iotc iotc

    • linkedin
    • facebook
    • twitter
    • YouTube
  • Registration

    Registration
  • Outline Outline
  • Osaka Osaka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Nagoya Nagoya
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Tokyo Tokyo
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Fukuoka Fukuoka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • Osaka Osaka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Nagoya Nagoya
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Tokyo Tokyo
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Fukuoka Fukuoka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration

      Registration

Session

  • consecutive interpreting

Search (possible multiple choice)

Keyword

10.10(Fri)

  • RoomA
  • RoomB
  • RoomC
  • RoomD
  • RoomE
09:45 | 10:15
  • OA-01

    Beyond Ransomware: The Overlooked Reality of Cyber Attacks and Strategic Countermeasures
    --Cybersecurity as a Critical Business Risk--

    • Speaker

      Kobe University

      Graduate School of Engineering, Professor Emeritus

      Masakatu Morii

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Business Email Compromise Countermeasures
  • OB-01

    Battlespace Cyber: Incidents via Wireless Space and Cyber Security

    • Speaker

      Ministry of Defense

      National Institute for Defense Studies
      Police Research Department
      Senior Research Officer

    • Endpoint Security
  • OC-01

    A Retrospective on the System Downtime Caused by Ransomware: Recovery Challenges and Hidden Pitfalls.

    • Speaker

      Osaka Prefectural Hospital Organization, Osaka General Medical Center

      Dept. of Medical Information Management
      Senior Chief Officer

      Hirofumi Morito

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
  • OD-01

    The current state of cybercrime and the efforts of the Osaka Prefectural Police

    • Speaker

      Osaka Prefectural Police.

    • Ransomware Countermeasures
    • Phishing scam
    • Other
  • OE-01

    Is security really something that small and medium-sized businesses and organizations need?
    ~ Reconsidering now: How to communicate "security" to management and executives ~

    • Speaker

      Japan Network Security Association.

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Data Leakage Prevention
10:25 | 11:05
  • OA-02

    What you need to consider now to protect your users and apps from threats and risks posed by AI

    • Speaker

      A10 Networks, K.K.

    • Targeted Attacks / Cyber Attacks
    • Vulnerability / Tampering Countermeasures
    • AI Security

    Presented byA10 Networks, K.K.

  • OB-02

    Maximizing the Power of Generative AI: Evolving Network Security
    — Latest Threat Trends & Solutions with Single-Vendor SASE

    • Speaker

      Cato Networks

      Field CTO

      Haru Kaneko

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • SASE (Secure Acess Service Edge)

    Presented byCato Networks (Japan) KK

  • OC-02

    Overlooked WSUS-Successor Challenges, Frontline Migration and Vulnerability Countermeasures
    —Hidden Risks and Solutions in Update Management—

    • Speaker

      Jupiter Technology Corp.

      Business Unit 3,
      Sales Group

      Hirofumi Kawamoto

    • Demonstrator

      Jupiter Technology Corp.

      Business Unit 3,
      Technical Group

      Akane Shimada

    • Targeted Attacks / Cyber Attacks
    • Endpoint Security
    • Vulnerability / Tampering Countermeasures

    Presented byJupiter Technology Corp.

  • OD-02

    Next-generation update management after WSUS discontinuation: Migration strategy to IT asset management tools

    • Speaker

      DOS Co., Ltd.

    • Data Leakage Prevention
    • Endpoint Security
    • Vulnerability / Tampering Countermeasures

    Presented byDOS Co., Ltd.

  • OE-02

    Smart Security: The Need for WIPS to Protect Wireless Networks

    • Speaker

      KORNIC GLORY

      Wired Technology Team / Manager

      CHANG MINSEON

    • Data Leakage Prevention
    • Monitoring / Detection
    • Managed Security Services

    Presented byKornic Glory Co.,Ltd.

11:15 | 11:55
  • OA-03

    Ransomware Prevention in the AI Age: Redefining Cyber Resilience and Resiliency

    • Speaker

      NTT DATA Japan Corporation

      Security & Network Division
      General Manager, Cyber Security

      Ryo Hoshino

    • Ransomware Countermeasures
    • AI Security

    Presented byNTT DATA KANSAI CORPORATION

  • OB-03

    Overcome cyber attacks as a business risk.
    Yamory shows vulnerability countermeasures in the cloud and SBOM era

    • Speaker

      Assured, Inc.

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • SBOM (Software Bill of Materials)

    Presented byAssured, Inc.

  • OC-03

    Effective and efficient security education that encourages employee behavioral change

    • Speaker

      LRM, Inc.

    • Targeted Attacks / Cyber Attacks
    • Human Resource Development
    • Phishing scam

    Presented byLRM, Inc.

  • OD-03

    Multi-factor authentication and access control for easily strengthening Active Directory privileged account security

    • Speaker

      OceanBridge Inc.

    • Targeted Attacks / Cyber Attacks
    • Zero Trust
    • Authentication / Identity Management

    Presented byOceanBridge Inc.

  • OE-03

    How to take your vulnerability management to the next level?
    Introducing Continuous Risk Management with Qualys.

    • Speaker

      Qualys Japan K.K.

      Sales Department HQ
      Regional Sales Director, Japan

      Mitsufusa Sugimoto

    • Demonstrator

      Qualys Japan K.K.

      Sales Department HQ
      Technical Account Manager

      Fuyuki Motono

    • Vulnerability / Tampering Countermeasures
    • Security Audits / System Audits
    • PSIRT / CSIRT

    Presented byQualys Japan K.K.

12:15 | 12:55
  • OA-04

    From visualization to action: A case study of security implementation for an "unstoppable factory" using Claroty and RYODEN

    • Speaker

      Claroty Ltd.

    • Zero Trust
    • AI Security
    • Monitoring / Detection

    Presented byRYODEN CORPORATION

  • OB-04

    Is device protection alone enough?
    Next-generation security platform to prepare for evolving threats

    • Speaker

      Macnica, Inc.

    • Data Leakage Prevention
    • Endpoint Security
    • XDR

    Presented byMacnica, Inc.

  • OC-04

    In an era where smartphones are targeted - Security strategies to protect mobile devices

    • Speaker

      Jamf Japan G.K.

      Sales Enablement Manager

      Shingo Matsushima

    • Data Leakage Prevention
    • Endpoint Security
    • Zero Trust

    Presented byJamf Japan G.K.

  • OD-04

    Security testing required for compliance with cyber regulations such as the EU Cyber Resilience Act (CRA)

    • Speaker

      Black Duck Software G.K.

      Senior Technical Marketing Manager

      Masato Matsuoka

    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
    • Application Security
    • SBOM (Software Bill of Materials)

    Presented byBlack Duck Software G.K.

  • OE-04

    Why Is NDR Now Indispensable? Protecting Modern Networks from the Latest Threats

    • Speaker

      Vectra AI Japan KK

      Security Engineer
      CEH
      CISSP

      Masaharu Imai

    • Cloud Security
    • XDR
    • SOC / Incident Response

    Presented byVectra AI Japan KK

13:05 | 13:35
  • OA-05

    Time to Rethink Authentication: Password Authentication vs. Passwordless Authentication

    • Speaker

      Ritsumeikan University

      College of Information Science & Engineering ,
      Professor

      Tetsutaro Uehara

    • Targeted Attacks / Cyber Attacks
    • Authentication / Identity Management
    • Phishing scam
  • OB-05

    Uncovering This Much from Public Information! The Power of OSINT Through Real-World Industry Cases

    • Speaker

      Representative Director

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Phishing scam
  • OC-05

    Cyberspace threat situation and police efforts (tentative)

    • Speaker

      National Police Agency JAPAN

      Cybercrime Prevention Office, Cyber Affairs Bureau
      Assistant Director

      Yohsuke Nakagawa

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
  • OD-05

    Details of Panasonic Group's cybersecurity strategy and factory and product security initiatives

    • Speaker

      Panasonic Holdings Corporation

  • OE-05

    The first step in cybersecurity measures is vulnerability management

    • Speaker

      Mitsubishi Electric Digital Innovation Corporation

      Information Security Service Division
      Service Planning Section

      Mitsuhiro Kimura

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Vulnerability / Tampering Countermeasures

    Presented byMitsubishi Electric Digital Innovation Corporation

13:45 | 14:25
  • OA-06

    Why Small Businesses Are the New Targets
    — The Latest Cyber Threats and How EPP × MDR Become the New Standard for Protection

    • Speaker

      Kaspersky Labs Japan

      Enterprise Solution Expert

      Takehiro Ito

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Managed Security Services

    Presented byK.K. Kaspersky Labs Japan

  • OB-06

    "True CTEM" realized from a business perspective
    What is security management in the AI ​​era?

    • Speaker

      AI Security Lab Co., Ltd.

      Business Planning Department
      director

      Kazuma Abe

    • Vulnerability / Tampering Countermeasures
    • AI Security
    • PSIRT / CSIRT

    Presented byAeye Security Lab Inc.

  • OC-06

    Make invisible threats visible!
    Comprehensive security measures from an attacker's perspective.

    • Speaker

      3-shake Inc.

      Securify division
      General Manager

      Takuya Tezuka

    • Vulnerability / Tampering Countermeasures
    • Critical Infrastructure Security
    • Application Security

    Presented by3-shake Inc.

  • OD-06

    "Why isn't this email being delivered?"
    -- Before you lose trust with your business partners! DMARC security measures to keep business in the Kansai region running smoothly

    • Speaker

      Honetsecurity K.K.

    • Targeted Attacks / Cyber Attacks
    • Email Security
    • Phishing scam

    Presented byHonetsecurity K.K.

  • OE-06

    Privileged Identity Management for the Cloud Era
    ~A Practical Approach to Balancing Security and Operational Efficiency~

    • Speaker

      NRI SecureTechnologies, Ltd.

      Control Solution Business Department

      Kohei Nono

    • Cloud Security
    • Authentication / Identity Management
    • Security Audits / System Audits

    Presented byNRI SecureTechnologies, Ltd.

14:40 | 15:20
  • OA-07

    The Dawn of the AI SOC Era
    — Stellar Cyber’s Vision for Human and AI Agents in Collaborative Autonomous Security Operations

    • Speaker

      Stellar Cyber

      CTO

      Aimei Wei

    • XDR
    • SOC / Incident Response
    • Monitoring / Detection

    Presented byStellar Cyber Inc.

  • OB-07

    The Real Risk Lies in “Misaligned Measures”
    — Three Actionable Steps to Strengthen Security from On-the-Ground Experience

    • Speaker

      MOTEX Inc.

      Cybersecurity Division,
      Associate, Security Engineering Section, Security Services Department I

      Yuki Hirota

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures

    Presented byMOTEX Inc.

  • OC-07

    Reconsidering the safety of file transmission: A practical solution to PPAP and internal fraud countermeasures (provisional)

    • Speaker

      NRI SecureTechnologies, Ltd.

    • Data Leakage Prevention
    • Email Security

    Presented byNRI SecureTechnologies, Ltd.

  • OD-07

    Protecting only domestic bases is dangerous!
    Three solutions to prevent rapidly increasing attacks on the global supply chain

    • Speaker

      Internet Initiative Japan Inc.

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust

    Presented byInternet Initiative Japan Inc.

  • OE-07

    Three Critical Security Domains in the AI Era
    - AI Threat, Data Leak, and Operational Automation

    • Speaker

      Check Point Software Technologies, Ltd.

      Cyber Security Officer

      Daiji Ushiro

    • Data Leakage Prevention
    • AI Security
    • SOC / Incident Response

    Presented byCheck Point Software Technologies Ltd.

15:30 | 16:00
  • OA-08

    Beneath the Surface of Smart Devices: A Deep Dive into Japan’s IoT Security Reality

    • Speaker

      National Cyber Observation center, Cybersecurity Research Institute

      National Institute of Information and Communications Technology (NICT)
      Director General

      Masashi Eto

    • Vulnerability / Tampering Countermeasures
    • IoT Security
    • DDoS Countermeasures
  • OB-08

    Information Security Initiatives at Ports (tentative)

    • Speaker

      Ministry of Land, Infrastructure, Transport and Tourism

      Ports and Harbours Bureau
      Deputy Director

      Tomohide Sugimoto

    • Critical Infrastructure Security
  • OC-08

    Introducing the "IPA Top 10 Information Security Threats 2025 (Organizational Edition)"
    ~Don't excuse your ignorance! Stay up to date with the latest information to prevent threats~

    • Speaker

      Information-technology Promotion Agency, Japan (IPA)

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Critical Infrastructure Security
  • OD-08

    Centralization of Security Incident Damage Reporting:
    Implementation of a Unified Format and Developments Toward the Enforcement of the Cyber Response Capability Enhancement Act

    • Speaker

      Mori Hamada & Matsumoto

      attorney at law

      Daisuke Tsuta

    • Targeted Attacks / Cyber Attacks
    • Critical Infrastructure Security
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
  • OE-08

    A control system vendor's approach as a bridge between IT and OT systems

    • Speaker

      Yokogawa Electric Corporation

    • Targeted Attacks / Cyber Attacks
    • IoT Security
    • Critical Infrastructure Security
16:10 | 16:50
  • OA-09

    "The Current State and Future of SASE
    ~Toward the Realization of Secure Digital Transformation and Axon Transformation~"

    • Speaker

      SoftBank Corp.

    • Zero Trust
    • AI Security
    • SASE (Secure Acess Service Edge)

    Presented bySoftBank Corp.

  • OB-09

    Aiming to minimize the risk of an expanding attack surface through AI
    Understanding the essence of "proactive security"

    • Speaker

      Trend Micro Incorporated

      Manager,
      Platform Marketing Group,
      Platform Enablement Dept

      Shiori Okamoto

    • Ransomware Countermeasures
    • Endpoint Security
    • AI Security

    Presented byTrend Micro Inc.

  • OC-09

    From ad hoc to strategic: Quantitative assessment of internal and external security risks

    • Speaker

      Tsuzuki Denki Co., Ltd.

      Section 1, Security Business Promotion Department

      Kentaro Numa

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Security Audits / System Audits

    Presented byTSUZUKI DENKI CO.,LTD.

  • OD-09

    The Hidden Dangers of Exposed Passwords
    – Self-Checks Before a Penetration Test

    • Speaker

      UBsecure, Inc.

      Cyber Security Consulting Div. Cyber Security Consulting Dept.1
      Security Consultant

      Arashi Katsuda

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention

    Presented byUBsecure, Inc.

  • OE-09

    Why DNP Shifted to Integrated Monitoring
    - Behind the Scenes of Security Reform

    • Panelist

      DNP Infomation Systems Co.,Ltd.

      Cyber Fusion Center,
      Vice Director

      Hirofumi Oyamada

    • Moderator

      Dai Nippon Printing Co.,Ltd.

      Advanced Business Center,
      Cyber Security Business Development Unit,
      Business Promotion Department,
      Senior Planner

      Shun Mori

    • SASE (Secure Acess Service Edge)
    • Human Resource Development
    • Managed Security Services

    Presented byDai Nippon Printing Co., Ltd.

17:05 | 17:45
  • OA-10

    The Security Resilience of Japanese Companies Revealed by Sekyumaru
    - Necessary Next Actions from Short- and Long-Term Perspectives - Beyond Zero Trust

    • Speaker

      Marubeni I-DIGIO Group

    • Cloud Security
    • Zero Trust
    • SASE (Secure Acess Service Edge)

    Presented byMarubeni I-DIGIO Group

  • OB-10

    Evolving Threats, Enhanced Defense: Key Insights from the 2025 Threat Hunting Report

    • Speaker

      CrowdStrike Japan GK

      Sales Engineering Dept,
      Senior Sales Engineer

      Takayuki Moto

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security

    Presented byCrowdStrike Japan GK

  • OC-10

    Zero Trust Security Achieved Without VPN: ZTNA with HPE Aruba Networking SSE

    • Speaker

      SB C&S Corp.

    • Zero Trust
    • Authentication / Identity Management
    • SASE (Secure Acess Service Edge)

    Presented bySB C&S Corp. / Hewlett Packard Japan, G.K.

  • OD-10

    Vulnerability Management Starting with SBOM
    — Unified Cloud and On-Premise Operations Enabled by Cloudbase —

    • Speaker

      Cloudbase

      Enterprise Business Division

      Aki Kanbayashi

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • SBOM (Software Bill of Materials)

    Presented byCloudbase Inc.

  • OE-10

    Revolutionizing SOC Operations
    - AI and automation are finally making SOCs more sophisticated and efficient.

    • Speaker

      NRI SecureTechnologies, Ltd.

      Junichi Nakayama

    • AI Security
    • SOC / Incident Response
    • Managed Security Services

    Presented byNet One Partners Co., Ltd.

17:50 | 18:20
  • OA-11

    Information Devices and Electromagnetic Wave Security
    - Traceless Attacks and Their Countermeasures

    • Speaker

      Nara Institute of Science and Technology

    • Data Leakage Prevention
    • IoT Security
    • Critical Infrastructure Security
  • OB-11

    The threat of state-sponsored cyber attacks

    • Speaker

      Public Security Intelligence Agency

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
  • OC-11

    Countermeasures SME can take against cyberattacks as "Contagious and Endless Disaster"

    • Speaker

      Osaka Chamber of Commerce and Industry

      ICT Support Division
      Manager

      Motoki Noda

    • Targeted Attacks / Cyber Attacks
    • Firewall / UTM (Unified Threat Management)
    • Human Resource Development
  • OD-11

    AI BOM - Secure and transparent AI in an ecosystem

    • Speaker

      The Linux Foundation Japan

    • AI Security
    • SBOM (Software Bill of Materials)
  • OE-11

    No Time to Wait! How to Build a Resilient Supply Chain

    • Speaker

      Spectee Inc.

      Director & COO

      Satoshi Negoro

    • Human Resource Development
    • Software Supply Chain Attacks
    • Other
  • Privacy Policy

[25年春開催]Security Days Spring 2025

Copyright (c) NANO OPT Media, Inc. All rights reserved.