Session
-
simultaneous interpreting
-
lunch
Search (possible multiple choice)
Keyword
10.22(Tue)
-
09:50 | 10:30
-
-
A1-02
Coming soon
-
Speaker
Sky CO., LTD.
- Targeted Theat / Cyber Aattack
- Endpoint Security
- Measures against information leakag
Presented bySky CO., LTD.
-
Speaker
-
Closed
WS1-01
CoinTantei
~Frontline of Japan's Virtual Asset Hacking Accident~- Targeted Theat / Cyber Aattack
- Measures against information leakag
- Phishing Attack
- Workshop
Presented byNSHC Japan Inc.
-
-
12:25 | 13:05
-
-
A1-05
Corporate Defense Strategies in the DX Era Consistent Cyber Resilience Strategies for Both Normal and Crisis Situations
-
Speaker
MOTEX Inc.
Evangelist
Cybersecurity Division, Security Services Department 1,
Security Engineering SectionSaki Fukuoka
- Targeted Theat / Cyber Aattack
- Ransomware measures
- SOC / Incident Response
Presented byMOTEX Inc.
-
Speaker
-
WS1-02
"Cybersecurity is Your Own Business": Spread It in Your Company
- Workshop
-
-
14:30 | 15:10
-
-
A1-07
Empowering Your Business with Smart Zero Trust
- How MFA Ensures Seamless Operations-
Speaker
Soliton Systems K.K.
CISM, CISSP Evangelist
IT Security Business UnitShoko Araki
- Cloud security
- Authentication / Identity Management
- Zero trust security model
Presented bySoliton Systems K.K.
-
Speaker
-
B1-07
Coming soon
-
Speaker
Illumio Japan G.K.
- Targeted Theat / Cyber Aattack
- Ransomware measures
- Zero trust security model
Presented byIllumio Japan G.K.
-
Speaker
-
C1-07
No more troublesome password management! Strong password-less authentication with security keys
-
Speaker
International Systems Research Co.
Division Head
Sales DivisionKazuhito Shibata
- Measures against information leakag
- Authentication / Identity Management
- Zero trust security model
Presented byInternational Systems Research Co.
-
Speaker
-
WS1-03
Cloud Security and ASPIC's Initiatives
- Cloud security
- Workshop
-
-
15:20 | 16:00
-
-
A1-08
Coming soon
-
Speaker
Forescout Technologies, Inc.
Presented byForescout Technologies, Inc.
-
Speaker
-
B1-08
Rely on our services ASM&XDR in both peace and crisis
- Achieving Comprehensive Cybersecurity Operations with Minimal Resources --
Speaker
Nippon Jimuki Co.,Ltd.
Senior Marketer
IT Platform Solutions Planning
Marketing DivisionNishinami Kazumasa
-
Speaker
Trend Micro Inc.
Senior Product Marketing Manager
General Business UnitKentaro Sakamoto
- Ransomware measures
- XDR
- Managed security
Presented byNippon Jimuki Co., Ltd.
-
Speaker
-
C1-08
Automated AI-based solutions block connections to all fraudulent or suspicious sites, and analyze and detect external intrusion routes!
-
Speaker
SentryMark, Inc.
Senior Sales Director
Akihiro Abe
-
Speaker
Conceal, Inc.
Chief Executive Officer
Gordon Lawson
-
Speaker
Conceal, Inc.
Sr. Director of Solutions Engineering
John Kellum
- Ransomware measures
- Vulnerability measures / Tampering measures
- AI security
Presented bySentryMark, Inc.
-
Speaker
-
-
16:10 | 16:50
-
-
Closed
A1-09
From Routine to Revolution: Boost Security Testing Speed 30x with Generative AI, Without Sacrificing Precision
-
Speaker
Aeye Security Lab Inc.
Executive Officer&Head of Customer Experience
Teppei Sekine
- Cloud security
- Vulnerability measures / Tampering measures
- Application Security
Presented byAeye Security Lab Inc.
-
Speaker
-
B1-09
~Evolving security platform~
Threat prevention using SentinelOne Singularity XDR-
Speaker
Tokyo Electron Device LTD.
Shiyuki Ogata
- Ransomware measures
- Endpoint Security
- XDR
Presented byTokyo Electron Device LTD.
-
Speaker
-
C1-09
What preparations are necessary to enhance defense against cyber attacks?
Software vulnerability measures to overcome operational challenges of WSUS.-
Speaker
Sumitomo Electric Information Systems Co., Ltd.
- Targeted Theat / Cyber Aattack
- Measures against information leakag
- Vulnerability measures / Tampering measures
Presented bySumitomo Electric Information Systems Co., Ltd.
-
Speaker
-
WS1-04
Lessons in Preventing Fraudulent and Deceptive Use of Brands: Practical Exercises and Insights from Tabletop Exercise Kits
- PSIRT / CSIRT
- Human resource development
- Phishing Attack
- Workshop
Council of Anti-Phishing Japan
-
-
17:00 | 17:40
-
-
A1-10
Lessons from information leaks at major companies. A whole picture of internal fraud measures taken by NI+C(NTT Group).
~The trump card is privileged ID management~-
Speaker
Nippon Information and Communication Corporation
Security & Network Business Headquarters
Senior Security SpecialistJinichi Yamamoto
-
Speaker
NTT TechnoCross Corporation
Digital Transformation Division
Business OwnerAkio Ogawa
- Measures against information leakag
- Authentication / Identity Management
- Zero trust security model
Presented byNippon Information and Communication Corporation
-
Speaker
-
B1-10
How to effectively protect “Privileged ID” from cyber attacks and internal fraud?
-Introducing a case study of improving security and reducing operational burden at the same time.--
Speaker
NRI SecureTechnologies, Ltd.
Control Solution Business Department
Kento Matsuzaki
- Measures against information leakag
- Authentication / Identity Management
- Security auditing / system audit
Presented byNRI SecureTechnologies, Ltd.
-
Speaker
-
C1-10
Generative AI Exploitation Attacks and Ransomware Countermeasures to Adopt
- Learning from the U.S. Department of Health and Human Services White Paper-
Speaker
Vade Japan K.K.
Channel Sales Engineer
Isao Miyazaki
- Targeted Theat / Cyber Aattack
- Ransomware measures
- Phishing Attack
Presented byVade Japan K.K.
-
Speaker
-
-
17:45 | 18:25
-
-
A1-11
10 Major Security Threats 2024 for Organizations
-
Speaker
Information-technology Promotion Agency, Japan
Chief Executive
Security CenterKouichi Shinotsuka
- Ransomware measures
- Measures against information leakag
- Vulnerability measures / Tampering measures
-
Speaker
-
B1-11
Comparative Analysis of Chinese and Russian Digital Influence Operations and Domestic Private Domain Case Studies
-
Speaker
Cybersecurity Lab, Meiji University
Director, Professor
Dr. Takamichi Saito
- Other
-
Speaker
-
C1-11
Coming soon
-
Speaker
Mori Hamada & Matsumoto.
- Ransomware measures
- Critical Infrastructure Security
- GDPR / Privacy Mark / ISMS / Laws of the Decree
-
Speaker
-
10.23(Wed)
-
09:50 | 10:30
-
-
A2-02
Coming soon
-
Speaker
ACT.inc
- Ransomware measures
- Endpoint Security
- SOC / Incident Response
Presented byACT.inc
-
Speaker
-
Closed
WS2-01
Japan Trends in Cyber Attacks
- APT Groups and Ransomware Gangs Under the Aegis of the Enemy Nations- Targeted Theat / Cyber Aattack
- Ransomware measures
- SOC / Incident Response
- Workshop
Presented byNSHC Japan Inc.
-
-
12:25 | 13:05
-
-
A2-05
Coming soon
-
Speaker
AGC Inc.
-
Speaker
Proofpoint Japan K.K.
- Targeted Theat / Cyber Aattack
- Email Security
Presented byProofpoint Japan K.K.
-
Speaker
-
WS2-02
Experience of Thales IAM platform
- Authentication / Identity Management
- Zero trust security model
- Phishing Attack
- Workshop
Presented byTHALES DIS Japan KK.
-
-
14:30 | 15:10
-
-
A2-07
Coming soon
-
Speaker
Cloudflare Japan
EVANGELIST
Harunobu Kameda
Presented byCloudflare Japan K.K.
-
Speaker
-
B2-07
Coming soon
-
Speaker
Pentera
Japan Country Manager
Mitchell DeBerdt
- Targeted Theat / Cyber Aattack
- Vulnerability measures / Tampering measures
- Critical Infrastructure Security
Presented byTokyo Electron Device LTD.
-
Speaker
-
C2-07
Two proactive defense methods - CTI & CTEM - for ransomware attacks
-
Speaker
KELA KK
Threat Intelligence Analyst
Haruka Ikegami
-
Speaker
ULTRA RED Ltd.
Director
Sales EngineeringYuji Sueyoshi
- Targeted Theat / Cyber Aattack
- Ransomware measures
- PSIRT / CSIRT
Presented byKELA K.K.
-
Speaker
-
WS2-03
A hands-on workshop to identify the key skills required for each role in your company
- PSIRT / CSIRT
- Human resource development
- Work style reform
- Workshop
Japan Trusted Alliance Group for cybersecurity
-
-
15:20 | 16:00
-
-
Closed
A2-08
New Threats Looming. How to Respond to Invisible Threats with Dark Web Monitoring and Attack Surface Management
-
Speaker
SMS Datatech Co., Ltd.
leader
Business development officeYuki Hanamura
- Ransomware measures
- Measures against information leakag
- Vulnerability measures / Tampering measures
Presented bySMS DataTech Corporation
-
Speaker
-
B2-08
Defend againsy supply chain attacks with privileged ID remote access
~Introducing optimal zero trust access solution ~-
Speaker
Internet Initiative Japan Inc.
Global Business Director,
Global Business Division,Miki Tanaka
- Targeted Theat / Cyber Aattack
- Ransomware measures
- Zero trust security model
Presented byInternet Initiative Japan Inc.
-
Speaker
-
C2-08
Coming soon
-
Speaker
PIOLINK, Inc.
- Ransomware measures
- Authentication / Identity Management
- Zero trust security model
Presented byPIOLINK, Inc.
-
Speaker
-
-
16:10 | 16:50
-
-
A2-09
Coming soon
-
Speaker
Cybertrust Japan Co., Ltd.
Yumi Tomita
- Targeted Theat / Cyber Aattack
- Vulnerability measures / Tampering measures
- Critical Infrastructure Security
Presented byCybertrust Japan Co., Ltd.
-
Speaker
-
B2-09
Coming soon
-
Speaker
KDDI CORPORATION
-
Speaker
KDDI Digital Security Inc.
- Targeted Theat / Cyber Aattack
- Zero trust security model
- Monitoring and detection
Presented byKDDI CORPORATION
-
Speaker
-
C2-09
How Enterprises Facing a Shortage of Security Talent Should Respond to Cyber Attacks: Exploring the Use of EDR, NDR, XDR, and Generative AI
-
Speaker
Trend Micro Incorporated
- Ransomware measures
- Endpoint Security
- AI security
Presented byTrend Micro Incorporated
-
Speaker
-
WS2-04
Change employee awareness! Best practices for targeted attack email training. Practical methods and approaches to make training successful that everyone in charge should know.
- Targeted Theat / Cyber Aattack
- Measures against information leakag
- Business Email Compromise
- Workshop
Presented byKnomak Ltd.
-
-
17:00 | 17:40
-
-
A2-10
Coming soon
-
Speaker
Alps System Integration Co., Ltd.
- Targeted Theat / Cyber Aattack
- Endpoint Security
- Zero trust security model
Presented byAlps System Integration Co., Ltd.
-
Speaker
-
B2-10
Key points for selecting MFA, learn from government guidelines
~Complete the blind spots of passkey (biometric authentication), The true value of matrix authentication-
Speaker
CSE Co.,Ltd
Deputy General Manager / SECUREMATRIX Development Manager
Secure Business DivisionTetsuya Shimodaira
- Authentication / Identity Management
Presented byCSE Co.,Ltd.
-
Speaker
-
C2-10
Former SoftBank CISO presents, How we can adopt "CTEM" and "Exposure Management"
-
Speaker
XM Cyber
Executive Advisor
Amane Kito
-
Speaker
SB C&S Corp.
Director
Zero Trust Promotion OfficeWataru Takeishi
- Targeted Theat / Cyber Aattack
- Vulnerability measures / Tampering measures
- Zero trust security model
Presented byXM Cyber Ltd.
-
Speaker
-
-
17:45 | 18:25
-
-
A2-11
Coming soon
-
Speaker
LAC Co., Ltd.
Sato Atsushi
-
Speaker
-
B2-11
Security Related Status on AI
- Issues and Regulatory Trends-
Speaker
JNSA(Japan Network Security Association)
Vice Chairman, CISO Support Working Group Leader
Masakazu Takahashi
- AI security
-
Speaker
-
C2-11
Approach and Implementation of Factory Security Measures
-
Speaker
Nagoya Institute of Technology
Visiting Associate Professor
Manufacturing and Innovation DX LaboratoryHiroshi Sasaki
- Ransomware measures
- Critical Infrastructure Security
- Human resource development
-
Speaker
-
10.24(Thu)
-
09:50 | 10:30
-
-
A3-02
Optimal Solutions for Cloud Security Learned from Incident Cases. Insights into the Latest Cyber Threats by a Security Researcher
-
Speaker
Canon IT Solutions Inc.
Security Researcher
Cyber Security LaboratoryHajime Ichihara
- Targeted Theat / Cyber Aattack
- Cloud security
- Container security
Presented byCanon IT Solutions Inc.
-
Speaker
-
WS3-01
Introduction_OT Security Advance Training (Smart City&ICS/SCADA)
- Critical Infrastructure Security
- IoT security
- Infrastructure hacking
- Workshop
Presented byNSHC Japan Inc.
-
-
12:25 | 13:05
-
-
A3-05
A multi-layered defense strategy is best for Critical infrastructure
-
Speaker
OPSWAT Inc.
CPO
Yiyi Miao
- Ransomware measures
- Zero trust security model
- Critical Infrastructure Security
Presented byOPSWAT JAPAN Co., Ltd.
-
Speaker
-
WS3-02
Coming soon
- Vulnerability measures / Tampering measures
- Software chain Attack
- Workshop
-
-
13:40 | 14:20
-
-
A3-06
For those who almost gave up on VDI
- new options for client virtualization-
Speaker
Soliton Systems K.K.
- Measures against information leakag
- Work style reform
- Container security
Presented bySoliton Systems K.K.
-
Speaker
-
Closed
B3-06
Security Strategies for the DX Era: Risk-Based Vulnerability Management and Optimizing the Attack Surface
-
Speaker
Ivanti Software K.K.
Manager, Sales Engineer
Takumi Hattori
- Cloud security
- Measures against information leakag
- Vulnerability measures / Tampering measures
Presented byIvanti Software K.K.
-
Speaker
-
C3-06
Coming soon
-
Speaker
Black Duck Software G.K.
Senior Technical Marketing Manager
Masato Matsuoka
- Software chain Attack
- Application Security
- Critical Infrastructure Security
Presented byBlack Duck Software G.K.
-
Speaker
-
-
14:30 | 15:10
-
-
A3-07
Addressing Current Network Security Challenges: Recent Incidents and the Role of NDR Effectiveness
-
Speaker
Vectra AI Japan
Senior Sales Engineer
Kazuo Fukuda
- Ransomware measures
- Cloud security
- XDR
Presented byVectra AI Inc.
-
Speaker
-
B3-07
Coming soon
-
Speaker
TECHMATRIX CORPORATION
- Vulnerability measures / Tampering measures
- Software chain Attack
- Security auditing / system audit
Presented byTECHMATRIX CORPORATION / Tenable Network Security Japan K.K.
-
Speaker
-
C3-07
Vulnerabilities targeted by targeted e-mail attacks and countermeasures
-
Speaker
QUALITIA Co., LTD.
Sales Division Field Sales Dept.
Takiguchi Takayuki
- Targeted Theat / Cyber Aattack
- Ransomware measures
- Email Security
Presented byQUALITIA CO., LTD.
-
Speaker
-
WS3-03
DMARC Implementation Guidelines
- To properly understand sender authentication technologies -- Email Security
- Domain authentication / DNS Security
- Phishing Attack
- Workshop
-
-
15:20 | 16:00
-
-
A3-08
Learning CAASM for Low-Cost and Continuous Web Vulnerability Assessment
-
Speaker
Flatt Security Inc.
Chief Technology Officer
Takashi Yoneuchi
- Cloud security
- Application Security
- Security auditing / system audit
Presented byFlatt Security Inc.
-
Speaker
-
B3-08
- AI and Automation makes it happen! -
Next Generation SIEM SOC Transformation-
Speaker
Palo Alto Networks K.K.
Manager, Domain Consultant, Cortex
Toshihiko Muroi
Presented byPalo Alto Networks K.K.
-
Speaker
-
C3-08
Taking complete visibility and command of your attack surface: What it takes to achieve integrated threat exposure management, detection and response operations.
-
Speaker
Rapid7 Japan K.K.
Field CTO,
Japan Security Science TeamKatsuya Furukawa
- XDR
- Vulnerability measures / Tampering measures
- SOC / Incident Response
Presented byRapid7 Japan K.K.
-
Speaker
-
-
16:10 | 16:50
-
-
A3-09
Digital Supply Chain Security
-
Speaker
Eclypsium
Business Development Manager
Yoshihisa Ozawa
- Ransomware measures
- Vulnerability measures / Tampering measures
- Software chain Attack
Presented byEclypsium Inc.
-
Speaker
-
B3-09
Coming soon
-
Speaker
PFU Limited
Expert, Security
Infrastructure Customer Service Division,Infrastructure Managed Services Div.Ⅰ,
Network Security Dept.Security ServicesMasayuki Sugama
- Vulnerability measures / Tampering measures
- SOC / Incident Response
- Managed security
Presented byPFU Limited
-
Speaker
-
C3-09
A True Cyber Security Platform - AI Powered, Cloud Delivered.
-
Speaker
Check Point Software Technologies, Ltd.
Cyber Security Officer, Japan
Daiji Ushiro
- Targeted Theat / Cyber Aattack
- Ransomware measures
- XDR
Presented byCheck Point Software Technologies Ltd.
-
Speaker
-
WS3-04
CISO-PRACTSIE Workshop for Evaluating the Effectiveness of Security Measures
- Workshop
-
-
17:00 | 17:40
-
-
A3-10
Coming soon
-
Speaker
J’s Communication Co., Ltd.
- Targeted Theat / Cyber Aattack
- Endpoint Security
- Zero trust security model
Presented byJ’s Communication Co., Ltd.
-
Speaker
-
B3-10
Security for DNP, its ideas and security management practices
-
Speaker
Dai Nippon Printing Co.,Ltd.
Senior Product Manager
Security Service Department, Cyber Security Business Development Unit, Advanced Business CenterShun Mori
- Endpoint Security
- SOC / Incident Response
- Managed security
Presented byDai Nippon Printing Co., Ltd.
-
Speaker
-
C3-10
Coming soon
-
Secure Innovation Inc.
- Targeted Theat / Cyber Aattack
- Vulnerability measures / Tampering measures
- Monitoring and detection
Presented bySecure Innovation Inc.
-
-
-
17:45 | 18:25
-
-
A3-11
Improving Organizational Response through the Consideration and Advancement of Cyber BCP (Business Continuity Planning)
-
Speaker
Ernst & Young ShinNihon LLC
Principal, EY Forensics Japan Technology Leader
Forensic & Integrity ServicesIchiro Sugiyama
- Targeted Theat / Cyber Aattack
- PSIRT / CSIRT
- SOC / Incident Response
-
Speaker
-
B3-11
Automotive Cyber Security in Software Defined Vehicle
-
Speaker
Nagoya University
Designated Associate Professor
Graduate School of InformaticsRyo Kurachi
- Application Security
- IoT security
- Other
-
Speaker
-
C3-11
Coming soon
-
Speaker
Amazon Web Services Japan G.K.
- AI security
-
Speaker
-
10.25(Fri)
-
09:50 | 10:30
-
-
A4-02
Proposing optimal security for each organization: EDR and MDR for SMBs, EDR and XDR for Enterprises
-
Speaker
K.K.Kaspersky Labs Japan
Chief Technology Officer / Technology Evangelist
Tetsuya Sekiba
- Targeted Theat / Cyber Aattack
- Ransomware measures
- Endpoint Security
Presented byKaspersky Labs Japan
-
Speaker
-
WS4-01
Introduction_OT Security Advance Training (Smart Mobility_Car&Drone)
- Critical Infrastructure Security
- IoT security
- Infrastructure hacking
- Workshop
Presented byNSHC Japan Inc.
-
-
12:25 | 13:05
-
-
A4-05
Graduated PPAP
- How to solve the PPAP problem-
Speaker
QUALITIA Co., LTD.
senior staff
Sales Division Field Sales Dept.Fukuyama Kohei
- Measures against information leakag
- Email Security
Presented byQUALITIA CO., LTD.
-
Speaker
-
WS4-02
Introductory workshop for image analysis using OSINT by pinja
- Human resource development
- Other
- Workshop
-
-
13:40 | 14:20
-
-
A4-06
What is the Key to Achieving the Ideal IT System in the Age of Digital Transformation?
-Optimal Authentication Balancing Security and Convenience --
Speaker
Soliton Systems K.K
Product&Service Manegement
IT Security DivisionMayu Matsuda
- Cloud security
- Endpoint Security
- Authentication / Identity Management
Presented bySoliton Systems K.K.
-
Speaker
-
B4-06
Translating Security Value to Executive Language:
Strategic Approaches for Winning Executive Support and Funding-
Speaker
UBsecure, Inc.
Security Consultant
Security Design Consulting Dept.Masaki Abe
- Measures against information leakag
- Vulnerability measures / Tampering measures
- Security auditing / system audit
Presented byUBsecure Inc.
-
Speaker
-
C4-06
Dark Energy - Cyber Threats to Satellite Communications During Conflict
-
Speaker
SANS Instructor
Justin Parker
- Targeted Theat / Cyber Aattack
- Application Security
- Human resource development
Presented bySANS Institute
-
Speaker
-
-
14:30 | 15:10
-
-
A4-07
Coming soon
-
Speaker
Encourage Technologies Co., Ltd.
- Cloud security
- Measures against information leakag
- Authentication / Identity Management
Presented byEncourage Technologies Co., Ltd.
-
Speaker
-
B4-07
Coming soon
-
Speaker
3-shake Inc.
- Vulnerability measures / Tampering measures
- Application Security
- Critical Infrastructure Security
Presented by3-shake Inc.
-
Speaker
-
C4-07
Countermeasures against unauthorized login required by Credit Card Security Guidelines (Version 5.0)
-
Speaker
Cacco Inc.
Senior Managing Director
Kentaro Sekine
- Measures against information leakag
- Monitoring and detection
- Phishing Attack
Presented byCacco inc.
-
Speaker
-
WS4-03
Learn Practical Cybersecurity Measures for SMEs: A Hands-On Workshop
- Targeted Theat / Cyber Aattack
- Ransomware measures
- Human resource development
- Workshop
-
-
15:20 | 16:00
-
-
A4-08
Is relying on external outsourcing forever truly the best solution?
Securing methods to ensure immediate effectiveness while cultivating long-term, in-house security expertise.-
Speaker
AP Communications Co., Ltd.
Sectuion Leader
iTOC Division BzD Department 0-WANShiori Ozawa
- Targeted Theat / Cyber Aattack
- SOC / Incident Response
- Human resource development
Presented byAP Communications Co., Ltd.
-
Speaker
-
Closed
B4-08
Coming soon
-
Speaker
Sakura Information Systems Co., Ltd.
Presented bySakura Information Systems Co., Ltd.
-
Speaker
-
C4-08
On-prem assets will remain... How to achieve zero trust with no line load?
The answer is “AppgateSDP”!-
Speaker
TECHMATRIX CORPORATION
Deputy General Manager
Security Products Sales Section 3
Sale Department No.3
Network Security DivisionRikihiro Oshio
- Zero trust security model
- IoT security
- Work style reform
Presented byTECHMATRIX CORPORATION
-
Speaker
-
-
16:10 | 16:50
-
-
Closed
A4-09
Introducing cybercrime trends on the dark web and cases of cybercrime in Japan analyzed using AI solutions.
-
Speaker
S2W
Team Leader
Business DevelopmentJay Oh
- Measures against information leakag
- AI security
- Monitoring and detection
Presented byS2W Inc.
-
Speaker
-
B4-09
Achieving Exposure Management to stay ahead of cyber attackers
-
Speaker
WithSecure K.K.
Solution Architect
Cyber Security Technology DivisionKoji Ohta
- Targeted Theat / Cyber Aattack
- Vulnerability measures / Tampering measures
- AI security
Presented byWithSecure KK
-
Speaker
-
C4-09
Start Here Ransomware Protection and Identity Management.
What's the right balance between security and cost?-
Speaker
Canon IT Solutions Inc.
IT Service Business Planning Division, IT Service Sales Group
Daisuke Yoshikawa
- Ransomware measures
- Endpoint Security
- Authentication / Identity Management
Presented byCanon IT Solutions Inc.
-
Speaker
-
WS4-04
Introduction and demonstration: ZTNA and SD-WAN features in iboss Zero Trust Unified SASE
- Cloud security
- Zero trust security model
- SASE
- Workshop
Presented byiboss, Inc.
-
-
17:00 | 17:40
-
-
A4-10
Coming soon
-
Speaker
Assured, Inc.
- Cloud security
- Measures against information leakag
- Vulnerability measures / Tampering measures
Presented byAssured, Inc.
-
Speaker
-
B4-10
What are the risks of using online storage?
Causes and solutions found in internal improprieties (tentative)-
Speaker
NRI SecureTechnologies, Ltd.
File Security Division
Naoki Inoue
- Cloud security
- Measures against information leakag
- Monitoring and detection
Presented byNRI SecureTechnologies, Ltd.
-
Speaker
-
C4-10
Don't Stop Operations! Maximizing Employee Satisfaction by Balancing Defense and Offense
- Marubeni G's Trial and Error with SASE/EDR-
Speaker
MARUBENI IT SOLUTIONS INC.
-
Speaker
MARUBENI IT SOLUTIONS INC.
- Ransomware measures
- Measures against information leakag
- Zero trust security model
Presented byMARUBENI IT SOLUTIONS INC.
-
Speaker
-
-
17:45 | 18:25
-
-
A4-11
Social and industrial infrastructure control system security
- Strategic implementation of OT zero trust --
Speaker
Toshiba Corporation
General Manager
Cyber Security Technology CenterKoji Okada
-
Speaker
Toshiba Corporation
General Manager
Cyber Security Technology CenterKoji Okada
- Endpoint Security
- Zero trust security model
- IoT security
-
Speaker
-
B4-11
The Standards on Cybersecurity Measures for Defense Industry
-
Speaker
Acquisition Technology and Logistics Agency
Director
Industrial Cyber Security Office, Equipment Security Management Division,
Department of Equipment PolicyYugo Matsumoto
- Targeted Theat / Cyber Aattack
- Measures against information leakag
- Security auditing / system audit
-
Speaker
-
C4-11
Coming soon
-
Speaker
Minna Bank, Ltd.
- SOC / Incident Response
- Software chain Attack
- Human resource development
-
Speaker
-