Neurosoft
  • CYBER
  • TECHNOLOGY
  • FIELD
  • INVESTOR RELATIONS
  • CAREERS
  • NEWS
  • CONTACT
  • Menu Menu
  • LinkedIn
  • X
  • Facebook
  • Instagram
Cyber, Events, News

Neurosoft Cybersecurity Day #2: One week left

Which opportunities and challenges organizations may face in their pursuit of digital resilience and seamless business growth in today’s market, through a cybersecurity lens? Some interesting insights:

  • By 17 October 2024, EU Member States must adopt and publish the measures necessary to comply with the NIS 2 Directive.
  • Research shows that over 60% of organizations work with more than 1,000 third party entities. Moreover, Gartner Survey finds 45% of organizations experienced third party-related business interruptions during the past two years. Resilient business growth calls for organizations to proactively manage third-party risks, as business ecosystems continue to expand and get more complex.
  • According to Gartner, by 2025, 80% of enterprises will have adopted a strategy to unify web, cloud services and private application access using a SASE/SSE architecture, up from 20% in 2021.
  • About 34% of Industrial Control System (ICS) vulnerabilities remained unpatched during 2023 The Hacker News mention, highlighting the need for urgent OT security measures.
  • Can SOAR and Automation be the elixir to address the talent shortage in the field of Cybersecurity?
  • How can Red teaming provide a proactive approach to assessing and improving the security of SCADA systems, helping organizations identify and mitigate potential threats and vulnerabilities before they result in operational disruptions, financial losses or safety incidents?

Neurosoft Cybersecurity Day #2 brings together industry leaders and experts to discuss the above-mentioned crucial advancements and challenges in the field of Cybersecurity, through captivating speeches and thought-provoking panels. Join us for an unparalleled opportunity to delve into the cutting-edge realms of cybersecurity, where innovation meets necessity and business resilience intersects with cybersecurity.

Do not miss out on the opportunity to take part in enlightening conversations and connect with the cybersecurity community while enjoying your drinks!

Be there. Be with us. Stay on top.

You can register here: https://lnkd.in/dfJQ8quX

You can check here the full agenda: https://lnkd.in/dfmF5cTK

February 29, 2024
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on LinkedIn
  • Share by Mail
https://neurosoft.gr/wp-content/uploads/2024/02/countdown_post_1week.jpg 1080 1080 neurouser https://neurosoft.gr/wp-content/uploads/2024/02/2LogoNeurosoft2024.png neurouser2024-02-29 18:02:492024-07-01 11:41:41Neurosoft Cybersecurity Day #2: One week left

Recent News

  • cybersecurity
    Microsoft Advanced Specialization in Cybersecurity AchievedMay 28, 2025 - 1:55 pm
  • Technology_NewsIT
    Information & Communication Technology Sector: Last UpdatesMay 21, 2025 - 1:25 pm
  • cloud
    Westcon Awards 2025: Best Cloud PartnerMay 15, 2025 - 2:41 pm
  • Cybersecurity
    Corporate Cybersecurity: Top 3 Behavioral ObservationsMay 5, 2025 - 1:47 pm
  • SD-WAN
    SD-WAN, a Single-Player?April 22, 2025 - 12:43 pm
  • NIS2
    NIS2: Compliance at a GlanceApril 14, 2025 - 12:58 pm
  • AIM Congress
    Cybersecurity and Investments in AIM CongressApril 7, 2025 - 12:54 pm
  • SOC
    The SOC Landscape: One Size No Longer Fits It AllMarch 27, 2025 - 1:58 pm
  • Cyber Security Awards 2025
    Cyber Security Awards 2025: A Triple Celebration for NeurosoftMarch 27, 2025 - 1:38 pm
  • Moving Beyond Fragmented Cloud Security with Unified SASEMarch 26, 2025 - 1:35 pm

Corporate Responsibility.  Careers.  Certified Quality.  Privacy Policy.  Whistleblower Policy. 

© Copyright 2025 - Neurosoft S.A.
  • LinkedIn
  • X
  • Facebook
  • Instagram
NIS2 and Security Maturity Assessment: A speed race towards Cybersecurity m...NIS2Cybersecurity DayNeurosoft Cybersecurity Day #2: The imperative implementation of NIS 2 as a...
Scroll to top
Cookies
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}