iotc iotc

    • linkedin
    • facebook
    • twitter
    • YouTube
  • Registration

    Registration
  • Outline Outline
  • Osaka Osaka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Nagoya Nagoya
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Tokyo Tokyo
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Fukuoka Fukuoka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • Osaka Osaka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Nagoya Nagoya
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Tokyo Tokyo
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Fukuoka Fukuoka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration

      Registration

Session

  • All
  • 10.16(Thu)
  • 10.17(Fri)

Search (possible multiple choice)

Keyword
  • Security Days Fall 2025 Nagoya
  • Security Days - Automotive

10.16(Thu)

  • RoomA
  • RoomB
  • RoomC
09:30 | 10:00
  • GA-01

    Cyberspace threat situation and police efforts (tentative)

    • Speaker

      National Police Agency JAPAN

      Cybercrime Prevention Office, Cyber Affairs Bureau
      Assistant Director

      Yohsuke Nakagawa

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
  • GB-01

    What is the hot topic of supply chain security right now?
    ~From the changing situation surrounding companies in the Chubu region~ Part 1

    • Panelist

      Information-technology Promotion Agency, Japan (IPA)

    • Panelist

      TOYOTA INDUSTRIES IT SOLUTIONS Inc.

    • Panelist

      Suzuki Motor Corporation

    • Moderator

      Chubu Electric Power Co.,Inc.

  • GC-01

    What Does Identity Really Mean?
    — 2035 is just around the corner —

    • Speaker

      The University of Osaka

      D3 center
      Professor, CISO

      Atsuo Inomata

    • Targeted Attacks / Cyber Attacks
    • Zero Trust
    • Authentication / Identity Management
10:10 | 10:50
  • GA-02

    Evolving Threats, Enhanced Defense: Key Insights from the 2025 Threat Hunting Report

    • Speaker

      CrowdStrike Japan GK

      Sales Engineering Dept.
      Sales Engineer

      Satoshi Sakamoto

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security

    Presented byCrowdStrike Japan GK

  • GB-02

    What is the hot topic of supply chain security right now?
    ~From the changing situation surrounding companies in the Chubu region~ Part 2

    • Panelist

      Information-technology Promotion Agency, Japan (IPA)

    • Panelist

      TOYOTA INDUSTRIES IT SOLUTIONS Inc.

    • Panelist

      Suzuki Motor Corporation

    • Moderator

      Chubu Electric Power Co.,Inc.

  • GC-02

    The Pros and Cons of AI Utilization: The "Offensive and Defensive" Security Strategy Required in the Digital Transformation Era

    • Speaker

      Netskope Japan K.K.

    • Cloud Security
    • Data Leakage Prevention
    • SASE (Secure Acess Service Edge)

    Presented byNetskope Japan K.K.

11:05 | 11:45
  • GA-03

    Effective and efficient security education that encourages employee behavioral change

    • Speaker

      LRM, Inc.

    • Targeted Attacks / Cyber Attacks
    • Human Resource Development
    • Phishing scam

    Presented byLRM, Inc.

  • GB-03

    Next-generation update management after WSUS discontinuation: Migration strategy to IT asset management tools

    • Speaker

      DOS Co., Ltd.

    • Data Leakage Prevention
    • Endpoint Security
    • Vulnerability / Tampering Countermeasures

    Presented byDOS Co., Ltd.

  • GC-03

    Case study presentation: Utilizing "Security Measures System" compliance!
    ~Nitto Kogyo's efforts to visualize security measures~

    • Speaker

      NITTO KOGYO CORPORATION

      Cyber Security Section / ICT Infrastructure Strategy Office
      Senior Project Manager

      Kitazumi Chiho

    • Moderator

      Network Value Components Ltd.

      Sales Div. Sale Department 1 Group 1

      Kondo Takumi

    • Vulnerability / Tampering Countermeasures
    • Security Audits / System Audits
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends

    Presented byNetwork Value Components Ltd.

12:05 | 12:35
  • GA-04

    Battlespace Cyber: Incidents via Wireless Space and Cyber Security

    • Speaker

      Ministry of Defense

      National Institute for Defense Studies
      Police Research Department
      Senior Research Officer

      Kawamura Koki

    • Endpoint Security
  • GB-04

    How to Get Started with Cybersecurity as a Key Enabler of Factory Digital Transformation

    • Speaker

      Nagoya Institute of Technology

      Manufacturing and Innovation DX Laboratory
      Visiting Associate Professor

      Hiroshi Sasaki

    • Targeted Attacks / Cyber Attacks
    • SOC / Incident Response
    • Human Resource Development
  • GC-04

    A control system vendor's approach as a bridge between IT and OT systems

    • Speaker

      Yokogawa Electric Corporation

    • Targeted Attacks / Cyber Attacks
    • IoT Security
    • Critical Infrastructure Security
12:50 | 13:30
  • GA-05

    Why Small Businesses Are the New Targets
    — The Latest Cyber Threats and How EPP × MDR Become the New Standard for Protection

    • Speaker

      Kaspersky Labs Japan

      Enterprise Solution Expert

      Takehiro Ito

    • Ransomware Countermeasures
    • Endpoint Security
    • Managed Security Services

    Presented byK.K. Kaspersky Labs Japan

  • GB-05

    From ad hoc to strategic: Quantitative assessment of internal and external security risks

    • Speaker

      Tsuzuki Denki Co., Ltd.

      Section 1, Security Business Promotion Department

      Takeshi Akiyama

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Security Audits / System Audits

    Presented byTSUZUKI DENKI CO.,LTD.

  • GC-05

    Aiming to minimize the risk of an expanding attack surface through AI
    Understanding the essence of "proactive security"

    • Speaker

      Trend Micro Incorporated

      Manager,
      Platform Marketing Group,
      Platform Enablement Dept

      Shiori Okamoto

    • Ransomware Countermeasures
    • Endpoint Security
    • AI Security

    Presented byTrend Micro Inc.

13:45 | 14:25
  • GA-06

    Strengthening Windows login security with AD integration
    - Multi-factor authentication and access control required for the supply chain -

    • Speaker

      OceanBridge Inc.

    • Zero Trust
    • Authentication / Identity Management
    • Software Supply Chain Attacks

    Presented byOceanBridge Inc.

  • GB-06

    Building a Resilient Supply Chain: Multi-Layered Defense & Email Security with HENNGE One

    • Speaker

      HENNGE K.K.

      Cloud Sales Division,
      Central Japan Sales Section

      Shinya Hatta

    • Targeted Attacks / Cyber Attacks
    • Cloud Security
    • Business Email Compromise Countermeasures

    Presented byHENNGE K.K.

  • GC-06

    The Current State and Future of SASE
    ~Toward the Realization of Secure Digital Transformation and Axon Transformation~

    • Speaker

      SoftBank Corp.

    • Zero Trust
    • AI Security
    • SASE (Secure Acess Service Edge)

    Presented bySoftBank Corp.

14:35 | 15:05
  • GA-07

    Considering the importance of OT security measures in the digital transformation of manufacturing sites through case studies
    ~What's happening between IT and OT?~

    • Speaker

      Mitsubishi Electric Corporation

    • Targeted Attacks / Cyber Attacks
    • Endpoint Security
    • Zero Trust

    Presented byMitsubishi Electric Corporation

  • GB-07

    Response to trends in laws and regulations regarding product security

    • Speaker

      Meiji University

      Institute of Business Information Ethics
      Visiting Researcher

      Eiichi Moriya

    • IoT Security
    • PSIRT / CSIRT
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
  • GC-07

    Agentic AI and LLMs: A Game-Changer in Cybersecurity

    • Speaker

      Institute of Information Security

      Professor

      Akira Otsuka

    • Targeted Attacks / Cyber Attacks
    • AI Security
15:15 | 15:55
  • GA-08

    How to take your vulnerability management to the next level?
    Introducing Continuous Risk Management with Qualys.

    • Speaker

      Qualys Japan K.K.

      Sales Department HQ
      Regional Sales Director, Japan

      Mitsufusa Sugimoto

    • Demonstrator

      Qualys Japan K.K.

      Sales Department HQ
      Technical Account Manager

      Fuyuki Motono

    • Vulnerability / Tampering Countermeasures
    • Security Audits / System Audits
    • PSIRT / CSIRT

    Presented byQualys Japan K.K.

  • GB-08

    In an era where smartphones are targeted - Security strategies to protect mobile devices

    • Speaker

      Jamf Japan G.K.

      Sales Engineer Manager

      Yoshinori Inaba

    • Data Leakage Prevention
    • Endpoint Security
    • Zero Trust

    Presented byJamf Japan G.K.

  • GC-08

    The first step in cybersecurity measures is vulnerability management

    • Speaker

      Mitsubishi Electric Digital Innovation Corporation

      Information Security Service Division
      Service Planning Section

      Takata Naoki

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Vulnerability / Tampering Countermeasures

    Presented byMitsubishi Electric Digital Innovation Corporation

16:10 | 16:50
  • GA-09

    Why Palo Alto Networks Matters Now: In-Depth Discussion (Tentative)

    • Speaker

      Palo Alto Networks K.K.

      Chief Cybersecurity Strategist

      Masayoshi Someya

    • Speaker

      SB C&S Corp.

      Digital Sales Promotion Office
      Network&Security Promotion Division ICT Unit

      Jun Sugata

    • AI Security
    • SASE (Secure Acess Service Edge)

    Presented bySB C&S Corp.

  • GB-09

    The Security Resilience of Japanese Companies Revealed by Sekyumaru
    - Necessary Next Actions from Short- and Long-Term Perspectives - Beyond Zero Trust

    • Speaker

      Marubeni I-DIGIO Group

    • Cloud Security
    • Zero Trust
    • SASE (Secure Acess Service Edge)

    Presented byMarubeni I-DIGIO Group

  • GC-09

    Conquer increasingly complex compliance!
    - Minimizing corporate risk through automation -

    • Speaker

      Dai Nippon Printing Co., Ltd.

    • Security Audits / System Audits
    • Workstyle Innovation

    Presented byDai Nippon Printing Co., Ltd.

17:00 | 17:30
  • GA-10

    Introducing the "IPA Top 10 Information Security Threats 2025 (Organizational Edition)"
    ~Don't excuse your ignorance! Stay up to date with the latest information to prevent threats~

    • Speaker

      Information-technology Promotion Agency, Japan (IPA)

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Critical Infrastructure Security
  • GB-10

    The threat of state-sponsored cyber attacks

    • Speaker

      Public Security Intelligence Agency

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
  • GC-10

    AI BOM - Secure and transparent AI in an ecosystem

    • Speaker

      The Linux Foundation

      Japan
      VP of Japan Operations

      Noriaki Fukuyasu

    • AI Security
    • SBOM (Software Bill of Materials)
  • Privacy Policy

[25年春開催]Security Days Spring 2025

Copyright (c) NANO OPT Media, Inc. All rights reserved.