Session
-
consecutive interpreting
Search (possible multiple choice)
Keyword
10.10(Fri)
-
09:45 | 10:15
-
-
OA-01
Beyond Ransomware: The Overlooked Reality of Cyber Attacks and Strategic Countermeasures
--Cybersecurity as a Critical Business Risk---
Speaker
Kobe University
Graduate School of Engineering, Professor Emeritus
Masakatu Morii
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Business Email Compromise Countermeasures
-
Speaker
-
OB-01
Battlespace Cyber: Incidents via Wireless Space and Cyber Security
-
Speaker
Ministry of Defense
National Institute for Defense Studies
Police Research Department
Senior Research Officer
- Endpoint Security
-
Speaker
-
OC-01
A Retrospective on the System Downtime Caused by Ransomware: Recovery Challenges and Hidden Pitfalls.
-
Speaker
Osaka Prefectural Hospital Organization, Osaka General Medical Center
Dept. of Medical Information Management
Senior Chief OfficerHirofumi Morito
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
-
Speaker
-
OD-01
The current state of cybercrime and the efforts of the Osaka Prefectural Police
-
Speaker
Osaka Prefectural Police.
- Ransomware Countermeasures
- Phishing scam
- Other
-
Speaker
-
OE-01
Is security really something that small and medium-sized businesses and organizations need?
~ Reconsidering now: How to communicate "security" to management and executives ~-
Speaker
Japan Network Security Association.
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Data Leakage Prevention
-
Speaker
-
-
10:25 | 11:05
-
-
OA-02
What you need to consider now to protect your users and apps from threats and risks posed by AI
-
Speaker
A10 Networks, K.K.
- Targeted Attacks / Cyber Attacks
- Vulnerability / Tampering Countermeasures
- AI Security
Presented byA10 Networks, K.K.
-
Speaker
-
OB-02
Maximizing the Power of Generative AI: Evolving Network Security
— Latest Threat Trends & Solutions with Single-Vendor SASE-
Speaker
Cato Networks
Field CTO
Haru Kaneko
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- SASE (Secure Acess Service Edge)
Presented byCato Networks (Japan) KK
-
Speaker
-
OC-02
Overlooked WSUS-Successor Challenges, Frontline Migration and Vulnerability Countermeasures
—Hidden Risks and Solutions in Update Management—-
Speaker
Jupiter Technology Corp.
Business Unit 3,
Sales GroupHirofumi Kawamoto
-
Demonstrator
Jupiter Technology Corp.
Business Unit 3,
Technical GroupAkane Shimada
- Targeted Attacks / Cyber Attacks
- Endpoint Security
- Vulnerability / Tampering Countermeasures
Presented byJupiter Technology Corp.
-
Speaker
-
OD-02
Next-generation update management after WSUS discontinuation: Migration strategy to IT asset management tools
-
Speaker
DOS Co., Ltd.
- Data Leakage Prevention
- Endpoint Security
- Vulnerability / Tampering Countermeasures
Presented byDOS Co., Ltd.
-
Speaker
-
OE-02
Smart Security: The Need for WIPS to Protect Wireless Networks
-
Speaker
KORNIC GLORY
Wired Technology Team / Manager
CHANG MINSEON
- Data Leakage Prevention
- Monitoring / Detection
- Managed Security Services
Presented byKornic Glory Co.,Ltd.
-
Speaker
-
-
11:15 | 11:55
-
-
OA-03
Ransomware Prevention in the AI Age: Redefining Cyber Resilience and Resiliency
-
Speaker
NTT DATA Japan Corporation
Security & Network Division
General Manager, Cyber SecurityRyo Hoshino
- Ransomware Countermeasures
- AI Security
Presented byNTT DATA KANSAI CORPORATION
-
Speaker
-
OB-03
Overcome cyber attacks as a business risk.
Yamory shows vulnerability countermeasures in the cloud and SBOM era-
Speaker
Assured, Inc.
- Cloud Security
- Vulnerability / Tampering Countermeasures
- SBOM (Software Bill of Materials)
Presented byAssured, Inc.
-
Speaker
-
OC-03
Effective and efficient security education that encourages employee behavioral change
-
Speaker
LRM, Inc.
- Targeted Attacks / Cyber Attacks
- Human Resource Development
- Phishing scam
Presented byLRM, Inc.
-
Speaker
-
OD-03
Multi-factor authentication and access control for easily strengthening Active Directory privileged account security
-
Speaker
OceanBridge Inc.
- Targeted Attacks / Cyber Attacks
- Zero Trust
- Authentication / Identity Management
Presented byOceanBridge Inc.
-
Speaker
-
OE-03
How to take your vulnerability management to the next level?
Introducing Continuous Risk Management with Qualys.-
Speaker
Qualys Japan K.K.
Sales Department HQ
Regional Sales Director, JapanMitsufusa Sugimoto
-
Demonstrator
Qualys Japan K.K.
Sales Department HQ
Technical Account ManagerFuyuki Motono
- Vulnerability / Tampering Countermeasures
- Security Audits / System Audits
- PSIRT / CSIRT
Presented byQualys Japan K.K.
-
Speaker
-
-
12:15 | 12:55
-
-
OA-04
From visualization to action: A case study of security implementation for an "unstoppable factory" using Claroty and RYODEN
-
Speaker
Claroty Ltd.
- Zero Trust
- AI Security
- Monitoring / Detection
Presented byRYODEN CORPORATION
-
Speaker
-
OB-04
Is device protection alone enough?
Next-generation security platform to prepare for evolving threats-
Speaker
Macnica, Inc.
- Data Leakage Prevention
- Endpoint Security
- XDR
Presented byMacnica, Inc.
-
Speaker
-
OC-04
In an era where smartphones are targeted - Security strategies to protect mobile devices
-
Speaker
Jamf Japan G.K.
Sales Enablement Manager
Shingo Matsushima
- Data Leakage Prevention
- Endpoint Security
- Zero Trust
Presented byJamf Japan G.K.
-
Speaker
-
OD-04
Security testing required for compliance with cyber regulations such as the EU Cyber Resilience Act (CRA)
-
Speaker
Black Duck Software G.K.
Senior Technical Marketing Manager
Masato Matsuoka
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
- Application Security
- SBOM (Software Bill of Materials)
Presented byBlack Duck Software G.K.
-
Speaker
-
OE-04
Why Is NDR Now Indispensable? Protecting Modern Networks from the Latest Threats
-
Speaker
Vectra AI Japan KK
Security Engineer
CEH
CISSPMasaharu Imai
- Cloud Security
- XDR
- SOC / Incident Response
Presented byVectra AI Japan KK
-
Speaker
-
-
13:05 | 13:35
-
-
OA-05
Time to Rethink Authentication: Password Authentication vs. Passwordless Authentication
-
Speaker
Ritsumeikan University
College of Information Science & Engineering ,
ProfessorTetsutaro Uehara
- Targeted Attacks / Cyber Attacks
- Authentication / Identity Management
- Phishing scam
-
Speaker
-
OB-05
Uncovering This Much from Public Information! The Power of OSINT Through Real-World Industry Cases
-
Speaker
Representative Director
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Phishing scam
-
Speaker
-
OC-05
Cyberspace threat situation and police efforts (tentative)
-
Speaker
National Police Agency JAPAN
Cybercrime Prevention Office, Cyber Affairs Bureau
Assistant DirectorYohsuke Nakagawa
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
-
Speaker
-
OD-05
Details of Panasonic Group's cybersecurity strategy and factory and product security initiatives
-
Speaker
Panasonic Holdings Corporation
-
Speaker
-
OE-05
The first step in cybersecurity measures is vulnerability management
-
Speaker
Mitsubishi Electric Digital Innovation Corporation
Information Security Service Division
Service Planning SectionMitsuhiro Kimura
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Vulnerability / Tampering Countermeasures
Presented byMitsubishi Electric Digital Innovation Corporation
-
Speaker
-
-
13:45 | 14:25
-
-
OA-06
Why Small Businesses Are the New Targets
— The Latest Cyber Threats and How EPP × MDR Become the New Standard for Protection-
Speaker
Kaspersky Labs Japan
Enterprise Solution Expert
Takehiro Ito
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Managed Security Services
Presented byK.K. Kaspersky Labs Japan
-
Speaker
-
OB-06
"True CTEM" realized from a business perspective
What is security management in the AI era?-
Speaker
AI Security Lab Co., Ltd.
Business Planning Department
directorKazuma Abe
- Vulnerability / Tampering Countermeasures
- AI Security
- PSIRT / CSIRT
Presented byAeye Security Lab Inc.
-
Speaker
-
OC-06
Make invisible threats visible!
Comprehensive security measures from an attacker's perspective.-
Speaker
3-shake Inc.
Securify division
General ManagerTakuya Tezuka
- Vulnerability / Tampering Countermeasures
- Critical Infrastructure Security
- Application Security
Presented by3-shake Inc.
-
Speaker
-
OD-06
"Why isn't this email being delivered?"
-- Before you lose trust with your business partners! DMARC security measures to keep business in the Kansai region running smoothly-
Speaker
Honetsecurity K.K.
- Targeted Attacks / Cyber Attacks
- Email Security
- Phishing scam
Presented byHonetsecurity K.K.
-
Speaker
-
OE-06
Privileged Identity Management for the Cloud Era
~A Practical Approach to Balancing Security and Operational Efficiency~-
Speaker
NRI SecureTechnologies, Ltd.
Control Solution Business Department
Kohei Nono
- Cloud Security
- Authentication / Identity Management
- Security Audits / System Audits
Presented byNRI SecureTechnologies, Ltd.
-
Speaker
-
-
14:40 | 15:20
-
-
OA-07
The Dawn of the AI SOC Era
— Stellar Cyber’s Vision for Human and AI Agents in Collaborative Autonomous Security Operations-
Speaker
Stellar Cyber
CTO
Aimei Wei
- XDR
- SOC / Incident Response
- Monitoring / Detection
Presented byStellar Cyber Inc.
-
Speaker
-
OB-07
The Real Risk Lies in “Misaligned Measures”
— Three Actionable Steps to Strengthen Security from On-the-Ground Experience-
Speaker
MOTEX Inc.
Cybersecurity Division,
Associate, Security Engineering Section, Security Services Department IYuki Hirota
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
Presented byMOTEX Inc.
-
Speaker
-
OC-07
Reconsidering the safety of file transmission: A practical solution to PPAP and internal fraud countermeasures (provisional)
-
Speaker
NRI SecureTechnologies, Ltd.
- Data Leakage Prevention
- Email Security
Presented byNRI SecureTechnologies, Ltd.
-
Speaker
-
OD-07
Protecting only domestic bases is dangerous!
Three solutions to prevent rapidly increasing attacks on the global supply chain-
Speaker
Internet Initiative Japan Inc.
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Zero Trust
Presented byInternet Initiative Japan Inc.
-
Speaker
-
OE-07
Three Critical Security Domains in the AI Era
- AI Threat, Data Leak, and Operational Automation-
Speaker
Check Point Software Technologies, Ltd.
Cyber Security Officer
Daiji Ushiro
- Data Leakage Prevention
- AI Security
- SOC / Incident Response
Presented byCheck Point Software Technologies Ltd.
-
Speaker
-
-
15:30 | 16:00
-
-
OA-08
Beneath the Surface of Smart Devices: A Deep Dive into Japan’s IoT Security Reality
-
Speaker
National Cyber Observation center, Cybersecurity Research Institute
National Institute of Information and Communications Technology (NICT)
Director GeneralMasashi Eto
- Vulnerability / Tampering Countermeasures
- IoT Security
- DDoS Countermeasures
-
Speaker
-
OB-08
Information Security Initiatives at Ports (tentative)
-
Speaker
Ministry of Land, Infrastructure, Transport and Tourism
Ports and Harbours Bureau
Deputy DirectorTomohide Sugimoto
- Critical Infrastructure Security
-
Speaker
-
OC-08
Introducing the "IPA Top 10 Information Security Threats 2025 (Organizational Edition)"
~Don't excuse your ignorance! Stay up to date with the latest information to prevent threats~-
Speaker
Information-technology Promotion Agency, Japan (IPA)
- Ransomware Countermeasures
- Data Leakage Prevention
- Critical Infrastructure Security
-
Speaker
-
OD-08
Centralization of Security Incident Damage Reporting:
Implementation of a Unified Format and Developments Toward the Enforcement of the Cyber Response Capability Enhancement Act-
Speaker
Mori Hamada & Matsumoto
attorney at law
Daisuke Tsuta
- Targeted Attacks / Cyber Attacks
- Critical Infrastructure Security
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
-
Speaker
-
OE-08
A control system vendor's approach as a bridge between IT and OT systems
-
Speaker
Yokogawa Electric Corporation
- Targeted Attacks / Cyber Attacks
- IoT Security
- Critical Infrastructure Security
-
Speaker
-
-
16:10 | 16:50
-
-
OA-09
"The Current State and Future of SASE
~Toward the Realization of Secure Digital Transformation and Axon Transformation~"-
Speaker
SoftBank Corp.
- Zero Trust
- AI Security
- SASE (Secure Acess Service Edge)
Presented bySoftBank Corp.
-
Speaker
-
OB-09
Aiming to minimize the risk of an expanding attack surface through AI
Understanding the essence of "proactive security"-
Speaker
Trend Micro Incorporated
Manager,
Platform Marketing Group,
Platform Enablement DeptShiori Okamoto
- Ransomware Countermeasures
- Endpoint Security
- AI Security
Presented byTrend Micro Inc.
-
Speaker
-
OC-09
From ad hoc to strategic: Quantitative assessment of internal and external security risks
-
Speaker
Tsuzuki Denki Co., Ltd.
Section 1, Security Business Promotion Department
Kentaro Numa
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Security Audits / System Audits
Presented byTSUZUKI DENKI CO.,LTD.
-
Speaker
-
OD-09
The Hidden Dangers of Exposed Passwords
– Self-Checks Before a Penetration Test-
Speaker
UBsecure, Inc.
Cyber Security Consulting Div. Cyber Security Consulting Dept.1
Security ConsultantArashi Katsuda
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
Presented byUBsecure, Inc.
-
Speaker
-
OE-09
Why DNP Shifted to Integrated Monitoring
- Behind the Scenes of Security Reform-
Panelist
DNP Infomation Systems Co.,Ltd.
Cyber Fusion Center,
Vice DirectorHirofumi Oyamada
-
Moderator
Dai Nippon Printing Co.,Ltd.
Advanced Business Center,
Cyber Security Business Development Unit,
Business Promotion Department,
Senior PlannerShun Mori
- SASE (Secure Acess Service Edge)
- Human Resource Development
- Managed Security Services
Presented byDai Nippon Printing Co., Ltd.
-
Panelist
-
-
17:05 | 17:45
-
-
OA-10
The Security Resilience of Japanese Companies Revealed by Sekyumaru
- Necessary Next Actions from Short- and Long-Term Perspectives - Beyond Zero Trust-
Speaker
Marubeni I-DIGIO Group
- Cloud Security
- Zero Trust
- SASE (Secure Acess Service Edge)
Presented byMarubeni I-DIGIO Group
-
Speaker
-
OB-10
Evolving Threats, Enhanced Defense: Key Insights from the 2025 Threat Hunting Report
-
Speaker
CrowdStrike Japan GK
Sales Engineering Dept,
Senior Sales EngineerTakayuki Moto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
Presented byCrowdStrike Japan GK
-
Speaker
-
OC-10
Zero Trust Security Achieved Without VPN: ZTNA with HPE Aruba Networking SSE
-
Speaker
SB C&S Corp.
- Zero Trust
- Authentication / Identity Management
- SASE (Secure Acess Service Edge)
Presented bySB C&S Corp. / Hewlett Packard Japan, G.K.
-
Speaker
-
OD-10
Vulnerability Management Starting with SBOM
— Unified Cloud and On-Premise Operations Enabled by Cloudbase —-
Speaker
Cloudbase
Enterprise Business Division
Aki Kanbayashi
- Cloud Security
- Vulnerability / Tampering Countermeasures
- SBOM (Software Bill of Materials)
Presented byCloudbase Inc.
-
Speaker
-
OE-10
Revolutionizing SOC Operations
- AI and automation are finally making SOCs more sophisticated and efficient.-
Speaker
NRI SecureTechnologies, Ltd.
Junichi Nakayama
- AI Security
- SOC / Incident Response
- Managed Security Services
Presented byNet One Partners Co., Ltd.
-
Speaker
-
-
17:50 | 18:20
-
-
OA-11
Information Devices and Electromagnetic Wave Security
- Traceless Attacks and Their Countermeasures-
Speaker
Nara Institute of Science and Technology
- Data Leakage Prevention
- IoT Security
- Critical Infrastructure Security
-
Speaker
-
OB-11
The threat of state-sponsored cyber attacks
-
Speaker
Public Security Intelligence Agency
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
-
Speaker
-
OC-11
Countermeasures SME can take against cyberattacks as "Contagious and Endless Disaster"
-
Speaker
Osaka Chamber of Commerce and Industry
ICT Support Division
ManagerMotoki Noda
- Targeted Attacks / Cyber Attacks
- Firewall / UTM (Unified Threat Management)
- Human Resource Development
-
Speaker
-
OD-11
AI BOM - Secure and transparent AI in an ecosystem
-
Speaker
The Linux Foundation Japan
- AI Security
- SBOM (Software Bill of Materials)
-
Speaker
-
OE-11
No Time to Wait! How to Build a Resilient Supply Chain
-
Speaker
Spectee Inc.
Director & COO
Satoshi Negoro
- Human Resource Development
- Software Supply Chain Attacks
- Other
-
Speaker
-