iotc iotc

    • facebook
    • twitter
    • YouTube
  • Registration closed Registration closed

  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration closed Registration closed

Session

  • All
  • 3.12(Tue)
  • 3.13(Wed)
  • 3.14(Thu)
  • 3.15(Fri)
  • consecutive interpreting

  • simultaneous interpreting

  • lunch

Search (possible multiple choice)

Keyword

3.12(Tue)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:40
  • A1-01

    On cybersecurity regulation and resilience capability development

    • Critical Infrastructure Security
    • Human resource development
    • other
09:50 | 10:30
  • A1-02

    How security should accelerate business growth [DX and cyber security]

    • Speaker

      Act Co., Ltd.

      Head of the cybersecurity business unit

      Koji Yokoi

    • Targeted Theat
    • Ransomware measures
    • Endpoint Security

    Presented byACT.inc

10:40 | 11:20
  • A1-03

    Coming Soon

    • Targeted Theat
    • Endpoint Security
    • Measures against information leakag

    Presented bySky CO., LTD.

  • W1-01

    New Challenges and Measures for Cybersecurity
    - Trends and Supply Chain Risks in Japan, US, and Europe What is important? What should we do? -

    • Workshop
11:30 | 12:10
  • A1-04

    Coming Soon

    Presented byGoogle Japan G.K.

12:30 | 13:10
  • A1-05

    Coming Soon

    • Speaker

      Ministry of Land, Infrastructure, Transport and Tourism

13:30 | 15:30
  • Closed

    W1-02

    How to identify and systematize the skills needed for your company's work
    ~Maximize corporate competitiveness by visualizing employee skills~

    • PSIRT / CSIRT
    • Human resource development
    • Work style reform
    • Workshop
13:50 | 14:30
  • A1-07

    Data Protection Strategy in the Zero Trust Era: Maximizing Risk Reduction with "Tailored Controls"

    • Speaker

      Soliton Systems K.K.

      Evangelist
      IT Security Division

      Shoko Araki

    • Measures against information leakag
    • Authentication / Identity Management
    • Zero trust security model

    Presented bySoliton Systems K.K.

  • Closed

    B1-07

    Coming Soon

    • Speaker

      KDDI CORPORATION

      Head of Department
      Security Management Department

      Akira Tanaka

    • Speaker

      KDDI CORPORATION

      Expert
      Security Management Department

      Haruki Oota

    • Vulnerability countermeasure
    • PSIRT / CSIRT
    • Software supply chain

    Presented byKDDI CORPORATION

  • C1-07

    Elevating Cybersecurity Resilience: Unveiling Proven Strategies from the Battlefield

    • Speaker

      Sygnia Consulting Ltd.

      Client Leadership Manager, Japan

      Sota Aoki

    • Speaker

      Sygnia Consulting Ltd.

      SVP Global Client Leadership

      Adam Finkelstein

    Presented bySygnia Consulting Ltd.

14:45 | 15:25
  • A1-08

    The elimination of "encrypted ZIPs and passwords sent through the same channel" is accelerating. What capabilities have those companies that have made the decision to change gained?

    • Speaker

      imatrix corp.

      Messaging Security Research Senior researcher

      Hibiki Oka

    • Measures against information leakag
    • Email Security
    • Work style reform

    Presented byimatrix corp.

  • B1-08

    Case studies for maximize iPhone utilization and security checklist to minimize risks.

    • Speaker

      Jamf Japan G.K.

      Sales Enablement
      Manager

      Shingo Matsushima

    • Endpoint Security
    • Measures against information leakag
    • Zero trust security model

    Presented byJamf Japan G.K

  • C1-08

    Coming Soon

    • Targeted Theat
    • Cloud Security
    • Work style reform

    Presented bySoftBank Corp.

15:40 | 16:20
  • A1-09

    CSPM, ASPM, SSPM, ASM ― The More Things Change, the More They Stay the Same

    • Speaker

      Flatt Security Inc.

      Chief Technology Officer

      Takashi Yoneuchi

    • Cloud Security
    • Vulnerability countermeasure
    • Security auditing / System auditing

    Presented byFlatt Security Inc.

  • B1-09

    Coming Soon

    • Cloud Security
    • Application Security
    • Measures against DDoS

    Presented byFastly, Inc.

  • C1-09

    The Realities of Incident Response - What Security countermeasures are Necessary Now?

    • Speaker

      Stonebeat Security, Inc.

      CEO, Chief Security Advisor

      Nobuhiko Sasaki

    • Targeted Theat
    • Ransomware measures
    • SOC / Incident response

    Presented byStonebeat Security, Inc.

16:35 | 17:15
  • A1-10

    Coming Soon

    • Measures against information leakag
    • Vulnerability countermeasure

    Presented byCyber Security Cloud, Inc.

  • B1-10

    DNP Group's Cyber Security ~ From EASM to CTEM

    • Speaker

      Dai Nippon Printing Co., Ltd.

      Cyber Security Business Development Unit, Advanced Business Center

      Shun Mori

    • Managed Security
    • Monitoring and Detection
    • Human resource development

    Presented byDai Nippon Printing Co., Ltd.

  • C1-10

    Coming Soon

    Presented bySCSK Minori Solutions Corporation

17:20 | 18:00
  • A1-11

    Security measures required for website

    • Speaker

      Information-technology Promotion Agency

      Analysis Engineer
      Security Center ,Security Measures Promotion Department ,Vulnerability Countermeasures Group

      Taisuke Kimura

    • Vulnerability countermeasure
  • B1-11

    Coming Soon

  • C1-11

    Cyber Resilience expected in the Financial Industry

    • Speaker

      Financial Services Agency

      Head of Cybersecurity Planning Group

      Shun Miura

    • Targeted Theat

3.13(Wed)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:40
  • A2-01

    Coming Soon

09:50 | 10:30
  • A2-02

    'Use' and 'Development': Achieving the Both of 'Growth' and 'Cost Reduction' in Corporate Security through Tools and Systems

    • Speaker

      HCLSoftware

      Japan Country Manager

      Yohichi Ono

    • Endpoint Security
    • Vulnerability countermeasure
    • Application Security

    Presented byHCLSoftware

10:40 | 11:20
  • A2-03

    Emerging Frontiers of Web Threats! Strategies and Latest Cases for Future Threats (Japanese Session)

    • Speaker

      CHEQ JAPAN

      Sale Engineer

      Geny Apukhtin

    • Targeted Theat
    • Authentication / Identity Management
    • GDPR / Privacy Mark / ISMS / Laws of the Decree

    Presented byCHEQ JAPAN

  • Closed

    W2-01

    Learning Through Practical Workshops! The Cybersecurity Frontline for Medium and Small Businesses
    – Defending Against Risks: Essential Threats and Countermeasures to Know

    • Targeted Theat
    • Ransomware measures
    • Human resource development
    • Workshop
11:30 | 12:10
  • A2-04

    True single-brain SASE platform Endpoint integration into closed loop to XDR

    • Speaker

      Cato Networks

      Senior Sales Engineer

      Yasu Koda

    • XDR
    • Zero trust security model
    • SASE

    Presented byCato Networks (Japan) K K

12:30 | 13:10
  • A2-05

    Coming Soon

    • Targeted Theat
    • SOC / Incident response
    • Managed Security

    Presented byKaspersky Labs Japan

13:00 | 15:00
  • W2-02

    Beyond Cyber Security: Cyber Resilience and Industry Trends

    • IoT Security
    • Security auditing / System auditing
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
    • Workshop
13:50 | 14:30
  • A2-07

    In-depth explanation in 40 minutes! The Past and Future of Client Virtualization

    • Speaker

      Soliton Systems K.K

      Product&Service Manegement
      IT Security Division

      Asagi Ogawa

    • Measures against information leakag
    • Work style reform
    • Container security

    Presented bySoliton Systems K.K.

  • B2-07

    Improve Your Organization's "Vulnerability Management" - Find out targeted IT asset in your org

    • Speaker

      Tenable Network Security Japan K.K.

      Security Enjineer

      Koichi Hatase

    • Cloud Security
    • Vulnerability countermeasure
    • Authentication / Identity Management

    Presented byTenable Network Security Japan K.K.

  • C2-07

    Introduction to Cybercrime Trends on the Dark Web and Analysis of Cybercrime Cases Related to Japan Using Artificial Intelligence Solution.

    • Speaker

      S2W Inc.

      Team Leader
      Marketing

      Jay Oh

    • Ransomware measures
    • Measures against information leakag
    • Monitoring and Detection

    Presented byS2W Inc.

14:45 | 15:25
  • A2-08

    Exploring next-generation NDR technology: Unveiling real-time detection and response to network-originated security threats.

    • Speaker

      Vectra AI Japan K.K.

      Senior Sales Engineer

      Kazuo Fukuda

    • Ransomware measures
    • XDR
    • Monitoring and Detection

    Presented byVectra AI Inc. / MACNICA, Inc.

  • B2-08

    How to Secure Your Critical Infrastructure and Sensitive Data from New Threats?: The Zero Trust Solution with Quantum Resilience

    • Speaker

      SSH Communications Security

      Solutions Engineering Director, APAC

      Katsuhiro Shogawa

    • Authentication / Identity Management
    • Critical Infrastructure Security
    • Quantum Security

    Presented bySSH Communications Security

  • C2-08

    Coming Soon

    • Speaker

      Intelligent Wave Inc.

      Expert
      4th Sales Dep.
      Sales Div.

      Hiroyuki Kanbayashi

    • Measures against information leakag
    • Authentication / Identity Management
    • Zero trust security model

    Presented byIntelligent Wave Inc.

15:40 | 16:20
  • A2-09

    The State of SASE. Challenges to implementing SASE and the best SASE solution for your company

    • Speaker

      INTEC Inc.

      High-end Specialist
      Network and Outsourcing Business Strategy Dept.
      Network and Outsourcing Division

      Osanai Hironobu

    • Cloud Security
    • Zero trust security model
    • SASE

    Presented byINTEC Inc.

  • B2-09

    Coming Soon

    • Ransomware measures
    • Endpoint Security
    • Measures against information leakag

    Presented byJupiter Technology Corp.

  • C2-09

    Isn't this the true mission of DX? What can FireMon, an NSPM product whose introduction has been delayed in Japan, do?

    • Speaker

      JSecurity,Inc.

      Product Planning Division

      Hidefumi Sakiyama

    • Speaker

      KIS Security, Inc.

      Director

      Masaya Kitamoto

    • Firewall / UTM
    • Managed Security
    • Security auditing / System auditing

    Presented byKIS Security, Inc.

  • W2-03

    Coming Soon

    • PSIRT / CSIRT
    • SOC / Incident response
    • Human resource development
    • Workshop
16:35 | 17:15
  • A2-10

    Recap of Security in 2023: Changes in Security Testing via Free Tools and the Impact of Generative AI

    • Speaker

      Aeye Security Lab Inc.

      Executive Officer&Head of Customer Experience

      Teppei Sekine

    • Cloud Security
    • Vulnerability countermeasure
    • Application Security

    Presented byAeye Security Lab Inc.

  • B2-10

    Next move against evolving cyber attacks and potential threats: Risk-based vulnerability management and efficient patch operations

    • Speaker

      Ivanti Software K.K.

      Security & UEM Sales Specialist

      Tomoji Ichimaru

    • Endpoint Security
    • Vulnerability countermeasure

    Presented byIvanti Software K.K.

  • C2-10

    [Learn by Use Case!] Active Cyber Defense and Trends by Threat Hunters
    ~ How to discover Sophisticated Elegant Digital Threat~

    • Speaker

      RSA Security Japan G.K.

      Senior Consultant,
      Threat Hunting and Incident Response Team, Professional Services Department

    • Speaker

      RSA Security Japan G.K.

      Senior Consultant,
      Threat Hunting and Incident Response Team, Professional Services Department

    • Targeted Theat
    • Ransomware measures
    • Monitoring and Detection

    Presented byRSA Security Japan G.K.

17:20 | 18:00
  • A2-11

    The Looming Threat of Cognitive Warfare and Implications for Cybersecurity
    -Considerations from the war in Ukraine and the offensive and defense in Taiwan, China -

    • Speaker

      Director, National Security Laboratory, LAC Corp.

      First Cyber Defense Force Commander

      Masatoshi Sato

    • Targeted Theat
    • Critical Infrastructure Security
    • other
  • B2-11

    Coming Soon

    • Targeted Theat
    • Cloud Security
    • Measures against information leakag
  • C2-11

    Legal Risks Associated with the Use of Generative AI and How to Avoid Them

    • Speaker

      Ushijima & Partners

      Partner

      Hiroyasu Kageshima

    • AI Security
    • Work style reform

3.14(Thu)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:40
  • A3-01

    Cyber Security Management for Digital Garden City Initiative

    • Speaker

      The Univerity of Tokyo

      Ph.D.

      Hiroshi Esaki

    • Endpoint Security
    • Zero trust security model
    • IoT Security
09:50 | 10:30
  • A3-02

    Trends in the cybersecurity industry
    - Cyber threat trends and AI utilization trends

    • Speaker

      CrowdStrike

      Sr. Manager
      Sales Engineering

      Shigeru Suzuki

    • Targeted Theat
    • Ransomware measures
    • Measures against information leakag

    Presented byCrowdStrike Japan GK

10:40 | 11:20
  • A3-03

    For those who are concerned about the "literacy" and "preparation" that are essential to preventing cyber security incidents.
    ~Suggestions for Training and Cyber insurance~

    • Speaker

      NTT Risk Manager Corporation

      Senior Executive Vice President

      Ryoko Shiraishi

    • GDPR / Privacy Mark / ISMS / Laws of the Decree
    • Human resource development
    • other

    Presented byNTT Risk Manager Corporation

  • W3-01

    Workshop: Introduction to Image Analysis with OSINT by pinja

    • Monitoring and Detection
    • Data Forensics
    • other
    • Workshop
11:30 | 12:10
  • A3-04

    Coming Soon

    • Targeted Theat
    • Email Security
    • Phishing Attack

    Presented byProofpoint Japan K.K.

12:30 | 13:10
  • A3-05

    Cybersecurity Policy Update of the Ministry of Internal Affairs and Communications

    • Speaker

      Ministry of Internal Affairs and Communications

      Deputy Counselor
      Office of Director-General for Cybersecurity

      Naoki F. Kawai

    • Targeted Theat
    • IoT Security
    • Human resource development
13:20 | 14:00
  • A3-06

    Coming Soon

    • Targeted Theat
    • XDR
    • Managed Security

    Presented byCanon Marketing Japan Inc.

  • W3-02

    Coming Soon

    • Vulnerability countermeasure
    • Critical Infrastructure Security
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
    • Workshop
14:40 | 15:20
  • A3-08

    The security and convenience that IT needs today
    - reason why electronic certificate is suitable for the first step-

    • Speaker

      Soliton Systems K.K

      Product&Service Manegement
      IT Security Division

      Mayu Matsuda

    • Measures against information leakag
    • Authentication / Identity Management
    • Zero trust security model

    Presented bySoliton Systems K.K.

  • B3-08

    How to actively defend against ransomware attacks

    • Speaker

      KELA KK

      Threat Intelligence Analyst

      Haruka Ikegami

    • Targeted Theat
    • Ransomware measures
    • Cloud Security

    Presented byKELA K.K.

  • C3-08

    Automated solution using AI to analyze and detect all intrusion routes, and block connections to unauthorized/spoofed sites!

    • Speaker

      SentryMark, Inc

      Senior Sales Director

      Akihiro Abe

    • Speaker

      BreachBits, Inc

      Co-Founder & CEO

      John Lundgren

    • Ransomware measures
    • Vulnerability countermeasure
    • AI Security

    Presented bySentryMark, Inc.

15:35 | 16:15
  • A3-09

    Five key points to consider in 2024 and how to counter them with Threat Intelligence

    • Speaker

      Recorded Future Japan

      Manager
      Pre-sales engineering

      Yoichi Susaki

    • Targeted Theat
    • PSIRT / CSIRT
    • SOC / Incident response

    Presented byRecorded Future Japan, K.K.

  • B3-09

    Coming Soon

    • Speaker

      SUSE Software Solutions Japan K.K.

      Head of Solution Architect Team, Japan

    • Zero trust security model
    • Critical Infrastructure Security
    • Container security

    Presented bySUSE Software Solutions Japan K.K.

  • C3-09

    Counter Attackers' New Technique! Introducing Email Security to contain the unknown email attacks that exploit generative AI with AI detection models.

    • Speaker

      Vade Japan K.K.

      Country Manager

      Toshiaki Ito

    • Ransomware measures
    • Antivirus
    • Phishing Attack

    Presented byVade Japan K.K.

16:30 | 17:10
  • A3-10

    Coming Soon

    • Speaker

      Nihon Synopsys G.K.

      Technical Marketing Manager
      Software Integrity Group

      Masato Matsuoka

    • Measures against information leakag
    • Software supply chain
    • Application Security

    Presented byNihon Synopsys G.K.

  • B3-10

    Coming Soon

    • Speaker

      iboss Japan

      Country Manager

    • Zero trust security model
    • SASE

    Presented bySB C&S Corp. / iboss, Inc.

  • C3-10

    What Endpoint Security is Necessary in the DX Era?
    ~What can be achieved with the Zero Trust Browser Solution~

    • Speaker

      J’s Communication Co., Ltd.

      General Manager
      Marketing Promotion Dept.

      Shin Shibayama

    • Targeted Theat
    • Endpoint Security
    • Zero trust security model

    Presented byJ’s Communication Co., Ltd.

17:20 | 18:00
  • A3-11

    Mercari's Challenges for "By-Design, By-Default, At-Scale" Security & Privacy

    • Speaker

      Mercari Inc.

      CISO
      Security & Privacy

      Naohisa Ichihara

    • Cloud Security
    • Measures against information leakag
  • B3-11

    Predicting 80 questions!
    - Capture "Registered Information Security Specialist Examination".

    • Speaker

      Japan Registered Information Security Specialists’ Association

      Director

      MURAYAMA NAOKI

    • PSIRT / CSIRT
    • SOC / Incident response
    • Human resource development
  • C3-11

    Urgent Cyber Security Measures for Medical Facilities Including Adaption to the MHLW Guideline

    • Speaker

      Medical ISAC Inc.

      Representative Director
      Headquarter

      Hiroshi Fukatsu

    • Email Security
    • Vulnerability countermeasure
    • Critical Infrastructure Security

3.15(Fri)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:40
  • A4-01

    Coming Soon

09:50 | 10:30
  • A4-02

    Catch the Pivot: Web and API attacks and countermeasures to be wary of in 2024

    • Speaker

      Akamai Technologies GK

      Product Marketing Manager
      Marketing

      Kazuhiro Nakanishi

    • Cloud Security
    • Application Security
    • Measures against DDoS

    Presented byAkamai Technologies, Inc.

  • Closed

    W4-01

    CISO-PRACTSIE Workshop for Evaluating the Effectiveness of Security Measures

    • Human resource development
    • other
    • Workshop
10:40 | 11:20
  • A4-03

    Phishing Defense Lifecycle

    • Speaker

      Cofense, Inc.

      Customer Solution Architect

      Marcus Vogt

    • Targeted Theat
    • Email Security
    • Phishing Attack

    Presented byCofense, Inc.

11:30 | 12:10
  • A4-04

    Coming Soon

    • Cloud Security
    • Critical Infrastructure Security
    • Managed Security

    Presented byCloudbase Inc.

12:30 | 13:10
  • A4-05

    Symantec Zero Trust to face the current Cyber Crimes arising in the World

    • Moderator

      SB Technology Corp.

      Principal Security Researcher

      Nobuhiro Tsuji

    • Panelist

      Broadcom Inc.

      Global Head Security Strategy, Enterprise Security Group

      Manoj Sharma

    • Endpoint Security
    • Vulnerability countermeasure
    • Zero trust security model
    • Symantec World 2024

    Presented bySB C&S Corp. / MACNICA, Inc.

13:30 | 15:30
  • W4-02

    Lessons in Preventing Fraudulent and Deceptive Use of Brands: Practical Exercises and Insights from Tabletop Exercise Kits

    • PSIRT / CSIRT
    • Human resource development
    • Phishing Attack
    • Workshop
13:50 | 14:30
  • A4-07

    Internal Fraud Countermeasures for the Financial Industry in 2024

    • Speaker

      Soliton Systems K.K.

      Manager
      Product Marketing Dept.

      Kazuki Mitsui

    • Endpoint Security
    • Measures against information leakag
    • Authentication / Identity Management

    Presented bySoliton Systems K.K.

  • B4-07

    Coming Soon

    • Speaker

      KDDI CORPORATION

      Vice Captain
      Zero Trust Solution Department

      Hideyo Fujita

    • Speaker

      KDDI CORPORATION

      Core Staff
      Zero Trust Solution Department

      Mitsuki Watanabe

    • Endpoint Security
    • Zero trust security model
    • Work style reform

    Presented byKDDI CORPORATION

  • C4-07

    Delivering the Future of Innovation

    • Speaker

      Broadcom Inc.

      Global Head Security Strategy, Enterprise Security Group

      Manoj Sharma

    • Targeted Theat
    • Cloud Security
    • Zero trust security model
    • Symantec World 2024

    Presented bySB C&S Corp. / MACNICA, Inc.

14:45 | 15:25
  • A4-08

    Security strategy envisioned by AI technology and next-generation SIEM "Sumo Logic"
    ~ What is the state of security monitoring that is required now? ~

    • Speaker

      CRESCO LTD.

      Senior Digital Technology Expert

      Yuji Miyamoto

    • Speaker

      Sumo Logic, Inc.

      Sumo Logic Consultant

      Alejandro Arcila

    • Speaker

      Sumo Logic, Inc.

      Technical Account Manager

      Hiroshi Nomura

    • SOC / Incident response
    • Managed Security
    • Security auditing / System auditing

    Presented byCRESCO LTD.

  • B4-08

    The Answer of 'Secure' Erasure: World of the Latest Data Erasure

    • Speaker

      Blancco Japan Inc. / Blancco Technology Group

      Regional Director, Japan

      Motoi Mimatsu

    • Endpoint Security
    • Measures against information leakag
    • Zero trust security model

    Presented byBlancco Japan Inc.

  • C4-08

    【For those who are considering EDR introduction】
    The last bastion of information security is "people"; 5 points to consider when introducing EPPs and EDRs.

    • Speaker

      SB C&S Corp.

      Marketing Dept.3 Network & Security Promotion Division ICT Unit

      Jun Sugata

    • Ransomware measures
    • Endpoint Security
    • Zero trust security model
    • Symantec World 2024

    Presented bySB C&S Corp.

15:40 | 16:20
  • A4-09

    Coming Soon

    • Cloud Security
    • Measures against information leakag
    • Authentication / Identity Management

    Presented byEncourage Technologies Co.,Ltd.

  • B4-09

    The Latest Trends in Zero Trust

    • Cloud Security
    • Zero trust security model
    • AI Security

    Presented byAP Communications Co., Ltd.

  • C4-09

    Caution with VPN!? The futre of post-VPN realized by ZTNA

    • Speaker

      Macnica, Inc.

      Head of Security Research Center Networks Company

      Takashi Teshigawara

    • Speaker

      Macnica, Inc.

      Security Dpt.3/ Technical Div.1/ Section 1 Networks Company

      Kenichi Isogai

    • Ransomware measures
    • Vulnerability countermeasure
    • Zero trust security model
    • Symantec World 2024

    Presented bySB C&S Corp. / MACNICA, Inc.

  • W4-03

    How to identify and systematize the skills needed for your company's work
    ~Maximize corporate competitiveness by visualizing employee skills~

    • PSIRT / CSIRT
    • Human resource development
    • Work style reform
    • Workshop
16:35 | 17:15
  • A4-10

    Coming Soon

    • Cloud Security
    • Measures against information leakag
    • Human resource development

    Presented byfreee K.K.

  • B4-10

    Latest Cyber Threat Trends and Predictions for 2024

    • Speaker

      Deep Instinct

      VP Sales Engineering, APJ

      Koichiro Otobe

    • Targeted Theat
    • Ransomware measures
    • Endpoint Security

    Presented byDeep Instinct

  • C4-10

    Aggressive Security for Generative AI Use - Information Leakage Countermeasures in the Cloud Era

    • Speaker

      EXA CORPORATION

      Open Infrastructure Technical Div. Infrastructure System Div.

      Masato Hara

    • Measures against information leakag
    • Zero trust security model
    • Monitoring and Detection
    • Symantec World 2024

    Presented bySB C&S Corp. / EXA CORPORATION

17:20 | 18:00
  • A4-11

    Cybersecurity at the NTT Group – Towards a World-class Practice

    • Speaker

      Nippon Telegraph and Telephone Corporation

      NTT Group CISO

      Shinichi Yokohama

    • Zero trust security model
    • Work style reform
    • other
  • B4-11

    Ready for increasing cyber threats and digital opinion manipulation!

    • Speaker

      Meiji University

      Takamichi Saito

    • Targeted Theat
    • Infrastructure hacking
  • C4-11

    Toward a Password-less World ~Overview and Latest Status of Passkey

    • Speaker

      Executive Council and Chair of FIDO Japan WG at FIDO Alliance /

      Chief Security Architect, NTT DOCOMO

      Koichi Moriyama

    • Cloud Security
    • Authentication / Identity Management
    • Phishing Attack
  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

Copyright (c) NANO OPT Media, Inc. All rights reserved.