Session
-
consecutive interpreting
-
simultaneous interpreting
-
lunch
Search (possible multiple choice)
Keyword
3.12(Tue)
-
11:30 | 12:10
-
13:50 | 14:30
-
-
A1-07
Data Protection Strategy in the Zero Trust Era: Maximizing Risk Reduction with "Tailored Controls"
-
Speaker
Soliton Systems K.K.
Evangelist
IT Security DivisionShoko Araki
- Measures against information leakag
- Authentication / Identity Management
- Zero trust security model
Presented bySoliton Systems K.K.
-
Speaker
-
Closed
B1-07
Coming Soon
-
Speaker
KDDI CORPORATION
Head of Department
Security Management DepartmentAkira Tanaka
-
Speaker
KDDI CORPORATION
Expert
Security Management DepartmentHaruki Oota
- Vulnerability countermeasure
- PSIRT / CSIRT
- Software supply chain
Presented byKDDI CORPORATION
-
Speaker
-
C1-07
Elevating Cybersecurity Resilience: Unveiling Proven Strategies from the Battlefield
-
Speaker
Sygnia Consulting Ltd.
Client Leadership Manager, Japan
Sota Aoki
-
Speaker
Sygnia Consulting Ltd.
SVP Global Client Leadership
Adam Finkelstein
Presented bySygnia Consulting Ltd.
-
Speaker
-
-
14:45 | 15:25
-
-
A1-08
The elimination of "encrypted ZIPs and passwords sent through the same channel" is accelerating. What capabilities have those companies that have made the decision to change gained?
-
Speaker
imatrix corp.
Messaging Security Research Senior researcher
Hibiki Oka
- Measures against information leakag
- Email Security
- Work style reform
Presented byimatrix corp.
-
Speaker
-
B1-08
Case studies for maximize iPhone utilization and security checklist to minimize risks.
-
Speaker
Jamf Japan G.K.
Sales Enablement
ManagerShingo Matsushima
- Endpoint Security
- Measures against information leakag
- Zero trust security model
Presented byJamf Japan G.K
-
Speaker
-
C1-08
Coming Soon
- Targeted Theat
- Cloud Security
- Work style reform
Presented bySoftBank Corp.
-
-
15:40 | 16:20
-
-
A1-09
CSPM, ASPM, SSPM, ASM ― The More Things Change, the More They Stay the Same
-
Speaker
Flatt Security Inc.
Chief Technology Officer
Takashi Yoneuchi
- Cloud Security
- Vulnerability countermeasure
- Security auditing / System auditing
Presented byFlatt Security Inc.
-
Speaker
-
B1-09
Coming Soon
- Cloud Security
- Application Security
- Measures against DDoS
Presented byFastly, Inc.
-
C1-09
The Realities of Incident Response - What Security countermeasures are Necessary Now?
-
Speaker
Stonebeat Security, Inc.
CEO, Chief Security Advisor
Nobuhiko Sasaki
- Targeted Theat
- Ransomware measures
- SOC / Incident response
Presented byStonebeat Security, Inc.
-
Speaker
-
-
16:35 | 17:15
-
-
A1-10
Coming Soon
- Measures against information leakag
- Vulnerability countermeasure
Presented byCyber Security Cloud, Inc.
-
B1-10
DNP Group's Cyber Security ~ From EASM to CTEM
-
Speaker
Dai Nippon Printing Co., Ltd.
Cyber Security Business Development Unit, Advanced Business Center
Shun Mori
- Managed Security
- Monitoring and Detection
- Human resource development
Presented byDai Nippon Printing Co., Ltd.
-
Speaker
-
C1-10
Coming Soon
Presented bySCSK Minori Solutions Corporation
-
-
17:20 | 18:00
-
-
A1-11
Security measures required for website
-
Speaker
Information-technology Promotion Agency
Analysis Engineer
Security Center ,Security Measures Promotion Department ,Vulnerability Countermeasures GroupTaisuke Kimura
- Vulnerability countermeasure
-
Speaker
-
B1-11
Coming Soon
-
C1-11
Cyber Resilience expected in the Financial Industry
-
Speaker
Financial Services Agency
Head of Cybersecurity Planning Group
Shun Miura
- Targeted Theat
-
Speaker
-
3.13(Wed)
-
09:00 | 09:40
-
10:40 | 11:20
-
-
A2-03
Emerging Frontiers of Web Threats! Strategies and Latest Cases for Future Threats (Japanese Session)
-
Speaker
CHEQ JAPAN
Sale Engineer
Geny Apukhtin
- Targeted Theat
- Authentication / Identity Management
- GDPR / Privacy Mark / ISMS / Laws of the Decree
Presented byCHEQ JAPAN
-
Speaker
-
Closed
W2-01
Learning Through Practical Workshops! The Cybersecurity Frontline for Medium and Small Businesses
– Defending Against Risks: Essential Threats and Countermeasures to Know- Targeted Theat
- Ransomware measures
- Human resource development
- Workshop
-
-
13:50 | 14:30
-
-
A2-07
In-depth explanation in 40 minutes! The Past and Future of Client Virtualization
-
Speaker
Soliton Systems K.K
Product&Service Manegement
IT Security DivisionAsagi Ogawa
- Measures against information leakag
- Work style reform
- Container security
Presented bySoliton Systems K.K.
-
Speaker
-
B2-07
Improve Your Organization's "Vulnerability Management" - Find out targeted IT asset in your org
-
Speaker
Tenable Network Security Japan K.K.
Security Enjineer
Koichi Hatase
- Cloud Security
- Vulnerability countermeasure
- Authentication / Identity Management
Presented byTenable Network Security Japan K.K.
-
Speaker
-
C2-07
Introduction to Cybercrime Trends on the Dark Web and Analysis of Cybercrime Cases Related to Japan Using Artificial Intelligence Solution.
-
Speaker
S2W Inc.
Team Leader
MarketingJay Oh
- Ransomware measures
- Measures against information leakag
- Monitoring and Detection
Presented byS2W Inc.
-
Speaker
-
-
14:45 | 15:25
-
-
A2-08
Exploring next-generation NDR technology: Unveiling real-time detection and response to network-originated security threats.
-
Speaker
Vectra AI Japan K.K.
Senior Sales Engineer
Kazuo Fukuda
- Ransomware measures
- XDR
- Monitoring and Detection
Presented byVectra AI Inc. / MACNICA, Inc.
-
Speaker
-
B2-08
How to Secure Your Critical Infrastructure and Sensitive Data from New Threats?: The Zero Trust Solution with Quantum Resilience
-
Speaker
SSH Communications Security
Solutions Engineering Director, APAC
Katsuhiro Shogawa
- Authentication / Identity Management
- Critical Infrastructure Security
- Quantum Security
Presented bySSH Communications Security
-
Speaker
-
C2-08
Coming Soon
-
Speaker
Intelligent Wave Inc.
Expert
4th Sales Dep.
Sales Div.Hiroyuki Kanbayashi
- Measures against information leakag
- Authentication / Identity Management
- Zero trust security model
Presented byIntelligent Wave Inc.
-
Speaker
-
-
15:40 | 16:20
-
-
A2-09
The State of SASE. Challenges to implementing SASE and the best SASE solution for your company
-
Speaker
INTEC Inc.
High-end Specialist
Network and Outsourcing Business Strategy Dept.
Network and Outsourcing DivisionOsanai Hironobu
- Cloud Security
- Zero trust security model
- SASE
Presented byINTEC Inc.
-
Speaker
-
B2-09
Coming Soon
- Ransomware measures
- Endpoint Security
- Measures against information leakag
Presented byJupiter Technology Corp.
-
C2-09
Isn't this the true mission of DX? What can FireMon, an NSPM product whose introduction has been delayed in Japan, do?
-
Speaker
JSecurity,Inc.
Product Planning Division
Hidefumi Sakiyama
-
Speaker
KIS Security, Inc.
Director
Masaya Kitamoto
- Firewall / UTM
- Managed Security
- Security auditing / System auditing
Presented byKIS Security, Inc.
-
Speaker
-
W2-03
Coming Soon
- PSIRT / CSIRT
- SOC / Incident response
- Human resource development
- Workshop
-
-
16:35 | 17:15
-
-
A2-10
Recap of Security in 2023: Changes in Security Testing via Free Tools and the Impact of Generative AI
-
Speaker
Aeye Security Lab Inc.
Executive Officer&Head of Customer Experience
Teppei Sekine
- Cloud Security
- Vulnerability countermeasure
- Application Security
Presented byAeye Security Lab Inc.
-
Speaker
-
B2-10
Next move against evolving cyber attacks and potential threats: Risk-based vulnerability management and efficient patch operations
-
Speaker
Ivanti Software K.K.
Security & UEM Sales Specialist
Tomoji Ichimaru
- Endpoint Security
- Vulnerability countermeasure
Presented byIvanti Software K.K.
-
Speaker
-
C2-10
[Learn by Use Case!] Active Cyber Defense and Trends by Threat Hunters
~ How to discover Sophisticated Elegant Digital Threat~-
Speaker
RSA Security Japan G.K.
Senior Consultant,
Threat Hunting and Incident Response Team, Professional Services Department -
Speaker
RSA Security Japan G.K.
Senior Consultant,
Threat Hunting and Incident Response Team, Professional Services Department
- Targeted Theat
- Ransomware measures
- Monitoring and Detection
Presented byRSA Security Japan G.K.
-
Speaker
-
-
17:20 | 18:00
-
-
A2-11
The Looming Threat of Cognitive Warfare and Implications for Cybersecurity
-Considerations from the war in Ukraine and the offensive and defense in Taiwan, China --
Speaker
Director, National Security Laboratory, LAC Corp.
First Cyber Defense Force Commander
Masatoshi Sato
- Targeted Theat
- Critical Infrastructure Security
- other
-
Speaker
-
B2-11
Coming Soon
- Targeted Theat
- Cloud Security
- Measures against information leakag
-
C2-11
Legal Risks Associated with the Use of Generative AI and How to Avoid Them
-
Speaker
Ushijima & Partners
Partner
Hiroyasu Kageshima
- AI Security
- Work style reform
-
Speaker
-
3.14(Thu)
-
10:40 | 11:20
-
-
A3-03
For those who are concerned about the "literacy" and "preparation" that are essential to preventing cyber security incidents.
~Suggestions for Training and Cyber insurance~-
Speaker
NTT Risk Manager Corporation
Senior Executive Vice President
Ryoko Shiraishi
- GDPR / Privacy Mark / ISMS / Laws of the Decree
- Human resource development
- other
Presented byNTT Risk Manager Corporation
-
Speaker
-
W3-01
Workshop: Introduction to Image Analysis with OSINT by pinja
- Monitoring and Detection
- Data Forensics
- other
- Workshop
-
-
14:40 | 15:20
-
-
A3-08
The security and convenience that IT needs today
- reason why electronic certificate is suitable for the first step--
Speaker
Soliton Systems K.K
Product&Service Manegement
IT Security DivisionMayu Matsuda
- Measures against information leakag
- Authentication / Identity Management
- Zero trust security model
Presented bySoliton Systems K.K.
-
Speaker
-
B3-08
How to actively defend against ransomware attacks
-
Speaker
KELA KK
Threat Intelligence Analyst
Haruka Ikegami
- Targeted Theat
- Ransomware measures
- Cloud Security
Presented byKELA K.K.
-
Speaker
-
C3-08
Automated solution using AI to analyze and detect all intrusion routes, and block connections to unauthorized/spoofed sites!
-
Speaker
SentryMark, Inc
Senior Sales Director
Akihiro Abe
-
Speaker
BreachBits, Inc
Co-Founder & CEO
John Lundgren
- Ransomware measures
- Vulnerability countermeasure
- AI Security
Presented bySentryMark, Inc.
-
Speaker
-
-
15:35 | 16:15
-
-
A3-09
Five key points to consider in 2024 and how to counter them with Threat Intelligence
-
Speaker
Recorded Future Japan
Manager
Pre-sales engineeringYoichi Susaki
- Targeted Theat
- PSIRT / CSIRT
- SOC / Incident response
Presented byRecorded Future Japan, K.K.
-
Speaker
-
B3-09
Coming Soon
-
Speaker
SUSE Software Solutions Japan K.K.
Head of Solution Architect Team, Japan
- Zero trust security model
- Critical Infrastructure Security
- Container security
Presented bySUSE Software Solutions Japan K.K.
-
Speaker
-
C3-09
Counter Attackers' New Technique! Introducing Email Security to contain the unknown email attacks that exploit generative AI with AI detection models.
-
Speaker
Vade Japan K.K.
Country Manager
Toshiaki Ito
- Ransomware measures
- Antivirus
- Phishing Attack
Presented byVade Japan K.K.
-
Speaker
-
-
16:30 | 17:10
-
-
A3-10
Coming Soon
-
Speaker
Nihon Synopsys G.K.
Technical Marketing Manager
Software Integrity GroupMasato Matsuoka
- Measures against information leakag
- Software supply chain
- Application Security
Presented byNihon Synopsys G.K.
-
Speaker
-
B3-10
Coming Soon
-
Speaker
iboss Japan
Country Manager
- Zero trust security model
- SASE
Presented bySB C&S Corp. / iboss, Inc.
-
Speaker
-
C3-10
What Endpoint Security is Necessary in the DX Era?
~What can be achieved with the Zero Trust Browser Solution~-
Speaker
J’s Communication Co., Ltd.
General Manager
Marketing Promotion Dept.Shin Shibayama
- Targeted Theat
- Endpoint Security
- Zero trust security model
Presented byJ’s Communication Co., Ltd.
-
Speaker
-
-
17:20 | 18:00
-
-
A3-11
Mercari's Challenges for "By-Design, By-Default, At-Scale" Security & Privacy
-
Speaker
Mercari Inc.
CISO
Security & PrivacyNaohisa Ichihara
- Cloud Security
- Measures against information leakag
-
Speaker
-
B3-11
Predicting 80 questions!
- Capture "Registered Information Security Specialist Examination".-
Speaker
Japan Registered Information Security Specialists’ Association
Director
MURAYAMA NAOKI
- PSIRT / CSIRT
- SOC / Incident response
- Human resource development
-
Speaker
-
C3-11
Urgent Cyber Security Measures for Medical Facilities Including Adaption to the MHLW Guideline
-
Speaker
Medical ISAC Inc.
Representative Director
HeadquarterHiroshi Fukatsu
- Email Security
- Vulnerability countermeasure
- Critical Infrastructure Security
-
Speaker
-
3.15(Fri)
-
09:00 | 09:40
-
09:50 | 10:30
-
-
A4-02
Catch the Pivot: Web and API attacks and countermeasures to be wary of in 2024
-
Speaker
Akamai Technologies GK
Product Marketing Manager
MarketingKazuhiro Nakanishi
- Cloud Security
- Application Security
- Measures against DDoS
Presented byAkamai Technologies, Inc.
-
Speaker
-
Closed
W4-01
CISO-PRACTSIE Workshop for Evaluating the Effectiveness of Security Measures
- Human resource development
- other
- Workshop
-
-
13:50 | 14:30
-
-
A4-07
Internal Fraud Countermeasures for the Financial Industry in 2024
-
Speaker
Soliton Systems K.K.
Manager
Product Marketing Dept.Kazuki Mitsui
- Endpoint Security
- Measures against information leakag
- Authentication / Identity Management
Presented bySoliton Systems K.K.
-
Speaker
-
B4-07
Coming Soon
-
Speaker
KDDI CORPORATION
Vice Captain
Zero Trust Solution DepartmentHideyo Fujita
-
Speaker
KDDI CORPORATION
Core Staff
Zero Trust Solution DepartmentMitsuki Watanabe
- Endpoint Security
- Zero trust security model
- Work style reform
Presented byKDDI CORPORATION
-
Speaker
-
C4-07
Delivering the Future of Innovation
-
Speaker
Broadcom Inc.
Global Head Security Strategy, Enterprise Security Group
Manoj Sharma
- Targeted Theat
- Cloud Security
- Zero trust security model
- Symantec World 2024
Presented bySB C&S Corp. / MACNICA, Inc.
-
Speaker
-
-
14:45 | 15:25
-
-
A4-08
Security strategy envisioned by AI technology and next-generation SIEM "Sumo Logic"
~ What is the state of security monitoring that is required now? ~-
Speaker
CRESCO LTD.
Senior Digital Technology Expert
Yuji Miyamoto
-
Speaker
Sumo Logic, Inc.
Sumo Logic Consultant
Alejandro Arcila
-
Speaker
Sumo Logic, Inc.
Technical Account Manager
Hiroshi Nomura
- SOC / Incident response
- Managed Security
- Security auditing / System auditing
Presented byCRESCO LTD.
-
Speaker
-
B4-08
The Answer of 'Secure' Erasure: World of the Latest Data Erasure
-
Speaker
Blancco Japan Inc. / Blancco Technology Group
Regional Director, Japan
Motoi Mimatsu
- Endpoint Security
- Measures against information leakag
- Zero trust security model
Presented byBlancco Japan Inc.
-
Speaker
-
C4-08
【For those who are considering EDR introduction】
The last bastion of information security is "people"; 5 points to consider when introducing EPPs and EDRs.-
Speaker
SB C&S Corp.
Marketing Dept.3 Network & Security Promotion Division ICT Unit
Jun Sugata
- Ransomware measures
- Endpoint Security
- Zero trust security model
- Symantec World 2024
Presented bySB C&S Corp.
-
Speaker
-
-
15:40 | 16:20
-
-
A4-09
Coming Soon
- Cloud Security
- Measures against information leakag
- Authentication / Identity Management
Presented byEncourage Technologies Co.,Ltd.
-
B4-09
The Latest Trends in Zero Trust
- Cloud Security
- Zero trust security model
- AI Security
Presented byAP Communications Co., Ltd.
-
C4-09
Caution with VPN!? The futre of post-VPN realized by ZTNA
-
Speaker
Macnica, Inc.
Head of Security Research Center Networks Company
Takashi Teshigawara
-
Speaker
Macnica, Inc.
Security Dpt.3/ Technical Div.1/ Section 1 Networks Company
Kenichi Isogai
- Ransomware measures
- Vulnerability countermeasure
- Zero trust security model
- Symantec World 2024
Presented bySB C&S Corp. / MACNICA, Inc.
-
Speaker
-
W4-03
How to identify and systematize the skills needed for your company's work
~Maximize corporate competitiveness by visualizing employee skills~- PSIRT / CSIRT
- Human resource development
- Work style reform
- Workshop
-
-
16:35 | 17:15
-
-
A4-10
Coming Soon
- Cloud Security
- Measures against information leakag
- Human resource development
Presented byfreee K.K.
-
B4-10
Latest Cyber Threat Trends and Predictions for 2024
-
Speaker
Deep Instinct
VP Sales Engineering, APJ
Koichiro Otobe
- Targeted Theat
- Ransomware measures
- Endpoint Security
Presented byDeep Instinct
-
Speaker
-
C4-10
Aggressive Security for Generative AI Use - Information Leakage Countermeasures in the Cloud Era
-
Speaker
EXA CORPORATION
Open Infrastructure Technical Div. Infrastructure System Div.
Masato Hara
- Measures against information leakag
- Zero trust security model
- Monitoring and Detection
- Symantec World 2024
Presented bySB C&S Corp. / EXA CORPORATION
-
Speaker
-
-
17:20 | 18:00
-
-
A4-11
Cybersecurity at the NTT Group – Towards a World-class Practice
-
Speaker
Nippon Telegraph and Telephone Corporation
NTT Group CISO
Shinichi Yokohama
- Zero trust security model
- Work style reform
- other
-
Speaker
-
B4-11
Ready for increasing cyber threats and digital opinion manipulation!
-
Speaker
Meiji University
Takamichi Saito
- Targeted Theat
- Infrastructure hacking
-
Speaker
-
C4-11
Toward a Password-less World ~Overview and Latest Status of Passkey
-
Speaker
Executive Council and Chair of FIDO Japan WG at FIDO Alliance /
Chief Security Architect, NTT DOCOMO
Koichi Moriyama
- Cloud Security
- Authentication / Identity Management
- Phishing Attack
-
Speaker
-