e-CyberHealth 2022 e-Booklet CyberSecurity 4e-Health Int'l Conference | Page 26

Ioannis Chatziioannidis
Head of GRC Department Odyssey Cybersecurity SENIOR SPONSOR
Mr . Ioannis Chatziioannidis – Head of Governance , Compliance & Risk Management Mr . Chatziioannidis has been in the field of Information Security , Risk Management , Data Protection and Business Continuity for over 12 years . In addition to his professional capacity , he is a certified and accredited at the National Standardization Council ( ESYD ) as Lead Auditor in the relevant ISO Standards ( 9001 , 27001 , 22301 , 20000-1 ) and Data Protection Executive ( DPO ) under the provisions of EU2016 / 679 ( GDPR ). He is also certified as a Trainer and Designer / Evaluator under the Instructional System Design ( ISD ) protocol and has served as Instructor for 4 years . He has been involved in more than 55 GDPR Compliance projects and has designed , developed and implemented numerous more ISO Management Systems for clients , focusing on the Information Security , Risk Management and Business Continuity aspects .
" Building an Effective & Applicable Cyber Security Strategy , Advisory Services and beyond "
The speech discussed the current reality of cyber threats , highlighting the fact that the health industry has become an attractive target for cyber attackers in recent years due to the sensitive nature of the information they hold . The speaker emphasized the need for organizations to shift from cyber defense to cyber resilience and focused on how organizations can achieve it in today ' s digital hyperconnected world .
As the threat landscape has expanded and digital boundaries have been eliminated , the speaker pointed out the importance for businesses to revisit and rethink their cybersecurity strategy .
The speaker also discussed the first step towards defining your Cybersecurity Strategy is being aware of your organization ’ s Threat Landscape and Cybersecurity Maturity Level ( CML ). By assessing the organization ' s cybersecurity maturity level , businesses can identify areas of weaknesses and develop their strategy in order to improve their security posture taking into account all operational aspects of their organization , including people , processes , and technology .