Greek Cybercrime Center (GCC)

Greek Cybercrime Center (GCC)

The Greek Cybercrime Center (GCC) is part of an emerging coordinated European effort which has the capacity to  significantly improve education and research in the newly growing area of cybercrime. As a national project, GCC seamlessly complements transnational projects such as 2CENTRE (The Cybercrime Centres of Excellence Network), and B-CCENTRE.

On a national level, GCC directly benefits the local LEAs to fight cybercrime. Greece ranks very high in reported metrics related to cybercrime infrastructure support. Thus the local LEAs are often called first to deal with cybercrime incidents and any advances in cybercrime training, research, and education provide significant benefit to them.

Combining the expertise of national industry, academia and law enforcement GCC aims to promote the state-of-the-art in cybercrime investigation. GCC aspires to become established as a centre of excellence in the area of cybercrime research.

Contact Information

Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

Baker McKenzie

Baker McKenzie

Baker & McKenzie is an international law firm. Practice areas include Data & Technology.

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

Clearwater Compliance

Clearwater Compliance

Clearwater Compliance specialize in Privacy, Security, Compliance and Risk Management Solutions for Health Care, Law Firms and other businesses.

Council for Information & Communication Technologies (CTIC)

Council for Information & Communication Technologies (CTIC)

CTIC was set up to address specific issues in the field of ICT relevant to the implementation of electronic government.

Blancco Technology Group

Blancco Technology Group

Blancco Technology Group is a leading global provider of mobile device diagnostics and secure data erasure solutions.

T-Systems

T-Systems

T-Systems offers integrated ICT solutions: from the secure operation of legacy systems to new business models and innovation projects in the Internet of Things.

SecureStack

SecureStack

SecureStack helps software developers find security & scalability gaps in their web applications and offers ways to fix those gaps without forcing those developers to become security experts.

ICS-Defender

ICS-Defender

The DYNICS ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.