Session
Search (possible multiple choice)
Keyword
10.16(Thu)
-
09:30 | 10:00
-
-
GA-01
Cyberspace threat situation and police efforts (tentative)
-
Speaker
National Police Agency JAPAN
Cybercrime Prevention Office, Cyber Affairs Bureau
Assistant DirectorYohsuke Nakagawa
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
-
Speaker
-
GB-01
What is the hot topic of supply chain security right now?
~From the changing situation surrounding companies in the Chubu region~ Part 1-
Panelist
Information-technology Promotion Agency, Japan (IPA)
-
Panelist
TOYOTA INDUSTRIES IT SOLUTIONS Inc.
-
Panelist
Suzuki Motor Corporation
-
Moderator
Chubu Electric Power Co.,Inc.
-
Panelist
-
GC-01
What Does Identity Really Mean?
— 2035 is just around the corner —-
Speaker
The University of Osaka
D3 center
Professor, CISOAtsuo Inomata
- Targeted Attacks / Cyber Attacks
- Zero Trust
- Authentication / Identity Management
-
Speaker
-
-
10:10 | 10:50
-
-
GA-02
Evolving Threats, Enhanced Defense: Key Insights from the 2025 Threat Hunting Report
-
Speaker
CrowdStrike Japan GK
Sales Engineering Dept.
Sales EngineerSatoshi Sakamoto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
Presented byCrowdStrike Japan GK
-
Speaker
-
GB-02
What is the hot topic of supply chain security right now?
~From the changing situation surrounding companies in the Chubu region~ Part 2-
Panelist
Information-technology Promotion Agency, Japan (IPA)
-
Panelist
TOYOTA INDUSTRIES IT SOLUTIONS Inc.
-
Panelist
Suzuki Motor Corporation
-
Moderator
Chubu Electric Power Co.,Inc.
-
Panelist
-
GC-02
The Pros and Cons of AI Utilization: The "Offensive and Defensive" Security Strategy Required in the Digital Transformation Era
-
Speaker
Netskope Japan K.K.
- Cloud Security
- Data Leakage Prevention
- SASE (Secure Acess Service Edge)
Presented byNetskope Japan K.K.
-
Speaker
-
-
11:05 | 11:45
-
-
GA-03
Effective and efficient security education that encourages employee behavioral change
-
Speaker
LRM, Inc.
- Targeted Attacks / Cyber Attacks
- Human Resource Development
- Phishing scam
Presented byLRM, Inc.
-
Speaker
-
GB-03
Next-generation update management after WSUS discontinuation: Migration strategy to IT asset management tools
-
Speaker
DOS Co., Ltd.
- Data Leakage Prevention
- Endpoint Security
- Vulnerability / Tampering Countermeasures
Presented byDOS Co., Ltd.
-
Speaker
-
GC-03
Case study presentation: Utilizing "Security Measures System" compliance!
~Nitto Kogyo's efforts to visualize security measures~-
Speaker
NITTO KOGYO CORPORATION
Cyber Security Section / ICT Infrastructure Strategy Office
Senior Project ManagerKitazumi Chiho
-
Moderator
Network Value Components Ltd.
Sales Div. Sale Department 1 Group 1
Kondo Takumi
- Vulnerability / Tampering Countermeasures
- Security Audits / System Audits
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
Presented byNetwork Value Components Ltd.
-
Speaker
-
-
12:05 | 12:35
-
-
GA-04
Battlespace Cyber: Incidents via Wireless Space and Cyber Security
-
Speaker
Ministry of Defense
National Institute for Defense Studies
Police Research Department
Senior Research OfficerKawamura Koki
- Endpoint Security
-
Speaker
-
GB-04
How to Get Started with Cybersecurity as a Key Enabler of Factory Digital Transformation
-
Speaker
Nagoya Institute of Technology
Manufacturing and Innovation DX Laboratory
Visiting Associate ProfessorHiroshi Sasaki
- Targeted Attacks / Cyber Attacks
- SOC / Incident Response
- Human Resource Development
-
Speaker
-
GC-04
A control system vendor's approach as a bridge between IT and OT systems
-
Speaker
Yokogawa Electric Corporation
- Targeted Attacks / Cyber Attacks
- IoT Security
- Critical Infrastructure Security
-
Speaker
-
-
12:50 | 13:30
-
-
GA-05
Why Small Businesses Are the New Targets
— The Latest Cyber Threats and How EPP × MDR Become the New Standard for Protection-
Speaker
Kaspersky Labs Japan
Enterprise Solution Expert
Takehiro Ito
- Ransomware Countermeasures
- Endpoint Security
- Managed Security Services
Presented byK.K. Kaspersky Labs Japan
-
Speaker
-
GB-05
From ad hoc to strategic: Quantitative assessment of internal and external security risks
-
Speaker
Tsuzuki Denki Co., Ltd.
Section 1, Security Business Promotion Department
Takeshi Akiyama
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Security Audits / System Audits
Presented byTSUZUKI DENKI CO.,LTD.
-
Speaker
-
GC-05
Aiming to minimize the risk of an expanding attack surface through AI
Understanding the essence of "proactive security"-
Speaker
Trend Micro Incorporated
Manager,
Platform Marketing Group,
Platform Enablement DeptShiori Okamoto
- Ransomware Countermeasures
- Endpoint Security
- AI Security
Presented byTrend Micro Inc.
-
Speaker
-
-
13:45 | 14:25
-
-
GA-06
Strengthening Windows login security with AD integration
- Multi-factor authentication and access control required for the supply chain --
Speaker
OceanBridge Inc.
- Zero Trust
- Authentication / Identity Management
- Software Supply Chain Attacks
Presented byOceanBridge Inc.
-
Speaker
-
GB-06
Building a Resilient Supply Chain: Multi-Layered Defense & Email Security with HENNGE One
-
Speaker
HENNGE K.K.
Cloud Sales Division,
Central Japan Sales SectionShinya Hatta
- Targeted Attacks / Cyber Attacks
- Cloud Security
- Business Email Compromise Countermeasures
Presented byHENNGE K.K.
-
Speaker
-
GC-06
The Current State and Future of SASE
~Toward the Realization of Secure Digital Transformation and Axon Transformation~-
Speaker
SoftBank Corp.
- Zero Trust
- AI Security
- SASE (Secure Acess Service Edge)
Presented bySoftBank Corp.
-
Speaker
-
-
14:35 | 15:05
-
-
GA-07
Considering the importance of OT security measures in the digital transformation of manufacturing sites through case studies
~What's happening between IT and OT?~-
Speaker
Mitsubishi Electric Corporation
- Targeted Attacks / Cyber Attacks
- Endpoint Security
- Zero Trust
Presented byMitsubishi Electric Corporation
-
Speaker
-
GB-07
Response to trends in laws and regulations regarding product security
-
Speaker
Meiji University
Institute of Business Information Ethics
Visiting ResearcherEiichi Moriya
- IoT Security
- PSIRT / CSIRT
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
-
Speaker
-
GC-07
Agentic AI and LLMs: A Game-Changer in Cybersecurity
-
Speaker
Institute of Information Security
Professor
Akira Otsuka
- Targeted Attacks / Cyber Attacks
- AI Security
-
Speaker
-
-
15:15 | 15:55
-
-
GA-08
How to take your vulnerability management to the next level?
Introducing Continuous Risk Management with Qualys.-
Speaker
Qualys Japan K.K.
Sales Department HQ
Regional Sales Director, JapanMitsufusa Sugimoto
-
Demonstrator
Qualys Japan K.K.
Sales Department HQ
Technical Account ManagerFuyuki Motono
- Vulnerability / Tampering Countermeasures
- Security Audits / System Audits
- PSIRT / CSIRT
Presented byQualys Japan K.K.
-
Speaker
-
GB-08
In an era where smartphones are targeted - Security strategies to protect mobile devices
-
Speaker
Jamf Japan G.K.
Sales Engineer Manager
Yoshinori Inaba
- Data Leakage Prevention
- Endpoint Security
- Zero Trust
Presented byJamf Japan G.K.
-
Speaker
-
GC-08
The first step in cybersecurity measures is vulnerability management
-
Speaker
Mitsubishi Electric Digital Innovation Corporation
Information Security Service Division
Service Planning SectionTakata Naoki
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Vulnerability / Tampering Countermeasures
Presented byMitsubishi Electric Digital Innovation Corporation
-
Speaker
-
-
16:10 | 16:50
-
-
GA-09
Why Palo Alto Networks Matters Now: In-Depth Discussion (Tentative)
-
Speaker
Palo Alto Networks K.K.
Chief Cybersecurity Strategist
Masayoshi Someya
-
Speaker
SB C&S Corp.
Digital Sales Promotion Office
Network&Security Promotion Division ICT UnitJun Sugata
- AI Security
- SASE (Secure Acess Service Edge)
Presented bySB C&S Corp.
-
Speaker
-
GB-09
The Security Resilience of Japanese Companies Revealed by Sekyumaru
- Necessary Next Actions from Short- and Long-Term Perspectives - Beyond Zero Trust-
Speaker
Marubeni I-DIGIO Group
- Cloud Security
- Zero Trust
- SASE (Secure Acess Service Edge)
Presented byMarubeni I-DIGIO Group
-
Speaker
-
GC-09
Conquer increasingly complex compliance!
- Minimizing corporate risk through automation --
Speaker
Dai Nippon Printing Co., Ltd.
- Security Audits / System Audits
- Workstyle Innovation
Presented byDai Nippon Printing Co., Ltd.
-
Speaker
-
-
17:00 | 17:30
-
-
GA-10
Introducing the "IPA Top 10 Information Security Threats 2025 (Organizational Edition)"
~Don't excuse your ignorance! Stay up to date with the latest information to prevent threats~-
Speaker
Information-technology Promotion Agency, Japan (IPA)
- Ransomware Countermeasures
- Data Leakage Prevention
- Critical Infrastructure Security
-
Speaker
-
GB-10
The threat of state-sponsored cyber attacks
-
Speaker
Public Security Intelligence Agency
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
-
Speaker
-
GC-10
AI BOM - Secure and transparent AI in an ecosystem
-
Speaker
The Linux Foundation
Japan
VP of Japan OperationsNoriaki Fukuyasu
- AI Security
- SBOM (Software Bill of Materials)
-
Speaker
-
10.17(Fri)
-
09:30 | 10:00
-
-
GA2-01
Cyber Attack Trends and Automotive Security Measures
-
Speaker
Tokyo Denki University
Emeritus Professor
Ryoichi Sasaki
- Targeted Attacks / Cyber Attacks
- Vulnerability / Tampering Countermeasures
- IoT Security
-
Speaker
-
GB2-01
DENSO’s Efforts on Product Security to Support the CASE Era
-
Speaker
DENSO CORPORATION
CISSP, CCSP, CISA, CEH
General Manager, Product Security Dept.
SOMRIE® Security Specialist, Senior
Information Security DivisionKeiichiro Hiranaga
- Security Audits / System Audits
- Critical Infrastructure Security
- PSIRT / CSIRT
-
Speaker
-
GC2-01
Securing the Mobility Ecosystem in the SDV Era: AWS Security Solutions for Automotive
-
Speaker
Amazon Web Services Japan G.K.
Solutions 1 Automotive &Manufacturing Group
Sr.Solutions ArchitectureTaku Fukushima
- Cloud Security
- Zero Trust
- Critical Infrastructure Security
-
Speaker
-
-
10:10 | 10:50
-
-
GA2-02
Efficiently comply with JAMA guidelines! Strategies for utilizing IT asset management tools
-
Speaker
DOS Co., Ltd.
- Data Leakage Prevention
- Endpoint Security
- Vulnerability / Tampering Countermeasures
Presented byDOS Co., Ltd.
-
Speaker
-
GB2-02
The Forefront of Identity Security for Compliance with JAMA/JAPIA Cybersecurity Guidelines: MFA and Access Control with Silverfort
-
Speaker
Silverfort
Country Lead, Japan
Hiro Aoyama
-
Demonstrator
Silverfort
Senior Sales Engineer, Japan
Kimimasa Sato
- Targeted Attacks / Cyber Attacks
- Zero Trust
- Authentication / Identity Management
Presented bySilverfort PTE LTD
-
Speaker
-
GC2-02
Overview of NXP’s HSE(Hardware Security Engine) root-of-trust at the core of the SDV
-
Speaker
NXP Japan
GS Japan Automotive Sales Automotive Business Development
Senior Principal Field Application EngineerShigehiko Tsumura
- IoT Security
- Encryption / Certificates
- Quantum Security
Presented byNXP Japan Ltd.
-
Speaker
-
-
11:05 | 11:45
-
-
GA2-03
Effective and efficient security education that encourages employee behavioral change
-
Speaker
LRM, Inc.
- Targeted Attacks / Cyber Attacks
- Human Resource Development
- Phishing scam
Presented byLRM, Inc.
-
Speaker
-
GB2-03
Inside the Hacker’s Mind: Lessons from Real Attacks on Software-Defined Vehicles
-
Speaker
ForAllSecure, Inc.
CEO
David Brumley
- Targeted Attacks / Cyber Attacks
- IoT Security
- Application Security
Presented byTECHMATRIX CORPORATION
-
Speaker
-
GC2-03
Going beyond the limits of SIEM! Defense of the automotive supply chain with XDR
- XDR
- SOC / Incident Response
- IoT Security
Presented byBroadBand Security, Inc.
-
-
12:05 | 12:35
-
-
GA2-04
Initiatives to improve practical capabilities in ongoing cybersecurity activities
-
Speaker
Japan Automotive ISAC INC.
-
Speaker
-
GB2-04
New Values Brought by Software-Defined Vehicles
-
Speaker
Nagoya University
Global Research Institute for Mobility in Society
Director and ProfessorHiroaki Takada
- Other
-
Speaker
-
GC2-04
Uncovering This Much from Public Information! The Power of OSINT Through Real-World Industry Cases
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Phishing scam
-
-
12:50 | 13:30
-
-
GA2-05
Securing Connected Vehicles: Vulnerability Assessment and Mitigation in Embedded Software
-
Speaker
TOYO Corporation
Software Solutions
ChiefToshikazu Iwata
- Vulnerability / Tampering Countermeasures
- SBOM (Software Bill of Materials)
- Software Supply Chain Attacks
Presented byTOYO Corporation
-
Speaker
-
GB2-05
Learning from advanced European examples: Data security for further data utilization
-
Speaker
Partisia Application ApS
Commercial Department
Japan Branch Representative
- Zero Trust
- Authentication / Identity Management
- Encryption / Certificates
Presented byPartisia Applications ApS
-
Speaker
-
GC2-05
Cybersecurity evaluation methods for automotive ECU development and case studies of ETAS solutions
-
Speaker
ETAS K.K.
Security, Information & Diagnostics Solution Field
Field Application EngineerOsamu Terada
- Vulnerability / Tampering Countermeasures
- SBOM (Software Bill of Materials)
- Other
Presented byETAS K.K.
-
Speaker
-
-
13:45 | 14:25
-
-
GA2-06
Protecting only domestic bases is dangerous!
Three solutions to prevent rapidly increasing attacks on the global supply chain-
Speaker
Internet Initiative Japan Inc.
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Zero Trust
Presented byInternet Initiative Japan Inc.
-
Speaker
-
GB2-06
Coming soon
-
Speaker
BSI Professional Services Japan
Consulting Services,
Consultant,PMPAkira Nomura
- Security Audits / System Audits
- Other
Presented byBSI Professional Services Japan Co.,Ltd.
-
Speaker
-
GC2-06
JAMA/JAPIA Cybersecurity Guidelines: Gap to Compliance
-
Speaker
MOTEX Inc.
Presented byMOTEX Inc.
-
Speaker
-
-
14:35 | 15:05
-
-
GA2-07
Automotive Cyber Threats and Latest Vulnerability Trends
-
Speaker
General Incorporated Association Japan Automotive ISAC
Security Operation Center
Deputy DirectorMasahiro Aoyama
- SOC / Incident Response
- Monitoring / Detection
- PSIRT / CSIRT
-
Speaker
-
GB2-07
Security in Control and Mobility
— Technologies to Protect Moving Systems-
Speaker
The University of Osaka
Department of Mechanical Engineering
ProfessorKenji Sawada
- Targeted Attacks / Cyber Attacks
- AI Security
- Critical Infrastructure Security
-
Speaker
-
GC2-07
Generative AI-Based Autonomous Driving: Threats and Countermeasures
-
Speaker
Turing Inc.
Fundamental AI team
Principal ResearcherTsubasa Takahashi
- AI Security
- Edge Security
-
Speaker
-
-
15:15 | 15:55
-
-
GA2-08
How to Promote OT Security Measures in the Automotive Industry
~Key Points for Meeting Requirements~-
Speaker
Mitsubishi Electric Corporation
- Targeted Attacks / Cyber Attacks
- Endpoint Security
- Zero Trust
Presented byMitsubishi Electric Corporation
-
Speaker
-
GB2-08
Coming soon
-
Speaker
Macnica, Inc.
Networks Company
Security Division #2Yusuke Takahashi
- SOC / Incident Response
Presented byMacnica, Inc.
-
Speaker
-
GC2-08
Coming sooProtecting Products from Supply Chain Attacks!
Utilizing SBOM and Strengthening Security in Embedded Softwaren-
Speaker
Cybertrust Japan Co., Ltd.
- Vulnerability / Tampering Countermeasures
- SBOM (Software Bill of Materials)
- Software Supply Chain Attacks
Presented byCybertrust Japan Co., Ltd.
-
Speaker
-
-
16:10 | 16:50
-
-
GA2-09
Balancing "Development Freedom" and "Security" in the SDV Era: Protecting the Automotive Development Environment with Cloud and AI
-
Speaker
Netskope Japan K.K.
- Ransomware Countermeasures
- Cloud Security
- SASE (Secure Acess Service Edge)
Presented byNetskope Japan K.K.
-
Speaker
-
GB2-09
[A Must-See for Automotive Industry Professionals!] Security Measures Compliant with JAMA Guidelines
-
Speaker
Digital Arts Inc.
Marketing Division
ManagerRyosuke Nakayama
- Zero Trust
- Email Security
- Authentication / Identity Management
Presented byDigital Arts Inc.
-
Speaker
-
GC2-09
The forefront of automotive security in the SDV era
- How to prepare for evolving threats-
Speaker
Panasonic Automotive Systems Co., Ltd.
- Vulnerability / Tampering Countermeasures
- Monitoring / Detection
- PSIRT / CSIRT
Presented byPanasonic Automotive Systems Co., Ltd.
-
Speaker
-
-
17:00 | 17:30
-
-
GA2-10
Cybersecurity Measures in the Automotive Supply Chain in the Era of Software-Defined Vehicles (SDV)
-
Speaker
General Incorporated Association Japan Automotive ISAC
Cyber Security Ecosystem Construction Center
Director /(Mazda Motor Corporation
MDI&IT Division
Director Global Security OfficerMasashi Yamasaki
- PSIRT / CSIRT
- Human Resource Development
- SBOM (Software Bill of Materials)
-
Speaker
-
GB2-10
A Decade of Automotive Security Through the Eyes of Academia — Past, Present, and Future
-
Speaker
Graduate School of Informatics, Nagoya University
- Application Security
- Software Supply Chain Attacks
- Edge Security
-
Speaker
-
GC2-10
Regulations for the Cyber Security of Vehicles
-
Speaker
TMI Associates
Attorney at Law,
Partner of TMI AssociatesYukitaka Iwata
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Critical Infrastructure Security
-
Speaker
-