{"id":12787,"date":"2023-03-01T15:51:58","date_gmt":"2023-03-01T13:51:58","guid":{"rendered":"https:\/\/securityproject.gr\/?page_id=12787"},"modified":"2023-03-16T10:56:32","modified_gmt":"2023-03-16T08:56:32","slug":"10th-security-project-2023","status":"publish","type":"page","link":"https:\/\/securityproject.gr\/en\/10th-security-project-2023\/","title":{"rendered":"10th Security Project 2023"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-padding-bottom:10px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:36;line-height:1.33;\">10th Security Project Conference<\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-custom10);--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.25;\">\u201cBuild an Integration Strategy\u201d<\/h2><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:28;line-height:1.91;\">Thursday 30 March 2023 &#8211; Athens, Divani Caravel Hotel<\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><ul>\n<li aria-level=\"1\">\n<h4><span style=\"color: #008080;\"><b><i>The top conference event for security in its 10th edition!<\/i><\/b><\/span><\/h4>\n<\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\">\n<h4><span style=\"color: #008080;\"><b><i>A bridge of professionals, technology and the market of security!<\/i><\/b><\/span><\/h4>\n<\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\">\n<h4><span style=\"color: #008080;\"><b><i>With expanded, contemporary, and impactful content<\/i><\/b><\/span><\/h4>\n<\/li>\n<\/ul>\n<h4 style=\"text-align: center;\"><strong><span style=\"color: #ff6600;\">Holistic approach focusing on People and Technology<\/span> <\/strong><\/h4>\n<p>The <strong>Security Project Conference<\/strong> \u2013 which is the only conference event on physical security in Greece \u2013 has reached &nbsp;its <strong>10th edition<\/strong>!<\/p>\n<p>The event organized by <strong>Smart Press<\/strong> and Security <strong>Manager<\/strong> magazine, being for many years the <strong>reference point<\/strong> of developments &nbsp;in the field of Security, aims this year \u2013 through its central title \u2013 to highlight the need to adopt a strategy for &nbsp;the <strong>holistic approach <\/strong>to security issues, based on the triptych <strong>Man<\/strong> <strong>\u2013 Technologies \u2013 Processes<\/strong>, as a pillar for an efficient model of protection against the dangers of the time.<\/p>\n<p>Through the assessment of the auditing course of all aspects of the security sector in recent years, we will discuss the challenges of today in relation to complex <strong>risks<\/strong>, hybrid <strong>threats<\/strong> and <strong>crime <\/strong>&nbsp;of all sizes, we will highlight modern <strong>Security &amp; Safety practices<\/strong> and we will of course focus on new <strong>technologies<\/strong> and&nbsp; <strong>integrated solutions<\/strong> &nbsp;developed for security through <strong>presentations<\/strong> and speeches by experts in the field, as well as the participation of market<strong> companies<\/strong> in the <strong>exhibition sector<\/strong> of the conference.<\/p>\n<h3 style=\"text-align: center;\"><span style=\"color: #ff6600;\"><strong>A professional meeting point<\/strong><\/span><\/h3>\n<p>We live in a completely <strong>interconnected environment<\/strong> where everything is <strong>interdependent<\/strong>. Security could not be an exception!<\/p>\n<p>The integration of <strong>technological infrastructure<\/strong>, the <strong>digital transformation<\/strong>, the <strong>hybrid environment of risks<\/strong> and the need of businesses, organizations, and even individuals, to enhance their flexibility and functionality, leads the security sector to the requirement to build a bridge of integration of the systems that make up security projects, integrating new functions and applications.&nbsp;<\/p>\n<p>At the same time, the need to <strong>align<\/strong> security with <strong>business goals<\/strong> and &nbsp;day-to-day processes is vital and can be achieved by expanding the role &nbsp;of <strong>security officers<\/strong> and &nbsp;making more effective use of<strong> technological <\/strong>and<strong> human resources.<\/strong> <strong><br \/>\n<\/strong>The <strong>Security Directors<\/strong> and the executives of the in-house respective departments, the <strong>Facility Guarding Project Managers<\/strong>, the <strong>scientific<\/strong> staff, the executives and the base staff &nbsp;of the <strong>IEPYA,<\/strong> the <strong>Professional System<\/strong> Installation Technicians &nbsp;and &nbsp;all those involved in the market of technologies and services, must today follow a new <strong>management<\/strong> model &nbsp;&nbsp;, <strong>working together<\/strong> and <strong>operating<\/strong> in the <strong>&nbsp;security ecosystem<\/strong> in order to respond effectively to the demands of the times.<\/p>\n<p>The Security Project will <strong>once again connect all the pieces of the security puzzle<\/strong> and at the same time will be a <strong>meeting point<\/strong> for professionals in the field who will have the opportunity to attend an expanded, modern and influential content that will be developed in &nbsp;the <em>2 thematic sections that will take place within the framework of the conference.<\/em><\/p>\n<p><a href=\"https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-manager-forum.png\"><img decoding=\"async\" class=\"alignnone size-medium wp-image-2009\" src=\"https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-manager-forum-300x35.png\" alt=\"\" width=\"300\" height=\"35\" srcset=\"https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-manager-forum-200x23.png 200w, https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-manager-forum-300x35.png 300w, https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-manager-forum-400x46.png 400w, https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-manager-forum-600x69.png 600w, https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-manager-forum-768x88.png 768w, https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-manager-forum-800x92.png 800w, https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-manager-forum.png 1000w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><strong>What a best risk management practices are applied today!<\/strong><\/p>\n<p><strong>Crime<\/strong> and, more broadly, the <strong>dangers<\/strong> and <strong>threats<\/strong> in the modern <strong>hybrid environment<\/strong>, &nbsp;stem from many different sources. Risk management in the most effective way today requires approaches to the implementation of <strong>policies <\/strong>&nbsp;and <strong>preventive protection measures<\/strong> at state, corporate, social, family and individual level that are evolving dynamically&nbsp;<\/p>\n<p>In this light, experts, scientists and experts will analyze important aspects of the risks that those who are <strong>responsible for making<\/strong> safety-related decisions within the framework of businesses, organizations, and critical infrastructure have to face today. The integration of all available human and technological resources into an integrated security system,&nbsp; development of innovations, the utilization of advanced technologies and solutions and the upgrading of staff training and management that are key factors for success and will be at the center of discussions and speeches.<\/p>\n<p><a href=\"https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-techology-day.png\"><img decoding=\"async\" class=\"alignnone size-medium wp-image-2008\" src=\"https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-techology-day-300x33.png\" alt=\"\" width=\"300\" height=\"33\" srcset=\"https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-techology-day-200x22.png 200w, https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-techology-day-300x33.png 300w, https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-techology-day-400x45.png 400w, https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-techology-day-600x67.png 600w, https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-techology-day-768x86.png 768w, https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-techology-day-800x89.png 800w, https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-techology-day-940x105.png 940w, https:\/\/securityproject.gr\/wp-content\/uploads\/2017\/03\/security-techology-day.png 943w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><strong>How security technologies are going to be investment with extra value<\/strong><\/p>\n<p>The global industry of physical security technologies, focuses in recent years on the development of systems that have the potential to be part of <strong>integrated solutions,<\/strong> adapted to the different needs and peculiarities of vertical <strong>market facilities<\/strong>. &nbsp;The <strong>interconnection of technological applications<\/strong> for security, with each other and with the rest of the building infrastructure, is not just an option, but a necessity that leads to the enhancement of functionality and the creation of greater<strong> value of investments for security<\/strong>.<\/p>\n<p>It is therefore particularly useful to highlight today, through the technological module of the Security Project, the impact of <strong>AI<\/strong>, <strong>IoT<\/strong>, <strong>cloud<\/strong>, <strong>wireless<\/strong> and <strong>hybrid<\/strong> systems, advanced <strong>24\/7 surveillance<\/strong> <strong>solutions<\/strong> and services &nbsp;&nbsp;and other trends, as catalysts that will upgrade the role of&nbsp;&nbsp;&nbsp; <strong>security project implementation professionals <\/strong>&nbsp;and give them a competitive advantage in the market.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-background-color:var(--awb-custom10);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\" style=\"--awb-text-color:var(--awb-color1);\"><p><strong>Sponsors&#8217; Exhibition\u200b<\/strong><\/p>\n<p>Once again, within the framework of the Security Project 2023, a parallel exhibition of the participating sponsoring companies will be held, giving visitors the opportunity to get in touch with companies operating in our country in the field of security services and solutions, in order to be informed about their activities and in general about all the developments in the field.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.25;\">Who and why are involved!<\/h2><\/div><div class=\"fusion-text fusion-text-3\"><p>Every year, the <strong>Security Project<\/strong> Conference is addressed and attended by hundreds of executives &nbsp;from the large <strong>community of<\/strong> <strong>Physical Security<\/strong> professionals &nbsp;from all over Greece.Specifically, this year, the following will participate as visitors to the conference<em>:<\/em><\/p>\n<ul>\n<li><strong>Directors and&nbsp; Executives of in-house Security Departments<\/strong> from large <strong>Private Companies and Public Organizations *<\/strong><\/li>\n<li>Executives and Staff of <strong>Security Companies<\/strong><\/li>\n<li><strong>Professional Security System Installers<\/strong> and companies active in the <strong>Implementation of Technological Projects<\/strong><\/li>\n<li>Security <strong>Forces<\/strong> Officers and Personnel<\/li>\n<li><strong>Academics, Scientists<\/strong>, Researchers, <strong>Consultants, Trainers, Students <\/strong>and <strong>Individuals<\/strong> with a wider interest in the field of Security<\/li>\n<\/ul>\n<p><em>(*Banking organizations, Industries and Production Units, Tourist Units, Commercial Enterprises, Hospitals, Public Organizations and Bodies, Airports &amp; Ports, Logistics, IT &amp; Telecommunications Companies, Shipping, Educational Institutions, Technical Companies, Embassies, Service Companies, etc.)<\/em><\/p>\n<p>Visitors to the Conference will have, among others, the opportunity to:<\/p>\n<ul>\n<li>To <strong>enrich their knowledge <\/strong>about modern technological <strong>trends<\/strong> and the latest <strong>developments<\/strong> around security issues.<\/li>\n<li>To <strong>get to know solutions <\/strong>&nbsp;and <strong>&nbsp;services<\/strong> and to <strong>meet<\/strong> executives of companies in the security sector in &nbsp;the <strong>exhibition area<\/strong> of the conference.<\/li>\n<\/ul>\n<p>To <strong>network with colleagues and professionals<\/strong> from the wider field of Security &amp; Safety and to exchange views, experiences and know-how.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-bottom:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-flex-start fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.2%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:28;line-height:1.91;\">Under the auspice of the scientific institution:<\/h3><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/e-keme.gr\/\" target=\"_blank\" aria-label=\"logo\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"157\" height=\"100\" src=\"https:\/\/securityproject.gr\/wp-content\/uploads\/2022\/11\/logo.png\" alt class=\"img-responsive wp-image-11605\"\/><\/a><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top:40px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-padding-top:30px;--awb-padding-right:30px;--awb-padding-bottom:30px;--awb-padding-left:30px;--awb-overflow:hidden;--awb-bg-color:var(--awb-custom14);--awb-bg-color-hover:var(--awb-custom14);--awb-bg-size:cover;--awb-border-radius:30px 30px 30px 30px;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\" style=\"--awb-text-color:var(--awb-color1);\"><p><span style=\"color: #ff6600;\"><b>The conference event trusted and participated by the market and the Security sector in Greece!<\/b><\/span><\/p>\n<p>Each organization of the <strong>Security Project<\/strong> has the support of important &nbsp;bodies and organizations, while it is distinguished for the participation &nbsp;of <strong>many important companies<\/strong> from the field of &nbsp;services, <strong>electronic systems<\/strong>, <strong>integrated solutions<\/strong> and <strong>security projects<\/strong>, &nbsp;which participate in the exhibition sector and contribute to the <strong>&nbsp;content <\/strong>&nbsp;of the conference<strong>, <\/strong>&nbsp;in the &nbsp;context of the&nbsp;<strong>Plenary session. <\/strong><\/p>\n<p>With quality, <strong>innovation <\/strong>and high <strong>impact <\/strong>&nbsp;as its pillars<strong>, <\/strong>&nbsp;&nbsp;the Security Project conference &nbsp;is &nbsp;the <strong>reference point<\/strong> in the field of conference events for Security.<\/p>\n<p>The team of <strong>Security Manager<\/strong> magazine &nbsp;and <strong>Smart Press<\/strong> with &nbsp;stable values &nbsp;of <strong>reliability<\/strong>, &nbsp;<strong>validity<\/strong> in highlighting security issues, <strong>recognition<\/strong>, <strong>trust<\/strong> and <strong>respect<\/strong> of the space, create the conditions for an event with maximum&nbsp; <strong>impact<\/strong> &nbsp;that aspires to be a celebration for the industry and its people.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-top:30px;--awb-margin-bottom:30px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-5\" style=\"--awb-content-alignment:center;\"><p><strong>Printed magazines and digital media about Security, by Smart Press, are:<\/strong><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-first\" style=\"--awb-bg-size:cover;width:50%;width:calc(50% - ( ( 4% ) * 0.5 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.securitymanager.gr\" target=\"_blank\" aria-label=\"HellasGuard\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"300\" height=\"99\" alt=\"Security Manager\" src=\"https:\/\/hoteltech.gr\/wp-content\/uploads\/2015\/02\/security-manager-300x99.png\" class=\"img-responsive wp-image-963\"\/><\/a><\/span><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-last\" style=\"--awb-bg-size:cover;width:50%;width:calc(50% - ( ( 4% ) * 0.5 ) );\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.itsecuritypro.gr\" target=\"_blank\" aria-label=\"EUROPA\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"300\" height=\"100\" alt=\"IT Professional Security\" src=\"https:\/\/hoteltech.gr\/wp-content\/uploads\/2015\/02\/it-security-big-300x100.png\" class=\"img-responsive wp-image-969\"\/><\/a><\/span><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":14,"featured_media":12881,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-12787","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/securityproject.gr\/en\/wp-json\/wp\/v2\/pages\/12787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityproject.gr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityproject.gr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityproject.gr\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/securityproject.gr\/en\/wp-json\/wp\/v2\/comments?post=12787"}],"version-history":[{"count":2,"href":"https:\/\/securityproject.gr\/en\/wp-json\/wp\/v2\/pages\/12787\/revisions"}],"predecessor-version":[{"id":12798,"href":"https:\/\/securityproject.gr\/en\/wp-json\/wp\/v2\/pages\/12787\/revisions\/12798"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityproject.gr\/en\/wp-json\/wp\/v2\/media\/12881"}],"wp:attachment":[{"href":"https:\/\/securityproject.gr\/en\/wp-json\/wp\/v2\/media?parent=12787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}