Session
-
simultaneous interpreting
-
lunch
Search (possible multiple choice)
Keyword
10.22(Tue)
-
09:50 | 10:30
-
-
A1-02
Coming soon
-
Speaker
Sky CO., LTD.
- Targeted Theat / Cyber Aattack
- Endpoint Security
- Measures against information leakag
Presented bySky CO., LTD.
-
Speaker
-
WS1-01
CoinTantei
~Frontline of Japan's Virtual Asset Hacking Accident~- Targeted Theat / Cyber Aattack
- Measures against information leakag
- Phishing Attack
- Workshop
Presented byNSHC Japan Inc.
-
-
12:25 | 13:05
-
-
A1-05
Corporate Defense Strategies in the DX Era Consistent Cyber Resilience Strategies for Both Normal and Crisis Situations
-
Speaker
MOTEX Inc.
Evangelist
Cybersecurity Division, Security Services Department 1,
Security Engineering SectionSaki Fukuoka
- Targeted Theat / Cyber Aattack
- Ransomware measures
- SOC / Incident Response
Presented byMOTEX Inc.
-
Speaker
-
WS1-02
"Cybersecurity is Your Own Business": Spread It in Your Company
- Workshop
-
-
14:30 | 15:10
-
-
A1-07
Empowering Your Business with Smart Zero Trust
- How MFA Ensures Seamless Operations-
Speaker
Soliton Systems K.K.
CISM, CISSP Evangelist
IT Security Business UnitShoko Araki
- Cloud security
- Authentication / Identity Management
- Zero trust security model
Presented bySoliton Systems K.K.
-
Speaker
-
B1-07
Coming soon
-
Speaker
Illumio Japan G.K.
- Targeted Theat / Cyber Aattack
- Ransomware measures
- Zero trust security model
Presented byIllumio Japan G.K.
-
Speaker
-
C1-07
No more troublesome password management! Strong password-less authentication with security keys
-
Speaker
International Systems Research Co.
Division Head
Sales DivisionKazuhito Shibata
- Measures against information leakag
- Authentication / Identity Management
- Zero trust security model
Presented byInternational Systems Research Co.
-
Speaker
-
WS1-03
Cloud Security and ASPIC's Initiatives
- Cloud security
- Workshop
-
-
15:20 | 16:00
-
-
A1-08
Coming soon
-
Speaker
Forescout Technologies, Inc.
Presented byForescout Technologies, Inc.
-
Speaker
-
B1-08
Rely on our services ASM&XDR in both peace and crisis
- Achieving Comprehensive Cybersecurity Operations with Minimal Resources --
Speaker
Nippon Jimuki Co.,Ltd.
Senior Marketer
IT Platform Solutions Planning
Marketing DivisionNishinami Kazumasa
-
Speaker
Trend Micro Inc.
Senior Product Marketing Manager
General Business UnitKentaro Sakamoto
- Ransomware measures
- XDR
- Managed security
Presented byNippon Jimuki Co., Ltd.
-
Speaker
-
C1-08
Automated AI-based solutions block connections to all fraudulent or suspicious sites, and analyze and detect external intrusion routes!
-
Speaker
SentryMark, Inc.
Senior Sales Director
Akihiro Abe
-
Speaker
Conceal, Inc.
Chief Executive Officer
Gordon Lawson
-
Speaker
Conceal, Inc.
Sr. Director of Solutions Engineering
John Kellum
- Ransomware measures
- Vulnerability measures / Tampering measures
- AI security
Presented bySentryMark, Inc.
-
Speaker
-
-
16:10 | 16:50
-
-
A1-09
From Routine to Revolution: Boost Security Testing Speed 30x with Generative AI, Without Sacrificing Precision
-
Speaker
Aeye Security Lab Inc.
Executive Officer&Head of Customer Experience
Teppei Sekine
- Cloud security
- Vulnerability measures / Tampering measures
- Application Security
Presented byAeye Security Lab Inc.
-
Speaker
-
B1-09
~Evolving security platform~
Threat prevention using SentinelOne Singularity XDR-
Speaker
Tokyo Electron Device LTD.
Shiyuki Ogata
- Ransomware measures
- Endpoint Security
- XDR
Presented byTokyo Electron Device LTD.
-
Speaker
-
C1-09
What preparations are necessary to enhance defense against cyber attacks?
Software vulnerability measures to overcome operational challenges of WSUS.-
Speaker
Sumitomo Electric Information Systems Co., Ltd.
- Targeted Theat / Cyber Aattack
- Measures against information leakag
- Vulnerability measures / Tampering measures
Presented bySumitomo Electric Information Systems Co., Ltd.
-
Speaker
-
WS1-04
Lessons in Preventing Fraudulent and Deceptive Use of Brands: Practical Exercises and Insights from Tabletop Exercise Kits
- PSIRT / CSIRT
- Human resource development
- Phishing Attack
- Workshop
Council of Anti-Phishing Japan
-
-
17:00 | 17:40
-
-
A1-10
Lessons from information leaks at major companies. A whole picture of internal fraud measures taken by NI+C(NTT Group).
~The trump card is privileged ID management~-
Speaker
Nippon Information and Communication Corporation
Security & Network Business Headquarters
Senior Security SpecialistJinichi Yamamoto
-
Speaker
NTT TechnoCross Corporation
Digital Transformation Division
Business OwnerAkio Ogawa
- Measures against information leakag
- Authentication / Identity Management
- Zero trust security model
Presented byNippon Information and Communication Corporation
-
Speaker
-
B1-10
How to effectively protect “Privileged ID” from cyber attacks and internal fraud?
-Introducing a case study of improving security and reducing operational burden at the same time.--
Speaker
NRI SecureTechnologies, Ltd.
Control Solution Business Department
Kento Matsuzaki
- Measures against information leakag
- Authentication / Identity Management
- Security auditing / system audit
Presented byNRI SecureTechnologies, Ltd.
-
Speaker
-
C1-10
Generative AI Exploitation Attacks and Ransomware Countermeasures to Adopt
- Learning from the U.S. Department of Health and Human Services White Paper-
Speaker
Vade Japan K.K.
Channel Sales Engineer
Isao Miyazaki
- Targeted Theat / Cyber Aattack
- Ransomware measures
- Phishing Attack
Presented byVade Japan K.K.
-
Speaker
-
-
17:45 | 18:25
-
-
A1-11
10 Major Security Threats 2024 for Organizations
-
Speaker
Information-technology Promotion Agency, Japan
Chief Executive
Security CenterKouichi Shinotsuka
- Ransomware measures
- Measures against information leakag
- Vulnerability measures / Tampering measures
-
Speaker
-
B1-11
Comparative Analysis of Chinese and Russian Digital Influence Operations and Domestic Private Domain Case Studies
-
Speaker
Cybersecurity Lab, Meiji University
Director, Professor
Dr. Takamichi Saito
- Other
-
Speaker
-
C1-11
Coming soon
-
Speaker
Mori Hamada & Matsumoto.
- Ransomware measures
- Critical Infrastructure Security
- GDPR / Privacy Mark / ISMS / Laws of the Decree
-
Speaker
-