Session
Search (possible multiple choice)
Keyword
10.17(Fri)
-
09:30 | 10:00
-
-
GA2-01
Cyber Attack Trends and Automotive Security Measures
-
Speaker
Tokyo Denki University
Emeritus Professor
Ryoichi Sasaki
- Targeted Attacks / Cyber Attacks
- Vulnerability / Tampering Countermeasures
- IoT Security
-
Speaker
-
GB2-01
DENSO’s Efforts on Product Security to Support the CASE Era
-
Speaker
DENSO CORPORATION
CISSP, CCSP, CISA, CEH
General Manager, Product Security Dept.
SOMRIE® Security Specialist, Senior
Information Security DivisionKeiichiro Hiranaga
- Security Audits / System Audits
- Critical Infrastructure Security
- PSIRT / CSIRT
-
Speaker
-
GC2-01
Securing the Mobility Ecosystem in the SDV Era: AWS Security Solutions for Automotive
-
Speaker
Amazon Web Services Japan G.K.
Solutions 1 Automotive &Manufacturing Group
Sr.Solutions ArchitectureTaku Fukushima
- Cloud Security
- Zero Trust
- Critical Infrastructure Security
-
Speaker
-
-
10:10 | 10:50
-
-
GA2-02
Efficiently comply with JAMA guidelines! Strategies for utilizing IT asset management tools
-
Speaker
DOS Co., Ltd.
- Data Leakage Prevention
- Endpoint Security
- Vulnerability / Tampering Countermeasures
Presented byDOS Co., Ltd.
-
Speaker
-
GB2-02
The Forefront of Identity Security for Compliance with JAMA/JAPIA Cybersecurity Guidelines: MFA and Access Control with Silverfort
-
Speaker
Silverfort
Country Lead, Japan
Hiro Aoyama
-
Demonstrator
Silverfort
Senior Sales Engineer, Japan
Kimimasa Sato
- Targeted Attacks / Cyber Attacks
- Zero Trust
- Authentication / Identity Management
Presented bySilverfort PTE LTD
-
Speaker
-
GC2-02
Overview of NXP’s HSE(Hardware Security Engine) root-of-trust at the core of the SDV
-
Speaker
NXP Japan
GS Japan Automotive Sales Automotive Business Development
Senior Principal Field Application EngineerShigehiko Tsumura
- IoT Security
- Encryption / Certificates
- Quantum Security
Presented byNXP Japan Ltd.
-
Speaker
-
-
11:05 | 11:45
-
-
GA2-03
Effective and efficient security education that encourages employee behavioral change
-
Speaker
LRM, Inc.
- Targeted Attacks / Cyber Attacks
- Human Resource Development
- Phishing scam
Presented byLRM, Inc.
-
Speaker
-
GB2-03
Inside the Hacker’s Mind: Lessons from Real Attacks on Software-Defined Vehicles
-
Speaker
ForAllSecure, Inc.
CEO
David Brumley
- Targeted Attacks / Cyber Attacks
- IoT Security
- Application Security
Presented byTECHMATRIX CORPORATION
-
Speaker
-
GC2-03
Going beyond the limits of SIEM! Defense of the automotive supply chain with XDR
- XDR
- SOC / Incident Response
- IoT Security
Presented byBroadBand Security, Inc.
-
-
12:05 | 12:35
-
-
GA2-04
Initiatives to improve practical capabilities in ongoing cybersecurity activities
-
Speaker
Japan Automotive ISAC INC.
-
Speaker
-
GB2-04
New Values Brought by Software-Defined Vehicles
-
Speaker
Nagoya University
Global Research Institute for Mobility in Society
Director and ProfessorHiroaki Takada
- Other
-
Speaker
-
GC2-04
Uncovering This Much from Public Information! The Power of OSINT Through Real-World Industry Cases
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Phishing scam
-
-
12:50 | 13:30
-
-
GA2-05
Securing Connected Vehicles: Vulnerability Assessment and Mitigation in Embedded Software
-
Speaker
TOYO Corporation
Software Solutions
ChiefToshikazu Iwata
- Vulnerability / Tampering Countermeasures
- SBOM (Software Bill of Materials)
- Software Supply Chain Attacks
Presented byTOYO Corporation
-
Speaker
-
GB2-05
Learning from advanced European examples: Data security for further data utilization
-
Speaker
Partisia Application ApS
Commercial Department
Japan Branch Representative
- Zero Trust
- Authentication / Identity Management
- Encryption / Certificates
Presented byPartisia Applications ApS
-
Speaker
-
GC2-05
Cybersecurity evaluation methods for automotive ECU development and case studies of ETAS solutions
-
Speaker
ETAS K.K.
Security, Information & Diagnostics Solution Field
Field Application EngineerOsamu Terada
- Vulnerability / Tampering Countermeasures
- SBOM (Software Bill of Materials)
- Other
Presented byETAS K.K.
-
Speaker
-
-
13:45 | 14:25
-
-
GA2-06
Protecting only domestic bases is dangerous!
Three solutions to prevent rapidly increasing attacks on the global supply chain-
Speaker
Internet Initiative Japan Inc.
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Zero Trust
Presented byInternet Initiative Japan Inc.
-
Speaker
-
GB2-06
Coming soon
-
Speaker
BSI Professional Services Japan
Consulting Services,
Consultant,PMPAkira Nomura
- Security Audits / System Audits
- Other
Presented byBSI Professional Services Japan Co.,Ltd.
-
Speaker
-
GC2-06
JAMA/JAPIA Cybersecurity Guidelines: Gap to Compliance
-
Speaker
MOTEX Inc.
Presented byMOTEX Inc.
-
Speaker
-
-
14:35 | 15:05
-
-
GA2-07
Automotive Cyber Threats and Latest Vulnerability Trends
-
Speaker
General Incorporated Association Japan Automotive ISAC
Security Operation Center
Deputy DirectorMasahiro Aoyama
- SOC / Incident Response
- Monitoring / Detection
- PSIRT / CSIRT
-
Speaker
-
GB2-07
Security in Control and Mobility
— Technologies to Protect Moving Systems-
Speaker
The University of Osaka
Department of Mechanical Engineering
ProfessorKenji Sawada
- Targeted Attacks / Cyber Attacks
- AI Security
- Critical Infrastructure Security
-
Speaker
-
GC2-07
Generative AI-Based Autonomous Driving: Threats and Countermeasures
-
Speaker
Turing Inc.
Fundamental AI team
Principal ResearcherTsubasa Takahashi
- AI Security
- Edge Security
-
Speaker
-
-
15:15 | 15:55
-
-
GA2-08
How to Promote OT Security Measures in the Automotive Industry
~Key Points for Meeting Requirements~-
Speaker
Mitsubishi Electric Corporation
- Targeted Attacks / Cyber Attacks
- Endpoint Security
- Zero Trust
Presented byMitsubishi Electric Corporation
-
Speaker
-
GB2-08
Coming soon
-
Speaker
Macnica, Inc.
Networks Company
Security Division #2Yusuke Takahashi
- SOC / Incident Response
Presented byMacnica, Inc.
-
Speaker
-
GC2-08
Coming sooProtecting Products from Supply Chain Attacks!
Utilizing SBOM and Strengthening Security in Embedded Softwaren-
Speaker
Cybertrust Japan Co., Ltd.
- Vulnerability / Tampering Countermeasures
- SBOM (Software Bill of Materials)
- Software Supply Chain Attacks
Presented byCybertrust Japan Co., Ltd.
-
Speaker
-
-
16:10 | 16:50
-
-
GA2-09
Balancing "Development Freedom" and "Security" in the SDV Era: Protecting the Automotive Development Environment with Cloud and AI
-
Speaker
Netskope Japan K.K.
- Ransomware Countermeasures
- Cloud Security
- SASE (Secure Acess Service Edge)
Presented byNetskope Japan K.K.
-
Speaker
-
GB2-09
[A Must-See for Automotive Industry Professionals!] Security Measures Compliant with JAMA Guidelines
-
Speaker
Digital Arts Inc.
Marketing Division
ManagerRyosuke Nakayama
- Zero Trust
- Email Security
- Authentication / Identity Management
Presented byDigital Arts Inc.
-
Speaker
-
GC2-09
The forefront of automotive security in the SDV era
- How to prepare for evolving threats-
Speaker
Panasonic Automotive Systems Co., Ltd.
- Vulnerability / Tampering Countermeasures
- Monitoring / Detection
- PSIRT / CSIRT
Presented byPanasonic Automotive Systems Co., Ltd.
-
Speaker
-
-
17:00 | 17:30
-
-
GA2-10
Cybersecurity Measures in the Automotive Supply Chain in the Era of Software-Defined Vehicles (SDV)
-
Speaker
General Incorporated Association Japan Automotive ISAC
Cyber Security Ecosystem Construction Center
Director /(Mazda Motor Corporation
MDI&IT Division
Director Global Security OfficerMasashi Yamasaki
- PSIRT / CSIRT
- Human Resource Development
- SBOM (Software Bill of Materials)
-
Speaker
-
GB2-10
A Decade of Automotive Security Through the Eyes of Academia — Past, Present, and Future
-
Speaker
Graduate School of Informatics, Nagoya University
- Application Security
- Software Supply Chain Attacks
- Edge Security
-
Speaker
-
GC2-10
Regulations for the Cyber Security of Vehicles
-
Speaker
TMI Associates
Attorney at Law,
Partner of TMI AssociatesYukitaka Iwata
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Critical Infrastructure Security
-
Speaker
-