iotc iotc

    • facebook
    • twitter
    • YouTube
  • Registration Registration

  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration Registration

Session

  • All
  • 10.22(Tue)
  • 10.23(Wed)
  • 10.24(Thu)
  • 10.25(Fri)
  • simultaneous interpreting

  • lunch

Search (possible multiple choice)

Keyword

10.23(Wed)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:40
  • A2-01

    Coming soon

    • Speaker

      Ministry of Economy, Trade and Industry

09:50 | 10:30
  • A2-02

    Coming soon

    • Speaker

      ACT.inc

    • Ransomware measures
    • Endpoint Security
    • SOC / Incident Response

    Presented byACT.inc

  • Closed

    WS2-01

    Japan Trends in Cyber Attacks
    - APT Groups and Ransomware Gangs Under the Aegis of the Enemy Nations

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • SOC / Incident Response
    • Workshop

    Presented byNSHC Japan Inc.

10:40 | 11:20
  • A2-03

    Coming soon

    • Speaker

      Veeam Software Japan

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Critical Infrastructure Security

    Presented byVeeam Software Japan

11:30 | 12:10
  • A2-04

    Maximizing Risk Reduction with the Qualys Enterprise TruRisk Platform

    • Speaker

      Qualys, Inc.

      Vice President
      Product Management

      Joe Petrocelli

    • Cloud security
    • Endpoint Security
    • Vulnerability measures / Tampering measures

    Presented byQualys, Inc.

12:25 | 13:05
  • A2-05

    Coming soon

    • Speaker

      AGC Inc.

    • Speaker

      Proofpoint Japan K.K.

    • Targeted Theat / Cyber Aattack
    • Email Security

    Presented byProofpoint Japan K.K.

  • WS2-02

    Experience of Thales IAM platform

    • Authentication / Identity Management
    • Zero trust security model
    • Phishing Attack
    • Workshop

    Presented byTHALES DIS Japan KK.

13:15 | 13:55
  • A2-06

    Coming soon

    • Speaker

      CHUGAI PHARMACEUTICAL CO., LTD.

    • Cloud security
    • PSIRT / CSIRT
    • SOC / Incident Response
14:30 | 15:10
  • A2-07

    Coming soon

    • Speaker

      Cloudflare Japan

      EVANGELIST

      Harunobu Kameda

    Presented byCloudflare Japan K.K.

  • B2-07

    Coming soon

    • Speaker

      Pentera

      Japan Country Manager

      Mitchell DeBerdt

    • Targeted Theat / Cyber Aattack
    • Vulnerability measures / Tampering measures
    • Critical Infrastructure Security

    Presented byTokyo Electron Device LTD.

  • C2-07

    Two proactive defense methods - CTI & CTEM - for ransomware attacks

    • Speaker

      KELA KK

      Threat Intelligence Analyst

      Haruka Ikegami

    • Speaker

      ULTRA RED Ltd.

      Director
      Sales Engineering

      Yuji Sueyoshi

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • PSIRT / CSIRT

    Presented byKELA K.K.

  • WS2-03

    A hands-on workshop to identify the key skills required for each role in your company

    • PSIRT / CSIRT
    • Human resource development
    • Work style reform
    • Workshop

    Japan Trusted Alliance Group for cybersecurity

15:20 | 16:00
  • A2-08

    New Threats Looming. How to Respond to Invisible Threats with Dark Web Monitoring and Attack Surface Management

    • Speaker

      SMS Datatech Co., Ltd.

      leader
      Business development office

      Yuki Hanamura

    • Ransomware measures
    • Measures against information leakag
    • Vulnerability measures / Tampering measures

    Presented bySMS DataTech Corporation

  • B2-08

    Defend againsy supply chain attacks with privileged ID remote access
    ~Introducing optimal zero trust access solution ~

    • Speaker

      Internet Initiative Japan Inc.

      Global Business Director,
      Global Business Division,

      Miki Tanaka

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Zero trust security model

    Presented byInternet Initiative Japan Inc.

  • C2-08

    Coming soon

    • Speaker

      PIOLINK, Inc.

    • Ransomware measures
    • Authentication / Identity Management
    • Zero trust security model

    Presented byPIOLINK, Inc.

16:10 | 16:50
  • A2-09

    Coming soon

    • Speaker

      Cybertrust Japan Co., Ltd.

      Yumi Tomita

    • Targeted Theat / Cyber Aattack
    • Vulnerability measures / Tampering measures
    • Critical Infrastructure Security

    Presented byCybertrust Japan Co., Ltd.

  • B2-09

    Coming soon

    • Speaker

      KDDI CORPORATION

    • Speaker

      KDDI Digital Security Inc.

    • Targeted Theat / Cyber Aattack
    • Zero trust security model
    • Monitoring and detection

    Presented byKDDI CORPORATION

  • C2-09

    How Enterprises Facing a Shortage of Security Talent Should Respond to Cyber Attacks: Exploring the Use of EDR, NDR, XDR, and Generative AI

    • Speaker

      Trend Micro Incorporated

    • Ransomware measures
    • Endpoint Security
    • AI security

    Presented byTrend Micro Incorporated

  • WS2-04

    Change employee awareness! Best practices for targeted attack email training. Practical methods and approaches to make training successful that everyone in charge should know.

    • Targeted Theat / Cyber Aattack
    • Measures against information leakag
    • Business Email Compromise
    • Workshop

    Presented byKnomak Ltd.

17:00 | 17:40
  • A2-10

    Coming soon

    • Speaker

      Alps System Integration Co., Ltd.

    • Targeted Theat / Cyber Aattack
    • Endpoint Security
    • Zero trust security model

    Presented byAlps System Integration Co., Ltd.

  • B2-10

    Key points for selecting MFA, learn from government guidelines
    ~Complete the blind spots of passkey (biometric authentication), The true value of matrix authentication

    • Speaker

      CSE Co.,Ltd

      Deputy General Manager / SECUREMATRIX Development Manager
      Secure Business Division

      Tetsuya Shimodaira

    • Authentication / Identity Management

    Presented byCSE Co.,Ltd.

  • C2-10

    Former SoftBank CISO presents, How we can adopt "CTEM" and "Exposure Management"

    • Speaker

      XM Cyber

      Executive Advisor

      Amane Kito

    • Speaker

      SB C&S Corp.

      Director
      Zero Trust Promotion Office

      Wataru Takeishi

    • Targeted Theat / Cyber Aattack
    • Vulnerability measures / Tampering measures
    • Zero trust security model

    Presented byXM Cyber Ltd.

17:45 | 18:25
  • A2-11

    Coming soon

    • Speaker

      LAC Co., Ltd.

      Sato Atsushi

  • B2-11

    Security Related Status on AI
    - Issues and Regulatory Trends

    • Speaker

      JNSA(Japan Network Security Association)

      Vice Chairman, CISO Support Working Group Leader

      Masakazu Takahashi

    • AI security
  • C2-11

    Approach and Implementation of Factory Security Measures

    • Speaker

      Nagoya Institute of Technology

      Visiting Associate Professor
      Manufacturing and Innovation DX Laboratory

      Hiroshi Sasaki

    • Ransomware measures
    • Critical Infrastructure Security
    • Human resource development
18:40 | 20:00
  • A2-12

    【Night Session】
    This fall's exam.
    - Review "Registered Information Security Specialist Examination".

    • Speaker

      Japan Registered Information Security Specialists’ Association

      Director

      Naoki Murayama

    • PSIRT / CSIRT
    • SOC / Incident Response
    • Human resource development
  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

[24年春開催]Security Days Spring 2024

Copyright (c) NANO OPT Media, Inc. All rights reserved.