Tokyo Session
-
on-demand
-
lunch
Search (possible multiple choice)
Keyword
10.18(Wed)
-
09:50 | 10:30
-
-
A2-02
#NAME?
- Targeted Theat
- Incident response / CSIRT / SOC
- Zero trust security model
Presented byPalo Alto Networks K.K.
*Japanese only
-
D2-02
Corporate Transformation and Business Innovation
- Considering the Higher Concepts of Information Security Management-
Speaker
Japan Productivity Center
Executive Management Consultant
Motohi KASE
- other
*In the event that there are too many applicants, we may hold a selection lottery.
-
Speaker
-
-
14:00 | 14:40
-
-
A2-07
The Key to Successful Zero Trust Implementation
- Based on a survey of Digital Transformation (DX) Team-
Speaker
Soliton Systems K.K.
Evangelist
IT Security DivisionShoko Araki
- Measures against information leakag
- Authentication / Identity Management
- Zero trust security model
Presented bySoliton Systems K.K.
*Japanese only
-
Speaker
-
B2-07
Can supply chain attacks be stopped? Mitigating risks with Zero Trust Security
- Ransomware measures
- Vulnerability countermeasure
- Zero trust security model
Presented byInternet Initiative Japan Inc.
*Japanese only
-
C2-07
Valuable functions and use cases of “Zscaler Private Access”
-
Speaker
Zscaler Japan K.K.
Senior Sales Engineer
Sales Engineer DivMasato Suzuki
- Cloud security
- Zero trust security model
- Remote access / VPN
Presented byZscaler Japan K.K.
*Japanese only
-
Speaker
-
-
14:50 | 15:30
-
-
A2-08
Information Leakage Prevention, Effective countermeasures using privileged ID management.
~How to achieve both high security and reduced operational load.~-
Speaker
NRI SecureTechnologies, Ltd.
Senior Associate Control Solution Business Department
Yoko Kamijo
- Measures against information leakag
- Authentication / Identity Management
- Security auditing / system audit
Presented byNRI SecureTechnologies, Ltd. / Recorded Future, Inc.
*Japanese only
-
Speaker
-
B2-08
Coming Soon
- Measures against information leakag
- Vulnerability countermeasure
Presented byCyber Security Cloud, Inc.
*Japanese only
-
C2-08
Next Steps against Infostealer Malware
-
Speaker
Sompo Risk Management Inc.
Marketing manager
Cyber security business divisionShinya Takahashi
- Measures against information leakag
- Authentication / Identity Management
- Antivirus
Presented bySompo Risk Management Inc.
*Japanese only
-
Speaker
-
-
15:45 | 16:25
-
-
A2-09
Coming Soon
- Targeted Theat
- Cloud security
- Authentication / Identity Management
Presented byEncourage Technologies Co., Ltd.
*Japanese only
-
B2-09
A supply chain attack may be the result of a tampering or a not fixed vulnerability on your company's website. We will explain effective defensive preparation seen from the attack method.
-
Speaker
SecureBrain Corporation
Program Management Director
Ryosuke Fukaya
- Cloud security
- Measures against information leakag
- Vulnerability countermeasure
Presented bySecureBrain Corporation
*Japanese only
-
Speaker
-
C2-09
Key Points to Consider in "Prevention First" against the Latest Cyber Attacks
-
Speaker
Check Point Software Technogies, Ltd.
Cyber Security Officer
Daiji Ushiro
- Targeted Theat
- Email Security
- Zero trust security model
Presented byCheck Point Software Technologies Ltd.
*Japanese only
-
Speaker
-
-
16:35 | 17:15
-
-
A2-10
Product Cyber Security using Cybellum's Cyber Digital TwinsTM
- from SBOM creation to continuous monitoring.-
Speaker
Cybellum Technologies GK
Sr.Sales Director
Yoshihiko Shiraishi
-
Demonstrator
Marubeni Information Systems Co.,Ltd.
Hideki Nakahara
- Software supply chain
- Application Security
- other
Presented byCybellum
*Japanese only
-
Speaker
-
B2-10
Coming Soon
- Cloud security
- Zero trust security model
- Remote access / VPN
Presented byTECHMATRIX CORPORATION
*Japanese only
-
C2-10
Real-time network threat detection
- next-generation NDR technology-
Speaker
Vectra AI Japan
Senior SE
Kazuo Fukuda
- Targeted Theat
- Ransomware measures
- Cloud security
Presented byVectra AI Inc.
*Japanese only
-
Speaker
-
-
17:20 | 18:00
-
-
A2-11
Ensuring the security of industrial control systems
-
Speaker
Control System Security Center
Securatory General
Ichiro Murase
- Critical Infrastructure Security
- Human resource development
- other
*Japanese only
-
Speaker
-
B2-11
Importance of Open Source Governance and Trends in SBOM Utilization
-
Speaker
Toyota Motor Corporation
Group Manager
AD-V: Value Chain Innovation Project, Technical Project Field, Advanced R&D and Engineering CompanyMasato Endo
-
Speaker
Sony Group Corporation
Technology Infrastructure Center
Norio Kobota
- Vulnerability countermeasure
- Software supply chain
- Human resource development
*Japanese only
-
Speaker
-
C2-11
Ensuring security in response to Japan Post Group's promotion of DX
-
Speaker
JAPAN POST HOLDINGS Co., Ltd.
Managing Executive Officers
Tsutomu Shomura
- Cloud security
- Critical Infrastructure Security
- Work style reform
*Japanese only
-
Speaker
-
D2-11
Do you believe that SBOM is just a List? This is the session for you to introduction of the Software Supply Chain Risk Management.
-
Speaker
IoT Security WG Leader, NPO Japan Network Security Association /
Sr. Technical Marketing Manager, Nihon Synopsys G.K.
Masato Matsuoka
- Software supply chain
- Application Security
- Edge security
*Japanese only
-
Speaker
-