Session
-
consecutive interpreting
-
simultaneous interpreting
Search (possible multiple choice)
Keyword
10.24(Fri)
-
09:40 | 10:20
-
-
A4-02
The Latest in Digital ASM: Automating from Efficient Detection to Prioritization with Generative AI
-
Speaker
Aeye Security Lab Inc.
Director of Business Planning
Kazuma Abe
- Cloud Security
- Vulnerability / Tampering Countermeasures
- Application Security
Presented byAeye Security Lab Inc.
-
Speaker
-
WS4-02
Fixing What’s Broken : One Line at a Time
-
Speaker
Cyfinoid Research
Anant Shrivastava
- Workshop
-
Speaker
-
-
12:15 | 12:55
-
-
A4-05
Know Thy Enemy
- Language Barrier Collapsed by Generative AI: Redefining the Defenses Needed for Japan, the World’s Most Targeted Country-
Speaker
Proofpoint Japan K.K.
Chief Evangelist
Yukimi Sohta
- Targeted Attacks / Cyber Attacks
- Email Security
- Phishing scam
Presented byProofpoint Japan K.K.
-
Speaker
-
WS4-05
Coming soon
- Workshop
-
-
13:05 | 13:35
-
-
A4-06
The importance of developing security personnel (tentative)
-
Speaker
National Institute of Information and Communications Technology
Director General of Cybersecurity Nexus
Director General of Cybersecurity Research InstituteDaisuke Inoue
-
Speaker
-
Closed
WS4-06
"Not knowing" is dangerous! Generative AI information leakage risks and countermeasures workshop: A thorough explanation by a Zscaler Certified ACE Engineer
-
Speaker
Nippon Information and Communication Corporation
- Data Leakage Prevention
- Zero Trust
- SASE (Secure Acess Service Edge)
- Workshop
Presented byNippon Information and Communication Corporation
-
Speaker
-
-
14:10 | 14:50
-
-
A4-07
Reconsidering the safety of file transmission: A practical solution to PPAP and internal fraud countermeasures (provisional)
-
Speaker
NRI SecureTechnologies, Ltd.
- Data Leakage Prevention
- Email Security
Presented byNRI SecureTechnologies, Ltd.
-
Speaker
-
B4-07
The SASE Authentication Strategy: Challenges from the Field
– Insights from 1,000 IT personnel-
Speaker
Soliton Systems K.K.
Product & Service Management
IT Security DivisionMayu Matsuda
- Zero Trust
- Authentication / Identity Management
- SASE (Secure Acess Service Edge)
Presented bySoliton Systems K.K.
-
Speaker
-
C4-07
Graduated from PPAP
-Five Years After the Abolition Declaration: The Evolution of File Delivery--
Speaker
QUALITIA CO., LTD.
Field Sales Department, Sales Division, Account Manager
Harukaze Mouri
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Email Security
Presented byQUALITIA CO., LTD.
-
Speaker
-
-
15:05 | 15:45
-
-
A4-08
The next step in security is log management!
What security measures start with log management?-
Speaker
Infoscience Corporation
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
Presented byInfoscience Corporation
-
Speaker
-
B4-08
Cyber risks in the OT domain increase with the shift to smart factories
-Practical points for protecting workplaces without downtime--
Speaker
AhnLab, Inc.
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Zero Trust
Presented byAhnLab, Inc.
-
Speaker
-
C4-08
The ultimate solution for protecting critical infrastructure from AI attacks, unknown malware, and zero-day attacks!
What is OPSWAT, the only company to achieve 100% accuracy in comprehensive security product testing? (Tentative)-
Speaker
OPSWAT
JAPANCountry Manager
Atsushi Takamatsu
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Zero Trust
Presented byNet One Partners Co., Ltd.
-
Speaker
-
WS4-08
Coming soon
- Workshop
-
-
16:00 | 16:40
-
-
A4-09
What Business Leaders Must Decide in the AI-Driven Era of Zero Trust
-
Speaker
AP Communications Co., Ltd.
iTOC Division,
BzD Department,
0-WAN
Engineering ManagerYasuhiro Yamane
-
Speaker
Zscaler K.K.
Sales Engineering
Head of Sales EngineeringMasatoshi Inuzuka
- Targeted Attacks / Cyber Attacks
- Zero Trust
- AI Security
Presented byAP Communications Co., Ltd.
-
Speaker
-
B4-09
The Trump Card in the Zero Trust Era: The True Value of Enterprise Browsers
-
Speaker
J’s Communication Co., Ltd.
- Targeted Attacks / Cyber Attacks
- Endpoint Security
- Zero Trust
Presented byJ’s Communication Co., Ltd.
-
Speaker
-
C4-09
From Innovation to Infiltration: The role of AI in Modern Cybersecurity
-
Speaker
Radware
Vice President of Sales Engineering and Security Architecture for Asia Pacific & Japan
Sharat Nautiyal
- AI Security
- DDoS Countermeasures
- Application Security
Presented byTerilogy Co., Ltd.
-
Speaker
-
WS4-09
Current email system functions and requirements
-
Panelist
Anti-Spam Promotion Council
Acting Chair & Technical Working Group chairperson
Shuji Sakuraba, Ph.D.
- Email Security
- Phishing scam
- Domain Authentication / DNS Security
- Workshop
-
Panelist
-
-
16:55 | 17:35
-
-
A4-10
Countermeasures and Responses Required for DDoS Attacks on Critical Systems
-
Speaker
NetScout Systems Japan K.K.
Enterprise Business Division
Account Manager - SecurityKunihito Yagi
- Targeted Attacks / Cyber Attacks
- Monitoring / Detection
- DDoS Countermeasures
Presented byTOYO Corporation
-
Speaker
-
B4-10
Why DNP Shifted to Integrated Monitoring
- Behind the Scenes of Security Reform-
Panelist
DNP Infomation Systems Co.,Ltd.
Cyber Fusion Center,
Vice DirectorHirofumi Oyamada
-
Moderator
Dai Nippon Printing Co.,Ltd.
Advanced Business Center,
Cyber Security Business Development Unit,
Business Promotion Department,
Senior PlannerShun Mori
- SASE (Secure Acess Service Edge)
- Human Resource Development
- Managed Security Services
Presented byDai Nippon Printing Co., Ltd.
-
Panelist
-
C4-10
OSINT - Field stories & future considerations
-
Speaker
SANS Institute
Certified InstructorShadowDragon
Director of Intelligence, Collection InnovationNico Dekens
- Targeted Attacks / Cyber Attacks
- Human Resource Development
Presented bySANS Institute
-
Speaker
-
-
17:40 | 18:10
-
-
A4-11
AI BOM - Secure and transparent AI in an ecosystem
-
Speaker
The Linux Foundation
Japan
VP of Japan OperationsNoriaki Fukuyasu
- AI Security
- SBOM (Software Bill of Materials)
-
Speaker
-
B4-11
Introducing the "IPA Top 10 Information Security Threats 2025 (Organizational Edition)"
~Don't excuse your ignorance! Stay up to date with the latest information to prevent threats~-
Speaker
Information-technology Promotion Agency, Japan (IPA)
- Ransomware Countermeasures
- Data Leakage Prevention
- Critical Infrastructure Security
-
Speaker
-
C4-11
Centralization of Security Incident Damage Reporting:
Implementation of a Unified Format and Developments Toward the Enforcement of the Cyber Response Capability Enhancement Act-
Speaker
Mori Hamada & Matsumoto
attorney at law
Daisuke Tsuta
- Targeted Attacks / Cyber Attacks
- Critical Infrastructure Security
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
-
Speaker
-