Neurosoft | Cybersecurity, Technology and Field Services
  • CYBER
  • TECHNOLOGY
  • FIELD
  • INVESTOR RELATIONS
  • CAREERS
  • NEWS
  • CONTACT
  • Menu Menu
  • Link to LinkedIn
  • Link to X
  • Link to Facebook
  • Link to Instagram
  • Link to Youtube
Cyber, Events

Highlights from Neurosoft at the Inaugural Cyber Security Forum

Cybersecurity Forum

Neurosoft was honored to be a participant in the first Cybersecurity Forum, held on November 22 at the Grande Bretagne Hotel. This event was organized under the auspices of the Hellenic Capital Market Commission and was attended by prominent officials, including Mr. Dimitris Papastergiou, the Minister of Digital Governance of the Hellenic Republic, and Mr. Michail Bletsas, the Governor of the National Cybersecurity Authority of Greece. Cybersecurity Forum brought together a dynamic mix of academics, industry leaders and cybersecurity experts. Together, they sparked a vibrant discussion on the critical topics of compliance, innovation and the ever-evolving landscape of cybersecurity.

Τhe CEO of Neurosoft, Mr. Nodas Paschalidis, participated in a panel titled “Securing the Data Frontier: Balancing Innovation, Privacy, and Cybersecurity”. During his speech, he highlighted key conclusions regarding a prosperous business future that relies on the balance between innovation, personal privacy and cybersecurity:

  • Organizations should invest in developing a roadmap that outlines the necessary actions to enhance their business and operational resilience. Having such a strategy, which includes identifying areas for improvement in cybersecurity, is essential.
  • Companies must cultivate a culture of flexibility and adaptability. Cybersecurity frameworks need to evolve at the same pace as the threats they are designed to combat. Investments in more secure architectures, such as SASE and AI-powered SOC services, provide organizations with an advantage against constantly changing cyber threats.
  • Perhaps the most critical aspect of this process is focusing on people. Technology alone cannot address cybersecurity challenges. Education, awareness and the development of a strong security culture are vital to overcoming the “human error” gap in cybersecurity.
  • Organizations must prioritize safeguarding their customers’ trust. Whether by adopting a Zero Trust architecture or implementing transparent privacy policies and legal frameworks like the GDPR, designing processes around customer trust is crucial for ensuring long-term success and resilience in a world where customers value security and the freedom to choose.

The distinguished speakers engaged in fruitful discussions, providing valuable insights aimed at ensuring business security and continuity. Let’s have a closer look at some key takeaways from the conference:

The NIS 2 directive

On November 26, the Greek parliament passed a bill from the Digital Governance Ministry that incorporates the European Union’s NIS 2 Directive. Just a few days earlier, during the Cybersecurity Forum, it was emphasized that the NIS 2 Directive requires organizations to adopt a comprehensive risk management approach. Compliance is an ongoing obligation that involves continuous training to address cybersecurity uncertainties. This necessitates a shift in mindset toward integrating “Security by Design” in all aspects of development, essential for new products, digital transformation and protecting critical infrastructure.

“A chain is only as strong as its weakest link”

The human factor is the weakest link in our digital landscape. The rapid adoption of digital platforms post-COVID-19 highlighted our need for better awareness training. In Greece, the shortage of skilled IT professionals underscores the importance of reskilling and upskilling. Collaboration among experts from different sectors is crucial for improving digital protection and resilience.

OT Security is an imperative

The operational technology (OT) sector is comparatively older and less advanced in its adoption of digital transformation practices than information technology (IT) infrastructures, which are relatively newer and more developed. It is imperative to address the security vulnerabilities within the OT domain promptly. Failure to do so not only jeopardizes service availability but may also result in severe consequences, including the potential loss of human lives.

CISOs and boards

The CEO of Neurosoft, Mr. Nodas Paschalidis, made a crucial point about the role of the CISO: trust is essential. Board members need to recognize the importance of the CISO’s insights and actively listen to their guidance. With cybersecurity threats on the rise, having a dedicated CISO isn’t just a formality; it’s a necessity. By providing the right platform for the CISO and their team to express their recommendations, organizations can ensure that vital actions are taken to safeguard their interests and promote a culture of security.

Cybersecurity Forum

The journey to a cyber-secure world based on collaboration

In today’s world, we find ourselves navigating through turbulent times marked by geopolitical shifts and economic uncertainty. Meanwhile, the rise of Generative AI is transforming the landscape for both attackers and defenders, accelerating developments at an unprecedented pace. We must embrace the reality that the cybersecurity journey for each organization is not a straight path but rather a dynamic voyage toward an ever-evolving destination. To thrive in this complex environment, collaboration among all stakeholders is essential.

November 22, 2024
Tags: Cyber, Events
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on LinkedIn
  • Share by Mail
https://neurosoft.gr/wp-content/uploads/2024/11/cybersecurity-152.jpg 1280 1920 neurouser https://neurosoft.gr/wp-content/uploads/2024/02/2LogoNeurosoft2024.png neurouser2024-11-22 17:00:242025-06-27 14:30:07Highlights from Neurosoft at the Inaugural Cyber Security Forum
You might also like
Cyber Threats Top summer Cyber Threats: Who is the winner?
NIS 2_compliance_cybersecurity Unlocking the NIS 2 Directive: Embracing Compliance as Your Ultimate Strategy
Ransomware Ransomware Victimization: Do personality types matter?
Hackcraft_Red Teaming_cybersecurity_security assessments Red Teaming and Traditional Security Assessments: Mutually Exclusive or Complementary?
Enjoy Your Summer_Neurosoft_secure connectivity Stay summery, connected and secure!
CrowdStrike_risk management 2024 CrowdStrike Incident: Do You Effectively Manage your Third-Party Vendors?

Recent News

  • OT Security
    Elevating OT SecurityJune 27, 2025 - 10:44 am
  • OT Security
    Two Days of Cybersecurity & Ethical HackingJune 23, 2025 - 10:27 am
  • AI Innovation_Cybersecurity
    Microsoft AI Tour: A Strategic Bulletin for AI Innovation & CybersecurityJune 17, 2025 - 10:20 am
  • cybersecurity-Microsoft
    Microsoft Advanced Specialization in Cybersecurity AchievedMay 28, 2025 - 1:55 pm
  • Technology_NewsIT
    Information & Communication Technology Sector: Last UpdatesMay 21, 2025 - 1:25 pm
  • cloud_westcon awards
    Westcon Awards 2025: Best Cloud PartnerMay 15, 2025 - 2:41 pm
  • Cybersecurity
    Corporate Cybersecurity: Top 3 Behavioral ObservationsMay 5, 2025 - 1:47 pm
  • SD-WAN_SASE
    SD-WAN, a Single-Player?April 22, 2025 - 12:43 pm
  • NIS 2_compliance
    NIS 2: Compliance at a GlanceApril 14, 2025 - 12:58 pm
  • investments in cybersecurity_AIM Congress
    Cybersecurity and Investments in AIM CongressApril 7, 2025 - 12:54 pm

Corporate Responsibility.  Careers.  Certified Quality.  Privacy Policy.  Whistleblower Policy. 

© Copyright 2025 - Neurosoft S.A.
  • Link to LinkedIn
  • Link to X
  • Link to Facebook
  • Link to Instagram
  • Link to Youtube
Link to: Neutrify: Moving Beyond Traditional SOC Services Link to: Neutrify: Moving Beyond Traditional SOC Services Neutrify: Moving Beyond Traditional SOC ServicesSOC_Neutrify Link to: The Importance of OT Security in Protecting Critical Infrastructure Link to: The Importance of OT Security in Protecting Critical Infrastructure The Importance of OT Security in Protecting Critical Infrastructure
Scroll to top Scroll to top Scroll to top
Cookies
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}