adacom loader
Please Wait

Resources

Participation in the Roundtable on the New European NIS 2 Directive image
Participation in the Roundtable on the New European NIS 2 Directive
ADACOM at the 12th Information Security Conference image
ADACOM at the 12th Information Security Conference
ADACOM at 1st Cyber Intelligence Forum image
ADACOM at 1st Cyber Intelligence Forum
Beyond Compliance: Leverage DORA for Competitive Advantage image
Beyond Compliance: Leverage DORA for Competitive Advantage
ADACOM and Fortinet as Grand Sponsor on 8th InsurTech Conference image
ADACOM and Fortinet as Grand Sponsor on 8th InsurTech Conference
AI-Driven DataGuard: Επαναπροσδιορίζοντας την Προστασία Δεδομένων  image
AI-Driven DataGuard: Επαναπροσδιορίζοντας την Προστασία Δεδομένων 
Achieving Microsoft Specialization: Information Protection & Governance image
Achieving Microsoft Specialization: Information Protection & Governance
Notification to Subscribers of Qualified Electronic Signatures & Qualified Electronic Seals image
Notification to Subscribers of Qualified Electronic Signatures & Qualified Electronic Seals
Achieving Microsoft Specialization: Identity and Access Management (IAM) image
Achieving Microsoft Specialization: Identity and Access Management (IAM)
Supporting Excellence and the Next Generation of Cybersecurity Talent image
Supporting Excellence and the Next Generation of Cybersecurity Talent
Cyber Fraud in Stock Markets: How to Protect Yourself– Insights by Panos Vassiliadis image
Cyber Fraud in Stock Markets: How to Protect Yourself– Insights by Panos Vassiliadis
Education and Multi-Layered Security: Altani Batoudaki Interview image
Education and Multi-Layered Security: Altani Batoudaki Interview
“The trusted companion on the path of digital change and the value of Cybersecurity” image
“The trusted companion on the path of digital change and the value of Cybersecurity”
“Zero Trust starts with Zero Touch” image
“Zero Trust starts with Zero Touch”
The Importance Of Asset Discovery For Strengthening Cloud Security Posture image
The Importance Of Asset Discovery For Strengthening Cloud Security Posture
What is the business model of Ransomware-as-a-Service? image
What is the business model of Ransomware-as-a-Service?
The role of CISO in the implementation of ISO 27001 image
The role of CISO in the implementation of ISO 27001
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards image
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards
ADACOM Awarded “CyberSecurity Company of the Year” in Greece at the 27th InfoCom World image
ADACOM Awarded “CyberSecurity Company of the Year” in Greece at the 27th InfoCom World
ADACOM Cyprus at the 1st Cyprus Security Career Fair image
ADACOM Cyprus at the 1st Cyprus Security Career Fair
ADACOM & CyberArk: Grand Sponsors at the 23rd Bank Management Conference image
ADACOM & CyberArk: Grand Sponsors at the 23rd Bank Management Conference
ADACOM Cyprus Sponsors the 22nd NextGen Payments & RegTech Forum 2025 image
ADACOM Cyprus Sponsors the 22nd NextGen Payments & RegTech Forum 2025
Executive Roundtable “Securing the Digital Future” image
Executive Roundtable “Securing the Digital Future”
ADACOM at the Cyber Security Forum II – Strengthening Cyber Resilience through Compliance and Technical Implementation image
ADACOM at the Cyber Security Forum II – Strengthening Cyber Resilience through Compliance and Technical Implementation