Session
Search (possible multiple choice)
Keyword
10.16(Thu)
-
09:30 | 10:00
-
-
GA-01
Cyberspace threat situation and police efforts (tentative)
-
Speaker
National Police Agency JAPAN
Cybercrime Prevention Office, Cyber Affairs Bureau
Assistant DirectorYohsuke Nakagawa
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
-
Speaker
-
GB-01
What is the hot topic of supply chain security right now?
~From the changing situation surrounding companies in the Chubu region~ Part 1-
Panelist
Information-technology Promotion Agency, Japan (IPA)
-
Panelist
TOYOTA INDUSTRIES IT SOLUTIONS Inc.
-
Panelist
Suzuki Motor Corporation
-
Moderator
Chubu Electric Power Co.,Inc.
-
Panelist
-
GC-01
What Does Identity Really Mean?
— 2035 is just around the corner —-
Speaker
The University of Osaka
D3 center
Professor, CISOAtsuo Inomata
- Targeted Attacks / Cyber Attacks
- Zero Trust
- Authentication / Identity Management
-
Speaker
-
-
10:10 | 10:50
-
-
GA-02
Evolving Threats, Enhanced Defense: Key Insights from the 2025 Threat Hunting Report
-
Speaker
CrowdStrike Japan GK
Sales Engineering Dept.
Sales EngineerSatoshi Sakamoto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
Presented byCrowdStrike Japan GK
-
Speaker
-
GB-02
What is the hot topic of supply chain security right now?
~From the changing situation surrounding companies in the Chubu region~ Part 2-
Panelist
Information-technology Promotion Agency, Japan (IPA)
-
Panelist
TOYOTA INDUSTRIES IT SOLUTIONS Inc.
-
Panelist
Suzuki Motor Corporation
-
Moderator
Chubu Electric Power Co.,Inc.
-
Panelist
-
GC-02
The Pros and Cons of AI Utilization: The "Offensive and Defensive" Security Strategy Required in the Digital Transformation Era
-
Speaker
Netskope Japan K.K.
- Cloud Security
- Data Leakage Prevention
- SASE (Secure Acess Service Edge)
Presented byNetskope Japan K.K.
-
Speaker
-
-
11:05 | 11:45
-
-
GA-03
Effective and efficient security education that encourages employee behavioral change
-
Speaker
LRM, Inc.
- Targeted Attacks / Cyber Attacks
- Human Resource Development
- Phishing scam
Presented byLRM, Inc.
-
Speaker
-
GB-03
Next-generation update management after WSUS discontinuation: Migration strategy to IT asset management tools
-
Speaker
DOS Co., Ltd.
- Data Leakage Prevention
- Endpoint Security
- Vulnerability / Tampering Countermeasures
Presented byDOS Co., Ltd.
-
Speaker
-
GC-03
Case study presentation: Utilizing "Security Measures System" compliance!
~Nitto Kogyo's efforts to visualize security measures~-
Speaker
NITTO KOGYO CORPORATION
Cyber Security Section / ICT Infrastructure Strategy Office
Senior Project ManagerKitazumi Chiho
-
Moderator
Network Value Components Ltd.
Sales Div. Sale Department 1 Group 1
Kondo Takumi
- Vulnerability / Tampering Countermeasures
- Security Audits / System Audits
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
Presented byNetwork Value Components Ltd.
-
Speaker
-
-
12:05 | 12:35
-
-
GA-04
Battlespace Cyber: Incidents via Wireless Space and Cyber Security
-
Speaker
Ministry of Defense
National Institute for Defense Studies
Police Research Department
Senior Research OfficerKawamura Koki
- Endpoint Security
-
Speaker
-
GB-04
How to Get Started with Cybersecurity as a Key Enabler of Factory Digital Transformation
-
Speaker
Nagoya Institute of Technology
Manufacturing and Innovation DX Laboratory
Visiting Associate ProfessorHiroshi Sasaki
- Targeted Attacks / Cyber Attacks
- SOC / Incident Response
- Human Resource Development
-
Speaker
-
GC-04
A control system vendor's approach as a bridge between IT and OT systems
-
Speaker
Yokogawa Electric Corporation
- Targeted Attacks / Cyber Attacks
- IoT Security
- Critical Infrastructure Security
-
Speaker
-
-
12:50 | 13:30
-
-
GA-05
Why Small Businesses Are the New Targets
— The Latest Cyber Threats and How EPP × MDR Become the New Standard for Protection-
Speaker
Kaspersky Labs Japan
Enterprise Solution Expert
Takehiro Ito
- Ransomware Countermeasures
- Endpoint Security
- Managed Security Services
Presented byK.K. Kaspersky Labs Japan
-
Speaker
-
GB-05
From ad hoc to strategic: Quantitative assessment of internal and external security risks
-
Speaker
Tsuzuki Denki Co., Ltd.
Section 1, Security Business Promotion Department
Takeshi Akiyama
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Security Audits / System Audits
Presented byTSUZUKI DENKI CO.,LTD.
-
Speaker
-
GC-05
Aiming to minimize the risk of an expanding attack surface through AI
Understanding the essence of "proactive security"-
Speaker
Trend Micro Incorporated
Manager,
Platform Marketing Group,
Platform Enablement DeptShiori Okamoto
- Ransomware Countermeasures
- Endpoint Security
- AI Security
Presented byTrend Micro Inc.
-
Speaker
-
-
13:45 | 14:25
-
-
GA-06
Strengthening Windows login security with AD integration
- Multi-factor authentication and access control required for the supply chain --
Speaker
OceanBridge Inc.
- Zero Trust
- Authentication / Identity Management
- Software Supply Chain Attacks
Presented byOceanBridge Inc.
-
Speaker
-
GB-06
Building a Resilient Supply Chain: Multi-Layered Defense & Email Security with HENNGE One
-
Speaker
HENNGE K.K.
Cloud Sales Division,
Central Japan Sales SectionShinya Hatta
- Targeted Attacks / Cyber Attacks
- Cloud Security
- Business Email Compromise Countermeasures
Presented byHENNGE K.K.
-
Speaker
-
GC-06
The Current State and Future of SASE
~Toward the Realization of Secure Digital Transformation and Axon Transformation~-
Speaker
SoftBank Corp.
- Zero Trust
- AI Security
- SASE (Secure Acess Service Edge)
Presented bySoftBank Corp.
-
Speaker
-
-
14:35 | 15:05
-
-
GA-07
Considering the importance of OT security measures in the digital transformation of manufacturing sites through case studies
~What's happening between IT and OT?~-
Speaker
Mitsubishi Electric Corporation
- Targeted Attacks / Cyber Attacks
- Endpoint Security
- Zero Trust
Presented byMitsubishi Electric Corporation
-
Speaker
-
GB-07
Response to trends in laws and regulations regarding product security
-
Speaker
Meiji University
Institute of Business Information Ethics
Visiting ResearcherEiichi Moriya
- IoT Security
- PSIRT / CSIRT
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
-
Speaker
-
GC-07
Agentic AI and LLMs: A Game-Changer in Cybersecurity
-
Speaker
Institute of Information Security
Professor
Akira Otsuka
- Targeted Attacks / Cyber Attacks
- AI Security
-
Speaker
-
-
15:15 | 15:55
-
-
GA-08
How to take your vulnerability management to the next level?
Introducing Continuous Risk Management with Qualys.-
Speaker
Qualys Japan K.K.
Sales Department HQ
Regional Sales Director, JapanMitsufusa Sugimoto
-
Demonstrator
Qualys Japan K.K.
Sales Department HQ
Technical Account ManagerFuyuki Motono
- Vulnerability / Tampering Countermeasures
- Security Audits / System Audits
- PSIRT / CSIRT
Presented byQualys Japan K.K.
-
Speaker
-
GB-08
In an era where smartphones are targeted - Security strategies to protect mobile devices
-
Speaker
Jamf Japan G.K.
Sales Engineer Manager
Yoshinori Inaba
- Data Leakage Prevention
- Endpoint Security
- Zero Trust
Presented byJamf Japan G.K.
-
Speaker
-
GC-08
The first step in cybersecurity measures is vulnerability management
-
Speaker
Mitsubishi Electric Digital Innovation Corporation
Information Security Service Division
Service Planning SectionTakata Naoki
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Vulnerability / Tampering Countermeasures
Presented byMitsubishi Electric Digital Innovation Corporation
-
Speaker
-
-
16:10 | 16:50
-
-
GA-09
Why Palo Alto Networks Matters Now: In-Depth Discussion (Tentative)
-
Speaker
Palo Alto Networks K.K.
Chief Cybersecurity Strategist
Masayoshi Someya
-
Speaker
SB C&S Corp.
Digital Sales Promotion Office
Network&Security Promotion Division ICT UnitJun Sugata
- AI Security
- SASE (Secure Acess Service Edge)
Presented bySB C&S Corp.
-
Speaker
-
GB-09
The Security Resilience of Japanese Companies Revealed by Sekyumaru
- Necessary Next Actions from Short- and Long-Term Perspectives - Beyond Zero Trust-
Speaker
Marubeni I-DIGIO Group
- Cloud Security
- Zero Trust
- SASE (Secure Acess Service Edge)
Presented byMarubeni I-DIGIO Group
-
Speaker
-
GC-09
Conquer increasingly complex compliance!
- Minimizing corporate risk through automation --
Speaker
Dai Nippon Printing Co., Ltd.
- Security Audits / System Audits
- Workstyle Innovation
Presented byDai Nippon Printing Co., Ltd.
-
Speaker
-
-
17:00 | 17:30
-
-
GA-10
Introducing the "IPA Top 10 Information Security Threats 2025 (Organizational Edition)"
~Don't excuse your ignorance! Stay up to date with the latest information to prevent threats~-
Speaker
Information-technology Promotion Agency, Japan (IPA)
- Ransomware Countermeasures
- Data Leakage Prevention
- Critical Infrastructure Security
-
Speaker
-
GB-10
The threat of state-sponsored cyber attacks
-
Speaker
Public Security Intelligence Agency
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
-
Speaker
-
GC-10
AI BOM - Secure and transparent AI in an ecosystem
-
Speaker
The Linux Foundation
Japan
VP of Japan OperationsNoriaki Fukuyasu
- AI Security
- SBOM (Software Bill of Materials)
-
Speaker
-