adacom loader
Please Wait

Resources

ADACOM Partner of the Year 2024 by CyberArk image
ADACOM Partner of the Year 2024 by CyberArk
Education and Multi-Layered Security: Altani Batoudaki Interview image
Education and Multi-Layered Security: Altani Batoudaki Interview
Key Insights from the Cybersecurity Breakfast on NIS2 and DORA image
Key Insights from the Cybersecurity Breakfast on NIS2 and DORA
At the Forefront of Cybersecurity: Nikitas Kladakis Interview image
At the Forefront of Cybersecurity: Nikitas Kladakis Interview
Participation in the Roundtable on the New European NIS 2 Directive image
Participation in the Roundtable on the New European NIS 2 Directive
ADACOM at the 12th Information Security Conference image
ADACOM at the 12th Information Security Conference
ADACOM - Signatory of Women's Empowerment Principles (WPEs) image
ADACOM - Signatory of Women's Empowerment Principles (WPEs)
Panagiota Lagou as a Jury Member at the South East European Innovators Challenge 2025 image
Panagiota Lagou as a Jury Member at the South East European Innovators Challenge 2025
ADACOM Participates in the Consultation for the National Cybersecurity Strategy 2026–2030 image
ADACOM Participates in the Consultation for the National Cybersecurity Strategy 2026–2030
ADACOM at 89th TIF - Pitching Session at Hellenic Defense Innovation Center image
ADACOM at 89th TIF - Pitching Session at Hellenic Defense Innovation Center
Navigating NIS2 Playbook: From Legislation to Resilience image
Navigating NIS2 Playbook: From Legislation to Resilience
Achieving Microsoft Specialization: Information Protection & Governance image
Achieving Microsoft Specialization: Information Protection & Governance
“The trusted companion on the path of digital change and the value of Cybersecurity” image
“The trusted companion on the path of digital change and the value of Cybersecurity”
“Zero Trust starts with Zero Touch” image
“Zero Trust starts with Zero Touch”
The Importance Of Asset Discovery For Strengthening Cloud Security Posture image
The Importance Of Asset Discovery For Strengthening Cloud Security Posture
What is the business model of Ransomware-as-a-Service? image
What is the business model of Ransomware-as-a-Service?
The role of CISO in the implementation of ISO 27001 image
The role of CISO in the implementation of ISO 27001
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards image
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards
ADACOM CY and CYMULATE organized the “TEST YOUR SECURITY POSTURE” image
ADACOM CY and CYMULATE organized the “TEST YOUR SECURITY POSTURE”