iotc iotc

    • facebook
    • twitter
    • YouTube
  • Registration Registration

  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration Registration

Session

  • All
  • 10.22(Tue)
  • 10.23(Wed)
  • 10.24(Thu)
  • 10.25(Fri)
  • simultaneous interpreting

  • lunch

Search (possible multiple choice)

Keyword

10.25(Fri)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:40
  • A4-01

    Cyber-Enabled Fraud and DPRK IT Workers Trends

    • Speaker

      US Embassy.

      Intelligence Analyst, Legal Attache Office

      Ryan Hull

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Infrastructure hacking
09:50 | 10:30
  • A4-02

    Proposing optimal security for each organization: EDR and MDR for SMBs, EDR and XDR for Enterprises

    • Speaker

      K.K.Kaspersky Labs Japan

      Chief Technology Officer / Technology Evangelist

      Tetsuya Sekiba

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Endpoint Security

    Presented byKaspersky Labs Japan

  • WS4-01

    Introduction_OT Security Advance Training (Smart Mobility_Car&Drone)

    • Critical Infrastructure Security
    • IoT security
    • Infrastructure hacking
    • Workshop

    Presented byNSHC Japan Inc.

10:40 | 11:20
  • A4-03

    Coming soon

    • Speaker

      Cloudbase Inc.

    • Cloud security
    • Measures against information leakag
    • Critical Infrastructure Security

    Presented byCloudbase Inc.

11:30 | 12:10
  • A4-04

    The Future of ChromeOS and Security Strategies

    • Speaker

      Densan System Co.,Ltd.

      Cloud Integration Division

      Ryuji Miyamoto

    • Speaker

      Google Japan G.K.

      Strategic Partner Manager
      ChromeOS Commercial Channels

      Tomofumi Hiroyama

    • Ransomware measures
    • Zero trust security model

    Presented byDensan System Co., Ltd.

12:25 | 13:05
  • A4-05

    Graduated PPAP
    - How to solve the PPAP problem

    • Speaker

      QUALITIA Co., LTD.

      senior staff
      Sales Division Field Sales Dept.

      Fukuyama Kohei

    • Measures against information leakag
    • Email Security

    Presented byQUALITIA CO., LTD.

  • WS4-02

    Introductory workshop for image analysis using OSINT by pinja

    • Human resource development
    • Other
    • Workshop
13:40 | 14:20
  • A4-06

    What is the Key to Achieving the Ideal IT System in the Age of Digital Transformation?
    -Optimal Authentication Balancing Security and Convenience -

    • Speaker

      Soliton Systems K.K

      Product&Service Manegement
      IT Security Division

      Mayu Matsuda

    • Cloud security
    • Endpoint Security
    • Authentication / Identity Management

    Presented bySoliton Systems K.K.

  • B4-06

    Translating Security Value to Executive Language:
    Strategic Approaches for Winning Executive Support and Funding

    • Speaker

      UBsecure, Inc.

      Security Consultant
      Security Design Consulting Dept.

      Masaki Abe

    • Measures against information leakag
    • Vulnerability measures / Tampering measures
    • Security auditing / system audit

    Presented byUBsecure Inc.

  • C4-06

    Dark Energy - Cyber Threats to Satellite Communications During Conflict

    • Speaker

      SANS Instructor

      Justin Parker

    • Targeted Theat / Cyber Aattack
    • Application Security
    • Human resource development

    Presented bySANS Institute

14:30 | 15:10
  • A4-07

    Coming soon

    • Speaker

      Encourage Technologies Co., Ltd.

    • Cloud security
    • Measures against information leakag
    • Authentication / Identity Management

    Presented byEncourage Technologies Co., Ltd.

  • B4-07

    Coming soon

    • Speaker

      3-shake Inc.

    • Vulnerability measures / Tampering measures
    • Application Security
    • Critical Infrastructure Security

    Presented by3-shake Inc.

  • C4-07

    Countermeasures against unauthorized login required by Credit Card Security Guidelines (Version 5.0)

    • Speaker

      Cacco Inc.

      Senior Managing Director

      Kentaro Sekine

    • Measures against information leakag
    • Monitoring and detection
    • Phishing Attack

    Presented byCacco inc.

  • WS4-03

    Learn Practical Cybersecurity Measures for SMEs: A Hands-On Workshop

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Human resource development
    • Workshop
15:20 | 16:00
  • A4-08

    AI-Driven Attacks Are Becoming a Reality: Advanced Threats and Countermeasures
    – The Strategic Role of AI Tools and the Importance of SOC

    • Speaker

      AP Communications Co., Ltd.

      Sectuion Leader
      iTOC Division BzD Department 0-WAN

      Shiori Ozawa

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • SOC / Incident Response

    Presented byAP Communications Co., Ltd.

  • Closed

    B4-08

    Coming soon

    • Speaker

      Sakura Information Systems Co., Ltd.

    Presented bySakura Information Systems Co., Ltd.

  • C4-08

    On-prem assets will remain... How to achieve zero trust with no line load?
    The answer is “AppgateSDP”!

    • Speaker

      TECHMATRIX CORPORATION

      Deputy General Manager
      Security Products Sales Section 3
      Sale Department No.3
      Network Security Division

      Rikihiro Oshio

    • Zero trust security model
    • IoT security
    • Work style reform

    Presented byTECHMATRIX CORPORATION

16:10 | 16:50
  • A4-09

    Introducing cybercrime trends on the dark web and cases of cybercrime in Japan analyzed using AI solutions.

    • Speaker

      S2W

      Team Leader
      Business Development

      Jay Oh

    • Measures against information leakag
    • AI security
    • Monitoring and detection

    Presented byS2W Inc.

  • B4-09

    Achieving Exposure Management to stay ahead of cyber attackers

    • Speaker

      WithSecure K.K.

      Solution Architect
      Cyber Security Technology Division

      Koji Ohta

    • Targeted Theat / Cyber Aattack
    • Vulnerability measures / Tampering measures
    • AI security

    Presented byWithSecure KK

  • C4-09

    Start Here Ransomware Protection and Identity Management.
    What's the right balance between security and cost?

    • Speaker

      Canon IT Solutions Inc.

      IT Service Business Planning Division, IT Service Sales Group

      Daisuke Yoshikawa

    • Ransomware measures
    • Endpoint Security
    • Authentication / Identity Management

    Presented byCanon IT Solutions Inc.

  • WS4-04

    Introduction and demonstration: ZTNA and SD-WAN features in iboss Zero Trust Unified SASE

    • Cloud security
    • Zero trust security model
    • SASE
    • Workshop

    Presented byiboss, Inc.

17:00 | 17:40
  • A4-10

    Coming soon

    • Speaker

      Assured, Inc.

    • Cloud security
    • Measures against information leakag
    • Vulnerability measures / Tampering measures

    Presented byAssured, Inc.

  • B4-10

    What are the risks of using online storage?
    Causes and solutions found in internal improprieties (tentative)

    • Speaker

      NRI SecureTechnologies, Ltd.

      File Security Division

      Naoki Inoue

    • Cloud security
    • Measures against information leakag
    • Monitoring and detection

    Presented byNRI SecureTechnologies, Ltd.

  • C4-10

    Don't Stop Operations! Maximizing Employee Satisfaction by Balancing Defense and Offense
    - Marubeni G's Trial and Error with SASE/EDR

    • Speaker

      MARUBENI IT SOLUTIONS INC.

    • Speaker

      MARUBENI IT SOLUTIONS INC.

    • Ransomware measures
    • Measures against information leakag
    • Zero trust security model

    Presented byMARUBENI IT SOLUTIONS INC.

17:45 | 18:25
  • A4-11

    Social and industrial infrastructure control system security
    - Strategic implementation of OT zero trust -

    • Speaker

      Toshiba Corporation

      General Manager
      Cyber Security Technology Center

      Koji Okada

    • Speaker

      Toshiba Corporation

      General Manager
      Cyber Security Technology Center

      Koji Okada

    • Endpoint Security
    • Zero trust security model
    • IoT security
  • B4-11

    The Standards on Cybersecurity Measures for Defense Industry

    • Speaker

      Acquisition Technology and Logistics Agency

      Director
      Industrial Cyber Security Office, Equipment Security Management Division,
      Department of Equipment Policy

      Yugo Matsumoto

    • Targeted Theat / Cyber Aattack
    • Measures against information leakag
    • Security auditing / system audit
  • C4-11

    Coming soon

    • Speaker

      Minna Bank, Ltd.

    • SOC / Incident Response
    • Software chain Attack
    • Human resource development
  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

[24年春開催]Security Days Spring 2024

Copyright (c) NANO OPT Media, Inc. All rights reserved.