adacom loader
Please Wait

Resources

From Detection to Response: The Power of Awareness and Intelligent Defense image
From Detection to Response: The Power of Awareness and Intelligent Defense
Intelligent Preventive Defense Against Cyber Threats in Industrial Environments image
Intelligent Preventive Defense Against Cyber Threats in Industrial Environments
GRC as the Backbone of Responsible AI Adoption image
GRC as the Backbone of Responsible AI Adoption
Cyber Security Awareness: Turning Users into the First Line of Defense image
Cyber Security Awareness: Turning Users into the First Line of Defense
ΑDACOM as Grand Sponsor at 20th IT Directors Forum image
ΑDACOM as Grand Sponsor at 20th IT Directors Forum
ADACOM V-Guard: From Security Operation Center to Risk Operation Center image
ADACOM V-Guard: From Security Operation Center to Risk Operation Center
Re-certification by the Hellenic Telecommunications & Post Commission (EETT) image
Re-certification by the Hellenic Telecommunications & Post Commission (EETT)
ADACOM Experts Contribute to ENISA's Report on Remote Identity Proofing image
ADACOM Experts Contribute to ENISA's Report on Remote Identity Proofing
ADACOM Participated in the 40th Athens Marathon – the Authentic image
ADACOM Participated in the 40th Athens Marathon – the Authentic
ADACOM Sets New Standards in Cybersecurity Achieving Five Specializations image
ADACOM Sets New Standards in Cybersecurity Achieving Five Specializations
Celebrating Success of ADACOM at Archer Summit 2023 image
Celebrating Success of ADACOM at Archer Summit 2023
Tailored Solutions for Every Organizational Need - Interview with Sofia Kanavou image
Tailored Solutions for Every Organizational Need - Interview with Sofia Kanavou
Navigating the Convergence: Financial Fraud and Cybercrime in the Digital Age image
Navigating the Convergence: Financial Fraud and Cybercrime in the Digital Age
“The trusted companion on the path of digital change and the value of Cybersecurity” image
“The trusted companion on the path of digital change and the value of Cybersecurity”
“Zero Trust starts with Zero Touch” image
“Zero Trust starts with Zero Touch”
The Importance Of Asset Discovery For Strengthening Cloud Security Posture image
The Importance Of Asset Discovery For Strengthening Cloud Security Posture
What is the business model of Ransomware-as-a-Service? image
What is the business model of Ransomware-as-a-Service?
The role of CISO in the implementation of ISO 27001 image
The role of CISO in the implementation of ISO 27001
Executive Roundtable “Securing the Digital Future” image
Executive Roundtable “Securing the Digital Future”
ADACOM at the Cyber Security Forum II – Strengthening Cyber Resilience through Compliance and Technical Implementation image
ADACOM at the Cyber Security Forum II – Strengthening Cyber Resilience through Compliance and Technical Implementation
ADACOM Cyprus Participated as Event Sponsor at the 6th CSN Cyprus Shipping ICT Conference image
ADACOM Cyprus Participated as Event Sponsor at the 6th CSN Cyprus Shipping ICT Conference
ΑDACOM as Grand Sponsor at 20th IT Directors Forum image
ΑDACOM as Grand Sponsor at 20th IT Directors Forum
ADACOM Cyprus Sponsors the 5th Cyber Security Conference image
ADACOM Cyprus Sponsors the 5th Cyber Security Conference
IDEAL Holdings IT : Platinum Sponsor with a Dynamic Presence at Fortinet Security Day 2025 image
IDEAL Holdings IT : Platinum Sponsor with a Dynamic Presence at Fortinet Security Day 2025