iotc iotc

    • linkedin
    • facebook
    • twitter
    • YouTube
  • Registration

    Registration
  • Outline Outline
  • Osaka Osaka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Nagoya Nagoya
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Tokyo Tokyo
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Fukuoka Fukuoka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • Osaka Osaka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Nagoya Nagoya
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Tokyo Tokyo
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Fukuoka Fukuoka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration

      Registration

Session

  • All
  • 10.21(Tue)
  • 10.22(Wed)
  • 10.23(Thu)
  • 10.24(Fri)
  • consecutive interpreting

  • simultaneous interpreting

Search (possible multiple choice)

Keyword

10.22(Wed)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:30
  • A2-01

    Tips for understanding changes in nation-state-sponsored attacks

    • Speaker

      Nihon Cyberdefence Co., Ltd.

      Chief Technical Officer

      Toshio Nawa

    • Zero Trust
    • XDR
    • Critical Infrastructure Security
09:40 | 10:20
  • A2-02

    The Frontline of Ransomware Threats: Lessons from Recent Cases and Immediate Countermeasures for Small and Medium-Sized Business

    • Speaker

      ESET Japan,Inc

      President and CEO

      Satoshi Nagano

    • Ransomware Countermeasures
    • Endpoint Security
    • XDR

    Presented byCanon Marketing Japan Inc.

  • WS2-02

    Software Supply Chain Attacks - a silent killer

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

    • Workshop
10:30 | 11:10
  • A2-03

    Evolving Threats, Enhanced Defense: Key Insights from the 2025 Threat Hunting Report

    • Speaker

      CrowdStrike Japan GK

      Sales Engineering Dept.
      Manager

      Yoichi Susaki

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security

    Presented byCrowdStrike Japan GK

11:20 | 12:00
  • A2-04

    The Real Risk Lies in “Misaligned Measures”
    — Three Actionable Steps to Strengthen Security from On-the-Ground Experience

    • Speaker

      MOTEX Inc.

      Expert,
      Professional Services Division

      Akira Nishii

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures

    Presented byMOTEX Inc.

12:40 | 13:20
  • A2-05

    Privileged Identity Management for the Cloud Era
    ~A Practical Approach to Balancing Security and Operational Efficiency~

    • Speaker

      NRI SecureTechnologies, Ltd.

      Control Solution Business Department

      Kohei Nono

    • Cloud Security
    • Authentication / Identity Management
    • Security Audits / System Audits

    Presented byNRI SecureTechnologies, Ltd.

  • B2-05

    Zero Trust Security with Chrome Enterprise

    • Speaker

      Densan System Co.,Ltd.

      planning and Marketing Department

      Ryuji Miyamoto

    • Speaker

      Densan System Co.,Ltd.

      Social Innovation Division

      Hanayo Matsuya

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Zero Trust

    Presented byDensan System Co., Ltd.

  • C2-05

    What you need to consider now to protect your users and apps from threats and risks posed by AI

    • Speaker

      A10 Networks, K.K.

    • Targeted Attacks / Cyber Attacks
    • AI Security
    • DDoS Countermeasures

    Presented byA10 Networks, K.K.

  • WS2-05

    Cloud Security Initiatives of Japan Cloud Industry Association (ASPIC) and the Information Disclosure Certification System Based on the Ministry of Internal Affairs and Communications’ Information Disclosure Guidelines

    • Speaker

      Executive Office of Japan Cloud Industry Association (ASPIC)

    • Speaker

      Executive Office of Japan Cloud Industry Association (ASPIC)

    • Security Audits / System Audits
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
    • Application Security
    • Workshop
13:30 | 14:00
  • A2-06

    OT Cyber Security accelarated by AI

    • Speaker

      THE UNIVERSITY OF TOKYO

    • Zero Trust
    • IoT Security
    • Critical Infrastructure Security
  • B2-06

    The Supply Chain Cybersecurity Consortium (SC3)'s efforts and case studies and challenges in supply chain cybersecurity

    • Speaker

      CRIC SC3

  • C2-06

    In an era where smartphones are targeted - Security strategies to protect mobile devices

    • Speaker

      Jamf Japan G.K.

      Sales Engineer

      Maari Koga

    • Data Leakage Prevention
    • Endpoint Security
    • Zero Trust

    Presented byJamf Japan G.K.

  • WS2-06

    Coming soon

    • Workshop

    Presented byLogpresso Inc.

14:15 | 14:55
  • A2-07

    How to take your vulnerability management to the next level?
    Introducing Continuous Risk Management with Qualys.

    • Speaker

      Qualys Japan K.K.

      Sales Department HQ
      Regional Sales Director, Japan

      Mitsufusa Sugimoto

    • Demonstrator

      Qualys Japan K.K.

      Sales Department HQ
      Techincal Account Manager

      Yukari Miyagawa

    • Vulnerability / Tampering Countermeasures
    • Security Audits / System Audits
    • PSIRT / CSIRT

    Presented byQualys Japan K.K.

  • B2-07

    Managing privileged acount and monitoring privileged session by using PAM/PASM

    • Speaker

      Jupiter Technology Corp.

      Business Unit 3, Sales Group

      Shinichiro Matsukura

    • Speaker

      Jupiter Technology Corp.

      Business Unit 3, Technical Group

      Kunio Tamura

    • Zero Trust
    • Authentication / Identity Management
    • Security Audits / System Audits

    Presented byJupiter Technology Corp.

  • C2-07

    How a Network Switch Became a Cybersecurity Game Changer
    – The TiFRONT Approach

    • Speaker

      PIOLINK, Inc.
      Partner Sales & Marketing Dept. General Manager

      PIOPLATFORM, Inc.
      Business Development Dept. Director

      Taro Matsuda

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures

    Presented byPIOLINK, Inc.

15:10 | 15:50
  • A2-08

    Next-Gen Cyber Defense through the Eyes of the Attacker: AI, CTEM, and the Dark Web

    • Speaker

      KELA KK

      Pre Sales Div.
      Head of Pre-sales

      Makoto Kawasaki

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Vulnerability / Tampering Countermeasures

    Presented byKELA K.K.

  • B2-08

    Revamping Identity Infrastructure at Mitsubishi Heavy Industries — Supporting DX for 80,000 Global Users with VANADIS

    • Speaker

      Mitsubishi Heavy Industries, Ltd.

      Digital Platform Technology Department,Digital Innovation Headquarters

      Ryo Onishi

    • Speaker

      NTT DATA INTELLILINK Corporation

      Security Innovation Division,Security & Technology Consulting Sector

      Hideki Fukuda

    • Data Leakage Prevention
    • Zero Trust
    • Authentication / Identity Management

    Presented byNTT DATA INTELLILINK Corporation

  • C2-08

    Web Security Threats and Real-Time Solutions with UMV:
    Insights from the Latest Hacking Incidents in Asia

    • Speaker

      UMV Inc.

      Global Marketing / VP

      Cassandra Lee

    • Cloud Security
    • Monitoring / Detection
    • Application Security

    Presented byUMV Inc.

  • Closed

    WS2-08

    OT/IoT security measures: I don't know what to do!
    From visualization to POC success points: A practical OT/IoT security workshop that's immediately useful in the field

    • Speaker

      Nozomi Networks, Inc.

      Staff Sales Engineer

    • Endpoint Security
    • IoT Security
    • Critical Infrastructure Security
    • Workshop

    Presented byNozomi Networks Inc.

16:05 | 16:45
  • A2-09

    A Super Introduction to OT Security
    -- OT Security You Can Start Practicing Tomorrow--

    • Speaker

      TXOne Networks Japan

    • Ransomware Countermeasures
    • Vulnerability / Tampering Countermeasures
    • Critical Infrastructure Security

    Presented byTXOne Networks Japan GK

  • B2-09

    What should security operations be like?
    How to prevent unauthorized operations in ICT operations and lower the barriers to vulnerability countermeasures

    • Speaker

      BOSCO Technologies Inc.

    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures
    • Authentication / Identity Management

    Presented byBOSCO Technologies Inc.

  • C2-09

    What are the fraud countermeasures in compliance with Credit Card Security Guidelines Ver. 6.0?
    -What is the power of “O-PLUX,” which is being introduced in the EC and financial industries?-

    • Speaker

      Cacco Inc.

      O-PLUX Division
      Division manager

      Mai Onose

    • Data Leakage Prevention
    • Monitoring / Detection
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends

    Presented byCacco Inc.

  • WS2-09

    CI CD the keys to the kingdom and some more.

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

    • Workshop
17:00 | 17:40
  • A2-10

    Protecting businesses by ""predicting""
    - New common sense for cyber threat countermeasures pioneered by ZeroMi Intelligence (tentative)

    Presented byZeamiCyberSecurity Co.,Ltd.

  • B2-10

    Why Is NDR Now Indispensable?
    Protecting Modern Networks from the Latest Threats

    • Speaker

      Vectra AI Japan KK

      Security Engineer
      CEH
      CISSP

      Masaharu Imai

    • Cloud Security
    • XDR
    • SOC / Incident Response

    Presented byVectra AI Japan KK

  • C2-10

    Identity Management Becomes More Complex in On-Premises and Cloud-Based Environments
    - Recommendations for Rethinking IAM to Balance Protection and Management - (tentative)

    • Data Leakage Prevention
    • Zero Trust
    • Authentication / Identity Management

    Presented byCSE Co.,Ltd.

17:45 | 18:15
  • A2-11

    Cyber ​​Resilience (tentative)

    • Speaker

      Cloud Security Alliance Japan Chapter, Incorporated
      (CSA- JC)

      Steering committee member and Cloud Security WG Leader

      Masanori Kamayama

    • Targeted Attacks / Cyber Attacks
    • Cloud Security
    • SBOM (Software Bill of Materials)
  • B2-11

    Cyberspace threat situation and police efforts (tentative)

    • Speaker

      National Police Agency JAPAN

      Cybercrime Prevention Office, Cyber Affairs Bureau
      Assistant Director

      Yohsuke Nakagawa

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
  • C2-11

    JFE Group's Cybersecurity Strategy

    • Speaker

      JFE Cyber Security & Solutions, LTD.

      President

      Ken Sakata

    • PSIRT / CSIRT
    • Human Resource Development
18:30 | 19:30
  • A2-12

    [Discussion] Case study of zero trust segmentation
    - What are the benefits of implementing Xshield by US company ColorTokens?

    • Speaker

      Denkosha

      SI
      Security Analyst

      Masahiko Ishibashi

    • Demonstrator

      Color Tokens, Inc.

      Global Field CTO
      CISSP

      Venky Raju

    • Ransomware Countermeasures
    • Zero Trust
    • Critical Infrastructure Security

    Presented byDENKOSHA Corporation

  • B2-12

    AI Security Automation Platform to Support “Sophistication”,
    “Efficiency”, and “Visualization” of Security Operations

    • Speaker

      SWIMLANE Japan K.K.

      Country Manager

      Hideki Ushigome

    • Speaker

      SWIMLANE Japan K.K.

      Senior System Architect

      Ryuichi Tomita

    • AI Security
    • SOC / Incident Response
    • PSIRT / CSIRT

    Presented bySWIMLANE LLC

  • Privacy Policy

[25年春開催]Security Days Spring 2025

Copyright (c) NANO OPT Media, Inc. All rights reserved.