The conference takes a highly integrated, enterprise-wide approach to security. There are four new tracks this year. Each track is examined in its theoretical and practical aspects, namely, through topic presentations and workshops / demonstrations.  Check this page regularly for updates.



January 27, 2010
8:30-9:00 Welcome coffee and registration
9:00-9:15 Opening Remarks: Leonidas Phoebus Koskos, Executive Director of the Hellenic American Union and Executive Vice President of the Hellenic American University
9:15-9:30 Opening Plenary Keynote: Dr. Udo Helmbrecht, Executive Director, ENISA
9:30-11:00                                 Isabella Santa, ENISA Moderator
Fearing Empowerment?, Wendy Goucher, Idrach Ltd
Inclusion and Empowerment: how participation and awareness influence security, Daniel Blander, InfoSecurityLab Inc
11:00-11:30 Coffee break

Security in an Interconnected World

Security Strategies in an Interconnected World, David Greer, Institute for Information Security,  University of Tulsa

12:15-12:45 Emerging Cyber Threats and Countermeasures, Peter Thermos, Palindrome Tehnologies
12:45-13:15 The chimera of Information Security, Spiros Liolis, HP Workshop: Stop! Identify yourself! Strong authentication methods for every need, Costas Ioannou, Inter Engineering
13:15-13:45 Data Leakage Prevention: Understanding the Concept, George Ntontos, In.T.Trust S.A.
13:45-14:30 Lunch break

Metrics for Security

Keynote Presentation: Security Metrics: measuring nothing?, Dr Derek J. Oliver, Ravenswood Consultants Ltd

15:15-15:45 The Dynamics of (In)Security - What's the story of 30,000 vulnerabilities discovered in the past decade?, Dr Stefan Frei, ETH Zurich
15:45-16:15 Coffee break
16:15-16:45 Cost Benefit Analysis of Information Security Initiatives: Obtaining support and funding from senior management in private organizations, Lucas Cardholm, Ernst & Young AB
 Workshop: Data Masking Best Practices: Does your Organization have Sensitive Data to Protect?, George Triantafyllou,  Ether Applications Ltd
16:45-17:15 Security Metrics - No pain, no gain, Peter Schoo, Fraunhofer Institute for Secure Information Technology SIT
January 28, 2010
9:00-9:30  Welcome coffee

Security Audits, Compliance and Standards

Keynote Presentation: Providing through Audit and Compliance, Kevin Henry, KMHenry and Affiliates Management Inc.

10:15-10:45 Compliance Audit in Relation to Outsourced Activities, Bent Poulsen, VP Securities A/S
10:45-11:15 Web Application Security Auditing – What, Why, and How, Nathan Gatt, PricewaterhouseCoopers Malta
11:15-11:45 Coffee break
11:45-12:15 All you need to know about ISO 27001 in 30 minutes, George Simos, TUV AUSTRIA HELLAS Workshop: End User Computing (EUC) Risk: From Assessment to Audit, Georgios Mallikourtis & Efthimis Papanikolaou, Alpha Bank
12:15-12:45 ISACA Risk IT Framework based on COBIT, George Raikos, ISACA Athens Chapter
12:45-13:45  Lunch break

Social Media and Social Networking: Risks and Threats

Keynote Presentation: There is no Patch for Stupidity. The Current State of Digital Social Engineering in 2010, Joshua Leewarner, Fretwork Technologies

14:30-15:00 Corporate and Personal Privacy – Your Employees and their Facebook Accounts, Matthew WA Pemble, Idrach Ltd
15:00-15:30 Coffee break
15:30-16:00                    Security vs. Social Networking. Trying to find the balance, Athanasios Vamvakas, Ether Applications Ltd

Social Networking and Media: Friend or Foe, Daniel Blander, InfoSecurityLab Inc













Lead Sponsors

Algosystems Logo

 ETHER Applications Ltd

To Top

Media Sponsor


To Top


Hellenic American Union

To Top

In cooperation with


To Top

Academic Advisor

 Hellenic American University


To Top