Neurosoft | Cybersecurity, Technology and Field Services
  • CYBER
  • TECHNOLOGY
  • FIELD
  • INVESTOR RELATIONS
  • CAREERS
  • NEWS
  • CONTACT
  • Menu Menu
  • Link to LinkedIn
  • Link to X
  • Link to Facebook
  • Link to Instagram
  • Link to Youtube
News

Neurosoft is a sponsor of the (ISC)² Hellenic Chapter!

Hellenic Chapter

It is our great pleasure and honor to be one of the sponsors of the International Information System Security Certification Consortium, (ISC)² Hellenic Chapter. The (ISC)² Hellenic Chapter is the world’s largest organization of certified information security professionals (founded in 1989 and with more than 150,000 members worldwide) and includes members composed of information security professionals and (ISC)² certified professionals holding either a CC, SSCP, CAP, CSSLP, HCISPP, CCSP and/or a CISSP or advanced concentration certification.

Its mission is to promote information security in Greece and share knowledge and ideas among security professionals. Neurosoft always puts security in the center of its interest and wants to be a part of this development, so it is a great moment for us to support this goal.

June 30, 2023
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on LinkedIn
  • Share by Mail
https://neurosoft.gr/wp-content/uploads/2024/02/2LogoNeurosoft2024.png 0 0 neurouser https://neurosoft.gr/wp-content/uploads/2024/02/2LogoNeurosoft2024.png neurouser2023-06-30 10:18:372025-05-14 16:04:33Neurosoft is a sponsor of the (ISC)² Hellenic Chapter!

Recent News

  • cybersecurity-Microsoft
    Microsoft Advanced Specialization in Cybersecurity AchievedMay 28, 2025 - 1:55 pm
  • Technology_NewsIT
    Information & Communication Technology Sector: Last UpdatesMay 21, 2025 - 1:25 pm
  • cloud_westcon awards
    Westcon Awards 2025: Best Cloud PartnerMay 15, 2025 - 2:41 pm
  • Cybersecurity
    Corporate Cybersecurity: Top 3 Behavioral ObservationsMay 5, 2025 - 1:47 pm
  • SD-WAN_SASE
    SD-WAN, a Single-Player?April 22, 2025 - 12:43 pm
  • NIS2_compliance
    NIS2: Compliance at a GlanceApril 14, 2025 - 12:58 pm
  • investments in cybersecurity_AIM Congress
    Cybersecurity and Investments in AIM CongressApril 7, 2025 - 12:54 pm
  • SOC
    The SOC Landscape: One Size No Longer Fits It AllMarch 27, 2025 - 1:58 pm
  • Cybersecurity Awards 2025
    Cybersecurity Awards 2025: A Triple Celebration for NeurosoftMarch 27, 2025 - 1:38 pm
  • Unified SASE_cloud security
    Moving Beyond Fragmented Cloud Security with Unified SASEMarch 26, 2025 - 1:35 pm

Corporate Responsibility.  Careers.  Certified Quality.  Privacy Policy.  Whistleblower Policy. 

© Copyright 2025 - Neurosoft S.A.
  • Link to LinkedIn
  • Link to X
  • Link to Facebook
  • Link to Instagram
  • Link to Youtube
Link to: SD-WAN: The great ally of ZeroTrust Link to: SD-WAN: The great ally of ZeroTrust SD-WAN: The great ally of ZeroTrust Link to: SOC Visibility Triad: Why is determinant for effective Cyber Defense? Link to: SOC Visibility Triad: Why is determinant for effective Cyber Defense? SOC Visibility Triad: Why is determinant for effective Cyber Defense?
Scroll to top Scroll to top Scroll to top
Cookies
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}