iotc iotc

    • linkedin
    • facebook
    • twitter
    • YouTube
  • Registration

    Registration
  • Outline Outline
  • Osaka Osaka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Nagoya Nagoya
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Tokyo Tokyo
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Fukuoka Fukuoka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • Osaka Osaka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Nagoya Nagoya
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Tokyo Tokyo
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Fukuoka Fukuoka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration

      Registration

Session

  • All
  • 10.21(Tue)
  • 10.22(Wed)
  • 10.23(Thu)
  • 10.24(Fri)
  • consecutive interpreting

  • simultaneous interpreting

  • lunch

Search (possible multiple choice)

Keyword

10.21(Tue)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:30
  • A1-01

    Economic Security and Cybersecurity: Essential Technologies and Talent Development

    • Speaker

      Institute of Information Security

      Professor

      Atsuhiro Goto

    • Ransomware Countermeasures
    • Critical Infrastructure Security
    • Software Supply Chain Attacks
09:40 | 10:20
  • A1-02

    Cyberattacks Accelerate with the Abuse of Generative AI
    Risks Companies Should Know and Countermeasures They Should Take

    • Speaker

      Sky CO., LTD.

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Vulnerability / Tampering Countermeasures

    Presented bySky CO., LTD.

  • Closed

    WS1-02

    Unraveling the "ideal" and "real" of security education through data and discussion
    ~Uncovering your company's next steps based on the concerns of your NCA324 organization~

    • Speaker

      Nippon CSIRT Association

    • Human Resource Development
    • Other
    • Workshop
10:30 | 11:10
  • A1-03

    Make invisible threats visible!
    Comprehensive security measures from an attacker's perspective.

    • Speaker

      3-shake Inc.

      Securify division
      General Manager

      Takuya Tezuka

    • Vulnerability / Tampering Countermeasures
    • Critical Infrastructure Security
    • Application Security

    Presented by3-shake Inc.

11:20 | 12:00
  • A1-04

    [Case Study Revealed!]
    "We may already be invaded!" What are the methods of targeted attacks that most companies fail to notice?
    ~A former Tokyo Metropolitan Police Department special investigator shares case studies and three solutions to avoid the traps of cyber attacks~

    • Speaker

      Future Secure Wave, Inc.

    • Speaker

      Future Corporation

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Vulnerability / Tampering Countermeasures

    Presented byFuture Secure Wave, Inc.

12:15 | 12:55
  • A1-05

    Enabling Advanced and Efficient DevSecOps for AI-Era Cloud Security with Wiz

    • Wiz Cloud Japan K.K.

      Principal Solutions Engineer

      Shogo Katsurada

    • Cloud Security
    • Zero Trust
    • AI Security

    Presented byWiz Cloud Japan K.K.

  • WS1-05

    AeyeScan hands-on seminar that allows anyone to easily perform professional vulnerability diagnosis

    • Speaker

      Aeye Security Lab Inc.

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • Application Security
    • Workshop

    Presented byAeye Security Lab Inc.

13:05 | 13:35
  • A1-06

    Current state of cybersecurity and cybersecurity policy (tentative)

    • Speaker

      Ministry of Economy, Trade and Industry

  • WS1-06

    Will Your Cyber Defenses Hold When It Matters?
    Exposing Hidden Business Risks Through Penetration Testing

    • Speaker

      NTT ADVANCED TECHNOLOGY CORPORATION

      Social Platform Business Headquarters, Security Business Division
      Team Leader

      Tetsushi Morita

    • Demonstrator

      NTT ADVANCED TECHNOLOGY CORPORATION

      Social Platform Business Headquarters, Security Business Division
      Senior Expert Engineer

      Masanori Ogawara

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security
    • Workshop

    Presented byNTT Advanced Technology Corporation

14:10 | 14:50
  • A1-07

    Is your work environment really safe?
    How to create a safe and flexible work environment to accommodate changing work styles

    • Speaker

      Canon IT Solutions Inc.

    • Zero Trust
    • Authentication / Identity Management
    • SASE (Secure Acess Service Edge)

    Presented byCanon IT Solutions Inc.

  • B1-07

    Effective and efficient security education that encourages employee behavioral change

    • Speaker

      LRM, Inc.

    • Targeted Attacks / Cyber Attacks
    • Human Resource Development
    • Phishing scam

    Presented byLRM, Inc.

  • C1-07

    Zero Trust: A Guide to Implementing Digital Transformation
    - Traps Hidden in Supply Chain Collaboration and Practical Defense Measures

    • Speaker

      Soliton Systems K.K.

      IT Security Department
      Evangelist

      Shoko Araki

    • Cloud Security
    • Zero Trust
    • Authentication / Identity Management

    Presented bySoliton Systems K.K.

  • Closed

    WS1-07

    Turning human weaknesses into organizational strengths:
    Practical security training and case studies to prepare for increasingly sophisticated attacks

    • Speaker

      KnowBe4 Japan

      Enterprise Account Executive

      Kosuke Takahashi

    • Speaker

      KnowBe4 Japan

      Enterprise Customer Success Manager

      Takayoshi Tanaka

    • Targeted Attacks / Cyber Attacks
    • Human Resource Development
    • Phishing scam
    • Workshop

    Presented byKnowBe4 Japan GK

15:05 | 15:45
  • A1-08

    "Why didn't this email get delivered?" - The reality of "email undeliverability" and "spoofing" that even major companies are worried about, and how DMARC can protect trust and reliability

    • Speaker

      Honetsecurity K.K.

    • Targeted Attacks / Cyber Attacks
    • Email Security
    • Phishing scam

    Presented byHonetsecurity K.K.

  • B1-08

    Protecting only domestic bases is dangerous!
    Three solutions to prevent rapidly increasing attacks on the global supply chain

    • Speaker

      Internet Initiative Japan Inc.

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust

    Presented byInternet Initiative Japan Inc.

  • C1-08

    Cybersecurity begins at the endpoint.

    • Speaker

      Densan System Co.,Ltd.

      Enterprise Solutions Department

      hidekazu yamawaki

    • Speaker

      Google Japan
      Chrome Enterprise Sales

      Chrome Customer Success Manager & Engineer

      Daiya Masuda

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Zero Trust

    Presented byDensan System Co., Ltd.

16:00 | 16:40
  • A1-09

    Zero Trust Security Achieved Without VPN: ZTNA with HPE Aruba Networking SSE

    • Speaker

      SB C&S Corp.

    • Zero Trust
    • Authentication / Identity Management
    • SASE (Secure Acess Service Edge)

    Presented bySB C&S Corp. / Hewlett Packard Japan, G.K.

  • B1-09

    From 0-Day Vulnerability to Real Attack: Protecting Against SharePoint Exploits with SOC

    • Speaker

      Viettel Cyber Security

      CEO

      Ash Kanzawa

    • SOC / Incident Response

    Presented byViettel Cyber Security One Member Limited Liability Company

  • C1-09

    AI Operations Design that Balances Security and Utilization
    The First Step: Starting with Risk Awareness

    • Speaker

      UBsecure, Inc.

      Department of Security Design Consulting
      Security Consultant

      Kazuyoshi Kimoto

    • Vulnerability / Tampering Countermeasures
    • AI Security
    • Managed Security Services

    Presented byUBsecure, Inc.

  • WS1-09

    Attacking Cloud Misconfiguration

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

    • Workshop
16:55 | 17:35
  • A1-10

    Zero Trust Security Enhancement Strategy Based on SSE Platform

    • Speaker

      MONITORAPP Inc.

      CEO

      YoungJoon Kim

    • Zero Trust
    • SASE (Secure Acess Service Edge)
    • Edge Security

    Presented byMONITORAPP Co., Ltd.

  • B1-10

    The foundation and final line of defense for security!
    Microsegmentation and cloud security made possible by Illumio

    • Speaker

      Illumio G.K.

      Senior Systems Engineer

      Jun Fukumoto

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust

    Presented byIllumio Japan G.K.

  • C1-10

    Secure OS for Zero Trust Architecture,
    alternative to enhance VDI/DaaS, OT, KIOSK security and reduce TCO

    • Speaker

      CXA Global Pte. Ltd.

      JOC Business
      Development
      Director

      Futoshi Miki

    • Endpoint Security
    • Zero Trust
    • Edge Security

    Presented byCXA Global Pte. Ltd.

17:40 | 18:10
  • A1-11

    A control system vendor's approach as a bridge between IT and OT systems

    • Speaker

      Yokogawa Electric Corporation

    • Targeted Attacks / Cyber Attacks
    • IoT Security
    • Critical Infrastructure Security
  • B1-11

    AI Safety Supports Innovation

    • Speaker

      Japan AI Safety Institute

      Deputy Executive Director / Secretary General

      Kenji Hiramoto

    • AI Security
  • C1-11

    Generative AI-Based Autonomous Driving: Threats and Countermeasures

    • Speaker

      Turing Inc.

      Fundamental AI team
      Principal Researcher

      Tsubasa Takahashi

    • AI Security
    • Edge Security
18:25 | 19:25
  • B1-12

    This fall's exam.
    - Review "Registered Information Security Specialist Examination".

    • Speaker

      Japan Registered Information Security Specialists

      Association Director

      Naoki Murayama

    • SOC / Incident Response
    • PSIRT / CSIRT
    • Human Resource Development
  • C1-12

    Achieve secure browser access with browser-native Security Service Edge (SSE),
    and analyze and detect external intrusion routes!

    • Speaker

      SentryMark, Inc.

      Senior Sales Director

      Akihiro Abe

    • Speaker

      Conceal, Inc.

      Vice President of Strategic Operations

      John Kellum

    • Zero Trust
    • Vulnerability / Tampering Countermeasures
    • AI Security

    Presented bySentryMark, Inc.

  • Privacy Policy

[25年春開催]Security Days Spring 2025

Copyright (c) NANO OPT Media, Inc. All rights reserved.