The conference takes a highly integrated, enterprise-wide approach to security. The topics are organized around the following tracks:

Each of the four tracks is examined in its theoretical and practical aspects, namely, through topic presentations and workshops/demonstrations.

New this year is a separate track with actual case studies that demonstrate how information security technologies have been applied in real-word business situations.


 January 15, 2009
08.30-09.00 Registration - Welcome Coffee
09.00-09.15 Opening Remarks  

The Need for Security: Problems, Threats and Vulnerabilities

Keynote Presentation: "The International State of Information Security, People, Processes and Technologies", Prof. Howard A. Schmidt

10.00-10.30 "The ISACA Business Model for Information Security", Dr Christos K. Dimitriadis

Information Security Audit

Keynote Presentation: "Information Security Assurance: Synergy Beats Bayoneting Every Time", Dr John Mitchell

10.30-11.00 "Intercepting Mobile Phone Calls and Short Messages: Theory & Practice", Iosif I. Androulidakis
11.00-11.30 Coffee Break
11.30-12.00 "Data Leakage: The Trends of Internal and External Threats", Gerasimos Moschonas  -
12.00-13.00  - Workshop: “Attacks and Countermeasures”, Evagelos Panagiotou
13.00-14.00  Lunch Break

Designing Security: Taking the Right Decisions

Keynote Presentation: "Building Security Based Upon Risk", Jeff Bardin

14.45-15.15 "Information Security Governance: Designing and Implementing Security Effectively", Anestis Demopoulos "CObIT and Information Security", Charles Mansour
15.15-15.45 "Biometrics as Means of Strong Authentication. Will it Grow or Will it Go?, Josmaarten Swinkels "Are Spreadsheets Risky? Audit & Security Implications", Georgios Mallikourtis
15.45-16.15  Coffee Break
16.15-16.45  "Global Access, Collaboration, and Security" Magnus Mengelbier  -
16.45-17.15  "Wireless Uninfected Life in the Future?" Michael Carlqvist



January 16, 2009
09.00-09.30 Welcome Coffee
09.30-10.00 Case Studies "Auditing Information Security Using CObIT" , Charles Mansour -
10.00-10.30 "Securing Information Assets with International Best Practice Standard ISO27001: A Case Study", Alan Calder "An Audit Approach to Mobile Device Security", Kaya Kazmirci
10.30-11.00 Coffee Break
11.00-11.30 "Geniki Bank eBanking & Digital Signatures: How We Combined Technology with Business Needs", Athanasios Vamvakas -
11.30-12.00 "Maximizing Security in Internet Banking Using EMV Cards", Steven Eliopoulos -
12.00-13.00 Lunch Break

Implementing Security Measures

Keynote Presentation: "New Blended Attacks: Defending Against Social Engineering Combined with Technology", Peter Wood

13.45-14.15 "Security in Motion", Michalis Kamprianis  
14.15-14.45 "The Human Side of Hacking - Next Generation Hack", Grigorios Dimitropoulos  
14.45-15.15 Coffee Break
15.15-15.45 "Employing Digital Signatures within SYZEFXIS", Antonis Alexakis & Sofia Anagnostopoulou -
15.45-16.15 "Declarative & Adaptive Security Policies in Oracle Fusion Applications", Serafein Karapatis -



To Top

Lead Sponsors

Alpha Bank_Logo


Algosystems Logo


ETHER Applications Ltd

To Top

Μedia Sponsor

To Top


Hellenic American Union

To Top

Academic Advisor

 Hellenic American University


To Top