Session
-
simultaneous interpreting
-
lunch
Search (possible multiple choice)
Keyword
10.23(Wed)
-
09:50 | 10:30
-
-
A2-02
Coming soon
-
Speaker
ACT.inc
- Ransomware measures
- Endpoint Security
- SOC / Incident Response
Presented byACT.inc
-
Speaker
-
Closed
WS2-01
Japan Trends in Cyber Attacks
- APT Groups and Ransomware Gangs Under the Aegis of the Enemy Nations- Targeted Theat / Cyber Aattack
- Ransomware measures
- SOC / Incident Response
- Workshop
Presented byNSHC Japan Inc.
-
-
12:25 | 13:05
-
-
A2-05
Coming soon
-
Speaker
AGC Inc.
-
Speaker
Proofpoint Japan K.K.
- Targeted Theat / Cyber Aattack
- Email Security
Presented byProofpoint Japan K.K.
-
Speaker
-
WS2-02
Experience of Thales IAM platform
- Authentication / Identity Management
- Zero trust security model
- Phishing Attack
- Workshop
Presented byTHALES DIS Japan KK.
-
-
14:30 | 15:10
-
-
A2-07
Coming soon
-
Speaker
Cloudflare Japan
EVANGELIST
Harunobu Kameda
Presented byCloudflare Japan K.K.
-
Speaker
-
B2-07
Coming soon
-
Speaker
Pentera
Japan Country Manager
Mitchell DeBerdt
- Targeted Theat / Cyber Aattack
- Vulnerability measures / Tampering measures
- Critical Infrastructure Security
Presented byTokyo Electron Device LTD.
-
Speaker
-
C2-07
Two proactive defense methods - CTI & CTEM - for ransomware attacks
-
Speaker
KELA KK
Threat Intelligence Analyst
Haruka Ikegami
-
Speaker
ULTRA RED Ltd.
Director
Sales EngineeringYuji Sueyoshi
- Targeted Theat / Cyber Aattack
- Ransomware measures
- PSIRT / CSIRT
Presented byKELA K.K.
-
Speaker
-
WS2-03
A hands-on workshop to identify the key skills required for each role in your company
- PSIRT / CSIRT
- Human resource development
- Work style reform
- Workshop
Japan Trusted Alliance Group for cybersecurity
-
-
15:20 | 16:00
-
-
A2-08
New Threats Looming. How to Respond to Invisible Threats with Dark Web Monitoring and Attack Surface Management
-
Speaker
SMS Datatech Co., Ltd.
leader
Business development officeYuki Hanamura
- Ransomware measures
- Measures against information leakag
- Vulnerability measures / Tampering measures
Presented bySMS DataTech Corporation
-
Speaker
-
B2-08
Defend againsy supply chain attacks with privileged ID remote access
~Introducing optimal zero trust access solution ~-
Speaker
Internet Initiative Japan Inc.
Global Business Director,
Global Business Division,Miki Tanaka
- Targeted Theat / Cyber Aattack
- Ransomware measures
- Zero trust security model
Presented byInternet Initiative Japan Inc.
-
Speaker
-
C2-08
Coming soon
-
Speaker
PIOLINK, Inc.
- Ransomware measures
- Authentication / Identity Management
- Zero trust security model
Presented byPIOLINK, Inc.
-
Speaker
-
-
16:10 | 16:50
-
-
A2-09
Coming soon
-
Speaker
Cybertrust Japan Co., Ltd.
Yumi Tomita
- Targeted Theat / Cyber Aattack
- Vulnerability measures / Tampering measures
- Critical Infrastructure Security
Presented byCybertrust Japan Co., Ltd.
-
Speaker
-
B2-09
Coming soon
-
Speaker
KDDI CORPORATION
-
Speaker
KDDI Digital Security Inc.
- Targeted Theat / Cyber Aattack
- Zero trust security model
- Monitoring and detection
Presented byKDDI CORPORATION
-
Speaker
-
C2-09
How Enterprises Facing a Shortage of Security Talent Should Respond to Cyber Attacks: Exploring the Use of EDR, NDR, XDR, and Generative AI
-
Speaker
Trend Micro Incorporated
- Ransomware measures
- Endpoint Security
- AI security
Presented byTrend Micro Incorporated
-
Speaker
-
WS2-04
Change employee awareness! Best practices for targeted attack email training. Practical methods and approaches to make training successful that everyone in charge should know.
- Targeted Theat / Cyber Aattack
- Measures against information leakag
- Business Email Compromise
- Workshop
Presented byKnomak Ltd.
-
-
17:00 | 17:40
-
-
A2-10
Coming soon
-
Speaker
Alps System Integration Co., Ltd.
- Targeted Theat / Cyber Aattack
- Endpoint Security
- Zero trust security model
Presented byAlps System Integration Co., Ltd.
-
Speaker
-
B2-10
Key points for selecting MFA, learn from government guidelines
~Complete the blind spots of passkey (biometric authentication), The true value of matrix authentication-
Speaker
CSE Co.,Ltd
Deputy General Manager / SECUREMATRIX Development Manager
Secure Business DivisionTetsuya Shimodaira
- Authentication / Identity Management
Presented byCSE Co.,Ltd.
-
Speaker
-
C2-10
Former SoftBank CISO presents, How we can adopt "CTEM" and "Exposure Management"
-
Speaker
XM Cyber
Executive Advisor
Amane Kito
-
Speaker
SB C&S Corp.
Director
Zero Trust Promotion OfficeWataru Takeishi
- Targeted Theat / Cyber Aattack
- Vulnerability measures / Tampering measures
- Zero trust security model
Presented byXM Cyber Ltd.
-
Speaker
-
-
17:45 | 18:25
-
-
A2-11
Coming soon
-
Speaker
LAC Co., Ltd.
Sato Atsushi
-
Speaker
-
B2-11
Security Related Status on AI
- Issues and Regulatory Trends-
Speaker
JNSA(Japan Network Security Association)
Vice Chairman, CISO Support Working Group Leader
Masakazu Takahashi
- AI security
-
Speaker
-
C2-11
Approach and Implementation of Factory Security Measures
-
Speaker
Nagoya Institute of Technology
Visiting Associate Professor
Manufacturing and Innovation DX LaboratoryHiroshi Sasaki
- Ransomware measures
- Critical Infrastructure Security
- Human resource development
-
Speaker
-