On Wednesday, February 19, 2025, TicTac Cyber ​​Security (an Acronis Platinum Partner) participated in the Ethniki Insurance Conference Center, where the Information Security Conference 2025 was held with great success, bringing together leading professionals and experts in the field of cybersecurity.

The conference focused on advanced cyber threats, NIS2 requirements, AI management, and the increasing complexity of cloud protection. Participants had the opportunity to learn about the latest protection strategies and technologies while highlighting the need to strengthen cybersecurity teams.

Through specialized presentations, interactive workshops, and a dynamic networking session, professionals in the field exchanged knowledge, experiences, and best practices for the effective protection of businesses.

See all the speakers and conference topics in detail here:

We would like to thank everyone who participated and contributed to the success of the Information Security Conference 2025. We are rescheduling our appointment for the next major meeting in the field of cybersecurity.

Speech Video

Conference Material

Below, you will find the material mentioned in the presentation.

Information Security 2025 Program

  • AI in Cybersecurity: Ally or Threat?
  • Building a Resilient Incident Response and Recovery Plan
  • Cybersecurity in the supply chain
  • Cyber ​​Insurance: Understanding Coverage and Mitigating Risk
  • Defending Phishing and Social Engineering
  • Digital forensics for the everyday person
  • Getting into the Minds of Hackers
  • Leveraging Threat Intelligence for Proactive Defense
  • Opportunities and challenges of NIS2 for Europe’s cybersecurity landscape
  • Pen Testing and Vulnerability Management Best Practices
  • Securing the Cloud
  • Tackling cybersecurity’s talent shortage
  • The evolution of a CISO: How the role has changed
  • The Human Factor: Developing a Security-First Culture
  • The Future of Cybersecurity: Quantum Computing and Beyond
  • The Insider Threat: Mitigating Risks from Privileged Users
  • Zero Trust Security