{"id":967,"date":"2015-10-23T07:45:32","date_gmt":"2015-10-23T07:45:32","guid":{"rendered":"http:\/\/chartoularios.gr\/el\/?p=967"},"modified":"2015-10-23T07:45:32","modified_gmt":"2015-10-23T07:45:32","slug":"isaca-athens-chapter-conference-24112015","status":"publish","type":"post","link":"https:\/\/www.chartoularios.gr\/el\/isaca-athens-chapter-conference-24112015\/","title":{"rendered":"ISACA Athens Chapter Conference 24\/11\/2015"},"content":{"rendered":"<p><\/p>\n<table cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\">\u0393\u03b9\u03b1 5\u03b7 \u03c7\u03c1\u03bf\u03bd\u03b9\u03ac \u03c4\u03bf <a href=\"http:\/\/ermis.hau.gr\/lctp\/goto.aspx?Id=26e768fa-1578-e511-80cb-00155d003800&amp;url=http%3a%2f%2fwww.isaca.gr%2f\">\u0399\u03bd\u03c3\u03c4\u03b9\u03c4\u03bf\u03cd\u03c4\u03bf \u0395\u03bb\u03ad\u03b3\u03c7\u03bf\u03c5 \u03a3\u03c5\u03c3\u03c4\u03b7\u03bc\u03ac\u03c4\u03c9\u03bd \u03a0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ba\u03ae\u03c2 <\/a>(ISACA Athens Chapter), \u03bc\u03b5 \u03c4\u03b7\u03bd \u03b1\u03c1\u03c9\u03b3\u03ae \u03c4\u03b7\u03c2 \u0395\u03bb\u03bb\u03b7\u03bd\u03bf\u03b1\u03bc\u03b5\u03c1\u03b9\u03ba\u03b1\u03bd\u03b9\u03ba\u03ae\u03c2 \u0388\u03bd\u03c9\u03c3\u03b7\u03c2, \u03ba\u03b1\u03b9 \u03c4\u03b7 \u03c3\u03c5\u03bc\u03bc\u03b5\u03c4\u03bf\u03c7\u03ae \u03c4\u03bf\u03c5 ENISA, \u03b4\u03b9\u03bf\u03c1\u03b3\u03b1\u03bd\u03ce\u03bd\u03b5\u03b9 \u03c3\u03c4\u03bf <b>\u039c\u03ad\u03b3\u03b1\u03c1\u03bf \u039c\u03bf\u03c5\u03c3\u03b9\u03ba\u03ae\u03c2 \u0391\u03b8\u03b7\u03bd\u03ce\u03bd, \u03c3\u03c4\u03b9\u03c2 24 \u039d\u03bf\u03b5\u03bc\u03b2\u03c1\u03af\u03bf\u03c5<\/b>, \u03c3\u03c5\u03bd\u03ad\u03b4\u03c1\u03b9\u03bf \u03bc\u03b5 \u03b2\u03b1\u03c3\u03b9\u03ba\u03bf\u03cd\u03c2 \u03b8\u03b5\u03bc\u03b1\u03c4\u03b9\u03ba\u03bf\u03cd\u03c2 \u03ac\u03be\u03bf\u03bd\u03b5\u03c2: &#8220;Cyber Security&#8221; \u03ba\u03b1\u03b9 &#8220;Big Data and Privacy&#8221;.<\/p>\n<p>&nbsp;<\/p>\n<p><b>ISACA International Speakers<br \/>\n<\/b><\/p>\n<ul>\n<li><b><\/b><b>Dr. \u03a7\u03c1\u03ae\u03c3\u03c4\u03bf\u03c2 \u0394\u03b7\u03bc\u03b7\u03c4\u03c1\u03b9\u03ac\u03b4\u03b7\u03c2<\/b>, CISA, CISM, CRISC,\u00a0\u03b5\u03bd \u03b5\u03bd\u03b5\u03c1\u03b3\u03b5\u03af\u03b1 \u0394\u03b9\u03b5\u03b8\u03bd\u03ae\u03c2 \u03a0\u03c1\u03cc\u03b5\u03b4\u03c1\u03bf\u03c2 \u03c4\u03bf\u03c5 ISACA International, Group Director of Information Security for Intralot (Greece)<\/li>\n<li><b><\/b><b>Rosemary Amato<\/b>, CISA, CMA, CPA,\u00a0\u03b5\u03bd \u03b5\u03bd\u03b5\u03c1\u03b3\u03b5\u03af\u03b1 \u0394\u03b9\u03b5\u03b8\u03bd\u03ae\u03c2 \u0391\u03bd\u03c4\u03b9\u03c0\u03c1\u03cc\u03b5\u03b4\u03c1\u03bf\u03c2 \u03c4\u03bf\u03c5 ISACA International, Director, Deloitte (The Netherlands), Program Director for Global Intelligence<\/li>\n<\/ul>\n<p><b>Expert speakers<\/b><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><b><\/b><b>Jim Manico<\/b>, OWASP Global Board Member, Founder of Manicode Security and Brakeman Security Inc., Investor\/Advisor for Signal Sciences.<\/li>\n<li><b><\/b><b>Dr. \u0395\u03c5\u03ac\u03b3\u03b3\u03b5\u03bb\u03bf\u03c2 \u039f\u03c5\u03b6\u03bf\u03cd\u03bd\u03b7\u03c2<\/b>, Head of Resilience and CIIP Unit, ENISA<\/li>\n<li><b><\/b><b>\u0391\u03b8\u03b7\u03bd\u03ac \u039c\u03c0\u03bf\u03cd\u03c1\u03ba\u03b1<\/b>, ENISA Expert<\/li>\n<li><b><\/b><b>Lajos Antal<\/b>, Partner, Deloitte Hungary<\/li>\n<li><b><\/b><b>\u03a7\u03c1\u03ae\u03c3\u03c4\u03bf\u03c2 \u0392\u03b9\u03b4\u03ac\u03ba\u03b7\u03c2<\/b>, Senior Manager, Risk &amp; Management Consulting, KPMG Advisors AE<\/li>\n<li><b><\/b><b>\u0391\u03c1\u03c4\u03ad\u03bc\u03b7\u03c2 \u039c\u03c5\u03c1\u03cc\u03c0\u03bf\u03c5\u03bb\u03bf\u03c2<\/b>, Managing Director, Linkage Inc Greece<\/li>\n<li><b><\/b><b>Dr. \u0392\u03b1\u03c3\u03af\u03bb\u03b7\u03c2 \u039a\u03ac\u03c4\u03bf\u03c2<\/b>, Head of Computing, Bournemouth University<\/li>\n<li><b><\/b><b>\u039d\u03b9\u03ba\u03cc\u03bb\u03b1\u03bf\u03c2 \u03a4\u03c3\u03ac\u03bb\u03b7\u03c2<\/b>, Researcher, INFOSEC Laboratory, Athens University of Economics &amp; Business<\/li>\n<\/ul>\n<p><b>Round Table Discussion: Cloud Deployment in the Banking Sector<\/b><\/p>\n<p>\u0393\u03b9\u03b1 \u03c0\u03c1\u03ce\u03c4\u03b7 \u03c6\u03bf\u03c1\u03ac \u03c3\u03c4\u03b7\u03bd \u0395\u03bb\u03bb\u03ac\u03b4\u03b1, \u03bc\u03b5 \u03c4\u03b7\u03bd \u03c5\u03c0\u03bf\u03c3\u03c4\u03ae\u03c1\u03b9\u03be\u03b7 \u03c4\u03b7\u03c2 \u0395\u03bb\u03bb\u03b7\u03bd\u03b9\u03ba\u03ae\u03c2 \u0388\u03bd\u03c9\u03c3\u03b7\u03c2 \u03a4\u03c1\u03b1\u03c0\u03b5\u03b6\u03ce\u03bd \u03ba\u03b1\u03b9 \u03bc\u03b5 \u03b1\u03c6\u03bf\u03c1\u03c6\u03ae \u03c4\u03b7\u03bd \u03c0\u03b1\u03c1\u03bf\u03c5\u03c3\u03af\u03b1\u03c3\u03b7 \u03c4\u03c9\u03bd \u03b1\u03c0\u03bf\u03c4\u03b5\u03bb\u03b5\u03c3\u03bc\u03ac\u03c4\u03c9\u03bd \u03c4\u03b7\u03c2 \u03c0\u03c1\u03cc\u03c3\u03c6\u03b1\u03c4\u03b7\u03c2 \u03ad\u03c1\u03b5\u03c5\u03bd\u03b1\u03c2 \u03c0\u03bf\u03c5 \u03b4\u03b9\u03b5\u03be\u03ae\u03c7\u03b8\u03b7 \u03b1\u03c0\u03cc \u03c4\u03bf ENISA \u201cNetwork and Information Security in the Finance Sector\u201d, \u03bf\u03b9 \u03c5\u03c0\u03b5\u03cd\u03b8\u03c5\u03bd\u03bf\u03b9 \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1\u03c2 \u03c0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ce\u03bd \u03c3\u03c5\u03c3\u03c4\u03b7\u03bc\u03b9\u03ba\u03ce\u03bd \u0395\u03bb\u03bb\u03b7\u03bd\u03b9\u03ba\u03ce\u03bd \u03a4\u03c1\u03b1\u03c0\u03b5\u03b6\u03ce\u03bd \u03ba\u03b1\u03b9 \u0395\u03c0\u03cc\u03c0\u03c4\u03b5\u03c2 \u03a4\u03c1\u03b1\u03c0\u03b5\u03b6\u03ce\u03bd \u03b1\u03c0\u03cc \u03c4\u03bf\u03bd \u0395\u03bd\u03b9\u03b1\u03af\u03bf \u0395\u03c0\u03bf\u03c0\u03c4\u03b9\u03ba\u03cc \u039c\u03b7\u03c7\u03b1\u03bd\u03b9\u03c3\u03bc\u03cc (Single Supervisory Mechanism, ECB-SSM) \u03b2\u03ac\u03b6\u03bf\u03c5\u03bd \u03c3\u03c4\u03bf \u03c4\u03c1\u03b1\u03c0\u03ad\u03b6\u03b9 \u03ba\u03c1\u03af\u03c3\u03b9\u03bc\u03b1 \u03b5\u03c1\u03c9\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1 \u03c3\u03c7\u03b5\u03c4\u03b9\u03ba\u03ac \u03bc\u03b5 \u03c4\u03b1 \u03bf\u03c6\u03ad\u03bb\u03b7, \u03c4\u03bf\u03c5\u03c2 \u03ba\u03b9\u03bd\u03b4\u03cd\u03bd\u03bf\u03c5\u03c2 \u03ba\u03b1\u03b8\u03ce\u03c2 \u03ba\u03b1\u03b9 \u03c4\u03bf \u03b5\u03c0\u03bf\u03c0\u03c4\u03b9\u03ba\u03cc \u03c0\u03bb\u03b1\u03af\u03c3\u03b9\u03bf \u03c3\u03c7\u03b5\u03c4\u03b9\u03ba\u03ac \u03bc\u03b5 \u03c4\u03b7\u03bd \u03c5\u03bb\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7 \u03c4\u03bf\u03c5 cloud computing \u03c3\u03c4\u03bf\u03bd \u03c4\u03c1\u03b1\u03c0\u03b5\u03b6\u03b9\u03ba\u03cc \u03ba\u03bb\u03ac\u03b4\u03bf \u03c3\u03c4\u03b7\u03bd \u0395\u03bb\u03bb\u03ac\u03b4\u03b1.\u00a0 \u0398\u03b1\u00a0\u03c0\u03b1\u03c1\u03bf\u03c5\u03c3\u03b9\u03b1\u03c3\u03c4\u03b5\u03af \u03b5\u03c0\u03af\u03c3\u03b7\u03c2 \u03b1\u03c0\u03cc \u03c4\u03b7\u03bd Microsoft (\u03c9\u03c2 Case-study) \u03c4\u03bf \u03c0\u03bb\u03b1\u03af\u03c3\u03b9\u03bf \u03c0\u03b1\u03c1\u03bf\u03c7\u03ae\u03c2 \u03c5\u03c0\u03b7\u03c1\u03b5\u03c3\u03b9\u03ce\u03bd Cloud \u03c3\u03b5 \u03c3\u03c5\u03c3\u03c4\u03b7\u03bc\u03b9\u03ba\u03ae \u03c4\u03c1\u03ac\u03c0\u03b5\u03b6\u03b1 \u03c4\u03bf\u03c5 \u0392\u03b5\u03bb\u03b3\u03af\u03bf\u03c5.<\/p>\n<p>&nbsp;<\/p>\n<p><b>Conference chairman:\u00a0Dr. \u0394\u03b7\u03bc\u03ae\u03c4\u03c1\u03b7\u03c2 \u0393\u03ba\u03c1\u03af\u03c4\u03b6\u03b1\u03bb\u03b7\u03c2,<\/b> Professor of ICT Security, Director of Information Security and Critical Infrastructure Protection Research Group, Dpt of Informatics, AUEB.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\">CSX Cybersecurity Fundamentals Workshop, 23 \u03ba\u03b1\u03b9 25 \u039d\u03bf\u03b5\u03bc\u03b2\u03c1\u03af\u03bf\u03c5<\/p>\n<p><b>\u03a3\u03c5\u03bd\u03b5\u03b4\u03c1\u03b9\u03b1\u03ba\u03cc \u039a\u03ad\u03bd\u03c4\u03c1\u03bf \u0395\u03bb\u03bb\u03b7\u03bd\u03bf\u03b1\u03bc\u03b5\u03c1\u03b9\u03ba\u03b1\u03bd\u03b9\u03ba\u03ae\u03c2 \u0388\u03bd\u03c9\u03c3\u03b7\u03c2<br \/>\n<\/b><\/p>\n<p>\u03a3\u03c4\u03bf \u03c0\u03bb\u03b1\u03af\u03c3\u03b9\u03bf \u03c4\u03bf\u03c5 \u03a3\u03c5\u03bd\u03b5\u03b4\u03c1\u03af\u03bf\u03c5 \u03c0\u03c1\u03b1\u03b3\u03bc\u03b1\u03c4\u03bf\u03c0\u03bf\u03b9\u03b5\u03af\u03c4\u03b1\u03b9 \u03c4\u03bf \u03c0\u03c1\u03ce\u03c4\u03bf \u03c3\u03c4\u03b7\u03bd \u0395\u03bb\u03bb\u03ac\u03b4\u03b1 \u03b5\u03ba\u03c0\u03b1\u03b9\u03b4\u03b5\u03c5\u03c4\u03b9\u03ba\u03cc \u03c3\u03b5\u03bc\u03b9\u03bd\u03ac\u03c1\u03b9\u03bf &#8220;CSX Cybersecurity Fundamentals&#8221;, \u03c3\u03c4\u03b9\u03c2 23 \u03ba\u03b1\u03b9 25 \u039d\u03bf\u03b5\u03bc\u03b2\u03c1\u03af\u03bf\u03c5, \u03bc\u03b5 \u03c3\u03ba\u03bf\u03c0\u03cc \u03c4\u03b7\u03bd \u03b1\u03c0\u03cc\u03ba\u03c4\u03b7\u03c3\u03b7 \u03c4\u03b7\u03c2 \u03c0\u03b9\u03c3\u03c4\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7\u03c2 <b>CSX Fundamentals Certificate \u03c4\u03bf\u03c5 ISACA, \u03b7 \u03bf\u03c0\u03bf\u03af\u03b1 \u03c0\u03c1\u03bf\u03c3\u03c6\u03ad\u03c1\u03b5\u03c4\u03b1\u03b9 \u03b3\u03b9\u03b1 \u03c0\u03c1\u03ce\u03c4\u03b7 \u03c6\u03bf\u03c1\u03ac \u03c3\u03c4\u03b7\u03bd \u0395\u03bb\u03bb\u03ac\u03b4\u03b1<\/b>.<\/p>\n<p>&nbsp;<\/p>\n<p>\u03a4\u03bf \u03c3\u03b5\u03bc\u03b9\u03bd\u03ac\u03c1\u03b9\u03bf \u03c3\u03b5 \u03b5\u03c0\u03b1\u03b3\u03b3\u03b5\u03bb\u03bc\u03b1\u03c4\u03af\u03b5\u03c2 \u03c4\u03b7\u03c2\u00a0\u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1\u03c2 \u03c0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ce\u03bd\u00a0\u03c0\u03bf\u03c5 \u03b5\u03c0\u03b9\u03b8\u03c5\u03bc\u03bf\u03cd\u03bd \u03bd\u03b1 \u03b4\u03b9\u03b5\u03c5\u03c1\u03cd\u03bd\u03bf\u03c5\u03bd \u03c4\u03b9\u03c2 \u03b3\u03bd\u03ce\u03c3\u03b5\u03b9\u03c2 \u03c4\u03bf\u03c5\u03c2 \u03c3\u03c4\u03bf cyber security \u03ba\u03b1\u03b9 \u03b5\u03c0\u03b9\u03c0\u03bb\u03ad\u03bf\u03bd \u03b5\u03c0\u03b9\u03b8\u03c5\u03bc\u03bf\u03cd\u03bd \u03bd\u03b1 \u03b1\u03c0\u03bf\u03ba\u03c4\u03ae\u03c3\u03bf\u03c5\u03bd \u03c4\u03b7 \u03c3\u03c7\u03b5\u03c4\u03b9\u03ba\u03ae \u03c0\u03b9\u03c3\u03c4\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7 \u03c4\u03bf\u03c5 ISACA, CSX Fundamentals Certificate.\u00a0 \u03a4\u03bf \u03c3\u03b5\u03bc\u03b9\u03bd\u03ac\u03c1\u03b9\u03bf \u03ba\u03b1\u03bb\u03cd\u03c0\u03c4\u03b5\u03b9 \u03c4\u03b1 \u03c0\u03b1\u03c1\u03b1\u03ba\u03ac\u03c4\u03c9:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Cybersecurity architecture principles<\/li>\n<li>Security of networks, systems, applications and data<\/li>\n<li>Incident response<\/li>\n<li>The security implications of the adoption of emerging technologies<\/li>\n<\/ul>\n<p><a href=\"http:\/\/ermis.hau.gr\/lctp\/goto.aspx?Id=26e768fa-1578-e511-80cb-00155d003800&amp;url=http%3a%2f%2fwww.isaca.org%2fcyber%2fPages%2fCybersecurity-Fundamentals-Certificate.aspx\"><b>\u0394\u03b5\u03af\u03c4\u03b5 \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b1 \u03b3\u03b9\u03b1 \u03c4\u03bf CSX Fundamentals Certificate \u03c4\u03bf\u03c5 ISACA<\/b><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><b>\u0395\u03b9\u03c3\u03b7\u03b3\u03b7\u03c4\u03ae\u03c2: Dr. \u039a\u03c9\u03bd\u03c3\u03c4\u03b1\u03bd\u03c4\u03af\u03bd\u03bf\u03c2 \u03a0\u03b1\u03c0\u03b1\u03c0\u03b1\u03bd\u03b1\u03b3\u03b9\u03ce\u03c4\u03bf\u03c5<\/b>, CISSP, Information Security Services Sales Manager, OTE, OWASP Greek Chapter President, ISACA CyberSecurity Nexus Liaison for Greece.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u0395\u03b3\u03b3\u03c1\u03b1\u03c6\u03b5\u03af\u03c4\u03b5 \u03c4\u03ce\u03c1\u03b1 \u03b3\u03b9\u03b1 \u03c4\u03bf \u03c3\u03c5\u03bd\u03ad\u03b4\u03c1\u03b9\u03bf \u03ba\u03b1\u03b9 \u03b3\u03b9\u03b1 \u03c4\u03bf CSX Workshop \u03c3\u03c5\u03bc\u03c0\u03bb\u03b7\u03c1\u03ce\u03bd\u03bf\u03bd\u03c4\u03b1\u03c2 \u03c4\u03b7\u03bd <a href=\"http:\/\/ermis.hau.gr\/lctp\/goto.aspx?Id=26e768fa-1578-e511-80cb-00155d003800&amp;url=http%3a%2f%2fwww.isacaathensconference.gr%2fform2015%2findex.html\">\u03b7\u03bb\u03b5\u03ba\u03c4\u03c1\u03bf\u03bd\u03b9\u03ba\u03ae \u03c6\u03cc\u03c1\u03bc\u03b1 \u03b5\u03b3\u03b3\u03c1\u03b1\u03c6\u03ae\u03c2<\/a>.<\/p>\n<p><b><br \/>\n<\/b>\u039f\u03b9 \u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 \u03b3\u03b9\u03b1 \u03c4\u03bf CSX Cyber Security Fundamentals workshop \u03b5\u03af\u03bd\u03b1\u03b9 \u03c0\u03b5\u03c1\u03b9\u03bf\u03c1\u03b9\u03c3\u03bc\u03ad\u03bd\u03b5\u03c2 \u03ba\u03b1\u03b9 \u03b8\u03b1 \u03c4\u03b7\u03c1\u03b7\u03b8\u03b5\u03af \u03c3\u03b5\u03b9\u03c1\u03ac \u03c0\u03c1\u03bf\u03c4\u03b5\u03c1\u03b1\u03b9\u03cc\u03c4\u03b7\u03c4\u03b1\u03c2.\u00a0 \u03a4\u03bf \u03c3\u03b5\u03bc\u03b9\u03bd\u03ac\u03c1\u03b9\u03bf \u03b5\u03c0\u03b9\u03b4\u03bf\u03c4\u03b5\u03af\u03c4\u03b1\u03b9 \u03b1\u03c0\u03cc \u03c4\u03bf 0,24 \u039f\u0391\u0395\u0394-\u039b\u0391\u0395\u039a \u03b3\u03b9\u03b1 \u03c3\u03c5\u03bc\u03bc\u03b5\u03c4\u03bf\u03c7\u03ad\u03c2 \u03c3\u03c4\u03b5\u03bb\u03b5\u03c7\u03ce\u03bd \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03c9\u03bd.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/ermis.hau.gr\/lctp\/goto.aspx?Id=26e768fa-1578-e511-80cb-00155d003800&amp;url=http%3a%2f%2fwww.isacaathensconference.gr%2ffaq1.html\">\u038c\u03c1\u03bf\u03b9 \u03c3\u03c5\u03bc\u03bc\u03b5\u03c4\u03bf\u03c7\u03ae\u03c2 \u03ba\u03b1\u03b9 \u03c3\u03c5\u03c7\u03bd\u03ad\u03c2 \u03b5\u03c1\u03c9\u03c4\u03ae\u03c3\u03b5\u03b9\u03c2<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u0393\u03b9\u03b1 5\u03b7 \u03c7\u03c1\u03bf\u03bd\u03b9\u03ac \u03c4\u03bf \u0399\u03bd\u03c3\u03c4\u03b9\u03c4\u03bf\u03cd\u03c4\u03bf \u0395\u03bb\u03ad\u03b3\u03c7\u03bf\u03c5 \u03a3\u03c5\u03c3\u03c4\u03b7\u03bc\u03ac\u03c4\u03c9\u03bd \u03a0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ba\u03ae\u03c2 (ISACA Athens Chapter), \u03bc\u03b5 \u03c4\u03b7\u03bd \u03b1\u03c1\u03c9\u03b3\u03ae \u03c4\u03b7\u03c2 \u0395\u03bb\u03bb\u03b7\u03bd\u03bf\u03b1\u03bc\u03b5\u03c1\u03b9\u03ba\u03b1\u03bd\u03b9\u03ba\u03ae\u03c2 \u0388\u03bd\u03c9\u03c3\u03b7\u03c2, \u03ba\u03b1\u03b9 \u03c4\u03b7 \u03c3\u03c5\u03bc\u03bc\u03b5\u03c4\u03bf\u03c7\u03ae \u03c4\u03bf\u03c5 ENISA, \u03b4\u03b9\u03bf\u03c1\u03b3\u03b1\u03bd\u03ce\u03bd\u03b5\u03b9 \u03c3\u03c4\u03bf \u039c\u03ad\u03b3\u03b1\u03c1\u03bf \u039c\u03bf\u03c5\u03c3\u03b9\u03ba\u03ae\u03c2 \u0391\u03b8\u03b7\u03bd\u03ce\u03bd, \u03c3\u03c4\u03b9\u03c2 24 \u039d\u03bf\u03b5\u03bc\u03b2\u03c1\u03af\u03bf\u03c5, \u03c3\u03c5\u03bd\u03ad\u03b4\u03c1\u03b9\u03bf \u03bc\u03b5 \u03b2\u03b1\u03c3\u03b9\u03ba\u03bf\u03cd\u03c2 \u03b8\u03b5\u03bc\u03b1\u03c4\u03b9\u03ba\u03bf\u03cd\u03c2 \u03ac\u03be\u03bf\u03bd\u03b5\u03c2: &#8220;Cyber Security&#8221; \u03ba\u03b1\u03b9 &#8220;Big Data and Privacy&#8221;. &nbsp; ISACA International Speakers Dr. \u03a7\u03c1\u03ae\u03c3\u03c4\u03bf\u03c2 \u0394\u03b7\u03bc\u03b7\u03c4\u03c1\u03b9\u03ac\u03b4\u03b7\u03c2, CISA, CISM, CRISC,\u00a0\u03b5\u03bd \u03b5\u03bd\u03b5\u03c1\u03b3\u03b5\u03af\u03b1 \u0394\u03b9\u03b5\u03b8\u03bd\u03ae\u03c2 \u03a0\u03c1\u03cc\u03b5\u03b4\u03c1\u03bf\u03c2 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/www.chartoularios.gr\/el\/wp-json\/wp\/v2\/posts\/967"}],"collection":[{"href":"https:\/\/www.chartoularios.gr\/el\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.chartoularios.gr\/el\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.chartoularios.gr\/el\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.chartoularios.gr\/el\/wp-json\/wp\/v2\/comments?post=967"}],"version-history":[{"count":3,"href":"https:\/\/www.chartoularios.gr\/el\/wp-json\/wp\/v2\/posts\/967\/revisions"}],"predecessor-version":[{"id":970,"href":"https:\/\/www.chartoularios.gr\/el\/wp-json\/wp\/v2\/posts\/967\/revisions\/970"}],"wp:attachment":[{"href":"https:\/\/www.chartoularios.gr\/el\/wp-json\/wp\/v2\/media?parent=967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.chartoularios.gr\/el\/wp-json\/wp\/v2\/categories?post=967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.chartoularios.gr\/el\/wp-json\/wp\/v2\/tags?post=967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}