adacom loader
Please Wait

Resources

Key Insights from the Cybersecurity Breakfast on NIS2 and DORA image
Key Insights from the Cybersecurity Breakfast on NIS2 and DORA
At the Forefront of Cybersecurity: Nikitas Kladakis Interview image
At the Forefront of Cybersecurity: Nikitas Kladakis Interview
Participation in the Roundtable on the New European NIS 2 Directive image
Participation in the Roundtable on the New European NIS 2 Directive
ADACOM at the 12th Information Security Conference image
ADACOM at the 12th Information Security Conference
ADACOM at 1st Cyber Intelligence Forum image
ADACOM at 1st Cyber Intelligence Forum
Beyond Compliance: Leverage DORA for Competitive Advantage image
Beyond Compliance: Leverage DORA for Competitive Advantage
Navigating NIS2 Playbook: From Legislation to Resilience image
Navigating NIS2 Playbook: From Legislation to Resilience
Achieving Microsoft Specialization: Information Protection & Governance image
Achieving Microsoft Specialization: Information Protection & Governance
Notification to Subscribers of Qualified Electronic Signatures & Qualified Electronic Seals image
Notification to Subscribers of Qualified Electronic Signatures & Qualified Electronic Seals
Achieving Microsoft Specialization: Identity and Access Management (IAM) image
Achieving Microsoft Specialization: Identity and Access Management (IAM)
Supporting Excellence and the Next Generation of Cybersecurity Talent image
Supporting Excellence and the Next Generation of Cybersecurity Talent
Cyber Fraud in Stock Markets: How to Protect Yourself– Insights by Panos Vassiliadis image
Cyber Fraud in Stock Markets: How to Protect Yourself– Insights by Panos Vassiliadis
“Zero Trust starts with Zero Touch” image
“Zero Trust starts with Zero Touch”
The Importance Of Asset Discovery For Strengthening Cloud Security Posture image
The Importance Of Asset Discovery For Strengthening Cloud Security Posture
What is the business model of Ransomware-as-a-Service? image
What is the business model of Ransomware-as-a-Service?
The role of CISO in the implementation of ISO 27001 image
The role of CISO in the implementation of ISO 27001
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards image
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards
How will NIS 2 Change Cybersecurity for Critical Infrastructure? image
How will NIS 2 Change Cybersecurity for Critical Infrastructure?
Trends and Challenges Discussed at ADACOM and Checkpoint's Roundtable Discussion image
Trends and Challenges Discussed at ADACOM and Checkpoint's Roundtable Discussion
ADACOM CY at 8th PAII Conference 2023 image
ADACOM CY at 8th PAII Conference 2023
ADACOM at 13th Infocom Security Conference & Expo 2023 image
ADACOM at 13th Infocom Security Conference & Expo 2023
Double Gold Award for ADACOM at Cyber Security Awards 2023 image
Double Gold Award for ADACOM at Cyber Security Awards 2023
ADACOM awarded for “Security Supervisor and Development of ISMS” in SYZEFXIS II image
ADACOM awarded for “Security Supervisor and Development of ISMS” in SYZEFXIS II
ADACOM CY at 1st Cyber Security weekend 2022 image
ADACOM CY at 1st Cyber Security weekend 2022