Session
-
consecutive interpreting
-
simultaneous interpreting
-
lunch
Search (possible multiple choice)
Keyword
10.21(Tue)
-
09:40 | 10:20
-
-
A1-02
Cyberattacks Accelerate with the Abuse of Generative AI
Risks Companies Should Know and Countermeasures They Should Take-
Speaker
Sky CO., LTD.
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Vulnerability / Tampering Countermeasures
Presented bySky CO., LTD.
-
Speaker
-
Closed
WS1-02
Unraveling the "ideal" and "real" of security education through data and discussion
~Uncovering your company's next steps based on the concerns of your NCA324 organization~-
Speaker
Nippon CSIRT Association
- Human Resource Development
- Other
- Workshop
-
Speaker
-
-
12:15 | 12:55
-
-
A1-05
Enabling Advanced and Efficient DevSecOps for AI-Era Cloud Security with Wiz
-
Wiz Cloud Japan K.K.
Principal Solutions Engineer
Shogo Katsurada
- Cloud Security
- Zero Trust
- AI Security
Presented byWiz Cloud Japan K.K.
-
-
WS1-05
AeyeScan hands-on seminar that allows anyone to easily perform professional vulnerability diagnosis
-
Speaker
Aeye Security Lab Inc.
- Cloud Security
- Vulnerability / Tampering Countermeasures
- Application Security
- Workshop
Presented byAeye Security Lab Inc.
-
Speaker
-
-
13:05 | 13:35
-
-
A1-06
Current state of cybersecurity and cybersecurity policy (tentative)
-
Speaker
Ministry of Economy, Trade and Industry
-
Speaker
-
WS1-06
Will Your Cyber Defenses Hold When It Matters?
Exposing Hidden Business Risks Through Penetration Testing-
Speaker
NTT ADVANCED TECHNOLOGY CORPORATION
Social Platform Business Headquarters, Security Business Division
Team LeaderTetsushi Morita
-
Demonstrator
NTT ADVANCED TECHNOLOGY CORPORATION
Social Platform Business Headquarters, Security Business Division
Senior Expert EngineerMasanori Ogawara
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
- Workshop
Presented byNTT Advanced Technology Corporation
-
Speaker
-
-
14:10 | 14:50
-
-
A1-07
Is your work environment really safe?
How to create a safe and flexible work environment to accommodate changing work styles-
Speaker
Canon IT Solutions Inc.
- Zero Trust
- Authentication / Identity Management
- SASE (Secure Acess Service Edge)
Presented byCanon IT Solutions Inc.
-
Speaker
-
B1-07
Effective and efficient security education that encourages employee behavioral change
-
Speaker
LRM, Inc.
- Targeted Attacks / Cyber Attacks
- Human Resource Development
- Phishing scam
Presented byLRM, Inc.
-
Speaker
-
C1-07
Zero Trust: A Guide to Implementing Digital Transformation
- Traps Hidden in Supply Chain Collaboration and Practical Defense Measures-
Speaker
Soliton Systems K.K.
IT Security Department
EvangelistShoko Araki
- Cloud Security
- Zero Trust
- Authentication / Identity Management
Presented bySoliton Systems K.K.
-
Speaker
-
Closed
WS1-07
Turning human weaknesses into organizational strengths:
Practical security training and case studies to prepare for increasingly sophisticated attacks-
Speaker
KnowBe4 Japan
Enterprise Account Executive
Kosuke Takahashi
-
Speaker
KnowBe4 Japan
Enterprise Customer Success Manager
Takayoshi Tanaka
- Targeted Attacks / Cyber Attacks
- Human Resource Development
- Phishing scam
- Workshop
Presented byKnowBe4 Japan GK
-
Speaker
-
-
15:05 | 15:45
-
-
A1-08
"Why didn't this email get delivered?" - The reality of "email undeliverability" and "spoofing" that even major companies are worried about, and how DMARC can protect trust and reliability
-
Speaker
Honetsecurity K.K.
- Targeted Attacks / Cyber Attacks
- Email Security
- Phishing scam
Presented byHonetsecurity K.K.
-
Speaker
-
B1-08
Protecting only domestic bases is dangerous!
Three solutions to prevent rapidly increasing attacks on the global supply chain-
Speaker
Internet Initiative Japan Inc.
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Zero Trust
Presented byInternet Initiative Japan Inc.
-
Speaker
-
C1-08
Cybersecurity begins at the endpoint.
-
Speaker
Densan System Co.,Ltd.
Enterprise Solutions Department
hidekazu yamawaki
-
Speaker
Google Japan
Chrome Enterprise SalesChrome Customer Success Manager & Engineer
Daiya Masuda
- Ransomware Countermeasures
- Data Leakage Prevention
- Zero Trust
Presented byDensan System Co., Ltd.
-
Speaker
-
-
16:00 | 16:40
-
-
A1-09
Zero Trust Security Achieved Without VPN: ZTNA with HPE Aruba Networking SSE
-
Speaker
SB C&S Corp.
- Zero Trust
- Authentication / Identity Management
- SASE (Secure Acess Service Edge)
Presented bySB C&S Corp. / Hewlett Packard Japan, G.K.
-
Speaker
-
B1-09
From 0-Day Vulnerability to Real Attack: Protecting Against SharePoint Exploits with SOC
-
Speaker
Viettel Cyber Security
CEO
Ash Kanzawa
- SOC / Incident Response
Presented byViettel Cyber Security One Member Limited Liability Company
-
Speaker
-
C1-09
AI Operations Design that Balances Security and Utilization
The First Step: Starting with Risk Awareness-
Speaker
UBsecure, Inc.
Department of Security Design Consulting
Security ConsultantKazuyoshi Kimoto
- Vulnerability / Tampering Countermeasures
- AI Security
- Managed Security Services
Presented byUBsecure, Inc.
-
Speaker
-
WS1-09
Attacking Cloud Misconfiguration
-
Speaker
Cyfinoid Research
Anant Shrivastava
- Workshop
-
Speaker
-
-
16:55 | 17:35
-
-
A1-10
Zero Trust Security Enhancement Strategy Based on SSE Platform
-
Speaker
MONITORAPP Inc.
CEO
YoungJoon Kim
- Zero Trust
- SASE (Secure Acess Service Edge)
- Edge Security
Presented byMONITORAPP Co., Ltd.
-
Speaker
-
B1-10
The foundation and final line of defense for security!
Microsegmentation and cloud security made possible by Illumio-
Speaker
Illumio G.K.
Senior Systems Engineer
Jun Fukumoto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Zero Trust
Presented byIllumio Japan G.K.
-
Speaker
-
C1-10
Secure OS for Zero Trust Architecture,
alternative to enhance VDI/DaaS, OT, KIOSK security and reduce TCO-
Speaker
CXA Global Pte. Ltd.
JOC Business
Development
DirectorFutoshi Miki
- Endpoint Security
- Zero Trust
- Edge Security
Presented byCXA Global Pte. Ltd.
-
Speaker
-
-
17:40 | 18:10
-
-
A1-11
A control system vendor's approach as a bridge between IT and OT systems
-
Speaker
Yokogawa Electric Corporation
- Targeted Attacks / Cyber Attacks
- IoT Security
- Critical Infrastructure Security
-
Speaker
-
B1-11
AI Safety Supports Innovation
-
Speaker
Japan AI Safety Institute
Deputy Executive Director / Secretary General
Kenji Hiramoto
- AI Security
-
Speaker
-
C1-11
Generative AI-Based Autonomous Driving: Threats and Countermeasures
-
Speaker
Turing Inc.
Fundamental AI team
Principal ResearcherTsubasa Takahashi
- AI Security
- Edge Security
-
Speaker
-
-
18:25 | 19:25
-
-
B1-12
This fall's exam.
- Review "Registered Information Security Specialist Examination".-
Speaker
Japan Registered Information Security Specialists
Association Director
Naoki Murayama
- SOC / Incident Response
- PSIRT / CSIRT
- Human Resource Development
-
Speaker
-
C1-12
Achieve secure browser access with browser-native Security Service Edge (SSE),
and analyze and detect external intrusion routes!-
Speaker
SentryMark, Inc.
Senior Sales Director
Akihiro Abe
-
Speaker
Conceal, Inc.
Vice President of Strategic Operations
John Kellum
- Zero Trust
- Vulnerability / Tampering Countermeasures
- AI Security
Presented bySentryMark, Inc.
-
Speaker
-