Neurosoft | Cybersecurity, Technology and Field Services
  • CYBER
  • TECHNOLOGY
  • FIELD
  • INVESTOR RELATIONS
  • CAREERS
  • NEWS
  • CONTACT
  • Menu Menu
  • Link to LinkedIn
  • Link to X
  • Link to Facebook
  • Link to Instagram
  • Link to Youtube
News

Neurosoft supports the Hellenic Cyber Security Team.

Hellenic Cyber Security Team

The growing need for IT security professionals leads to an imperative necessity: to find new and young cyber talents and to encourage them to pursue a career in cyber security.
Neurosoft is a proud supporter and a Gold Sponsor of the Hellenic Cyber Security Team that competed in the 2017 ECSC challenge grand finals, held between 30 October/3November 2017 in Malaga, Spain. The Hellenic team was trained and organized by the Department of Digital Systems of the University of Piraeus.
The European Cyber Security Challenge (ECSC) is an annual European competition promoted by the European Commission through ENISA that brings together young people (ages 14-25) to compete in Cyber Security, aiming to uncover new InfoSEc talent within Europe. The competition was very demanding and included many security-related challenges i.e. web security, mobile security, crypto puzzles, reverse engineering and forensics.

December 5, 2017
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on LinkedIn
  • Share by Mail
0 0 neurouser https://neurosoft.gr/wp-content/uploads/2024/02/2LogoNeurosoft2024.png neurouser2017-12-05 11:37:152025-05-14 16:51:29Neurosoft supports the Hellenic Cyber Security Team.

Recent News

  • OT Security
    Elevating OT SecurityJune 27, 2025 - 10:44 am
  • OT Security
    Two Days of Cybersecurity & Ethical HackingJune 23, 2025 - 10:27 am
  • AI Innovation_Cybersecurity
    Microsoft AI Tour: A Strategic Bulletin for AI Innovation & CybersecurityJune 17, 2025 - 10:20 am
  • cybersecurity-Microsoft
    Microsoft Advanced Specialization in Cybersecurity AchievedMay 28, 2025 - 1:55 pm
  • Technology_NewsIT
    Information & Communication Technology Sector: Last UpdatesMay 21, 2025 - 1:25 pm
  • cloud_westcon awards
    Westcon Awards 2025: Best Cloud PartnerMay 15, 2025 - 2:41 pm
  • Cybersecurity
    Corporate Cybersecurity: Top 3 Behavioral ObservationsMay 5, 2025 - 1:47 pm
  • SD-WAN_SASE
    SD-WAN, a Single-Player?April 22, 2025 - 12:43 pm
  • NIS 2_compliance
    NIS 2: Compliance at a GlanceApril 14, 2025 - 12:58 pm
  • investments in cybersecurity_AIM Congress
    Cybersecurity and Investments in AIM CongressApril 7, 2025 - 12:54 pm

Corporate Responsibility.  Careers.  Certified Quality.  Privacy Policy.  Whistleblower Policy. 

© Copyright 2025 - Neurosoft S.A.
  • Link to LinkedIn
  • Link to X
  • Link to Facebook
  • Link to Instagram
  • Link to Youtube
Link to: May the Angel be with you! Link to: May the Angel be with you! May the Angel be with you! Link to: Proxima+: Sales Finance of Things! Link to: Proxima+: Sales Finance of Things! Proxima+: Sales Finance of Things!
Scroll to top Scroll to top Scroll to top
Cookies
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}