class=\"speaker-container\"><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/09\/WEB23.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/dr-nicodemos-damianou\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/09\/NIKODIMOS-DAMIANOU-150x150.jpg\" alt=\"Dr. Nicodemos Damianou\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/dr-nicodemos-damianou\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>Dr. Nicodemos Damianou<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/dr-nicodemos-damianou\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">Deputy Minister of Research, Innovation and Digital Policy, Republic of Cyprus<\/a><\/p><\/div><\/div><\/div><\/div><\/div><div class=\"cssportal-grid\"><div class=\"agenda-header\"><div class=\"div1\" style=\"color: #000000;\">09:30 - 9:45<\/div><div class=\"div2\" style=\"color: #09ace2;\">Regulatory Challenges: How to Keep Up with Cyber Laws in Cyprus and the EU<\/div><\/div><div class=\"speaker-container\"><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/04\/WEB4.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/george-michaelides\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/05\/George-Michaelides-150x150.jpg\" alt=\"George Michaelides\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/george-michaelides\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>George Michaelides<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/george-michaelides\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">Commissioner of Communications, Republic of Cyprus <\/a><\/p><\/div><\/div><\/div><\/div><\/div><div class=\"cssportal-grid\"><div class=\"agenda-header\"><div class=\"div1\" style=\"color: #000000;\">09:45 - 10:00<\/div><div class=\"div2\" style=\"color: #09ace2;\">Bridging the gap: How organizations are building a more secure &#038; resilient future<\/div><\/div><div class=\"agenda-content\"><div class=\"div3\"><\/div><div class=\"div4\" style=\"color: #000000;\"><p>The presentation gives a clear summary of the 2025 cyber risk landscape, focusing on the expansion of cybercrime, the worldwide adoption of cybersecurity practices, and the increased instability caused by geopolitical events and new technologies. Notable trends include the emergence of generative AI, the essential role of identity and access management (IAM), and the growing significance of continuous threat monitoring and organizational resilience. It also addresses evolving regulations such as the European Union\u2019s Digital Operational Resilience Act (DORA) and the Network and Information Security Directive (NIS2), which aim to reinforce cybersecurity standards for a range of sectors. Achieving cyber resilience requires strong governance, accountability at the senior management level, and strategies to reduce recovery times for essential business functions. Ultimately, this provides practical guidance to help organizations improve their security and resilience.<\/p>\n<\/div><\/div><div class=\"speaker-container\"><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/06\/WEB6.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/conal-hickey\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/07\/CONAL-KICKEY-150x150.jpg\" alt=\"C\u00f3nal Hickey\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/conal-hickey\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>C\u00f3nal Hickey<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/conal-hickey\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">Vice President, Security &amp; Resiliency Practice Leader SM, Kyndryl<\/a><\/p><\/div><\/div><\/div><\/div><\/div><div class=\"cssportal-grid\"><div class=\"agenda-header\"><div class=\"div1\" style=\"color: #000000;\">10:00 - 10:15<\/div><div class=\"div2\" style=\"color: #09ace2;\">Fireside Chat: AI vs AI &#8211; Beyond Human Limits<\/div><\/div><div class=\"agenda-content\"><div class=\"div3\"><\/div><div class=\"div4\" style=\"color: #000000;\"><p>In today&#8217;s rapidly shifting cyber landscape, the scale, speed, and complexity of threats have surpassed human capacity to respond alone. This session explores how organizations can move <strong>beyond human limits<\/strong> by combining <strong>AI-driven defense tools<\/strong> with the <strong>right expertise and strategy<\/strong>. It&#8217;s not just about deploying artificial intelligence-it&#8217;s about understanding how to integrate it intelligently, with skilled professionals and purpose-built solutions. Discover how advanced technologies, guided by human insight, can give your organization the edge in a world where only AI can match AI.<\/p>\n<\/div><\/div><div class=\"speaker-container\"><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/08\/LOGOS-WEB-INSPIRE-500X50051.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/andreas-constantinides\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/09\/ANDREAS-CONSTANTINIDES-150x150.jpg\" alt=\"Andreas Constantinides\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/andreas-constantinides\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>Andreas Constantinides<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/andreas-constantinides\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">Managed Services Director, Odyssey<\/a><\/p><\/div><\/div><\/div><\/div><div class=\"moderator-container\"><div class=\"div3 title\"><img decoding=\"async\" src=\"https:\/\/placehold.co\/10x10\/FFFF\/FFFF\"><\/div><div class=\"div4 title\" style=\"color: #000000;\">Moderator:<\/div><div class=\"moderator-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/08\/WEB19.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/manos-manoli\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/08\/MANOLI-MANOLIS-150x150.jpg\" alt=\"Manos Manoli\" class=\"moderator-photo\"><\/a><\/div><div class=\"div62\"><p><strong><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/manos-manoli\/\" style=\"color: #000000;\" target=\"_blank\">Manos Manoli<\/a><\/strong><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/manos-manoli\/\" style=\"color: #e9418f;\" target=\"_blank\">Chief Information Security Officer, Marlow Navigation Co.Ltd<\/a><\/p><\/div><\/div><\/div><\/div><\/div><div class=\"cssportal-grid\"><div class=\"agenda-header\"><div class=\"div1\" style=\"color: #000000;\">10:15 - 10:30<\/div><div class=\"div2\" style=\"color: #09ace2;\">Taming the AI Act: Build Smart, Not From Scratch<\/div><\/div><div class=\"agenda-content\"><div class=\"div3\"><\/div><div class=\"div4\" style=\"color: #000000;\"><p>The EU AI Act is here \u2014 compliance isn\u2019t optional, but the path forward doesn\u2019t have to be overwhelming. This session cuts through the legal noise to deliver a <strong>practical, risk-based roadmap<\/strong> for putting the Act into action. Instead of reinventing the wheel, we show how <strong>your existing Privacy and Security programs<\/strong>\u00a0can become the launchpad for AI governance. You&#8217;ll learn how to mobilize <strong>cross-functional teams<\/strong>, align with suppliers and data owners, and scale without chaos. We also tackle the gaps: what the AI Act misses \u2014 and how forward-thinking organizations can get ahead of what\u2019s coming next.<\/p>\n<\/div><\/div><div class=\"speaker-container\"><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/placehold.co\/40x40\/FFF\/FFF\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/ulrika-dellrud\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/05\/ULRIKA-DELLRUD-150x150.jpg\" alt=\"Ulrika Dellrud\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/ulrika-dellrud\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>Ulrika Dellrud<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/ulrika-dellrud\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">Chief Privacy &amp; Data Ethics Officer, Smarter Contracts<\/a><\/p><\/div><\/div><\/div><\/div><\/div><div class=\"cssportal-grid\"><div class=\"agenda-header\"><div class=\"div1\" style=\"color: #000000;\">10:30 - 11:10<\/div><div class=\"div2\" style=\"color: #09ace2;\">Panel Discussion: Inside a Ransomware Attack: Real-Life Stories from the Frontlines<\/div><\/div><div class=\"agenda-content\"><div class=\"div3\"><\/div><div class=\"div4\" style=\"color: #000000;\"><p>Security leaders share experiences of dealing with major ransomware incidents<\/p>\n<ul>\n<li>How AI is making ransomware faster, stealthier, and harder to stop<\/li>\n<li>How organizations responded and recovered<\/li>\n<li>Lessons for businesses of all sizes<\/li>\n<\/ul>\n<\/div><\/div><div class=\"speaker-container\"><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/06\/WEB8.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/brian-zarb-adami\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/06\/BRIAN-ZERB-ADAMI-150x150.jpg\" alt=\"Brian Zarb Adami\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/brian-zarb-adami\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>Brian Zarb Adami<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/brian-zarb-adami\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">CEO, CyberSift<\/a><\/p><\/div><\/div><\/div><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/06\/WEB7.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/rosario-blanco\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/09\/ROSARIO-BLANCO-150x150.jpg\" alt=\"Rosario Blanco\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/rosario-blanco\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>Rosario Blanco<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/rosario-blanco\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">Commercial Director for Italy, Greece &amp; Adriatics, Westcon-Comstor<\/a><\/p><\/div><\/div><\/div><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/07\/WEB13.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/theodoros-hadjistyllis\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/07\/THEODOROS-HADJISTYLLIS-150x150.jpg\" alt=\"Theodoros Hadjistyllis\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/theodoros-hadjistyllis\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>Theodoros Hadjistyllis<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/theodoros-hadjistyllis\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">Account Management Director for Cyprus, Mastercard<\/a><\/p><\/div><\/div><\/div><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/05\/cyber.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/nikitas-kladakis\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/07\/Nikitas-Kladakis-photo--150x150.jpg\" alt=\"Nikitas Kladakis\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/nikitas-kladakis\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>Nikitas Kladakis<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/nikitas-kladakis\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">General Manager, ADACOM <\/a><\/p><\/div><\/div><\/div><\/div><div class=\"moderator-container\"><div class=\"div3 title\"><img decoding=\"async\" src=\"https:\/\/placehold.co\/10x10\/FFFF\/FFFF\"><\/div><div class=\"div4 title\" style=\"color: #000000;\">Moderator:<\/div><div class=\"moderator-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/08\/WEB19.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/manos-manoli\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/08\/MANOLI-MANOLIS-150x150.jpg\" alt=\"Manos Manoli\" class=\"moderator-photo\"><\/a><\/div><div class=\"div62\"><p><strong><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/manos-manoli\/\" style=\"color: #000000;\" target=\"_blank\">Manos Manoli<\/a><\/strong><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/manos-manoli\/\" style=\"color: #e9418f;\" target=\"_blank\">Chief Information Security Officer, Marlow Navigation Co.Ltd<\/a><\/p><\/div><\/div><\/div><\/div><\/div><div class=\"cssportal-grid\"><div class=\"agenda-header\"><div class=\"div1\" style=\"color: #000000;\">11:10 - 11:25<\/div><div class=\"div2\" style=\"color: #09ace2;\">The Insider Threat: Tackling Risks from Within the Organization<\/div><\/div><div class=\"agenda-content\"><div class=\"div3\"><\/div><div class=\"div4\" style=\"color: #000000;\"><p>Insider threats are no longer just internal or external. Attackers now impersonate staff using AI, deepfakes, and stolen credentials. This session explores how organizations can address this evolving risk through behavior analytics, regulatory alignment (NIS2, DORA, GDPR), and a security-first culture. Learn why the board must lead and how every employee plays a critical role in defending the organization from within.<\/p>\n<\/div><\/div><div class=\"speaker-container\"><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/06\/WEB5.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/christos-makedonas\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/07\/Christos-Makedonas_554-2-150x150.jpg\" alt=\"Christos Makedonas\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/christos-makedonas\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>Christos Makedonas<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/christos-makedonas\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">Partner, Digital Risk Services, Grant Thornton Cyprus<\/a><\/p><\/div><\/div><\/div><\/div><\/div><div class=\"cssportal-grid\"><div class=\"agenda-header\"><div class=\"div1\" style=\"color: #000000;\">11:25 - 12:05<\/div><div class=\"div2\" style=\"color: #09ace2;\">Networking Brunch<\/div><\/div><\/div><div class=\"cssportal-grid\"><div class=\"agenda-header\"><div class=\"div1\" style=\"color: #000000;\">12:05 - 12:20<\/div><div class=\"div2\" style=\"color: #09ace2;\">The Future of privacy in the new AI and Quantum World<\/div><\/div><div class=\"agenda-content\"><div class=\"div3\"><\/div><div class=\"div4\" style=\"color: #000000;\"><p>In this session, Punit Bhatia will explore the rapidly evolving privacy landscape\u00a0in the context of two transformative technological forces: Artificial Intelligence (AI) and quantum computing. As organizations and regulators worldwide grapple with the unprecedented capabilities and risks introduced by these technologies, the session will provide a forward-looking view on the challenges, regulatory responses, and ideas shaping the future of privacy.<\/p>\n<\/div><\/div><div class=\"speaker-container\"><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/05\/WEB-LOGO-fit4privacy.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/punit-bhatia\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/05\/punit-phatia-150x150.jpg\" alt=\"Punit Bhatia\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/punit-bhatia\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>Punit Bhatia<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/punit-bhatia\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">Partner, FIT4PRIVACY<\/a><\/p><\/div><\/div><\/div><\/div><\/div><div class=\"cssportal-grid\"><div class=\"agenda-header\"><div class=\"div1\" style=\"color: #000000;\">12:20 - 12:40<\/div><div class=\"div2\" style=\"color: #09ace2;\">Panel Discussion: Cloud Security &#8211; Best Practices for Securing Data in the Cloud<\/div><\/div><div class=\"agenda-content\"><div class=\"div3\"><\/div><div class=\"div4\" style=\"color: #000000;\"><ul>\n<li>Common cloud vulnerabilities<\/li>\n<li>Shared responsibility model in cloud security<\/li>\n<\/ul>\n<\/div><\/div><div class=\"speaker-container\"><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/09\/WEB21.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/jessica-jbeily\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/09\/JESSICA-JBEILY-150x150.jpg\" alt=\"Jessica Jbeily\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/jessica-jbeily\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>Jessica Jbeily<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/jessica-jbeily\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">Territory Manager, Barracuda <\/a><\/p><\/div><\/div><\/div><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/07\/WEB15.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/pavlos-kleanthous\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/07\/PAVLOS-KLEANTHOUS-150x150.jpg\" alt=\"Pavlos Kleanthous\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/pavlos-kleanthous\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>Pavlos Kleanthous<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/pavlos-kleanthous\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">Founder &amp; CEO, Parsectix<\/a><\/p><\/div><\/div><\/div><\/div><div class=\"moderator-container\"><div class=\"div3 title\"><img decoding=\"async\" src=\"https:\/\/placehold.co\/10x10\/FFFF\/FFFF\"><\/div><div class=\"div4 title\" style=\"color: #000000;\">Moderator:<\/div><div class=\"moderator-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/08\/WEB19.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/manos-manoli\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/08\/MANOLI-MANOLIS-150x150.jpg\" alt=\"Manos Manoli\" class=\"moderator-photo\"><\/a><\/div><div class=\"div62\"><p><strong><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/manos-manoli\/\" style=\"color: #000000;\" target=\"_blank\">Manos Manoli<\/a><\/strong><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/manos-manoli\/\" style=\"color: #e9418f;\" target=\"_blank\">Chief Information Security Officer, Marlow Navigation Co.Ltd<\/a><\/p><\/div><\/div><\/div><\/div><\/div><div class=\"cssportal-grid\"><div class=\"agenda-header\"><div class=\"div1\" style=\"color: #000000;\">12:40 - 12:50<\/div><div class=\"div2\" style=\"color: #09ace2;\">State-of-the-Art Protection &#038; Compliance<\/div><\/div><div class=\"agenda-content\"><div class=\"div3\"><\/div><div class=\"div4\" style=\"color: #000000;\"><p>The continuous operation of a Security Operations Center (SOC) (24x7x365) is the cornerstone of organizational resilience and regulatory compliance. By combining cutting-edge technologies, automation, and artificial intelligence, the SOC detects, analyzes, and responds to threats in real time. In an environment where cyberattacks are constantly evolving, the SOC emerges as a key factor of protection and strategic value for every organization.<\/p>\n<\/div><\/div><div class=\"speaker-container\"><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/07\/WEB17.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/triantafillos-prokopidis\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/09\/TRIANTAFYLLOS-PROKOPIDIS-150x150.jpg\" alt=\"Triantafillos Prokopidis\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/triantafillos-prokopidis\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>Triantafillos Prokopidis<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/triantafillos-prokopidis\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">Sales Director-Cyber Security Solutions, Cosmos Business Systems<\/a><\/p><\/div><\/div><\/div><\/div><\/div><div class=\"cssportal-grid\"><div class=\"agenda-header\"><div class=\"div1\" style=\"color: #000000;\">12:50 - 13:05<\/div><div class=\"div2\" style=\"color: #09ace2;\">Fireside Chat: Beyond Penetration Testing \u2013 Is It Enough to Stay Secure?<\/div><\/div><div class=\"agenda-content\"><div class=\"div3\"><\/div><div class=\"div4\" style=\"color: #000000;\"><ul>\n<li>Experts discuss the limits of pentesting &amp; alternative security approaches<\/li>\n<li>GenAI Pen testing<\/li>\n<\/ul>\n<\/div><\/div><div class=\"speaker-container\"><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/09\/WEB22.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/claudio-casini\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/09\/CLAUDIO-CASINI-150x150.jpg\" alt=\"Claudio Casini\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/claudio-casini\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>Claudio Casini<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/claudio-casini\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">Channel Account Executive \u2013 Southern Europe, Jamf<\/a><\/p><\/div><\/div><\/div><\/div><div class=\"moderator-container\"><div class=\"div3 title\"><img decoding=\"async\" src=\"https:\/\/placehold.co\/10x10\/FFFF\/FFFF\"><\/div><div class=\"div4 title\" style=\"color: #000000;\">Moderator:<\/div><div class=\"moderator-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/08\/WEB19.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/manos-manoli\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/08\/MANOLI-MANOLIS-150x150.jpg\" alt=\"Manos Manoli\" class=\"moderator-photo\"><\/a><\/div><div class=\"div62\"><p><strong><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/manos-manoli\/\" style=\"color: #000000;\" target=\"_blank\">Manos Manoli<\/a><\/strong><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/manos-manoli\/\" style=\"color: #e9418f;\" target=\"_blank\">Chief Information Security Officer, Marlow Navigation Co.Ltd<\/a><\/p><\/div><\/div><\/div><\/div><\/div><div class=\"cssportal-grid\"><div class=\"agenda-header\"><div class=\"div1\" style=\"color: #000000;\">13:05 - 13:25<\/div><div class=\"div2\" style=\"color: #09ace2;\">Panel Discussion: Building a Cyber Resilient Organization \u2013 DORA application experiences &#038; lessons learnt<\/div><\/div><div class=\"agenda-content\"><div class=\"div3\"><\/div><div class=\"div4\" style=\"color: #000000;\"><p>9 months on from the implementation of DORA, security leaders share real-life insights. What teething problems and implementation issues still remain to be tackled? What are some of the best practices they would recommend?<\/p>\n<\/div><\/div><div class=\"speaker-container\"><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2024\/12\/bank-of-cyprus-logo-en-2.png\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/iacovos-kirlappos\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/09\/IAKOVOS-KIRLAPPOS-150x150.jpg\" alt=\"Iacovos Kirlappos\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/iacovos-kirlappos\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>Iacovos Kirlappos<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/iacovos-kirlappos\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">Manager Information Security and ICT Risk Management, Bank of Cyprus<\/a><\/p><\/div><\/div><\/div><div class=\"speaker-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/09\/WEB20.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/edward-starkie\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/09\/EDWARD-STARKIE-150x150.jpg\" alt=\"Edward Starkie\" class=\"speaker-photo\"><\/a><\/div><div class=\"div62\"><p><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/edward-starkie\/\" class=\"div62speaker\" style=\"color: #000000;\" target=\"_blank\"><strong>Edward Starkie<\/strong><\/a><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/edward-starkie\/\" class=\"div62jobtitle\" style=\"color: #e9418f;\" target=\"_blank\">Director, Cyber Risk, Thomas Murray<\/a><\/p><\/div><\/div><\/div><\/div><div class=\"moderator-container\"><div class=\"div3 title\"><img decoding=\"async\" src=\"https:\/\/placehold.co\/10x10\/FFFF\/FFFF\"><\/div><div class=\"div4 title\" style=\"color: #000000;\">Moderator:<\/div><div class=\"moderator-box\"><div class=\"div5\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/04\/WEB2.jpg\" alt=\"Company Logo\" class=\"company-logo\"><\/div><div class=\"div6\"><div class=\"div61\"><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/aglaia-nicolaou\/\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-content\/uploads\/2025\/06\/AGLAIA-NICOLAOU-1-150x150.jpg\" alt=\"Aglaia Nicolaou\" class=\"moderator-photo\"><\/a><\/div><div class=\"div62\"><p><strong><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/aglaia-nicolaou\/\" style=\"color: #000000;\" target=\"_blank\">Aglaia Nicolaou<\/a><\/strong><br><a href=\"https:\/\/cybersecurity.imhbusiness.com\/2025\/people\/aglaia-nicolaou\/\" style=\"color: #e9418f;\" target=\"_blank\">Secretary &amp; SheLeadsTech Liaison, ISACA Cyprus Chapter<\/a><\/p><\/div><\/div><\/div><\/div><\/div><div class=\"cssportal-grid\"><div class=\"agenda-header\"><div class=\"div1\" style=\"color: #000000;\">13:30<\/div><div class=\"div2\" style=\"color: #09ace2;\">End of the Conference<\/div><\/div><\/div><\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<!-- hidden widget 3955-1dfd2110 -->\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-631","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/pages\/631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/comments?post=631"}],"version-history":[{"count":15,"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/pages\/631\/revisions"}],"predecessor-version":[{"id":3752,"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/pages\/631\/revisions\/3752"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/media?parent=631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}