Session
Search (possible multiple choice)
Keyword
3.13(Wed)
-
09:00 | 09:40
-
10:40 | 11:20
-
-
A2-03
Emerging Frontiers of Web Threats! Strategies and Latest Cases for Future Threats (Japanese Session)
-
Speaker
CHEQ JAPAN
Sale Engineer
Geny Apukhtin
- Targeted Theat
- Authentication / Identity Management
- GDPR / Privacy Mark / ISMS / Laws of the Decree
Presented byCHEQ JAPAN
-
Speaker
-
Closed
W2-01
Learning Through Practical Workshops! The Cybersecurity Frontline for Medium and Small Businesses
– Defending Against Risks: Essential Threats and Countermeasures to Know- Targeted Theat
- Ransomware measures
- Human resource development
- Workshop
-
-
13:50 | 14:30
-
-
A2-07
In-depth explanation in 40 minutes! The Past and Future of Client Virtualization
-
Speaker
Soliton Systems K.K
Product&Service Manegement
IT Security DivisionAsagi Ogawa
- Measures against information leakag
- Work style reform
- Container security
Presented bySoliton Systems K.K.
-
Speaker
-
B2-07
Improve Your Organization's "Vulnerability Management" - Find out targeted IT asset in your org
-
Speaker
Tenable Network Security Japan K.K.
Security Enjineer
Koichi Hatase
- Cloud Security
- Vulnerability countermeasure
- Authentication / Identity Management
Presented byTenable Network Security Japan K.K.
-
Speaker
-
C2-07
Introduction to Cybercrime Trends on the Dark Web and Analysis of Cybercrime Cases Related to Japan Using Artificial Intelligence Solution.
-
Speaker
S2W Inc.
Team Leader
MarketingJay Oh
- Ransomware measures
- Measures against information leakag
- Monitoring and Detection
Presented byS2W Inc.
-
Speaker
-
-
14:45 | 15:25
-
-
A2-08
Exploring next-generation NDR technology: Unveiling real-time detection and response to network-originated security threats.
-
Speaker
Vectra AI Japan K.K.
Senior Sales Engineer
Kazuo Fukuda
- Ransomware measures
- XDR
- Monitoring and Detection
Presented byVectra AI Inc. / MACNICA, Inc.
-
Speaker
-
B2-08
How to Secure Your Critical Infrastructure and Sensitive Data from New Threats?: The Zero Trust Solution with Quantum Resilience
-
Speaker
SSH Communications Security
Solutions Engineering Director, APAC
Katsuhiro Shogawa
- Authentication / Identity Management
- Critical Infrastructure Security
- Quantum Security
Presented bySSH Communications Security
-
Speaker
-
C2-08
Coming Soon
-
Speaker
Intelligent Wave Inc.
Expert
4th Sales Dep.
Sales Div.Hiroyuki Kanbayashi
- Measures against information leakag
- Authentication / Identity Management
- Zero trust security model
Presented byIntelligent Wave Inc.
-
Speaker
-
-
15:40 | 16:20
-
-
A2-09
The State of SASE. Challenges to implementing SASE and the best SASE solution for your company
-
Speaker
INTEC Inc.
High-end Specialist
Network and Outsourcing Business Strategy Dept.
Network and Outsourcing DivisionOsanai Hironobu
- Cloud Security
- Zero trust security model
- SASE
Presented byINTEC Inc.
-
Speaker
-
B2-09
Coming Soon
- Ransomware measures
- Endpoint Security
- Measures against information leakag
Presented byJupiter Technology Corp.
-
C2-09
Isn't this the true mission of DX? What can FireMon, an NSPM product whose introduction has been delayed in Japan, do?
-
Speaker
JSecurity,Inc.
Product Planning Division
Hidefumi Sakiyama
-
Speaker
KIS Security, Inc.
Director
Masaya Kitamoto
- Firewall / UTM
- Managed Security
- Security auditing / System auditing
Presented byKIS Security, Inc.
-
Speaker
-
W2-03
Coming Soon
- PSIRT / CSIRT
- SOC / Incident response
- Human resource development
- Workshop
-
-
16:35 | 17:15
-
-
A2-10
Recap of Security in 2023: Changes in Security Testing via Free Tools and the Impact of Generative AI
-
Speaker
Aeye Security Lab Inc.
Executive Officer&Head of Customer Experience
Teppei Sekine
- Cloud Security
- Vulnerability countermeasure
- Application Security
Presented byAeye Security Lab Inc.
-
Speaker
-
B2-10
Next move against evolving cyber attacks and potential threats: Risk-based vulnerability management and efficient patch operations
-
Speaker
Ivanti Software K.K.
Security & UEM Sales Specialist
Tomoji Ichimaru
- Endpoint Security
- Vulnerability countermeasure
Presented byIvanti Software K.K.
-
Speaker
-
C2-10
[Learn by Use Case!] Active Cyber Defense and Trends by Threat Hunters
~ How to discover Sophisticated Elegant Digital Threat~-
Speaker
RSA Security Japan G.K.
Senior Consultant,
Threat Hunting and Incident Response Team, Professional Services Department -
Speaker
RSA Security Japan G.K.
Senior Consultant,
Threat Hunting and Incident Response Team, Professional Services Department
- Targeted Theat
- Ransomware measures
- Monitoring and Detection
Presented byRSA Security Japan G.K.
-
Speaker
-
-
17:20 | 18:00
-
-
A2-11
The Looming Threat of Cognitive Warfare and Implications for Cybersecurity
-Considerations from the war in Ukraine and the offensive and defense in Taiwan, China --
Speaker
Director, National Security Laboratory, LAC Corp.
First Cyber Defense Force Commander
Masatoshi Sato
- Targeted Theat
- Critical Infrastructure Security
- other
-
Speaker
-
B2-11
Coming Soon
- Targeted Theat
- Cloud Security
- Measures against information leakag
-
C2-11
Legal Risks Associated with the Use of Generative AI and How to Avoid Them
-
Speaker
Ushijima & Partners
Partner
Hiroyasu Kageshima
- AI Security
- Work style reform
-
Speaker
-