iotc iotc

    • facebook
    • twitter
    • YouTube
  • Registration Registration

  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration Registration

Session

  • All
  • 10.22(Tue)
  • 10.23(Wed)
  • 10.24(Thu)
  • 10.25(Fri)
  • simultaneous interpreting

  • lunch

Search (possible multiple choice)

Keyword

10.24(Thu)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:40
  • A3-01

    Latest trends in cybersecurity policy in the ICT field

    • Speaker

      Ministry of Internal Affairs and Communications

      Deputy Director
      Office of the Director-General for Cybersecurity

      Masanori Miyake

    • IoT security
    • Human resource development
09:50 | 10:30
  • A3-02

    Optimal Solutions for Cloud Security Learned from Incident Cases. Insights into the Latest Cyber Threats by a Security Researcher

    • Speaker

      Canon IT Solutions Inc.

      Security Researcher
      Cyber Security Laboratory

      Hajime Ichihara

    • Targeted Theat / Cyber Aattack
    • Cloud security
    • Container security

    Presented byCanon IT Solutions Inc.

  • WS3-01

    Introduction_OT Security Advance Training (Smart City&ICS/SCADA)

    • Critical Infrastructure Security
    • IoT security
    • Infrastructure hacking
    • Workshop

    Presented byNSHC Japan Inc.

10:40 | 11:20
  • A3-03

    Latest Edition! What are the Current Threat Trends?
    - Introduction of Security Measures Necessary Now

    • Speaker

      CrowdStrike Japan G.K.

      Manager Sales
      Engineering

      Michio Mori

    • Targeted Theat / Cyber Aattack
    • XDR
    • SOC / Incident Response

    Presented byCrowdStrike Japan GK

11:30 | 12:10
  • A3-04

    Coming soon

    • Speaker

      dit Co., Ltd.

    • Speaker

      Future Corporation

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Vulnerability measures / Tampering measures

    Presented bydit Co., Ltd. / Future Corporation

12:25 | 13:05
  • A3-05

    A multi-layered defense strategy is best for Critical infrastructure

    • Speaker

      OPSWAT Inc.

      CPO

      Yiyi Miao

    • Ransomware measures
    • Zero trust security model
    • Critical Infrastructure Security

    Presented byOPSWAT JAPAN Co., Ltd.

  • Closed

    WS3-02

    Coming soon

    • Vulnerability measures / Tampering measures
    • Software chain Attack
    • Workshop
13:40 | 14:20
  • A3-06

    For those who almost gave up on VDI
    - new options for client virtualization

    • Speaker

      Soliton Systems K.K.

    • Measures against information leakag
    • Work style reform
    • Container security

    Presented bySoliton Systems K.K.

  • B3-06

    Security Strategies for the DX Era: Risk-Based Vulnerability Management and Optimizing the Attack Surface

    • Speaker

      Ivanti Software K.K.

      Manager, Sales Engineer

      Takumi Hattori

    • Cloud security
    • Measures against information leakag
    • Vulnerability measures / Tampering measures

    Presented byIvanti Software K.K.

  • C3-06

    Coming soon

    • Speaker

      Black Duck Software G.K.

      Senior Technical Marketing Manager

      Masato Matsuoka

    • Software chain Attack
    • Application Security
    • Critical Infrastructure Security

    Presented byBlack Duck Software G.K.

14:30 | 15:10
  • A3-07

    Addressing Current Network Security Challenges: Recent Incidents and the Role of NDR Effectiveness

    • Speaker

      Vectra AI Japan

      Senior Sales Engineer

      Kazuo Fukuda

    • Ransomware measures
    • Cloud security
    • XDR

    Presented byVectra AI Inc.

  • B3-07

    Coming soon

    • Speaker

      TECHMATRIX CORPORATION

    • Vulnerability measures / Tampering measures
    • Software chain Attack
    • Security auditing / system audit

    Presented byTECHMATRIX CORPORATION / Tenable Network Security Japan K.K.

  • C3-07

    Vulnerabilities targeted by targeted e-mail attacks and countermeasures

    • Speaker

      QUALITIA Co., LTD.

      Sales Division Field Sales Dept.

      Takiguchi Takayuki

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Email Security

    Presented byQUALITIA CO., LTD.

  • Closed

    WS3-03

    DMARC Implementation Guidelines
    - To properly understand sender authentication technologies -

    • Email Security
    • Domain authentication / DNS Security
    • Phishing Attack
    • Workshop
15:20 | 16:00
  • A3-08

    Learning CAASM for Low-Cost and Continuous Web Vulnerability Assessment

    • Speaker

      Flatt Security Inc.

      Chief Technology Officer

      Takashi Yoneuchi

    • Cloud security
    • Application Security
    • Security auditing / system audit

    Presented byFlatt Security Inc.

  • B3-08

    - AI and Automation makes it happen! -
    Next Generation SIEM SOC Transformation

    • Speaker

      Palo Alto Networks K.K.

      Manager, Domain Consultant, Cortex

      Toshihiko Muroi

    Presented byPalo Alto Networks K.K.

  • C3-08

    Taking complete visibility and command of your attack surface: What it takes to achieve integrated threat exposure management, detection and response operations.

    • Speaker

      Rapid7 Japan K.K.

      Field CTO,
      Japan Security Science Team

      Katsuya Furukawa

    • XDR
    • Vulnerability measures / Tampering measures
    • SOC / Incident Response

    Presented byRapid7 Japan K.K.

16:10 | 16:50
  • A3-09

    Digital Supply Chain Security

    • Speaker

      Eclypsium

      Business Development Manager

      Yoshihisa Ozawa

    • Ransomware measures
    • Vulnerability measures / Tampering measures
    • Software chain Attack

    Presented byEclypsium Inc.

  • B3-09

    Coming soon

    • Speaker

      PFU Limited

      Expert, Security
      Infrastructure Customer Service Division,Infrastructure Managed Services Div.Ⅰ,
      Network Security Dept.Security Services

      Masayuki Sugama

    • Vulnerability measures / Tampering measures
    • SOC / Incident Response
    • Managed security

    Presented byPFU Limited

  • C3-09

    A True Cyber Security Platform - AI Powered, Cloud Delivered.

    • Speaker

      Check Point Software Technologies, Ltd.

      Cyber Security Officer, Japan

      Daiji Ushiro

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • XDR

    Presented byCheck Point Software Technologies Ltd.

  • WS3-04

    CISO-PRACTSIE Workshop for Evaluating the Effectiveness of Security Measures

    • Workshop
17:00 | 17:40
  • A3-10

    Coming soon

    • Speaker

      J’s Communication Co., Ltd.

    • Targeted Theat / Cyber Aattack
    • Endpoint Security
    • Zero trust security model

    Presented byJ’s Communication Co., Ltd.

  • B3-10

    Security for DNP, its ideas and security management practices

    • Speaker

      Dai Nippon Printing Co.,Ltd.

      Senior Product Manager
      Security Service Department, Cyber Security Business Development Unit, Advanced Business Center

      Shun Mori

    • Endpoint Security
    • SOC / Incident Response
    • Managed security

    Presented byDai Nippon Printing Co., Ltd.

  • C3-10

    Coming soon

    • Secure Innovation Inc.

    • Targeted Theat / Cyber Aattack
    • Vulnerability measures / Tampering measures
    • Monitoring and detection

    Presented bySecure Innovation Inc.

17:45 | 18:25
  • A3-11

    Improving Organizational Response through the Consideration and Advancement of Cyber BCP (Business Continuity Planning)

    • Speaker

      Ernst & Young ShinNihon LLC

      Principal, EY Forensics Japan Technology Leader
      Forensic & Integrity Services

      Ichiro Sugiyama

    • Targeted Theat / Cyber Aattack
    • PSIRT / CSIRT
    • SOC / Incident Response
  • B3-11

    Automotive Cyber Security in Software Defined Vehicle

    • Speaker

      Nagoya University

      Designated Associate Professor
      Graduate School of Informatics

      Ryo Kurachi

    • Application Security
    • IoT security
    • Other
  • C3-11

    Coming soon

    • Speaker

      Amazon Web Services Japan G.K.

    • AI security
18:30 | 18:20
  • A3-12

    【Night Session】
    Coming soon

    • Speaker

      Japan Hackers Association

  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

[24年春開催]Security Days Spring 2024

Copyright (c) NANO OPT Media, Inc. All rights reserved.