Session
Search (possible multiple choice)
Keyword
10.28(Tue)
-
09:30 | 10:00
-
-
FA-01
Cybersecurity Measures from the Network Side
-
Speaker
Ministry of Internal Affairs and Communications
Ministry of Internal Affairs and Communications
Senior Planning OfficerTakanori Umeki
-
Speaker
-
FB-01
Introducing the "IPA Top 10 Information Security Threats 2025 (Organizational Edition)"
~Don't excuse your ignorance! Stay up to date with the latest information to prevent threats~-
Speaker
Information-technology Promotion Agency, Japan (IPA)
- Ransomware Countermeasures
- Data Leakage Prevention
- Critical Infrastructure Security
-
Speaker
-
FC-01
Uncovering This Much from Public Information! The Power of OSINT Through Real-World Industry Cases
-
Speaker
Japan Hacker Association
Representative Director
Takayuki Sugiura
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Phishing scam
-
Speaker
-
-
10:10 | 10:50
-
-
FA-02
Next-generation update management after WSUS discontinuation: Migration strategy to IT asset management tools
-
Speaker
DOS Co., Ltd.
- Data Leakage Prevention
- Endpoint Security
- Vulnerability / Tampering Countermeasures
Presented byDOS Co., Ltd.
-
Speaker
-
FB-02
The Latest in Digital ASM: Automating from Efficient Detection to Prioritization with Generative AI
-
Speaker
Aeye Security Lab Inc.
Chief Executive Officer
Teppei Sekine (CISSP)
- Cloud Security
- Vulnerability / Tampering Countermeasures
- Application Security
Presented byAeye Security Lab Inc.
-
Speaker
-
FC-02
Overlooked WSUS-Successor Challenges, Frontline Migration and Vulnerability Countermeasures
—Hidden Risks and Solutions in Update Management—-
Speaker
Jupiter Technology Corp.
Business Unit 3, Sales Group
Hirofumi Kawamoto
-
Demonstrator
Jupiter Technology Corp.
Business Unit 3, Technical Group
Akane Shimada
- Targeted Attacks / Cyber Attacks
- Endpoint Security
- Vulnerability / Tampering Countermeasures
Presented byJupiter Technology Corp.
-
Speaker
-
-
11:05 | 11:45
-
-
FA-03
"Why didn't this email get delivered?"
- Now is the time for Kyushu companies to take action and implement DMARC to protect trust and business with their business partners.-
Speaker
Honetsecurity K.K.
- Targeted Attacks / Cyber Attacks
- Email Security
- Phishing scam
Presented byHonetsecurity K.K.
-
Speaker
-
FB-03
Effective and efficient security education that encourages employee behavioral change
-
Speaker
LRM, Inc.
- Targeted Attacks / Cyber Attacks
- Human Resource Development
- Phishing scam
Presented byLRM, Inc.
-
Speaker
-
FC-03
Why Palo Alto Networks Matters Now: In-Depth Discussion (Tentative)
-
Speaker
Palo Alto Networks K.K.
Chief Cybersecurity Strategist
Masayoshi Someya
-
Speaker
SB C&S Corp.
Digital Sales Promotion Office
Network&Security Promotion Division ICT UnitJun Sugata
- AI Security
- Firewall / UTM (Unified Threat Management)
- SASE (Secure Acess Service Edge)
Presented bySB C&S Corp.
-
Speaker
-
-
12:05 | 12:35
-
-
FA-04
Battlespace Cyber: Incidents via Wireless Space and Cyber Security
-
Speaker
Ministry of Defense
National Institute for Defense Studies
Police Research Department
Senior Research Officer
- Endpoint Security
-
Speaker
-
FB-04
Economic Security and Cybersecurity: Essential Technologies and Talent Development
-
Speaker
Instite of Information Security
Professor
Atsuhiro Goto
- Ransomware Countermeasures
- Critical Infrastructure Security
- Software Supply Chain Attacks
-
Speaker
-
FC-04
KYUSEC's Initiatives and Future Prospects
~Toward a Cybersecurity-Advanced Region for All of Kyushu~ (tentative)-
Speaker
Kyushu Security Symposium Steering Committee Vice-chairman
Kyushu Electric Power Co., Inc. / QTnet, Inc.
Yukihiro Yasuda
- Other
-
Speaker
-
-
12:50 | 13:30
-
-
FA-05
From visualization to action: A case study of security implementation for an "unstoppable factory" using Claroty and RYODEN
-
Speaker
Claroty Ltd.
- Zero Trust
- AI Security
- Monitoring / Detection
Presented byRYODEN CORPORATION
-
Speaker
-
FB-05
The Hidden Dangers of Exposed Passwords
– Self-Checks Before a Penetration Test-
Speaker
UBsecure, Inc.
Cyber Security Consulting Div. Cyber Security Consulting Dept.1
Security ConsultantArashi Katsuda
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
Presented byUBsecure, Inc.
-
Speaker
-
FC-05
Aiming to minimize the risk of an expanding attack surface through AI
Understanding the essence of "proactive security"-
Speaker
Trend Micro Incorporated
Platform Marketing Group,
Platform Enablement Dept,
Director,Shunsuke Fukuda
- Ransomware Countermeasures
- Endpoint Security
- AI Security
Presented byTrend Micro Inc.
-
Speaker
-
-
13:45 | 14:25
-
-
FA-06
Make invisible threats visible!
Comprehensive security measures from an attacker's perspective.-
Speaker
3-shake Inc.
Securify division
General ManagerTakuya Tezuka
- Vulnerability / Tampering Countermeasures
- Critical Infrastructure Security
- Application Security
Presented by3-shake Inc.
-
Speaker
-
FB-06
The Pros and Cons of AI Utilization: The "Offensive and Defensive" Security Strategy Required in the Digital Transformation Era
Presented byNetskope Japan K.K.
-
FC-06
Revolutionizing SOC Operations
- AI and automation are finally making SOCs more sophisticated and efficient.-
Speaker
NRI SecureTechnologies, Ltd.
Junichi Nakayama
- AI Security
- SOC / Incident Response
- Managed Security Services
Presented byNet One Partners Co., Ltd.
-
Speaker
-
-
14:35 | 15:05
-
-
FA-07
Cyberspace threat situation and police efforts (tentative)
-
Speaker
National Police Agency JAPAN
Cybercrime Prevention Office, Cyber Affairs Bureau
Assistant DirectorYohsuke Nakagawa
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
-
Speaker
-
FB-07
A control system vendor's approach as a bridge between IT and OT systems
-
Speaker
Yokogawa Electric Corporation
- Targeted Attacks / Cyber Attacks
- IoT Security
- Critical Infrastructure Security
-
Speaker
-
FC-07
Defending Against Hidden Threats via DNS: The Role and Effectiveness of DNS Firewalls
-
Speaker
Fukuoka University
Information Technology Center
Associate ProfessorSho Fujimura
- Targeted Attacks / Cyber Attacks
- Domain Authentication / DNS Security
-
Speaker
-
-
15:15 | 15:55
-
-
FA-08
In an era where smartphones are targeted - Security strategies to protect mobile devices
-
Speaker
Jamf Japan G.K.
Sales Engineer
Atsushi Sakai
- Data Leakage Prevention
- Endpoint Security
- Zero Trust
Presented byJamf Japan G.K.
-
Speaker
-
FB-08
Realistic Ransomware Countermeasures for SMEs: Don't Dance to Their Tune!
-
Speaker
Kaspersky Labs Japan
Yu Miyazaki
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
Presented byK.K. Kaspersky Labs Japan
-
Speaker
-
FC-08
How to Respond to the Evolving Threat of Phishing Emails
- The State-of-the-Art of Email Security with Cofense-
Speaker
NRI Secure Technologies, Inc.
Cloud Security Business Department
Senior Security EngineerKoki Daita
-
Speaker
NRI Secure Technologies, Inc.
Business Promotion Dept.
Security ConsultantYuma Egawa
- Email Security
- Phishing scam
- Business Email Compromise Countermeasures
Presented byNRI SecureTechnologies, Ltd.
-
Speaker
-
-
16:10 | 16:50
-
-
FA-09
The Security Resilience of Japanese Companies Revealed by the Sekyumaru
- Necessary Next Actions from Short- and Long-Term Perspectives - Beyond Zero Trust-
Speaker
Marubeni I-DIGIO Group
- Cloud Security
- Zero Trust
- SASE (Secure Acess Service Edge)
Presented byMarubeni I-DIGIO Group
-
Speaker
-
FB-09
The Real Risk Lies in “Misaligned Measures”
— Three Actionable Steps to Strengthen Security from On-the-Ground Experience-
Speaker
MOTEX Inc.
Sales Division,
Deputy General ManagerDaisuke Kaneko
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
Presented byMOTEX Inc.
-
Speaker
-
FC-09
The foundation and final line of defense for security!
Microsegmentation and cloud security made possible by Illumio-
Speaker
Illumio G.K.
Enterprise Sales Division
Regional Sales DirectorYoshinori Hara
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Zero Trust
Presented byIllumio Japan G.K.
-
Speaker
-
-
17:00 | 17:30
-
-
FA-10
Cybersecurity measures and human resource acquisition necessary for small and medium-sized enterprises
-
Speaker
Kyushu University
Research Institute for Information Technology ,Professor
Hiroshi Koide
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Human Resource Development
-
Speaker
-
FB-10
The threat of state-sponsored cyber attacks
-
Speaker
Public Security Intelligence Agency
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
-
Speaker
-
FC-10
AI BOM - Secure and transparent AI in an ecosystem
-
Speaker
The Linux Foundation Japan
Evangelist
- AI Security
- SBOM (Software Bill of Materials)
-
Speaker
-