iotc iotc

    • facebook
    • twitter
    • YouTube
  • Registration closed Registration closed

  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration closed Registration closed

Session

  • All
  • 3.12(Tue)
  • 3.13(Wed)
  • 3.14(Thu)
  • 3.15(Fri)
  • simultaneous interpreting

  • lunch

Search (possible multiple choice)

Keyword

3.14(Thu)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:40
  • A3-01

    Cyber Security Management for Digital Garden City Initiative

    • Speaker

      The Univerity of Tokyo

      Ph.D.

      Hiroshi Esaki

    • Endpoint Security
    • Zero trust security model
    • IoT Security
09:50 | 10:30
  • A3-02

    Trends in the cybersecurity industry
    - Cyber threat trends and AI utilization trends

    • Speaker

      CrowdStrike

      Sr. Manager
      Sales Engineering

      Shigeru Suzuki

    • Targeted Theat
    • Ransomware measures
    • Measures against information leakag

    Presented byCrowdStrike Japan GK

10:40 | 11:20
  • A3-03

    For those who are concerned about the "literacy" and "preparation" that are essential to preventing cyber security incidents.
    ~Suggestions for Training and Cyber insurance~

    • Speaker

      NTT Risk Manager Corporation

      Senior Executive Vice President

      Ryoko Shiraishi

    • GDPR / Privacy Mark / ISMS / Laws of the Decree
    • Human resource development
    • other

    Presented byNTT Risk Manager Corporation

  • W3-01

    Workshop: Introduction to Image Analysis with OSINT by pinja

    • Monitoring and Detection
    • Data Forensics
    • other
    • Workshop
11:30 | 12:10
  • A3-04

    Coming Soon

    • Targeted Theat
    • Email Security
    • Phishing Attack

    Presented byProofpoint Japan K.K.

12:30 | 13:10
  • A3-05

    Cybersecurity Policy Update of the Ministry of Internal Affairs and Communications

    • Speaker

      Ministry of Internal Affairs and Communications

      Deputy Counselor
      Office of Director-General for Cybersecurity

      Naoki F. Kawai

    • Targeted Theat
    • IoT Security
    • Human resource development
13:20 | 14:00
  • A3-06

    Coming Soon

    • Targeted Theat
    • XDR
    • Managed Security

    Presented byCanon Marketing Japan Inc.

  • W3-02

    Coming Soon

    • Vulnerability countermeasure
    • Critical Infrastructure Security
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
    • Workshop
14:40 | 15:20
  • A3-08

    The security and convenience that IT needs today
    - reason why electronic certificate is suitable for the first step-

    • Speaker

      Soliton Systems K.K

      Product&Service Manegement
      IT Security Division

      Mayu Matsuda

    • Measures against information leakag
    • Authentication / Identity Management
    • Zero trust security model

    Presented bySoliton Systems K.K.

  • B3-08

    How to actively defend against ransomware attacks

    • Speaker

      KELA KK

      Threat Intelligence Analyst

      Haruka Ikegami

    • Targeted Theat
    • Ransomware measures
    • Cloud Security

    Presented byKELA K.K.

  • C3-08

    Automated solution using AI to analyze and detect all intrusion routes, and block connections to unauthorized/spoofed sites!

    • Speaker

      SentryMark, Inc

      Senior Sales Director

      Akihiro Abe

    • Speaker

      BreachBits, Inc

      Co-Founder & CEO

      John Lundgren

    • Ransomware measures
    • Vulnerability countermeasure
    • AI Security

    Presented bySentryMark, Inc.

15:35 | 16:15
  • A3-09

    Five key points to consider in 2024 and how to counter them with Threat Intelligence

    • Speaker

      Recorded Future Japan

      Manager
      Pre-sales engineering

      Yoichi Susaki

    • Targeted Theat
    • PSIRT / CSIRT
    • SOC / Incident response

    Presented byRecorded Future Japan, K.K.

  • B3-09

    Coming Soon

    • Speaker

      SUSE Software Solutions Japan K.K.

      Head of Solution Architect Team, Japan

    • Zero trust security model
    • Critical Infrastructure Security
    • Container security

    Presented bySUSE Software Solutions Japan K.K.

  • C3-09

    Counter Attackers' New Technique! Introducing Email Security to contain the unknown email attacks that exploit generative AI with AI detection models.

    • Speaker

      Vade Japan K.K.

      Country Manager

      Toshiaki Ito

    • Ransomware measures
    • Antivirus
    • Phishing Attack

    Presented byVade Japan K.K.

16:30 | 17:10
  • A3-10

    Coming Soon

    • Speaker

      Nihon Synopsys G.K.

      Technical Marketing Manager
      Software Integrity Group

      Masato Matsuoka

    • Measures against information leakag
    • Software supply chain
    • Application Security

    Presented byNihon Synopsys G.K.

  • B3-10

    Coming Soon

    • Speaker

      iboss Japan

      Country Manager

    • Zero trust security model
    • SASE

    Presented bySB C&S Corp. / iboss, Inc.

  • C3-10

    What Endpoint Security is Necessary in the DX Era?
    ~What can be achieved with the Zero Trust Browser Solution~

    • Speaker

      J’s Communication Co., Ltd.

      General Manager
      Marketing Promotion Dept.

      Shin Shibayama

    • Targeted Theat
    • Endpoint Security
    • Zero trust security model

    Presented byJ’s Communication Co., Ltd.

17:20 | 18:00
  • A3-11

    Mercari's Challenges for "By-Design, By-Default, At-Scale" Security & Privacy

    • Speaker

      Mercari Inc.

      CISO
      Security & Privacy

      Naohisa Ichihara

    • Cloud Security
    • Measures against information leakag
  • B3-11

    Predicting 80 questions!
    - Capture "Registered Information Security Specialist Examination".

    • Speaker

      Japan Registered Information Security Specialists’ Association

      Director

      MURAYAMA NAOKI

    • PSIRT / CSIRT
    • SOC / Incident response
    • Human resource development
  • C3-11

    Urgent Cyber Security Measures for Medical Facilities Including Adaption to the MHLW Guideline

    • Speaker

      Medical ISAC Inc.

      Representative Director
      Headquarter

      Hiroshi Fukatsu

    • Email Security
    • Vulnerability countermeasure
    • Critical Infrastructure Security
  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

Copyright (c) NANO OPT Media, Inc. All rights reserved.