iotc iotc

    • linkedin
    • facebook
    • twitter
    • YouTube
  • Registration

    Registration
  • Outline Outline
  • Osaka Osaka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Nagoya Nagoya
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Tokyo Tokyo
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Fukuoka Fukuoka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • Osaka Osaka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Nagoya Nagoya
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Tokyo Tokyo
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Fukuoka Fukuoka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration

      Registration

Session

  • All
  • 10.21(Tue)
  • 10.22(Wed)
  • 10.23(Thu)
  • 10.24(Fri)
  • consecutive interpreting

  • simultaneous interpreting

Search (possible multiple choice)

Keyword

10.23(Thu)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:30
  • A3-01

    Cybersecurity Measures from the Network Side

    • Speaker

      Ministry of Internal Affairs and Communications

      Office of the Director-General for Cybersecurity
      Senior Planning Officer

      Takanori Umeki

09:40 | 10:20
  • A3-02

    How to identify blind spots in the cloud? An approach to "visualizing" risks

    • Speaker

      Canon IT Solutions Inc.

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • Managed Security Services

    Presented byCanon IT Solutions Inc.

  • WS3-02

    Mapping SBOMs for Fun and Profit

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

    • Workshop
10:30 | 11:10
  • A3-03

    Aiming to minimize the risk of an expanding attack surface through AI
    Understanding the essence of "proactive security"

    • Speaker

      Trend Micro Incorporated

      Platform Marketing Group,
      Platform Enablement Dept,
      Director,

      Shunsuke Fukuda

    • Ransomware Countermeasures
    • Endpoint Security
    • AI Security

    Presented byTrend Micro Inc.

11:20 | 12:00
  • A3-04

    Vulnerability Management Starting with SBOM
    — Unified Cloud and On-Premise Operations Enabled by Cloudbase —

    • Speaker

      Cloudbase

      Product Manager

      Kazuki Otao

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • SBOM (Software Bill of Materials)

    Presented byCloudbase Inc.

12:40 | 13:20
  • A3-05

    The battle for cybersecurity begins with Chrome Enterprise

    • Speaker

      Densan System Co.,Ltd.

      Planning and Marketing Department

      Ryuji Miyamoto

    • Speaker

      Densan System Co.,Ltd.

      Social Innovation Division

      Hanayo Matsuya

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Zero Trust

    Presented byDensan System Co., Ltd.

  • B3-05

    Security testing required for compliance with cyber regulations such as the EU Cyber Resilience Act (CRA)

    • Speaker

      Black Duck Software G.K.

      Senior Technical Marketing Manager

      Masato Matsuoka

    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
    • Application Security
    • SBOM (Software Bill of Materials)

    Presented byBlack Duck Software G.K.

  • C3-05

    Three Critical Security Domains in the AI Era
    - AI Threat, Data Leak, and Operational Automation

    • Speaker

      Check Point Software Technologies, Ltd.

      Cyber Security Officer

      Daiji Ushiro

    • Data Leakage Prevention
    • AI Security
    • SOC / Incident Response

    Presented byCheck Point Software Technologies Ltd.

  • WS3-05

    The "trust" and "competitiveness" that SOC2 reports bring
    Auditors reveal the reality of SOC2 certification and on-site challenges

    • Speaker

      Reiwa & Company / Meneside

    • Speaker

      Reiwa & Company / Meneside

    • Cloud Security
    • Security Audits / System Audits
    • Other
    • Workshop

    Presented byMeneside Co.,Ltd.

13:30 | 14:00
  • Closed

    A3-06

    Cybersecurity Measures Required in the Defense Industry

    • Speaker

      Acquisition Technology and Logistics Agency

      Director
      Industrial Cyber Security Office
      Equipment Security Management Division
      Department of Equipment Policy

      Yugo Matsumoto

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • Security Audits / System Audits
  • B3-06

    Minimum imperative knowledge and skill for CEO’s; CEO Training - NTT Case

    • Speaker

      NIPPON TELEGRAPH AND TELEPHONE CORPORATION

    • Human Resource Development
  • C3-06

    Securing SB C&S Digital Future: Proactive Exposure Management through CTEM & future with EASM

    • Speaker

      SB C&S Corp.

      IT Infrastructure Division,
      Information System Division

      Yoshiaki Ishizaki

    • Speaker

      XM Cyber, LTD.

      Senior Sales Engineer

      Masayuki Suzuki

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • Infrastructure Hacking

    Presented byXM Cyber Ltd.

  • WS3-06

    How to visualize Active Directory threats and prevent attacks before they happen

    • Speaker

      TECHMATRIX CORPORATION

    • Demonstrator

      TECHMATRIX CORPORATION

    • Targeted Attacks / Cyber Attacks
    • Vulnerability / Tampering Countermeasures
    • Authentication / Identity Management
    • Workshop

    Presented byTECHMATRIX CORPORATION

14:15 | 14:55
  • A3-07

    Methods for Breaking Free VDI and VPN
    -Practical Solutions Revealed by a Survey of 1,000 IT Professionals-

    • Speaker

      Soliton Systems K.K.

      IT Security Division
      Product Promotion Department
      Manager

    • Data Leakage Prevention
    • Endpoint Security
    • Container Security

    Presented bySoliton Systems K.K.

  • B3-07

    Are physical secure rooms outdated?
    How to create a "virtual secure room" that combines convenience and security, and the benefits of using it

    • Speaker

      Encourage Technologies Co., Ltd.

    • Authentication / Identity Management
    • Monitoring / Detection
    • Workstyle Innovation

    Presented byEncourage Technologies Co., Ltd.

  • C3-07

    Vulnerabilities in MCP Servers and New Attack Surfaces in AI Applications

    • Speaker

      Datadog Japan GK

      Security Sales Engineer

      Yuki Matsuzaki

    • Targeted Attacks / Cyber Attacks
    • Cloud Security
    • AI Security

    Presented byDatadog Japan G.K.

15:10 | 15:50
  • A3-08

    Confronting Evolving Threats: The Frontiers of Next-Generation Endpoint Security

    • HP Japan Inc.

    • Targeted Attacks / Cyber Attacks
    • Vulnerability / Tampering Countermeasures
    • Quantum Security

    Presented byHP Japan Inc.

  • B3-08

    Automation of IT Infrastructure Management and Security Measures through Configuration Management (CMDB)

    • Speaker

      Aby3 Secure System

      Secure Consulting Unit
      Unit Manager / Senior Engineer

      Yoshitaka Suzuki

    • Cloud Security
    • Critical Infrastructure Security
    • SBOM (Software Bill of Materials)

    Presented byAby3 Secure System Corp.

  • C3-08

    For IT managers at small and medium-sized enterprises
    "Security Measures for Small and Medium-Sized Enterprises: Basics and Strategies"
    ~The Information Assets of Small and Medium-Sized Enterprises that Are Surprisingly Leaking~

    • Speaker

      Sakura Information Systems Co., Ltd.

    • Targeted Attacks / Cyber Attacks
    • Vulnerability / Tampering Countermeasures

    Presented bySakura Information Systems Co., Ltd.

  • WS3-08

    Secure Development in the AI ​​Era
    - How to Balance Productivity and Security

    • Speaker

      TECHMATRIX CORPORATION

    • AI Security
    • PSIRT / CSIRT
    • Application Security
    • Workshop

    Presented byTECHMATRIX CORPORATION

16:05 | 16:45
  • A3-09

    The future of national security and security as seen from the perspective of a CEO who makes security and defense products

    • Speaker

      Skygate Technologies Inc.

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • Zero Trust

    Presented bySkygate Technologies Inc.

  • B3-09

    Eliminating Boundaries from Network Devices: ZUNDA CONNECT ROUTER Embodying "Router 2.0" and Connection Design for the Zero Trust Era

    • Speaker

      ZUNDA Inc.

    • Zero Trust
    • SASE (Secure Acess Service Edge)
    • Managed Security Services

    Presented byZUNDA Inc.

  • C3-09

    Email Security in the Age of Generative AI and Real-Time Attacks
    --How to Prevent MFA Breaches

    • Speaker

      Abnormal AI

      Enterprise Sale Enginner

    Presented byAbnormal AI

  • WS3-09

    Lessons in Preventing Fraudulent and Deceptive Use of Brands: Practical Exercises and Insights from Tabletop Exercise Kits

    • Speaker

      Council of Anti-Phishing Japan
      Steering Committee Member /

      Trend Micro Incorporated.
      Principal Engineer

      Noriaki Hayashi

    • PSIRT / CSIRT
    • Human Resource Development
    • Phishing scam
    • Workshop
17:00 | 17:40
  • A3-10

    Protect your company from invisible threats!
    A dual-pronged approach: a cloud service that constantly monitors the dark web and targeted email training to develop your people!

    • Speaker

      JSecurity,Inc.

      Sales Department
      Team Leader

      Yunosuke Sugawara

    • Targeted Attacks / Cyber Attacks
    • Cloud Security
    • Data Leakage Prevention

    Presented byJSecurity, Inc.

  • B3-10

    A Multi-Cloud Defense Strategy to Address New Threats in the AI ​​Era
    -Next-Generation Security with Fastly-

    • Speaker

      Fastly K.K.

      Sr. Sales Engineer

      Shumpei Takuma

    • Targeted Attacks / Cyber Attacks
    • Cloud Security
    • AI Security

    Presented byFastly K.K.

  • C3-10

    Future security strategies for Japanese companies
    ~The Strengths of INTEC's Proprietary EDR Service Toward Realizing Zero Trust~

    • Speaker

      INTEC Inc.

      ICT Platform Service Business Division,Network Service Unit,Network Integration Dept.
      High-end Specialist

      Mamiko Sasaki

    • Ransomware Countermeasures
    • Endpoint Security
    • Zero Trust

    Presented byINTEC Inc.

17:45 | 18:15
  • Closed

    A3-11

    The threat of state-sponsored cyber attacks

    • Speaker

      Public Security Intelligence Agency

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
  • B3-11

    Considering the importance of OT security measures in the digital transformation of manufacturing sites through case studies
    ~What's happening between IT and OT?~

    • Speaker

      Mitsubishi Electric Corporation

    • Targeted Attacks / Cyber Attacks
    • Endpoint Security
    • Zero Trust

    Presented byMitsubishi Electric Corporation

  • C3-11

    Generative AI and Security

    • Speaker

      Japan Network Security Association

      Survey and Research Committee,
      AI Security WG Leader

      Yuichi Hattori, Ph.D.

    • AI Security
18:30 | 19:30
  • A3-12

    The evolution of security operations and how they will evolve in the future

    • Speaker

      Rapid7

      CEO/CTO

      Tatsuya Furukawa

    • Targeted Attacks / Cyber Attacks
    • Cloud Security
    • Other

    Presented byRapid7 Japan K.K.

  • C3-12

    From AI to Supply Chain: Why Reducing Your Attack Surface Is No Longer Optional

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

  • Privacy Policy

[25年春開催]Security Days Spring 2025

Copyright (c) NANO OPT Media, Inc. All rights reserved.