Session
Search (possible multiple choice)
Keyword
3.14(Thu)
-
10:40 | 11:20
-
-
A3-03
For those who are concerned about the "literacy" and "preparation" that are essential to preventing cyber security incidents.
~Suggestions for Training and Cyber insurance~-
Speaker
NTT Risk Manager Corporation
Senior Executive Vice President
Ryoko Shiraishi
- GDPR / Privacy Mark / ISMS / Laws of the Decree
- Human resource development
- other
Presented byNTT Risk Manager Corporation
-
Speaker
-
W3-01
Workshop: Introduction to Image Analysis with OSINT by pinja
- Monitoring and Detection
- Data Forensics
- other
- Workshop
-
-
14:40 | 15:20
-
-
A3-08
The security and convenience that IT needs today
- reason why electronic certificate is suitable for the first step--
Speaker
Soliton Systems K.K
Product&Service Manegement
IT Security DivisionMayu Matsuda
- Measures against information leakag
- Authentication / Identity Management
- Zero trust security model
Presented bySoliton Systems K.K.
-
Speaker
-
B3-08
How to actively defend against ransomware attacks
-
Speaker
KELA KK
Threat Intelligence Analyst
Haruka Ikegami
- Targeted Theat
- Ransomware measures
- Cloud Security
Presented byKELA K.K.
-
Speaker
-
C3-08
Automated solution using AI to analyze and detect all intrusion routes, and block connections to unauthorized/spoofed sites!
-
Speaker
SentryMark, Inc
Senior Sales Director
Akihiro Abe
-
Speaker
BreachBits, Inc
Co-Founder & CEO
John Lundgren
- Ransomware measures
- Vulnerability countermeasure
- AI Security
Presented bySentryMark, Inc.
-
Speaker
-
-
15:35 | 16:15
-
-
A3-09
Five key points to consider in 2024 and how to counter them with Threat Intelligence
-
Speaker
Recorded Future Japan
Manager
Pre-sales engineeringYoichi Susaki
- Targeted Theat
- PSIRT / CSIRT
- SOC / Incident response
Presented byRecorded Future Japan, K.K.
-
Speaker
-
B3-09
Coming Soon
-
Speaker
SUSE Software Solutions Japan K.K.
Head of Solution Architect Team, Japan
- Zero trust security model
- Critical Infrastructure Security
- Container security
Presented bySUSE Software Solutions Japan K.K.
-
Speaker
-
C3-09
Counter Attackers' New Technique! Introducing Email Security to contain the unknown email attacks that exploit generative AI with AI detection models.
-
Speaker
Vade Japan K.K.
Country Manager
Toshiaki Ito
- Ransomware measures
- Antivirus
- Phishing Attack
Presented byVade Japan K.K.
-
Speaker
-
-
16:30 | 17:10
-
-
A3-10
Coming Soon
-
Speaker
Nihon Synopsys G.K.
Technical Marketing Manager
Software Integrity GroupMasato Matsuoka
- Measures against information leakag
- Software supply chain
- Application Security
Presented byNihon Synopsys G.K.
-
Speaker
-
B3-10
Coming Soon
-
Speaker
iboss Japan
Country Manager
- Zero trust security model
- SASE
Presented bySB C&S Corp. / iboss, Inc.
-
Speaker
-
C3-10
What Endpoint Security is Necessary in the DX Era?
~What can be achieved with the Zero Trust Browser Solution~-
Speaker
J’s Communication Co., Ltd.
General Manager
Marketing Promotion Dept.Shin Shibayama
- Targeted Theat
- Endpoint Security
- Zero trust security model
Presented byJ’s Communication Co., Ltd.
-
Speaker
-
-
17:20 | 18:00
-
-
A3-11
Mercari's Challenges for "By-Design, By-Default, At-Scale" Security & Privacy
-
Speaker
Mercari Inc.
CISO
Security & PrivacyNaohisa Ichihara
- Cloud Security
- Measures against information leakag
-
Speaker
-
B3-11
Predicting 80 questions!
- Capture "Registered Information Security Specialist Examination".-
Speaker
Japan Registered Information Security Specialists’ Association
Director
MURAYAMA NAOKI
- PSIRT / CSIRT
- SOC / Incident response
- Human resource development
-
Speaker
-
C3-11
Urgent Cyber Security Measures for Medical Facilities Including Adaption to the MHLW Guideline
-
Speaker
Medical ISAC Inc.
Representative Director
HeadquarterHiroshi Fukatsu
- Email Security
- Vulnerability countermeasure
- Critical Infrastructure Security
-
Speaker
-