Session
-
lunch
Search (possible multiple choice)
Keyword
10.29(Tue)
-
09:30 | 10:10
-
-
GA-01
Coming soon
-
Speaker
NPO Japan Network Security Association(JNSA)
-
Speaker
-
GB-01
Coming soon
-
Speaker
Tokai Bureau of Telecommunications
Assistant Director
Cybersecurity OfficeKazuki Sekiya
- IoT security
- Human resource development
-
Speaker
-
GC-01
Approach and Implementation of Factory Security Measures
-
Speaker
Nagoya Institute of Technology
Visiting Associate Professor
Manufacturing and Innovation DX LaboratoryHiroshi Sasaki
- Ransomware measures
- Critical Infrastructure Security
- Human resource development
-
Speaker
-
-
10:20 | 11:00
-
-
GA-02
Coming soon
-
Speaker
:3-shake Inc.
- Vulnerability measures / Tampering measures
- Application Security
- Critical Infrastructure Security
Presented by3-shake Inc.
-
Speaker
-
GB-02
Coming soon
-
Speaker
ACT.inc
- Ransomware measures
- Endpoint Security
- SOC / Incident Response
Presented byACT.inc
-
Speaker
-
GC-02
Coming soon
-
Speaker
Veeam Software Japan
- Targeted Theat / Cyber Aattack
- Ransomware measures
- Critical Infrastructure Security
Presented byVeeam Software Japan
-
Speaker
-
WS1-01
Lessons in Preventing Fraudulent and Deceptive Use of Brands: Practical Exercises and Insights from Tabletop Exercise Kits
- PSIRT / CSIRT
- Human resource development
- Phishing Attack
- Workshop
-
-
11:15 | 11:55
-
-
GA-03
Managing privileged acount and monitoring privileged session by using PAM/PASM
-
Speaker
Jupiter Technology Corp.
Chief Engineer
Business Unit 3, Technical GroupHirofumi Noguchi
-
Speaker
Jupiter Technology Corp.
Business Unit 3, Technical Group
Kunio Tamura
- Authentication / Identity Management
- Zero trust security model
- Security auditing / system audit
Presented byJupiter Technology Corp.
-
Speaker
-
GB-03
Don't Stop Operations! Maximizing Employee Satisfaction by Balancing Defense and Offense
- Marubeni G's Trial and Error with SASE/EDR-
Speaker
MARUBENI IT SOLUTIONS INC.
-
Speaker
MARUBENI IT SOLUTIONS INC.
- Ransomware measures
- Measures against information leakag
- Zero trust security model
Presented byMARUBENI IT SOLUTIONS INC.
-
Speaker
-
GC-03
Accelerating implementation in Nagoya! How to securely manage email and chat attachment files with no additional burden on employees?
-
Speaker
HENNGE K.K.
Product Planning & Research Division
Natsumi Tanioka
- Targeted Theat / Cyber Aattack
- Email Security
- Business Email Compromise
Presented byHENNGE K.K.
-
Speaker
-
-
12:15 | 12:55
-
-
GA-04
Coming soon
-
Speaker
Verizon Japan Ltd.
Senior Solutions Principal, Security
- Targeted Theat / Cyber Aattack
- Vulnerability measures / Tampering measures
- Software chain Attack
Presented byVerizon Japan Ltd.
-
Speaker
-
GB-04
Latest Edition! What are the Current Threat Trends?
- Introduction of Security Measures Necessary Now-
Speaker
CrowdStrike Japan G.K.
Sales Engineer
Shun Nakai
- Targeted Theat / Cyber Aattack
- XDR
- SOC / Incident Response
Presented byCrowdStrike Japan GK
-
Speaker
-
GC-04
~Evolving security platform~
Threat prevention using SentinelOne Singularity XDR-
Speaker
Tokyo Electron Device LTD.
katsushi yamashita
- Ransomware measures
- Endpoint Security
- XDR
Presented byTokyo Electron Device LTD.
-
Speaker
-
WS1-02
The workshop on cybersecurity human resource development using "the Cyber-Poilce Game".
- Measures against information leakag
- Human resource development
- Phishing Attack
- Workshop
-
-
13:05 | 13:45
-
-
GA-05
Control system security practices to enhance cyber resilience in connected factories
-
Speaker
Toshiba Corporation
General Manager
Cyber Security Technology CenterKoji Okada
-
Speaker
Toshiba Corporation
Expert
Cyber Security Technology CenterMasue Shiba
- Endpoint Security
- Software chain Attack
- IoT security
-
Speaker
-
GB-05
Improving Organizational Response through the Consideration and Advancement of Cyber BCP (Business Continuity Planning)
-
Speaker
Ernst & Young ShinNihon LLC
Principal, EY Forensics Japan Technology Leader
Forensic & Integrity ServicesIchiro Sugiyama
- Targeted Theat / Cyber Aattack
- PSIRT / CSIRT
- SOC / Incident Response
-
Speaker
-
GC-05
Coming soon
-
Speaker
Mori Hamada & Matsumoto.
- Ransomware measures
- Critical Infrastructure Security
- GDPR / Privacy Mark / ISMS / Laws of the Decree
-
Speaker
-
-
14:00 | 14:40
-
-
GA-06
Corporate Defense Strategies in the DX Era Consistent Cyber Resilience Strategies for Both Normal and Crisis Situations
-
Speaker
MOTEX Inc.
Evangelist
Cybersecurity Division, Security Services Department 1,
Security Engineering SectionSaki Fukuoka
- Targeted Theat / Cyber Aattack
- Ransomware measures
- SOC / Incident Response
Presented byMOTEX Inc.
-
Speaker
-
GB-06
Coming soon
-
Speaker
Tenable Network Security Japan K.K.
- Vulnerability measures / Tampering measures
- Critical Infrastructure Security
- IoT security
Presented byTenable Network Security Japan K.K.
-
Speaker
-
GC-06
Coming soon
-
Speaker
A10 Networks, K.K.
- Zero trust security model
- Critical Infrastructure Security
- Work style reform
Presented byA10 Networks, K.K.
-
Speaker
-
WS1-03
A hands-on workshop to identify the key skills required for each role in your company
- PSIRT / CSIRT
- Human resource development
- Work style reform
- Workshop
-
-
14:55 | 15:35
-
-
GA-07
Next Generation Authentication Infrastructure and Global IT Governance at Sumitomo Riko
-
Speaker
Sumitomo Riko Company Limited
Manager
IT Infrastracture Planning Sectuion, Information Security DivisionRyuma Kishi
-
Speaker
Okta Japan K.K.
Enterprise Account Executive
Enterprise SalesHitoshi Kozushi
- Cloud security
- Authentication / Identity Management
- Zero trust security model
Presented byOkta Japan K.K.
-
Speaker
-
GB-07
Coming soon
-
Speaker
PFU Limited
Expert, Security
Infrastructure Customer Service Division,Infrastructure Managed Services Div.
Ⅰ,Network Security Dept.Security ServicesMasayuki Sugama
- Vulnerability measures / Tampering measures
- SOC / Incident Response
- Managed security
Presented byPFU Limited
-
Speaker
-
GC-07
The natural reason why mission-critical systems succumbed to ransomware: a simple defense and demonstration for manufacturers using A I
-
Speaker
BlackBerry Japan
Director
Field MarketingYuji Yamasaki
- Ransomware measures
- Managed security
- AI security
Presented byBlackBerry Japan Limited
-
Speaker
-
-
15:50 | 16:30
-
-
GA-08
Maximizing Risk Reduction with the Qualys Enterprise TruRisk Platform
-
Speaker
Qualys Japan K.K.
Regional Sales Director, Japan
Sales DivisionMitsufusa Sugimoto
-
Demonstrator
Qualys Japan K.K.
Technical Account Manager
Sales DivisionYukari Miyagawa
- Cloud security
- Endpoint Security
- Vulnerability measures / Tampering measures
Presented byQualys, Inc.
-
Speaker
-
GB-08
Coming soon
-
Speaker
Secure Innovation Inc.
- IoT security
- Security auditing / system audit
- GDPR / Privacy Mark / ISMS / Laws of the Decree
Presented bySecure Innovation Inc.
-
Speaker
-
GC-08
Relationship and Requirements of European Cybersecurity and Privacy-Related Legislation, and Industry Trends in Japan
-
Speaker
TUV Rheinland Japan Ltd.
Project Manager
Industry & CybersecurityFumiyasu Miura
- IoT security
- Security auditing / system audit
- GDPR / Privacy Mark / ISMS / Laws of the Decree
Presented byTÜV Rheinland Japan Ltd.
-
Speaker
-
-
16:35 | 17:15
-
-
GA-09
10 Major Security Threats 2024 for Organizations
-
Speaker
Information-technology Promotion Agency, Japan
Chief Executive
Security CenterKouichi Shinotsuka
- Ransomware measures
- Measures against information leakag
- Vulnerability measures / Tampering measures
-
Speaker
-
GB-09
Automotive Cyber Security in Software Defined Vehicle
-
Speaker
Nagoya University
Designated Associate Professor
Graduate School of InformaticsRyo Kurachi
- Application Security
- IoT security
- Other
-
Speaker
-
GC-09
Coming soon
-
Speaker
Macnica, Inc.
- Ransomware measures
- Measures against information leakag
- Phishing Attack
-
Speaker
-