Session
-
simultaneous interpreting
-
lunch
Search (possible multiple choice)
Keyword
10.24(Thu)
-
09:50 | 10:30
-
-
A3-02
Optimal Solutions for Cloud Security Learned from Incident Cases. Insights into the Latest Cyber Threats by a Security Researcher
-
Speaker
Canon IT Solutions Inc.
Security Researcher
Cyber Security LaboratoryHajime Ichihara
- Targeted Theat / Cyber Aattack
- Cloud security
- Container security
Presented byCanon IT Solutions Inc.
-
Speaker
-
WS3-01
Introduction_OT Security Advance Training (Smart City&ICS/SCADA)
- Critical Infrastructure Security
- IoT security
- Infrastructure hacking
- Workshop
Presented byNSHC Japan Inc.
-
-
12:25 | 13:05
-
-
A3-05
A multi-layered defense strategy is best for Critical infrastructure
-
Speaker
OPSWAT Inc.
CPO
Yiyi Miao
- Ransomware measures
- Zero trust security model
- Critical Infrastructure Security
Presented byOPSWAT JAPAN Co., Ltd.
-
Speaker
-
Closed
WS3-02
Coming soon
- Vulnerability measures / Tampering measures
- Software chain Attack
- Workshop
-
-
13:40 | 14:20
-
-
A3-06
For those who almost gave up on VDI
- new options for client virtualization-
Speaker
Soliton Systems K.K.
- Measures against information leakag
- Work style reform
- Container security
Presented bySoliton Systems K.K.
-
Speaker
-
B3-06
Security Strategies for the DX Era: Risk-Based Vulnerability Management and Optimizing the Attack Surface
-
Speaker
Ivanti Software K.K.
Manager, Sales Engineer
Takumi Hattori
- Cloud security
- Measures against information leakag
- Vulnerability measures / Tampering measures
Presented byIvanti Software K.K.
-
Speaker
-
C3-06
Coming soon
-
Speaker
Black Duck Software G.K.
Senior Technical Marketing Manager
Masato Matsuoka
- Software chain Attack
- Application Security
- Critical Infrastructure Security
Presented byBlack Duck Software G.K.
-
Speaker
-
-
14:30 | 15:10
-
-
A3-07
Addressing Current Network Security Challenges: Recent Incidents and the Role of NDR Effectiveness
-
Speaker
Vectra AI Japan
Senior Sales Engineer
Kazuo Fukuda
- Ransomware measures
- Cloud security
- XDR
Presented byVectra AI Inc.
-
Speaker
-
B3-07
Coming soon
-
Speaker
TECHMATRIX CORPORATION
- Vulnerability measures / Tampering measures
- Software chain Attack
- Security auditing / system audit
Presented byTECHMATRIX CORPORATION / Tenable Network Security Japan K.K.
-
Speaker
-
C3-07
Vulnerabilities targeted by targeted e-mail attacks and countermeasures
-
Speaker
QUALITIA Co., LTD.
Sales Division Field Sales Dept.
Takiguchi Takayuki
- Targeted Theat / Cyber Aattack
- Ransomware measures
- Email Security
Presented byQUALITIA CO., LTD.
-
Speaker
-
Closed
WS3-03
DMARC Implementation Guidelines
- To properly understand sender authentication technologies -- Email Security
- Domain authentication / DNS Security
- Phishing Attack
- Workshop
-
-
15:20 | 16:00
-
-
A3-08
Learning CAASM for Low-Cost and Continuous Web Vulnerability Assessment
-
Speaker
Flatt Security Inc.
Chief Technology Officer
Takashi Yoneuchi
- Cloud security
- Application Security
- Security auditing / system audit
Presented byFlatt Security Inc.
-
Speaker
-
B3-08
- AI and Automation makes it happen! -
Next Generation SIEM SOC Transformation-
Speaker
Palo Alto Networks K.K.
Manager, Domain Consultant, Cortex
Toshihiko Muroi
Presented byPalo Alto Networks K.K.
-
Speaker
-
C3-08
Taking complete visibility and command of your attack surface: What it takes to achieve integrated threat exposure management, detection and response operations.
-
Speaker
Rapid7 Japan K.K.
Field CTO,
Japan Security Science TeamKatsuya Furukawa
- XDR
- Vulnerability measures / Tampering measures
- SOC / Incident Response
Presented byRapid7 Japan K.K.
-
Speaker
-
-
16:10 | 16:50
-
-
A3-09
Digital Supply Chain Security
-
Speaker
Eclypsium
Business Development Manager
Yoshihisa Ozawa
- Ransomware measures
- Vulnerability measures / Tampering measures
- Software chain Attack
Presented byEclypsium Inc.
-
Speaker
-
B3-09
Coming soon
-
Speaker
PFU Limited
Expert, Security
Infrastructure Customer Service Division,Infrastructure Managed Services Div.Ⅰ,
Network Security Dept.Security ServicesMasayuki Sugama
- Vulnerability measures / Tampering measures
- SOC / Incident Response
- Managed security
Presented byPFU Limited
-
Speaker
-
C3-09
A True Cyber Security Platform - AI Powered, Cloud Delivered.
-
Speaker
Check Point Software Technologies, Ltd.
Cyber Security Officer, Japan
Daiji Ushiro
- Targeted Theat / Cyber Aattack
- Ransomware measures
- XDR
Presented byCheck Point Software Technologies Ltd.
-
Speaker
-
WS3-04
CISO-PRACTSIE Workshop for Evaluating the Effectiveness of Security Measures
- Workshop
-
-
17:00 | 17:40
-
-
A3-10
Coming soon
-
Speaker
J’s Communication Co., Ltd.
- Targeted Theat / Cyber Aattack
- Endpoint Security
- Zero trust security model
Presented byJ’s Communication Co., Ltd.
-
Speaker
-
B3-10
Security for DNP, its ideas and security management practices
-
Speaker
Dai Nippon Printing Co.,Ltd.
Senior Product Manager
Security Service Department, Cyber Security Business Development Unit, Advanced Business CenterShun Mori
- Endpoint Security
- SOC / Incident Response
- Managed security
Presented byDai Nippon Printing Co., Ltd.
-
Speaker
-
C3-10
Coming soon
-
Secure Innovation Inc.
- Targeted Theat / Cyber Aattack
- Vulnerability measures / Tampering measures
- Monitoring and detection
Presented bySecure Innovation Inc.
-
-
-
17:45 | 18:25
-
-
A3-11
Improving Organizational Response through the Consideration and Advancement of Cyber BCP (Business Continuity Planning)
-
Speaker
Ernst & Young ShinNihon LLC
Principal, EY Forensics Japan Technology Leader
Forensic & Integrity ServicesIchiro Sugiyama
- Targeted Theat / Cyber Aattack
- PSIRT / CSIRT
- SOC / Incident Response
-
Speaker
-
B3-11
Automotive Cyber Security in Software Defined Vehicle
-
Speaker
Nagoya University
Designated Associate Professor
Graduate School of InformaticsRyo Kurachi
- Application Security
- IoT security
- Other
-
Speaker
-
C3-11
Coming soon
-
Speaker
Amazon Web Services Japan G.K.
- AI security
-
Speaker
-