iotc iotc

    • facebook
    • twitter
    • YouTube
  • Registration closed Registration closed

  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration closed Registration closed

Session

  • lunch

Search (possible multiple choice)

Keyword

3.5(Tue)

  • RoomA
  • RoomB
  • RoomC
09:30 | 10:10
  • GA-01

    Coming Soon

    • Speaker

      Japan Hackers Association

      Takayuki Sugiura

  • GC-01

    Coming Soon

    • Speaker

      TOYOTA MOTOR CORPORATION

10:20 | 11:00
  • GA-02

    Coming Soon

    • Speaker

      Blue Planet-works, Inc.

      Principal Security Advisor

      Yusuke Shigihara

    • Ransomware measures
    • Endpoint Security
    • Vulnerability countermeasure

    Presented byBlue Planet-works, Inc.

  • GB-02

    How to efficiently manage "Privileged ID" targeted by cyber attacks and internal fraud
    - Introducing a case study that reduced the operational burden to 1/7 -

    • Speaker

      NRI SecureTechnologies, Ltd.

      Control Solution Business Department

      Shizuka Fujisawa

    • Measures against information leakag
    • Authentication / Identity Management
    • Security auditing / System auditing

    Presented byNRI SecureTechnologies, Ltd.

  • GC-02

    Excerpts of 'Real' Inquiries from Security Personnel!!
    Cybersecurity Troubles: 10 Questions and Answers

    • Speaker

      Act Co., Ltd.

      Head of the cybersecurity business unit

      Koji Yokoi

    • Targeted Theat
    • Ransomware measures
    • XDR

    Presented byACT.inc

11:15 | 11:55
  • GA-03

    Coming Soon

    • Ransomware measures
    • Authentication / Identity Management
    • Zero trust security model
  • GB-03

    What is employee personal information management that leads to corporate growth?
    Techniques for collecting, managing, and utilizing employee information

    • Speaker

      SmartHR, Inc.

      General Manager

      Ryosuke Komai

    • Cloud Security
    • Human resource development
    • Work style reform

    Presented bySmartHR, Inc.

  • GC-03

    The elimination of "encrypted ZIPs and passwords sent through the same channel" is accelerating. What capabilities have those companies that have made the decision to change gained?

    • Speaker

      imatrix corp.

      Messaging Security Research
      Senior researcher

      Hibiki Oka

    • Measures against information leakag
    • Email Security
    • Work style reform

    Presented byimatrix corp.

12:15 | 12:55
  • GA-04

    Coming Soon

    • Targeted Theat
    • SOC / Incident response
    • Managed Security

    Presented byKaspersky Labs Japan

  • GB-04

    Case studies for maximize iPhone utilization and security checklist to minimize risks.

    • Speaker

      Jamf Japan G.K.

      Manager
      Sales Engineering

      Takuya Iida

    • Endpoint Security
    • Measures against information leakag
    • Zero trust security model

    Presented byJamf Japan G.K

  • GC-04

    Coming Soon

    Presented bySkyhigh Security Inc

13:05 | 13:45
  • GA-05

    Security requirements and responses required for SDV

    • Speaker

      Mazda Motor Corporation

      Global Security Officer
      MDI&IT Division /
      General Incorporated Association Japan Automotive ISAC
      Chairman
      Technical Committee

      Masashi Yamasaki

    • SOC / Incident response
    • IoT Security
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
  • GB-05

    Cyber Security Efforts and the flont line of Chubu Electric Power Grid

    • Speaker

      Chubu Electric Power Grid Co., Inc.

      Assistant Manager, PG-CSIRT Cybersecurity Evangelist/Specialist
      IT&Control System Department

      Hiroyuki Hasegawa

    • PSIRT / CSIRT
    • Critical Infrastructure Security
    • Human resource development
  • GC-05

    Legal Risks Associated with the Use of Generative AI and How to Avoid Them

    • Speaker

      Ushijima & Partners

      Partner

      Hiroyasu Kageshima

    • AI Security
    • other
14:00 | 14:40
  • GA-06

    DNP Group's Cyber Security ~ From EASM to CTEM

    • Speaker

      Dai Nippon Printing Co., Ltd.

      Cyber Security Business Development Unit, Advanced Business Center

      Shun Mori

    • Managed Security
    • Monitoring and Detection
    • Human resource development

    Presented byDai Nippon Printing Co., Ltd.

  • GB-06

    Coming Soon

    • Targeted Theat
    • Cloud Security
    • Work style reform

    Presented bySoftBank Corp.

  • GC-06

    Coming Soon

    • Speaker

      GLOBAL SECURITY EXPERTS Inc.

      Nahomi Kuraya

    • PSIRT / CSIRT
    • Managed Security
    • IoT Security

    Presented byGLOBAL SECURITY EXPERTS Inc.

14:55 | 15:35
  • GA-07

    Coming Soon

    Presented bySCSK Minori Solutions Corporation

  • GB-07

    The Best Password Management for Enterprises

    • Speaker

      Keeper Security APAC Inc.

      Sales

      Yousuke Tanabe

    • Speaker

      ZUNDA Inc.

      Director / Sales & Customer Success

      Daichi Fujii

    • Cloud Security
    • Authentication / Identity Management
    • Zero trust security model

    Presented byZUNDA Inc.

15:50 | 16:30
  • GA-08

    What will you solve with SBOM?

    • Vulnerability countermeasure
    • Software supply chain
    • Critical Infrastructure Security

    Presented byCybertrust Japan Co., Ltd.

  • GB-08

    Coming Soon

    • Targeted Theat
    • Cloud Security
    • Measures against information leakag
  • GC-08

    Coming Soon

    • Measures against information leakag
    • Vulnerability countermeasure

    Presented byCyber Security Cloud, Inc.

16:40 | 17:20
  • GA-09

    Security measures required for website

    • Speaker

      Information-technology Promotion Agency

      Analysis Engineer
      Security Center ,Security Measures Promotion Department ,Vulnerability Countermeasures Group

      Taisuke Kimura

    • Vulnerability countermeasure
  • GC-09

    Coming Soon

    • Speaker

      Ministry of Land, Infrastructure, Transport and Tourism

  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

Copyright (c) NANO OPT Media, Inc. All rights reserved.