Session
-
simultaneous interpreting
-
lunch
Search (possible multiple choice)
Keyword
10.25(Fri)
-
09:50 | 10:30
-
-
A4-02
Proposing optimal security for each organization: EDR and MDR for SMBs, EDR and XDR for Enterprises
-
Speaker
K.K.Kaspersky Labs Japan
Chief Technology Officer / Technology Evangelist
Tetsuya Sekiba
- Targeted Theat / Cyber Aattack
- Ransomware measures
- Endpoint Security
Presented byKaspersky Labs Japan
-
Speaker
-
WS4-01
Introduction_OT Security Advance Training (Smart Mobility_Car&Drone)
- Critical Infrastructure Security
- IoT security
- Infrastructure hacking
- Workshop
Presented byNSHC Japan Inc.
-
-
12:25 | 13:05
-
-
A4-05
Graduated PPAP
- How to solve the PPAP problem-
Speaker
QUALITIA Co., LTD.
senior staff
Sales Division Field Sales Dept.Fukuyama Kohei
- Measures against information leakag
- Email Security
Presented byQUALITIA CO., LTD.
-
Speaker
-
WS4-02
Introductory workshop for image analysis using OSINT by pinja
- Human resource development
- Other
- Workshop
-
-
13:40 | 14:20
-
-
A4-06
What is the Key to Achieving the Ideal IT System in the Age of Digital Transformation?
-Optimal Authentication Balancing Security and Convenience --
Speaker
Soliton Systems K.K
Product&Service Manegement
IT Security DivisionMayu Matsuda
- Cloud security
- Endpoint Security
- Authentication / Identity Management
Presented bySoliton Systems K.K.
-
Speaker
-
B4-06
Translating Security Value to Executive Language:
Strategic Approaches for Winning Executive Support and Funding-
Speaker
UBsecure, Inc.
Security Consultant
Security Design Consulting Dept.Masaki Abe
- Measures against information leakag
- Vulnerability measures / Tampering measures
- Security auditing / system audit
Presented byUBsecure Inc.
-
Speaker
-
C4-06
Dark Energy - Cyber Threats to Satellite Communications During Conflict
-
Speaker
SANS Instructor
Justin Parker
- Targeted Theat / Cyber Aattack
- Application Security
- Human resource development
Presented bySANS Institute
-
Speaker
-
-
14:30 | 15:10
-
-
A4-07
Coming soon
-
Speaker
Encourage Technologies Co., Ltd.
- Cloud security
- Measures against information leakag
- Authentication / Identity Management
Presented byEncourage Technologies Co., Ltd.
-
Speaker
-
B4-07
Coming soon
-
Speaker
3-shake Inc.
- Vulnerability measures / Tampering measures
- Application Security
- Critical Infrastructure Security
Presented by3-shake Inc.
-
Speaker
-
C4-07
Countermeasures against unauthorized login required by Credit Card Security Guidelines (Version 5.0)
-
Speaker
Cacco Inc.
Senior Managing Director
Kentaro Sekine
- Measures against information leakag
- Monitoring and detection
- Phishing Attack
Presented byCacco inc.
-
Speaker
-
WS4-03
Learn Practical Cybersecurity Measures for SMEs: A Hands-On Workshop
- Targeted Theat / Cyber Aattack
- Ransomware measures
- Human resource development
- Workshop
-
-
15:20 | 16:00
-
-
A4-08
AI-Driven Attacks Are Becoming a Reality: Advanced Threats and Countermeasures
– The Strategic Role of AI Tools and the Importance of SOC-
Speaker
AP Communications Co., Ltd.
Sectuion Leader
iTOC Division BzD Department 0-WANShiori Ozawa
- Targeted Theat / Cyber Aattack
- Ransomware measures
- SOC / Incident Response
Presented byAP Communications Co., Ltd.
-
Speaker
-
Closed
B4-08
Coming soon
-
Speaker
Sakura Information Systems Co., Ltd.
Presented bySakura Information Systems Co., Ltd.
-
Speaker
-
C4-08
On-prem assets will remain... How to achieve zero trust with no line load?
The answer is “AppgateSDP”!-
Speaker
TECHMATRIX CORPORATION
Deputy General Manager
Security Products Sales Section 3
Sale Department No.3
Network Security DivisionRikihiro Oshio
- Zero trust security model
- IoT security
- Work style reform
Presented byTECHMATRIX CORPORATION
-
Speaker
-
-
16:10 | 16:50
-
-
A4-09
Introducing cybercrime trends on the dark web and cases of cybercrime in Japan analyzed using AI solutions.
-
Speaker
S2W
Team Leader
Business DevelopmentJay Oh
- Measures against information leakag
- AI security
- Monitoring and detection
Presented byS2W Inc.
-
Speaker
-
B4-09
Achieving Exposure Management to stay ahead of cyber attackers
-
Speaker
WithSecure K.K.
Solution Architect
Cyber Security Technology DivisionKoji Ohta
- Targeted Theat / Cyber Aattack
- Vulnerability measures / Tampering measures
- AI security
Presented byWithSecure KK
-
Speaker
-
C4-09
Start Here Ransomware Protection and Identity Management.
What's the right balance between security and cost?-
Speaker
Canon IT Solutions Inc.
IT Service Business Planning Division, IT Service Sales Group
Daisuke Yoshikawa
- Ransomware measures
- Endpoint Security
- Authentication / Identity Management
Presented byCanon IT Solutions Inc.
-
Speaker
-
WS4-04
Introduction and demonstration: ZTNA and SD-WAN features in iboss Zero Trust Unified SASE
- Cloud security
- Zero trust security model
- SASE
- Workshop
Presented byiboss, Inc.
-
-
17:00 | 17:40
-
-
A4-10
Coming soon
-
Speaker
Assured, Inc.
- Cloud security
- Measures against information leakag
- Vulnerability measures / Tampering measures
Presented byAssured, Inc.
-
Speaker
-
B4-10
What are the risks of using online storage?
Causes and solutions found in internal improprieties (tentative)-
Speaker
NRI SecureTechnologies, Ltd.
File Security Division
Naoki Inoue
- Cloud security
- Measures against information leakag
- Monitoring and detection
Presented byNRI SecureTechnologies, Ltd.
-
Speaker
-
C4-10
Don't Stop Operations! Maximizing Employee Satisfaction by Balancing Defense and Offense
- Marubeni G's Trial and Error with SASE/EDR-
Speaker
MARUBENI IT SOLUTIONS INC.
-
Speaker
MARUBENI IT SOLUTIONS INC.
- Ransomware measures
- Measures against information leakag
- Zero trust security model
Presented byMARUBENI IT SOLUTIONS INC.
-
Speaker
-
-
17:45 | 18:25
-
-
A4-11
Social and industrial infrastructure control system security
- Strategic implementation of OT zero trust --
Speaker
Toshiba Corporation
General Manager
Cyber Security Technology CenterKoji Okada
-
Speaker
Toshiba Corporation
General Manager
Cyber Security Technology CenterKoji Okada
- Endpoint Security
- Zero trust security model
- IoT security
-
Speaker
-
B4-11
The Standards on Cybersecurity Measures for Defense Industry
-
Speaker
Acquisition Technology and Logistics Agency
Director
Industrial Cyber Security Office, Equipment Security Management Division,
Department of Equipment PolicyYugo Matsumoto
- Targeted Theat / Cyber Aattack
- Measures against information leakag
- Security auditing / system audit
-
Speaker
-
C4-11
Coming soon
-
Speaker
Minna Bank, Ltd.
- SOC / Incident Response
- Software chain Attack
- Human resource development
-
Speaker
-