iotc iotc

    • facebook
    • twitter
    • YouTube
  • Registration closed Registration closed

  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration closed Registration closed

Session

  • All
  • 3.12(Tue)
  • 3.13(Wed)
  • 3.14(Thu)
  • 3.15(Fri)
  • lunch

Search (possible multiple choice)

Keyword

3.13(Wed)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:40
  • A2-01

    Coming Soon

09:50 | 10:30
  • A2-02

    'Use' and 'Development': Achieving the Both of 'Growth' and 'Cost Reduction' in Corporate Security through Tools and Systems

    • Speaker

      HCLSoftware

      Japan Country Manager

      Yohichi Ono

    • Endpoint Security
    • Vulnerability countermeasure
    • Application Security

    Presented byHCLSoftware

10:40 | 11:20
  • A2-03

    Emerging Frontiers of Web Threats! Strategies and Latest Cases for Future Threats (Japanese Session)

    • Speaker

      CHEQ JAPAN

      Sale Engineer

      Geny Apukhtin

    • Targeted Theat
    • Authentication / Identity Management
    • GDPR / Privacy Mark / ISMS / Laws of the Decree

    Presented byCHEQ JAPAN

  • Closed

    W2-01

    Learning Through Practical Workshops! The Cybersecurity Frontline for Medium and Small Businesses
    – Defending Against Risks: Essential Threats and Countermeasures to Know

    • Targeted Theat
    • Ransomware measures
    • Human resource development
    • Workshop
11:30 | 12:10
  • A2-04

    True single-brain SASE platform Endpoint integration into closed loop to XDR

    • Speaker

      Cato Networks

      Senior Sales Engineer

      Yasu Koda

    • XDR
    • Zero trust security model
    • SASE

    Presented byCato Networks (Japan) K K

12:30 | 13:10
  • A2-05

    Coming Soon

    • Targeted Theat
    • SOC / Incident response
    • Managed Security

    Presented byKaspersky Labs Japan

13:00 | 15:00
  • W2-02

    Beyond Cyber Security: Cyber Resilience and Industry Trends

    • IoT Security
    • Security auditing / System auditing
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
    • Workshop
13:50 | 14:30
  • A2-07

    In-depth explanation in 40 minutes! The Past and Future of Client Virtualization

    • Speaker

      Soliton Systems K.K

      Product&Service Manegement
      IT Security Division

      Asagi Ogawa

    • Measures against information leakag
    • Work style reform
    • Container security

    Presented bySoliton Systems K.K.

  • B2-07

    Improve Your Organization's "Vulnerability Management" - Find out targeted IT asset in your org

    • Speaker

      Tenable Network Security Japan K.K.

      Security Enjineer

      Koichi Hatase

    • Cloud Security
    • Vulnerability countermeasure
    • Authentication / Identity Management

    Presented byTenable Network Security Japan K.K.

  • C2-07

    Introduction to Cybercrime Trends on the Dark Web and Analysis of Cybercrime Cases Related to Japan Using Artificial Intelligence Solution.

    • Speaker

      S2W Inc.

      Team Leader
      Marketing

      Jay Oh

    • Ransomware measures
    • Measures against information leakag
    • Monitoring and Detection

    Presented byS2W Inc.

14:45 | 15:25
  • A2-08

    Exploring next-generation NDR technology: Unveiling real-time detection and response to network-originated security threats.

    • Speaker

      Vectra AI Japan K.K.

      Senior Sales Engineer

      Kazuo Fukuda

    • Ransomware measures
    • XDR
    • Monitoring and Detection

    Presented byVectra AI Inc. / MACNICA, Inc.

  • B2-08

    How to Secure Your Critical Infrastructure and Sensitive Data from New Threats?: The Zero Trust Solution with Quantum Resilience

    • Speaker

      SSH Communications Security

      Solutions Engineering Director, APAC

      Katsuhiro Shogawa

    • Authentication / Identity Management
    • Critical Infrastructure Security
    • Quantum Security

    Presented bySSH Communications Security

  • C2-08

    Coming Soon

    • Speaker

      Intelligent Wave Inc.

      Expert
      4th Sales Dep.
      Sales Div.

      Hiroyuki Kanbayashi

    • Measures against information leakag
    • Authentication / Identity Management
    • Zero trust security model

    Presented byIntelligent Wave Inc.

15:40 | 16:20
  • A2-09

    The State of SASE. Challenges to implementing SASE and the best SASE solution for your company

    • Speaker

      INTEC Inc.

      High-end Specialist
      Network and Outsourcing Business Strategy Dept.
      Network and Outsourcing Division

      Osanai Hironobu

    • Cloud Security
    • Zero trust security model
    • SASE

    Presented byINTEC Inc.

  • B2-09

    Coming Soon

    • Ransomware measures
    • Endpoint Security
    • Measures against information leakag

    Presented byJupiter Technology Corp.

  • C2-09

    Isn't this the true mission of DX? What can FireMon, an NSPM product whose introduction has been delayed in Japan, do?

    • Speaker

      JSecurity,Inc.

      Product Planning Division

      Hidefumi Sakiyama

    • Speaker

      KIS Security, Inc.

      Director

      Masaya Kitamoto

    • Firewall / UTM
    • Managed Security
    • Security auditing / System auditing

    Presented byKIS Security, Inc.

  • W2-03

    Coming Soon

    • PSIRT / CSIRT
    • SOC / Incident response
    • Human resource development
    • Workshop
16:35 | 17:15
  • A2-10

    Recap of Security in 2023: Changes in Security Testing via Free Tools and the Impact of Generative AI

    • Speaker

      Aeye Security Lab Inc.

      Executive Officer&Head of Customer Experience

      Teppei Sekine

    • Cloud Security
    • Vulnerability countermeasure
    • Application Security

    Presented byAeye Security Lab Inc.

  • B2-10

    Next move against evolving cyber attacks and potential threats: Risk-based vulnerability management and efficient patch operations

    • Speaker

      Ivanti Software K.K.

      Security & UEM Sales Specialist

      Tomoji Ichimaru

    • Endpoint Security
    • Vulnerability countermeasure

    Presented byIvanti Software K.K.

  • C2-10

    [Learn by Use Case!] Active Cyber Defense and Trends by Threat Hunters
    ~ How to discover Sophisticated Elegant Digital Threat~

    • Speaker

      RSA Security Japan G.K.

      Senior Consultant,
      Threat Hunting and Incident Response Team, Professional Services Department

    • Speaker

      RSA Security Japan G.K.

      Senior Consultant,
      Threat Hunting and Incident Response Team, Professional Services Department

    • Targeted Theat
    • Ransomware measures
    • Monitoring and Detection

    Presented byRSA Security Japan G.K.

17:20 | 18:00
  • A2-11

    The Looming Threat of Cognitive Warfare and Implications for Cybersecurity
    -Considerations from the war in Ukraine and the offensive and defense in Taiwan, China -

    • Speaker

      Director, National Security Laboratory, LAC Corp.

      First Cyber Defense Force Commander

      Masatoshi Sato

    • Targeted Theat
    • Critical Infrastructure Security
    • other
  • B2-11

    Coming Soon

    • Targeted Theat
    • Cloud Security
    • Measures against information leakag
  • C2-11

    Legal Risks Associated with the Use of Generative AI and How to Avoid Them

    • Speaker

      Ushijima & Partners

      Partner

      Hiroyasu Kageshima

    • AI Security
    • Work style reform
  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

Copyright (c) NANO OPT Media, Inc. All rights reserved.