iotc iotc

    • facebook
    • twitter
    • YouTube
  • Registration closed Registration closed

  • Outline Outline
  • Tokyo Tokyo
    Session Session
    Exhibition Exhibition
    Sponsor Sponsor
  • Osaka Osaka
    Session Session
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • Tokyo Tokyo
    Session Session
    Exhibition Exhibition
    Sponsor Sponsor
  • Osaka Osaka
    Session Session
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration closed Registration closed

Tokyo Session

  • All
  • 10.17(Tue)
  • 10.18(Wed)
  • 10.19(Thu)
  • 10.20(Fri)
  • on-demand

  • lunch

Search (possible multiple choice)

Keyword

10.18(Wed)

  • RoomA
  • RoomB
  • RoomC
  • RoomD
09:00 | 09:40
  • A2-01

    Cybersecurity Policy for Industry Sector in Japan

    • Speaker

      Ministry of Economy, Trade and Industry

      Director for Cybersecurity Strategy Cybersecurity Division Commerce and Information Policy Bureau

      Yamada Taketo

    • other

    Presented byMinistry of Economy, Trade and Industry

    *Japanese only

09:50 | 10:30
  • A2-02

    #NAME?

    • Targeted Theat
    • Incident response / CSIRT / SOC
    • Zero trust security model

    Presented byPalo Alto Networks K.K.

    *Japanese only

  • D2-02

    Corporate Transformation and Business Innovation
    - Considering the Higher Concepts of Information Security Management

    • Speaker

      Japan Productivity Center

      Executive Management Consultant

      Motohi KASE

    • other

    *In the event that there are too many applicants, we may hold a selection lottery.

10:40 | 11:20
  • A2-03

    Secure PC Environment with Chromebooks
    - Introduces strong security functions through case studies

    • Speaker

      Densan System Co.,Ltd.

      ChromeOS Sales Manager
      Cloud Integration Division

      Yosuke Ogawa

    • Ransomware measures
    • Cloud security
    • Endpoint Security

    Presented byDensan System Co., Ltd.

    *Japanese only

11:30 | 12:10
  • A2-04

    Coming Soon

    • Targeted Theat
    • Ransomware measures
    • Endpoint Security

    Presented byKaspersky Labs Japan

    *Japanese only

12:25 | 13:05
  • A2-05

    Why is Lateral Security gaining attention now?
    - VMware's Latest Security Solutions Encompassing Detection, Defense, Response, and Recovery for the Virtual Infrastructure

    • Speaker

      VMware

      Security Senior Specialist Engineer
      Networking & Security Solution Engineering

      Tony Shimono

    • Targeted Theat
    • Ransomware measures
    • Cloud security

    Presented byVMware K.K.

    *Japanese only

13:10 | 13:50
  • D2-06

    Analysts provide consistent support for endpoint security measures !!

    • Speaker

      OPTAGE CO, INC.

      Sub Manager, Cloud Sales Team

      Yosuke Umezawa

    • Ransomware measures
    • Incident response / CSIRT / SOC
    • Monitoring and detection

    Presented byOPTAGE Inc.

    *Japanese only

14:00 | 14:40
  • A2-07

    The Key to Successful Zero Trust Implementation
    - Based on a survey of Digital Transformation (DX) Team

    • Speaker

      Soliton Systems K.K.

      Evangelist
      IT Security Division

      Shoko Araki

    • Measures against information leakag
    • Authentication / Identity Management
    • Zero trust security model

    Presented bySoliton Systems K.K.

    *Japanese only

  • B2-07

    Can supply chain attacks be stopped? Mitigating risks with Zero Trust Security

    • Ransomware measures
    • Vulnerability countermeasure
    • Zero trust security model

    Presented byInternet Initiative Japan Inc.

    *Japanese only

  • C2-07

    Valuable functions and use cases of “Zscaler Private Access”

    • Speaker

      Zscaler Japan K.K.

      Senior Sales Engineer
      Sales Engineer Div

      Masato Suzuki

    • Cloud security
    • Zero trust security model
    • Remote access / VPN

    Presented byZscaler Japan K.K.

    *Japanese only

14:50 | 15:30
  • A2-08

    Information Leakage Prevention, Effective countermeasures using privileged ID management.
    ~How to achieve both high security and reduced operational load.~

    • Speaker

      NRI SecureTechnologies, Ltd.

      Senior Associate Control Solution Business Department

      Yoko Kamijo

    • Measures against information leakag
    • Authentication / Identity Management
    • Security auditing / system audit

    Presented byNRI SecureTechnologies, Ltd. / Recorded Future, Inc.

    *Japanese only

  • B2-08

    Coming Soon

    • Measures against information leakag
    • Vulnerability countermeasure

    Presented byCyber Security Cloud, Inc.

    *Japanese only

  • C2-08

    Next Steps against Infostealer Malware

    • Speaker

      Sompo Risk Management Inc.

      Marketing manager
      Cyber security business division

      Shinya Takahashi

    • Measures against information leakag
    • Authentication / Identity Management
    • Antivirus

    Presented bySompo Risk Management Inc.

    *Japanese only

15:45 | 16:25
  • A2-09

    Coming Soon

    • Targeted Theat
    • Cloud security
    • Authentication / Identity Management

    Presented byEncourage Technologies Co., Ltd.

    *Japanese only

  • B2-09

    A supply chain attack may be the result of a tampering or a not fixed vulnerability on your company's website. We will explain effective defensive preparation seen from the attack method.

    • Speaker

      SecureBrain Corporation

      Program Management Director

      Ryosuke Fukaya

    • Cloud security
    • Measures against information leakag
    • Vulnerability countermeasure

    Presented bySecureBrain Corporation

    *Japanese only

  • C2-09

    Key Points to Consider in "Prevention First" against the Latest Cyber Attacks

    • Speaker

      Check Point Software Technogies, Ltd.

      Cyber Security Officer

      Daiji Ushiro

    • Targeted Theat
    • Email Security
    • Zero trust security model

    Presented byCheck Point Software Technologies Ltd.

    *Japanese only

16:35 | 17:15
  • A2-10

    Product Cyber Security using Cybellum's Cyber Digital TwinsTM
    - from SBOM creation to continuous monitoring.

    • Speaker

      Cybellum Technologies GK

      Sr.Sales Director

      Yoshihiko Shiraishi

    • Demonstrator

      Marubeni Information Systems Co.,Ltd.

      Hideki Nakahara

    • Software supply chain
    • Application Security
    • other

    Presented byCybellum

    *Japanese only

  • B2-10

    Coming Soon

    • Cloud security
    • Zero trust security model
    • Remote access / VPN

    Presented byTECHMATRIX CORPORATION

    *Japanese only

  • C2-10

    Real-time network threat detection
    - next-generation NDR technology

    • Speaker

      Vectra AI Japan

      Senior SE

      Kazuo Fukuda

    • Targeted Theat
    • Ransomware measures
    • Cloud security

    Presented byVectra AI Inc.

    *Japanese only

17:20 | 18:00
  • A2-11

    Ensuring the security of industrial control systems

    • Speaker

      Control System Security Center

      Securatory General

      Ichiro Murase

    • Critical Infrastructure Security
    • Human resource development
    • other

    *Japanese only

  • B2-11

    Importance of Open Source Governance and Trends in SBOM Utilization

    • Speaker

      Toyota Motor Corporation

      Group Manager
      AD-V: Value Chain Innovation Project, Technical Project Field, Advanced R&D and Engineering Company

      Masato Endo

    • Speaker

      Sony Group Corporation

      Technology Infrastructure Center

      Norio Kobota

    • Vulnerability countermeasure
    • Software supply chain
    • Human resource development

    *Japanese only

  • C2-11

    Ensuring security in response to Japan Post Group's promotion of DX

    • Speaker

      JAPAN POST HOLDINGS Co., Ltd.

      Managing Executive Officers

      Tsutomu Shomura

    • Cloud security
    • Critical Infrastructure Security
    • Work style reform

    *Japanese only

  • D2-11

    Do you believe that SBOM is just a List? This is the session for you to introduction of the Software Supply Chain Risk Management.

    • Speaker

      IoT Security WG Leader, NPO Japan Network Security Association /

      Sr. Technical Marketing Manager, Nihon Synopsys G.K.

      Masato Matsuoka

    • Software supply chain
    • Application Security
    • Edge security

    *Japanese only

  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

[23年春開催]Security Days Spring 2023

Copyright (c) NANO OPT Media, Inc. All rights reserved.