iotc iotc

    • facebook
    • twitter
    • YouTube
  • Registration Registration

  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration Registration

Session

  • All
  • 10.22(Tue)
  • 10.23(Wed)
  • 10.24(Thu)
  • 10.25(Fri)
  • simultaneous interpreting

  • lunch

Search (possible multiple choice)

Keyword

10.22(Tue)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:40
  • A1-01

    Cyber Resilience for Supply Chain

    • Speaker

      Institute of Information Security

      President

      Atsuhiro Goto

    • Software chain Attack
    • Critical Infrastructure Security
    • IoT security
09:50 | 10:30
  • A1-02

    Coming soon

    • Speaker

      Sky CO., LTD.

    • Targeted Theat / Cyber Aattack
    • Endpoint Security
    • Measures against information leakag

    Presented bySky CO., LTD.

  • WS1-01

    CoinTantei
    ~Frontline of Japan's Virtual Asset Hacking Accident~

    • Targeted Theat / Cyber Aattack
    • Measures against information leakag
    • Phishing Attack
    • Workshop

    Presented byNSHC Japan Inc.

10:40 | 11:20
  • A1-03

    Latest trends in information security incidents and countermeasures for incidents caused by human factors

    • Speaker

      NTT RiskManager Corporation

      General Manager
      Planning and General affairs Department

      Hideo Kubo

    • Measures against information leakag
    • Security auditing / system audit
    • Human resource development

    Presented byNTT Risk Manager Corporation

11:30 | 12:10
  • A1-04

    Cyber Threat Hunting and Attack Surface Management (ASM) with Generative AI

    • Speaker

      AI Spera Inc.

      Co-Founder

      Huy Kang Kim

    • Measures against information leakag
    • Vulnerability measures / Tampering measures
    • AI security

    Presented byAI Spera JP Inc.

12:25 | 13:05
  • A1-05

    Corporate Defense Strategies in the DX Era Consistent Cyber Resilience Strategies for Both Normal and Crisis Situations

    • Speaker

      MOTEX Inc.

      Evangelist
      Cybersecurity Division, Security Services Department 1,
      Security Engineering Section

      Saki Fukuoka

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • SOC / Incident Response

    Presented byMOTEX Inc.

  • WS1-02

    "Cybersecurity is Your Own Business": Spread It in Your Company

    • Workshop
13:15 | 13:55
  • A1-06

    Coming soon

    • Speaker

      NISSIN FOODS HOLDINGS CO., LTD.

14:30 | 15:10
  • A1-07

    Empowering Your Business with Smart Zero Trust
    - How MFA Ensures Seamless Operations

    • Speaker

      Soliton Systems K.K.

      CISM, CISSP Evangelist
      IT Security Business Unit

      Shoko Araki

    • Cloud security
    • Authentication / Identity Management
    • Zero trust security model

    Presented bySoliton Systems K.K.

  • B1-07

    Coming soon

    • Speaker

      Illumio Japan G.K.

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Zero trust security model

    Presented byIllumio Japan G.K.

  • C1-07

    No more troublesome password management! Strong password-less authentication with security keys

    • Speaker

      International Systems Research Co.

      Division Head
      Sales Division

      Kazuhito Shibata

    • Measures against information leakag
    • Authentication / Identity Management
    • Zero trust security model

    Presented byInternational Systems Research Co.

  • WS1-03

    Cloud Security and ASPIC's Initiatives

    • Cloud security
    • Workshop
15:20 | 16:00
  • A1-08

    Coming soon

    • Speaker

      Forescout Technologies, Inc.

    Presented byForescout Technologies, Inc.

  • B1-08

    Rely on our services ASM&XDR in both peace and crisis
    - Achieving Comprehensive Cybersecurity Operations with Minimal Resources -

    • Speaker

      Nippon Jimuki Co.,Ltd.

      Senior Marketer
      IT Platform Solutions Planning
      Marketing Division

      Nishinami Kazumasa

    • Speaker

      Trend Micro Inc.

      Senior Product Marketing Manager
      General Business Unit

      Kentaro Sakamoto

    • Ransomware measures
    • XDR
    • Managed security

    Presented byNippon Jimuki Co., Ltd.

  • C1-08

    Automated AI-based solutions block connections to all fraudulent or suspicious sites, and analyze and detect external intrusion routes!

    • Speaker

      SentryMark, Inc.

      Senior Sales Director

      Akihiro Abe

    • Speaker

      Conceal, Inc.

      Chief Executive Officer

      Gordon Lawson

    • Speaker

      Conceal, Inc.

      Sr. Director of Solutions Engineering

      John Kellum

    • Ransomware measures
    • Vulnerability measures / Tampering measures
    • AI security

    Presented bySentryMark, Inc.

16:10 | 16:50
  • A1-09

    From Routine to Revolution: Boost Security Testing Speed 30x with Generative AI, Without Sacrificing Precision

    • Speaker

      Aeye Security Lab Inc.

      Executive Officer&Head of Customer Experience

      Teppei Sekine

    • Cloud security
    • Vulnerability measures / Tampering measures
    • Application Security

    Presented byAeye Security Lab Inc.

  • B1-09

    ~Evolving security platform~
    Threat prevention using SentinelOne Singularity XDR

    • Speaker

      Tokyo Electron Device LTD.

      Shiyuki Ogata

    • Ransomware measures
    • Endpoint Security
    • XDR

    Presented byTokyo Electron Device LTD.

  • C1-09

    What preparations are necessary to enhance defense against cyber attacks?
    Software vulnerability measures to overcome operational challenges of WSUS.

    • Speaker

      Sumitomo Electric Information Systems Co., Ltd.

    • Targeted Theat / Cyber Aattack
    • Measures against information leakag
    • Vulnerability measures / Tampering measures

    Presented bySumitomo Electric Information Systems Co., Ltd.

  • WS1-04

    Lessons in Preventing Fraudulent and Deceptive Use of Brands: Practical Exercises and Insights from Tabletop Exercise Kits

    • PSIRT / CSIRT
    • Human resource development
    • Phishing Attack
    • Workshop

    Council of Anti-Phishing Japan

17:00 | 17:40
  • A1-10

    Lessons from information leaks at major companies. A whole picture of internal fraud measures taken by NI+C(NTT Group).
    ~The trump card is privileged ID management~

    • Speaker

      Nippon Information and Communication Corporation

      Security & Network Business Headquarters
      Senior Security Specialist

      Jinichi Yamamoto

    • Speaker

      NTT TechnoCross Corporation

      Digital Transformation Division
      Business Owner

      Akio Ogawa

    • Measures against information leakag
    • Authentication / Identity Management
    • Zero trust security model

    Presented byNippon Information and Communication Corporation

  • B1-10

    How to effectively protect “Privileged ID” from cyber attacks and internal fraud?
    -Introducing a case study of improving security and reducing operational burden at the same time.-

    • Speaker

      NRI SecureTechnologies, Ltd.

      Control Solution Business Department

      Kento Matsuzaki

    • Measures against information leakag
    • Authentication / Identity Management
    • Security auditing / system audit

    Presented byNRI SecureTechnologies, Ltd.

  • C1-10

    Generative AI Exploitation Attacks and Ransomware Countermeasures to Adopt
    - Learning from the U.S. Department of Health and Human Services White Paper

    • Speaker

      Vade Japan K.K.

      Channel Sales Engineer

      Isao Miyazaki

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Phishing Attack

    Presented byVade Japan K.K.

17:45 | 18:25
  • A1-11

    10 Major Security Threats 2024 for Organizations

    • Speaker

      Information-technology Promotion Agency, Japan

      Chief Executive
      Security Center

      Kouichi Shinotsuka

    • Ransomware measures
    • Measures against information leakag
    • Vulnerability measures / Tampering measures
  • B1-11

    Comparative Analysis of Chinese and Russian Digital Influence Operations and Domestic Private Domain Case Studies

    • Speaker

      Cybersecurity Lab, Meiji University

      Director, Professor

      Dr. Takamichi Saito

    • Other
  • C1-11

    Coming soon

    • Speaker

      Mori Hamada & Matsumoto.

    • Ransomware measures
    • Critical Infrastructure Security
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
18:40 | 20:00
  • A1-12

    【Night Session】
    CyberTantei~Business Risks Lurking on the Dark Web~

    • Speaker

      BRIDGED Co.,Ltd.

      CEO

      Kotaro Takahashi

    • Speaker

      NSHC Japan Inc.

      Director

      Bumjoon Park

    • Measures against information leakag
    • Zero trust security model
    • Managed security
  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

[24年春開催]Security Days Spring 2024

Copyright (c) NANO OPT Media, Inc. All rights reserved.