Session
-
consecutive interpreting
-
simultaneous interpreting
Search (possible multiple choice)
Keyword
10.22(Wed)
-
09:40 | 10:20
-
-
A2-02
The Frontline of Ransomware Threats: Lessons from Recent Cases and Immediate Countermeasures for Small and Medium-Sized Business
-
Speaker
ESET Japan,Inc
President and CEO
Satoshi Nagano
- Ransomware Countermeasures
- Endpoint Security
- XDR
Presented byCanon Marketing Japan Inc.
-
Speaker
-
WS2-02
Software Supply Chain Attacks - a silent killer
-
Speaker
Cyfinoid Research
Anant Shrivastava
- Workshop
-
Speaker
-
-
12:40 | 13:20
-
-
A2-05
Privileged Identity Management for the Cloud Era
~A Practical Approach to Balancing Security and Operational Efficiency~-
Speaker
NRI SecureTechnologies, Ltd.
Control Solution Business Department
Kohei Nono
- Cloud Security
- Authentication / Identity Management
- Security Audits / System Audits
Presented byNRI SecureTechnologies, Ltd.
-
Speaker
-
B2-05
Zero Trust Security with Chrome Enterprise
-
Speaker
Densan System Co.,Ltd.
planning and Marketing Department
Ryuji Miyamoto
-
Speaker
Densan System Co.,Ltd.
Social Innovation Division
Hanayo Matsuya
- Ransomware Countermeasures
- Data Leakage Prevention
- Zero Trust
Presented byDensan System Co., Ltd.
-
Speaker
-
C2-05
What you need to consider now to protect your users and apps from threats and risks posed by AI
-
Speaker
A10 Networks, K.K.
- Targeted Attacks / Cyber Attacks
- AI Security
- DDoS Countermeasures
Presented byA10 Networks, K.K.
-
Speaker
-
WS2-05
Cloud Security Initiatives of Japan Cloud Industry Association (ASPIC) and the Information Disclosure Certification System Based on the Ministry of Internal Affairs and Communications’ Information Disclosure Guidelines
-
Speaker
Executive Office of Japan Cloud Industry Association (ASPIC)
-
Speaker
Executive Office of Japan Cloud Industry Association (ASPIC)
- Security Audits / System Audits
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
- Application Security
- Workshop
-
Speaker
-
-
13:30 | 14:00
-
-
A2-06
OT Cyber Security accelarated by AI
-
Speaker
THE UNIVERSITY OF TOKYO
- Zero Trust
- IoT Security
- Critical Infrastructure Security
-
Speaker
-
B2-06
The Supply Chain Cybersecurity Consortium (SC3)'s efforts and case studies and challenges in supply chain cybersecurity
-
Speaker
CRIC SC3
-
Speaker
-
C2-06
In an era where smartphones are targeted - Security strategies to protect mobile devices
-
Speaker
Jamf Japan G.K.
Sales Engineer
Maari Koga
- Data Leakage Prevention
- Endpoint Security
- Zero Trust
Presented byJamf Japan G.K.
-
Speaker
-
WS2-06
Coming soon
- Workshop
Presented byLogpresso Inc.
-
-
14:15 | 14:55
-
-
A2-07
How to take your vulnerability management to the next level?
Introducing Continuous Risk Management with Qualys.-
Speaker
Qualys Japan K.K.
Sales Department HQ
Regional Sales Director, JapanMitsufusa Sugimoto
-
Demonstrator
Qualys Japan K.K.
Sales Department HQ
Techincal Account ManagerYukari Miyagawa
- Vulnerability / Tampering Countermeasures
- Security Audits / System Audits
- PSIRT / CSIRT
Presented byQualys Japan K.K.
-
Speaker
-
B2-07
Managing privileged acount and monitoring privileged session by using PAM/PASM
-
Speaker
Jupiter Technology Corp.
Business Unit 3, Sales Group
Shinichiro Matsukura
-
Speaker
Jupiter Technology Corp.
Business Unit 3, Technical Group
Kunio Tamura
- Zero Trust
- Authentication / Identity Management
- Security Audits / System Audits
Presented byJupiter Technology Corp.
-
Speaker
-
C2-07
How a Network Switch Became a Cybersecurity Game Changer
– The TiFRONT Approach-
Speaker
PIOLINK, Inc.
Partner Sales & Marketing Dept. General ManagerPIOPLATFORM, Inc.
Business Development Dept. DirectorTaro Matsuda
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
Presented byPIOLINK, Inc.
-
Speaker
-
-
15:10 | 15:50
-
-
A2-08
Next-Gen Cyber Defense through the Eyes of the Attacker: AI, CTEM, and the Dark Web
-
Speaker
KELA KK
Pre Sales Div.
Head of Pre-salesMakoto Kawasaki
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Vulnerability / Tampering Countermeasures
Presented byKELA K.K.
-
Speaker
-
B2-08
Revamping Identity Infrastructure at Mitsubishi Heavy Industries — Supporting DX for 80,000 Global Users with VANADIS
-
Speaker
Mitsubishi Heavy Industries, Ltd.
Digital Platform Technology Department,Digital Innovation Headquarters
Ryo Onishi
-
Speaker
NTT DATA INTELLILINK Corporation
Security Innovation Division,Security & Technology Consulting Sector
Hideki Fukuda
- Data Leakage Prevention
- Zero Trust
- Authentication / Identity Management
Presented byNTT DATA INTELLILINK Corporation
-
Speaker
-
C2-08
Web Security Threats and Real-Time Solutions with UMV:
Insights from the Latest Hacking Incidents in Asia-
Speaker
UMV Inc.
Global Marketing / VP
Cassandra Lee
- Cloud Security
- Monitoring / Detection
- Application Security
Presented byUMV Inc.
-
Speaker
-
Closed
WS2-08
OT/IoT security measures: I don't know what to do!
From visualization to POC success points: A practical OT/IoT security workshop that's immediately useful in the field-
Speaker
Nozomi Networks, Inc.
Staff Sales Engineer
- Endpoint Security
- IoT Security
- Critical Infrastructure Security
- Workshop
Presented byNozomi Networks Inc.
-
Speaker
-
-
16:05 | 16:45
-
-
A2-09
A Super Introduction to OT Security
-- OT Security You Can Start Practicing Tomorrow---
Speaker
TXOne Networks Japan
- Ransomware Countermeasures
- Vulnerability / Tampering Countermeasures
- Critical Infrastructure Security
Presented byTXOne Networks Japan GK
-
Speaker
-
B2-09
What should security operations be like?
How to prevent unauthorized operations in ICT operations and lower the barriers to vulnerability countermeasures-
Speaker
BOSCO Technologies Inc.
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
- Authentication / Identity Management
Presented byBOSCO Technologies Inc.
-
Speaker
-
C2-09
What are the fraud countermeasures in compliance with Credit Card Security Guidelines Ver. 6.0?
-What is the power of “O-PLUX,” which is being introduced in the EC and financial industries?--
Speaker
Cacco Inc.
O-PLUX Division
Division managerMai Onose
- Data Leakage Prevention
- Monitoring / Detection
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
Presented byCacco Inc.
-
Speaker
-
WS2-09
CI CD the keys to the kingdom and some more.
-
Speaker
Cyfinoid Research
Anant Shrivastava
- Workshop
-
Speaker
-
-
17:00 | 17:40
-
-
A2-10
Protecting businesses by ""predicting""
- New common sense for cyber threat countermeasures pioneered by ZeroMi Intelligence (tentative)Presented byZeamiCyberSecurity Co.,Ltd.
-
B2-10
Why Is NDR Now Indispensable?
Protecting Modern Networks from the Latest Threats-
Speaker
Vectra AI Japan KK
Security Engineer
CEH
CISSPMasaharu Imai
- Cloud Security
- XDR
- SOC / Incident Response
Presented byVectra AI Japan KK
-
Speaker
-
C2-10
Identity Management Becomes More Complex in On-Premises and Cloud-Based Environments
- Recommendations for Rethinking IAM to Balance Protection and Management - (tentative)- Data Leakage Prevention
- Zero Trust
- Authentication / Identity Management
Presented byCSE Co.,Ltd.
-
-
17:45 | 18:15
-
-
A2-11
Cyber Resilience (tentative)
-
Speaker
Cloud Security Alliance Japan Chapter, Incorporated
(CSA- JC)Steering committee member and Cloud Security WG Leader
Masanori Kamayama
- Targeted Attacks / Cyber Attacks
- Cloud Security
- SBOM (Software Bill of Materials)
-
Speaker
-
B2-11
Cyberspace threat situation and police efforts (tentative)
-
Speaker
National Police Agency JAPAN
Cybercrime Prevention Office, Cyber Affairs Bureau
Assistant DirectorYohsuke Nakagawa
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
-
Speaker
-
C2-11
JFE Group's Cybersecurity Strategy
-
Speaker
JFE Cyber Security & Solutions, LTD.
President
Ken Sakata
- PSIRT / CSIRT
- Human Resource Development
-
Speaker
-
-
18:30 | 19:30
-
-
A2-12
[Discussion] Case study of zero trust segmentation
- What are the benefits of implementing Xshield by US company ColorTokens?-
Speaker
Denkosha
SI
Security AnalystMasahiko Ishibashi
-
Demonstrator
Color Tokens, Inc.
Global Field CTO
CISSPVenky Raju
- Ransomware Countermeasures
- Zero Trust
- Critical Infrastructure Security
Presented byDENKOSHA Corporation
-
Speaker
-
B2-12
AI Security Automation Platform to Support “Sophistication”,
“Efficiency”, and “Visualization” of Security Operations-
Speaker
SWIMLANE Japan K.K.
Country Manager
Hideki Ushigome
-
Speaker
SWIMLANE Japan K.K.
Senior System Architect
Ryuichi Tomita
- AI Security
- SOC / Incident Response
- PSIRT / CSIRT
Presented bySWIMLANE LLC
-
Speaker
-