adacom loader
Please Wait

Resources

Executive Roundtable “Securing the Digital Future” image
Executive Roundtable “Securing the Digital Future”
ADACOM at the Cyber Security Forum II – Strengthening Cyber Resilience through Compliance and Technical Implementation image
ADACOM at the Cyber Security Forum II – Strengthening Cyber Resilience through Compliance and Technical Implementation
ADACOM Cyprus Participated as Event Sponsor at the 6th CSN Cyprus Shipping ICT Conference image
ADACOM Cyprus Participated as Event Sponsor at the 6th CSN Cyprus Shipping ICT Conference
Quantum Cryptography Readiness and the Role of Certificate Lifecycle Management image
Quantum Cryptography Readiness and the Role of Certificate Lifecycle Management
ADACOM Supports the CISO 50 Powerlist: Insights from Panagiota Lagou, GRC Director image
ADACOM Supports the CISO 50 Powerlist: Insights from Panagiota Lagou, GRC Director
From Detection to Response: The Power of Awareness and Intelligent Defense image
From Detection to Response: The Power of Awareness and Intelligent Defense
ADACOM - Signatory of Women's Empowerment Principles (WPEs) image
ADACOM - Signatory of Women's Empowerment Principles (WPEs)
Panagiota Lagou as a Jury Member at the South East European Innovators Challenge 2025 image
Panagiota Lagou as a Jury Member at the South East European Innovators Challenge 2025
ADACOM Participates in the Consultation for the National Cybersecurity Strategy 2026–2030 image
ADACOM Participates in the Consultation for the National Cybersecurity Strategy 2026–2030
ADACOM at 89th TIF - Pitching Session at Hellenic Defense Innovation Center image
ADACOM at 89th TIF - Pitching Session at Hellenic Defense Innovation Center
Navigating NIS2 Playbook: From Legislation to Resilience image
Navigating NIS2 Playbook: From Legislation to Resilience
Achieving Microsoft Specialization: Information Protection & Governance image
Achieving Microsoft Specialization: Information Protection & Governance
“The trusted companion on the path of digital change and the value of Cybersecurity” image
“The trusted companion on the path of digital change and the value of Cybersecurity”
“Zero Trust starts with Zero Touch” image
“Zero Trust starts with Zero Touch”
The Importance Of Asset Discovery For Strengthening Cloud Security Posture image
The Importance Of Asset Discovery For Strengthening Cloud Security Posture
What is the business model of Ransomware-as-a-Service? image
What is the business model of Ransomware-as-a-Service?
The role of CISO in the implementation of ISO 27001 image
The role of CISO in the implementation of ISO 27001
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards image
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards
ADACOM CY and CYMULATE organized the “TEST YOUR SECURITY POSTURE” image
ADACOM CY and CYMULATE organized the “TEST YOUR SECURITY POSTURE”