adacom loader
Please Wait

Resources

Risk & Resilience: Cybersecurity as a Strategic Advantage image
Risk & Resilience: Cybersecurity as a Strategic Advantage
ADACOM as Sponsor at the13th Information Security Conference 2026 image
ADACOM as Sponsor at the13th Information Security Conference 2026
ADACOM as CyberArk Partner of the Year 2025 - EMEA image
ADACOM as CyberArk Partner of the Year 2025 - EMEA
ADACOM as CheckPoint Workspace Partner of the Year 2025 – EMEA image
ADACOM as CheckPoint Workspace Partner of the Year 2025 – EMEA
ADACOM as Grand Sponsor at the 9th InsurTech Conference image
ADACOM as Grand Sponsor at the 9th InsurTech Conference
ADACOM x DigiCert Host Executive Roundtable on Post-Quantum Cryptography image
ADACOM x DigiCert Host Executive Roundtable on Post-Quantum Cryptography
Panagiota Lagou as a Jury Member at the South East European Innovators Challenge 2025 image
Panagiota Lagou as a Jury Member at the South East European Innovators Challenge 2025
ADACOM Participates in the Consultation for the National Cybersecurity Strategy 2026–2030 image
ADACOM Participates in the Consultation for the National Cybersecurity Strategy 2026–2030
ADACOM at 89th TIF - Pitching Session at Hellenic Defense Innovation Center image
ADACOM at 89th TIF - Pitching Session at Hellenic Defense Innovation Center
Navigating NIS2 Playbook: From Legislation to Resilience image
Navigating NIS2 Playbook: From Legislation to Resilience
Achieving Microsoft Specialization: Information Protection & Governance image
Achieving Microsoft Specialization: Information Protection & Governance
Notification to Subscribers of Qualified Electronic Signatures & Qualified Electronic Seals image
Notification to Subscribers of Qualified Electronic Signatures & Qualified Electronic Seals
“Zero Trust starts with Zero Touch” image
“Zero Trust starts with Zero Touch”
The Importance Of Asset Discovery For Strengthening Cloud Security Posture image
The Importance Of Asset Discovery For Strengthening Cloud Security Posture
What is the business model of Ransomware-as-a-Service? image
What is the business model of Ransomware-as-a-Service?
The role of CISO in the implementation of ISO 27001 image
The role of CISO in the implementation of ISO 27001
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards image
Protecting The Safety and Reliability of The Energy Sector with NERC CIP Standards
How will NIS 2 Change Cybersecurity for Critical Infrastructure? image
How will NIS 2 Change Cybersecurity for Critical Infrastructure?
ADACOM Awarded “CyberSecurity Company of the Year” in Greece at the 27th InfoCom World image
ADACOM Awarded “CyberSecurity Company of the Year” in Greece at the 27th InfoCom World
ADACOM Cyprus at the 1st Cyprus Security Career Fair image
ADACOM Cyprus at the 1st Cyprus Security Career Fair
ADACOM & CyberArk: Grand Sponsors at the 23rd Bank Management Conference image
ADACOM & CyberArk: Grand Sponsors at the 23rd Bank Management Conference
ADACOM Cyprus Sponsors the 22nd NextGen Payments & RegTech Forum 2025 image
ADACOM Cyprus Sponsors the 22nd NextGen Payments & RegTech Forum 2025
Executive Roundtable “Securing the Digital Future” image
Executive Roundtable “Securing the Digital Future”
ADACOM at the Cyber Security Forum II – Strengthening Cyber Resilience through Compliance and Technical Implementation image
ADACOM at the Cyber Security Forum II – Strengthening Cyber Resilience through Compliance and Technical Implementation