iotc iotc

    • linkedin
    • facebook
    • twitter
    • YouTube
  • Registration

    Registration
  • Outline Outline
  • Osaka Osaka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Nagoya Nagoya
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Tokyo Tokyo
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Fukuoka Fukuoka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • Osaka Osaka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Nagoya Nagoya
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Tokyo Tokyo
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Fukuoka Fukuoka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration

      Registration

Session

Search (possible multiple choice)

Keyword

10.28(Tue)

  • RoomA
  • RoomB
  • RoomC
09:30 | 10:00
  • FA-01

    Cybersecurity Measures from the Network Side

    • Speaker

      Ministry of Internal Affairs and Communications

      Ministry of Internal Affairs and Communications
      Senior Planning Officer

      Takanori Umeki

  • FB-01

    Introducing the "IPA Top 10 Information Security Threats 2025 (Organizational Edition)"
    ~Don't excuse your ignorance! Stay up to date with the latest information to prevent threats~

    • Speaker

      Information-technology Promotion Agency, Japan (IPA)

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Critical Infrastructure Security
  • FC-01

    Uncovering This Much from Public Information! The Power of OSINT Through Real-World Industry Cases

    • Speaker

      Japan Hacker Association

      Representative Director

      Takayuki Sugiura

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Phishing scam
10:10 | 10:50
  • FA-02

    Next-generation update management after WSUS discontinuation: Migration strategy to IT asset management tools

    • Speaker

      DOS Co., Ltd.

    • Data Leakage Prevention
    • Endpoint Security
    • Vulnerability / Tampering Countermeasures

    Presented byDOS Co., Ltd.

  • FB-02

    The Latest in Digital ASM: Automating from Efficient Detection to Prioritization with Generative AI

    • Speaker

      Aeye Security Lab Inc.

      Chief Executive Officer

      Teppei Sekine (CISSP)

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • Application Security

    Presented byAeye Security Lab Inc.

  • FC-02

    Overlooked WSUS-Successor Challenges, Frontline Migration and Vulnerability Countermeasures
    —Hidden Risks and Solutions in Update Management—

    • Speaker

      Jupiter Technology Corp.

      Business Unit 3, Sales Group

      Hirofumi Kawamoto

    • Demonstrator

      Jupiter Technology Corp.

      Business Unit 3, Technical Group

      Akane Shimada

    • Targeted Attacks / Cyber Attacks
    • Endpoint Security
    • Vulnerability / Tampering Countermeasures

    Presented byJupiter Technology Corp.

11:05 | 11:45
  • FA-03

    "Why didn't this email get delivered?"
    - Now is the time for Kyushu companies to take action and implement DMARC to protect trust and business with their business partners.

    • Speaker

      Honetsecurity K.K.

    • Targeted Attacks / Cyber Attacks
    • Email Security
    • Phishing scam

    Presented byHonetsecurity K.K.

  • FB-03

    Effective and efficient security education that encourages employee behavioral change

    • Speaker

      LRM, Inc.

    • Targeted Attacks / Cyber Attacks
    • Human Resource Development
    • Phishing scam

    Presented byLRM, Inc.

  • FC-03

    Why Palo Alto Networks Matters Now: In-Depth Discussion (Tentative)

    • Speaker

      Palo Alto Networks K.K.

      Chief Cybersecurity Strategist

      Masayoshi Someya

    • Speaker

      SB C&S Corp.

      Digital Sales Promotion Office
      Network&Security Promotion Division ICT Unit

      Jun Sugata

    • AI Security
    • Firewall / UTM (Unified Threat Management)
    • SASE (Secure Acess Service Edge)

    Presented bySB C&S Corp.

12:05 | 12:35
  • FA-04

    Battlespace Cyber: Incidents via Wireless Space and Cyber Security

    • Speaker

      Ministry of Defense

      National Institute for Defense Studies
      Police Research Department
      Senior Research Officer

    • Endpoint Security
  • FB-04

    Economic Security and Cybersecurity: Essential Technologies and Talent Development

    • Speaker

      Instite of Information Security

      Professor

      Atsuhiro Goto

    • Ransomware Countermeasures
    • Critical Infrastructure Security
    • Software Supply Chain Attacks
  • FC-04

    KYUSEC's Initiatives and Future Prospects
    ~Toward a Cybersecurity-Advanced Region for All of Kyushu~ (tentative)

    • Speaker

      Kyushu Security Symposium Steering Committee Vice-chairman

      Kyushu Electric Power Co., Inc. / QTnet, Inc.

      Yukihiro Yasuda

    • Other
12:50 | 13:30
  • FA-05

    From visualization to action: A case study of security implementation for an "unstoppable factory" using Claroty and RYODEN

    • Speaker

      Claroty Ltd.

    • Zero Trust
    • AI Security
    • Monitoring / Detection

    Presented byRYODEN CORPORATION

  • FB-05

    The Hidden Dangers of Exposed Passwords
    – Self-Checks Before a Penetration Test

    • Speaker

      UBsecure, Inc.

      Cyber Security Consulting Div. Cyber Security Consulting Dept.1
      Security Consultant

      Arashi Katsuda

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention

    Presented byUBsecure, Inc.

  • FC-05

    Aiming to minimize the risk of an expanding attack surface through AI
    Understanding the essence of "proactive security"

    • Speaker

      Trend Micro Incorporated

      Platform Marketing Group,
      Platform Enablement Dept,
      Director,

      Shunsuke Fukuda

    • Ransomware Countermeasures
    • Endpoint Security
    • AI Security

    Presented byTrend Micro Inc.

13:45 | 14:25
  • FA-06

    Make invisible threats visible!
    Comprehensive security measures from an attacker's perspective.

    • Speaker

      3-shake Inc.

      Securify division
      General Manager

      Takuya Tezuka

    • Vulnerability / Tampering Countermeasures
    • Critical Infrastructure Security
    • Application Security

    Presented by3-shake Inc.

  • FB-06

    The Pros and Cons of AI Utilization: The "Offensive and Defensive" Security Strategy Required in the Digital Transformation Era

    Presented byNetskope Japan K.K.

  • FC-06

    Revolutionizing SOC Operations
    - AI and automation are finally making SOCs more sophisticated and efficient.

    • Speaker

      NRI SecureTechnologies, Ltd.

      Junichi Nakayama

    • AI Security
    • SOC / Incident Response
    • Managed Security Services

    Presented byNet One Partners Co., Ltd.

14:35 | 15:05
  • FA-07

    Cyberspace threat situation and police efforts (tentative)

    • Speaker

      National Police Agency JAPAN

      Cybercrime Prevention Office, Cyber Affairs Bureau
      Assistant Director

      Yohsuke Nakagawa

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
  • FB-07

    A control system vendor's approach as a bridge between IT and OT systems

    • Speaker

      Yokogawa Electric Corporation

    • Targeted Attacks / Cyber Attacks
    • IoT Security
    • Critical Infrastructure Security
  • FC-07

    Defending Against Hidden Threats via DNS: The Role and Effectiveness of DNS Firewalls

    • Speaker

      Fukuoka University

      Information Technology Center
      Associate Professor

      Sho Fujimura

    • Targeted Attacks / Cyber Attacks
    • Domain Authentication / DNS Security
15:15 | 15:55
  • FA-08

    In an era where smartphones are targeted - Security strategies to protect mobile devices

    • Speaker

      Jamf Japan G.K.

      Sales Engineer

      Atsushi Sakai

    • Data Leakage Prevention
    • Endpoint Security
    • Zero Trust

    Presented byJamf Japan G.K.

  • FB-08

    Realistic Ransomware Countermeasures for SMEs: Don't Dance to Their Tune!

    • Speaker

      Kaspersky Labs Japan

      Yu Miyazaki

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security

    Presented byK.K. Kaspersky Labs Japan

  • FC-08

    How to Respond to the Evolving Threat of Phishing Emails
    - The State-of-the-Art of Email Security with Cofense

    • Speaker

      NRI Secure Technologies, Inc.

      Cloud Security Business Department
      Senior Security Engineer

      Koki Daita

    • Speaker

      NRI Secure Technologies, Inc.

      Business Promotion Dept.
      Security Consultant

      Yuma Egawa

    • Email Security
    • Phishing scam
    • Business Email Compromise Countermeasures

    Presented byNRI SecureTechnologies, Ltd.

16:10 | 16:50
  • FA-09

    The Security Resilience of Japanese Companies Revealed by the Sekyumaru
    - Necessary Next Actions from Short- and Long-Term Perspectives - Beyond Zero Trust

    • Speaker

      Marubeni I-DIGIO Group

    • Cloud Security
    • Zero Trust
    • SASE (Secure Acess Service Edge)

    Presented byMarubeni I-DIGIO Group

  • FB-09

    The Real Risk Lies in “Misaligned Measures”
    — Three Actionable Steps to Strengthen Security from On-the-Ground Experience

    • Speaker

      MOTEX Inc.

      Sales Division,
      Deputy General Manager

      Daisuke Kaneko

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures

    Presented byMOTEX Inc.

  • FC-09

    The foundation and final line of defense for security!
    Microsegmentation and cloud security made possible by Illumio

    • Speaker

      Illumio G.K.

      Enterprise Sales Division
      Regional Sales Director

      Yoshinori Hara

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust

    Presented byIllumio Japan G.K.

17:00 | 17:30
  • FA-10

    Cybersecurity measures and human resource acquisition necessary for small and medium-sized enterprises

    • Speaker

      Kyushu University

      Research Institute for Information Technology ,Professor

      Hiroshi Koide

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Human Resource Development
  • FB-10

    The threat of state-sponsored cyber attacks

    • Speaker

      Public Security Intelligence Agency

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
  • FC-10

    AI BOM - Secure and transparent AI in an ecosystem

    • Speaker

      The Linux Foundation Japan

      Evangelist

    • AI Security
    • SBOM (Software Bill of Materials)
  • Privacy Policy

[25年春開催]Security Days Spring 2025

Copyright (c) NANO OPT Media, Inc. All rights reserved.