Session
-
consecutive interpreting
-
simultaneous interpreting
Search (possible multiple choice)
Keyword
10.23(Thu)
-
09:40 | 10:20
-
-
A3-02
How to identify blind spots in the cloud? An approach to "visualizing" risks
-
Speaker
Canon IT Solutions Inc.
- Cloud Security
- Vulnerability / Tampering Countermeasures
- Managed Security Services
Presented byCanon IT Solutions Inc.
-
Speaker
-
WS3-02
Mapping SBOMs for Fun and Profit
-
Speaker
Cyfinoid Research
Anant Shrivastava
- Workshop
-
Speaker
-
-
12:40 | 13:20
-
-
A3-05
The battle for cybersecurity begins with Chrome Enterprise
-
Speaker
Densan System Co.,Ltd.
Planning and Marketing Department
Ryuji Miyamoto
-
Speaker
Densan System Co.,Ltd.
Social Innovation Division
Hanayo Matsuya
- Ransomware Countermeasures
- Data Leakage Prevention
- Zero Trust
Presented byDensan System Co., Ltd.
-
Speaker
-
B3-05
Security testing required for compliance with cyber regulations such as the EU Cyber Resilience Act (CRA)
-
Speaker
Black Duck Software G.K.
Senior Technical Marketing Manager
Masato Matsuoka
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
- Application Security
- SBOM (Software Bill of Materials)
Presented byBlack Duck Software G.K.
-
Speaker
-
C3-05
Three Critical Security Domains in the AI Era
- AI Threat, Data Leak, and Operational Automation-
Speaker
Check Point Software Technologies, Ltd.
Cyber Security Officer
Daiji Ushiro
- Data Leakage Prevention
- AI Security
- SOC / Incident Response
Presented byCheck Point Software Technologies Ltd.
-
Speaker
-
WS3-05
The "trust" and "competitiveness" that SOC2 reports bring
Auditors reveal the reality of SOC2 certification and on-site challenges-
Speaker
Reiwa & Company / Meneside
-
Speaker
Reiwa & Company / Meneside
- Cloud Security
- Security Audits / System Audits
- Other
- Workshop
Presented byMeneside Co.,Ltd.
-
Speaker
-
-
13:30 | 14:00
-
-
Closed
A3-06
Cybersecurity Measures Required in the Defense Industry
-
Speaker
Acquisition Technology and Logistics Agency
Director
Industrial Cyber Security Office
Equipment Security Management Division
Department of Equipment PolicyYugo Matsumoto
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Security Audits / System Audits
-
Speaker
-
B3-06
Minimum imperative knowledge and skill for CEO’s; CEO Training - NTT Case
-
Speaker
NIPPON TELEGRAPH AND TELEPHONE CORPORATION
- Human Resource Development
-
Speaker
-
C3-06
Securing SB C&S Digital Future: Proactive Exposure Management through CTEM & future with EASM
-
Speaker
SB C&S Corp.
IT Infrastructure Division,
Information System DivisionYoshiaki Ishizaki
-
Speaker
XM Cyber, LTD.
Senior Sales Engineer
Masayuki Suzuki
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Infrastructure Hacking
Presented byXM Cyber Ltd.
-
Speaker
-
WS3-06
How to visualize Active Directory threats and prevent attacks before they happen
-
Speaker
TECHMATRIX CORPORATION
-
Demonstrator
TECHMATRIX CORPORATION
- Targeted Attacks / Cyber Attacks
- Vulnerability / Tampering Countermeasures
- Authentication / Identity Management
- Workshop
Presented byTECHMATRIX CORPORATION
-
Speaker
-
-
14:15 | 14:55
-
-
A3-07
Methods for Breaking Free VDI and VPN
-Practical Solutions Revealed by a Survey of 1,000 IT Professionals--
Speaker
Soliton Systems K.K.
IT Security Division
Product Promotion Department
Manager
- Data Leakage Prevention
- Endpoint Security
- Container Security
Presented bySoliton Systems K.K.
-
Speaker
-
B3-07
Are physical secure rooms outdated?
How to create a "virtual secure room" that combines convenience and security, and the benefits of using it-
Speaker
Encourage Technologies Co., Ltd.
- Authentication / Identity Management
- Monitoring / Detection
- Workstyle Innovation
Presented byEncourage Technologies Co., Ltd.
-
Speaker
-
C3-07
Vulnerabilities in MCP Servers and New Attack Surfaces in AI Applications
-
Speaker
Datadog Japan GK
Security Sales Engineer
Yuki Matsuzaki
- Targeted Attacks / Cyber Attacks
- Cloud Security
- AI Security
Presented byDatadog Japan G.K.
-
Speaker
-
-
15:10 | 15:50
-
-
A3-08
Confronting Evolving Threats: The Frontiers of Next-Generation Endpoint Security
-
HP Japan Inc.
- Targeted Attacks / Cyber Attacks
- Vulnerability / Tampering Countermeasures
- Quantum Security
Presented byHP Japan Inc.
-
-
B3-08
Automation of IT Infrastructure Management and Security Measures through Configuration Management (CMDB)
-
Speaker
Aby3 Secure System
Secure Consulting Unit
Unit Manager / Senior EngineerYoshitaka Suzuki
- Cloud Security
- Critical Infrastructure Security
- SBOM (Software Bill of Materials)
Presented byAby3 Secure System Corp.
-
Speaker
-
C3-08
For IT managers at small and medium-sized enterprises
"Security Measures for Small and Medium-Sized Enterprises: Basics and Strategies"
~The Information Assets of Small and Medium-Sized Enterprises that Are Surprisingly Leaking~-
Speaker
Sakura Information Systems Co., Ltd.
- Targeted Attacks / Cyber Attacks
- Vulnerability / Tampering Countermeasures
Presented bySakura Information Systems Co., Ltd.
-
Speaker
-
WS3-08
Secure Development in the AI Era
- How to Balance Productivity and Security-
Speaker
TECHMATRIX CORPORATION
- AI Security
- PSIRT / CSIRT
- Application Security
- Workshop
Presented byTECHMATRIX CORPORATION
-
Speaker
-
-
16:05 | 16:45
-
-
A3-09
The future of national security and security as seen from the perspective of a CEO who makes security and defense products
-
Speaker
Skygate Technologies Inc.
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Zero Trust
Presented bySkygate Technologies Inc.
-
Speaker
-
B3-09
Eliminating Boundaries from Network Devices: ZUNDA CONNECT ROUTER Embodying "Router 2.0" and Connection Design for the Zero Trust Era
-
Speaker
ZUNDA Inc.
- Zero Trust
- SASE (Secure Acess Service Edge)
- Managed Security Services
Presented byZUNDA Inc.
-
Speaker
-
C3-09
Email Security in the Age of Generative AI and Real-Time Attacks
--How to Prevent MFA Breaches-
Speaker
Abnormal AI
Enterprise Sale Enginner
Presented byAbnormal AI
-
Speaker
-
WS3-09
Lessons in Preventing Fraudulent and Deceptive Use of Brands: Practical Exercises and Insights from Tabletop Exercise Kits
-
Speaker
Council of Anti-Phishing Japan
Steering Committee Member /Trend Micro Incorporated.
Principal EngineerNoriaki Hayashi
- PSIRT / CSIRT
- Human Resource Development
- Phishing scam
- Workshop
-
Speaker
-
-
17:00 | 17:40
-
-
A3-10
Protect your company from invisible threats!
A dual-pronged approach: a cloud service that constantly monitors the dark web and targeted email training to develop your people!-
Speaker
JSecurity,Inc.
Sales Department
Team LeaderYunosuke Sugawara
- Targeted Attacks / Cyber Attacks
- Cloud Security
- Data Leakage Prevention
Presented byJSecurity, Inc.
-
Speaker
-
B3-10
A Multi-Cloud Defense Strategy to Address New Threats in the AI Era
-Next-Generation Security with Fastly--
Speaker
Fastly K.K.
Sr. Sales Engineer
Shumpei Takuma
- Targeted Attacks / Cyber Attacks
- Cloud Security
- AI Security
Presented byFastly K.K.
-
Speaker
-
C3-10
Future security strategies for Japanese companies
~The Strengths of INTEC's Proprietary EDR Service Toward Realizing Zero Trust~-
Speaker
INTEC Inc.
ICT Platform Service Business Division,Network Service Unit,Network Integration Dept.
High-end SpecialistMamiko Sasaki
- Ransomware Countermeasures
- Endpoint Security
- Zero Trust
Presented byINTEC Inc.
-
Speaker
-
-
17:45 | 18:15
-
-
Closed
A3-11
The threat of state-sponsored cyber attacks
-
Speaker
Public Security Intelligence Agency
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
-
Speaker
-
B3-11
Considering the importance of OT security measures in the digital transformation of manufacturing sites through case studies
~What's happening between IT and OT?~-
Speaker
Mitsubishi Electric Corporation
- Targeted Attacks / Cyber Attacks
- Endpoint Security
- Zero Trust
Presented byMitsubishi Electric Corporation
-
Speaker
-
C3-11
Generative AI and Security
-
Speaker
Japan Network Security Association
Survey and Research Committee,
AI Security WG LeaderYuichi Hattori, Ph.D.
- AI Security
-
Speaker
-
-
18:30 | 19:30
-
-
A3-12
The evolution of security operations and how they will evolve in the future
-
Speaker
Rapid7
CEO/CTO
Tatsuya Furukawa
- Targeted Attacks / Cyber Attacks
- Cloud Security
- Other
Presented byRapid7 Japan K.K.
-
Speaker
-
C3-12
From AI to Supply Chain: Why Reducing Your Attack Surface Is No Longer Optional
-
Speaker
Cyfinoid Research
Anant Shrivastava
-
Speaker
-