iotc iotc

    • linkedin
    • facebook
    • twitter
    • YouTube
  • Registration

    Registration
  • Outline Outline
  • Osaka Osaka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Nagoya Nagoya
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Tokyo Tokyo
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Fukuoka Fukuoka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • Osaka Osaka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Nagoya Nagoya
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Tokyo Tokyo
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Fukuoka Fukuoka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration

      Registration

Session

  • All
  • 10.21(Tue)
  • 10.22(Wed)
  • 10.23(Thu)
  • 10.24(Fri)
  • consecutive interpreting

  • simultaneous interpreting

Search (possible multiple choice)

Keyword

10.24(Fri)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:30
  • A4-01

    Cyber ​​Risk Trends and Security Strategies in the Land, Infrastructure, Transport and Tourism Sector

    • Speaker

      Ministry of Land, Infrastructure, Transport and Tourism

      Chief Information Security Advisor

      Tatsuya Kitao

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Critical Infrastructure Security
09:40 | 10:20
  • A4-02

    The Latest in Digital ASM: Automating from Efficient Detection to Prioritization with Generative AI

    • Speaker

      Aeye Security Lab Inc.

      Director of Business Planning

      Kazuma Abe

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • Application Security

    Presented byAeye Security Lab Inc.

  • WS4-02

    Fixing What’s Broken : One Line at a Time

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

    • Workshop
10:30 | 11:10
  • A4-03

    Evolving Threats, Expanding Targets: What Defenses Are Needed for Businesses Today? (tentative)

    • Speaker

      Broadcom

      Enterprise Security Group
      Chief Security Strategist

      Manoj Sharma

    • Ransomware Countermeasures
    • Endpoint Security
    • Zero Trust

    Presented byTD Synnex Corp

11:20 | 12:00
  • A4-04

    Comparison of 7 security services against targeted email attacks
    - Is there a way to counter AI-produced email attacks?

    • Speaker

      QUALITIA CO., LTD.

      Field Sales Department, Sales Division
      Deputy Manager

      Souta Sakurai

    • Targeted Attacks / Cyber Attacks
    • Email Security
    • Phishing scam

    Presented byQUALITIA CO., LTD.

12:15 | 12:55
  • A4-05

    Know Thy Enemy
    - Language Barrier Collapsed by Generative AI: Redefining the Defenses Needed for Japan, the World’s Most Targeted Country

    • Speaker

      Proofpoint Japan K.K.

      Chief Evangelist

      Yukimi Sohta

    • Targeted Attacks / Cyber Attacks
    • Email Security
    • Phishing scam

    Presented byProofpoint Japan K.K.

  • WS4-05

    Coming soon

    • Workshop
13:05 | 13:35
  • A4-06

    The importance of developing security personnel (tentative)

    • Speaker

      National Institute of Information and Communications Technology

      Director General of Cybersecurity Nexus
      Director General of Cybersecurity Research Institute

      Daisuke Inoue

  • Closed

    WS4-06

    "Not knowing" is dangerous! Generative AI information leakage risks and countermeasures workshop: A thorough explanation by a Zscaler Certified ACE Engineer

    • Speaker

      Nippon Information and Communication Corporation

    • Data Leakage Prevention
    • Zero Trust
    • SASE (Secure Acess Service Edge)
    • Workshop

    Presented byNippon Information and Communication Corporation

14:10 | 14:50
  • A4-07

    Reconsidering the safety of file transmission: A practical solution to PPAP and internal fraud countermeasures (provisional)

    • Speaker

      NRI SecureTechnologies, Ltd.

    • Data Leakage Prevention
    • Email Security

    Presented byNRI SecureTechnologies, Ltd.

  • B4-07

    The SASE Authentication Strategy: Challenges from the Field
    – Insights from 1,000 IT personnel

    • Speaker

      Soliton Systems K.K.

      Product & Service Management
      IT Security Division

      Mayu Matsuda

    • Zero Trust
    • Authentication / Identity Management
    • SASE (Secure Acess Service Edge)

    Presented bySoliton Systems K.K.

  • C4-07

    Graduated from PPAP
    -Five Years After the Abolition Declaration: The Evolution of File Delivery-

    • Speaker

      QUALITIA CO., LTD.

      Field Sales Department, Sales Division, Account Manager

      Harukaze Mouri

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • Email Security

    Presented byQUALITIA CO., LTD.

15:05 | 15:45
  • A4-08

    The next step in security is log management!
    What security measures start with log management?

    • Speaker

      Infoscience Corporation

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures

    Presented byInfoscience Corporation

  • B4-08

    Cyber ​​risks in the OT domain increase with the shift to smart factories
    -Practical points for protecting workplaces without downtime-

    • Speaker

      AhnLab, Inc.

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust

    Presented byAhnLab, Inc.

  • C4-08

    The ultimate solution for protecting critical infrastructure from AI attacks, unknown malware, and zero-day attacks!
    What is OPSWAT, the only company to achieve 100% accuracy in comprehensive security product testing? (Tentative)

    • Speaker

      OPSWAT
      JAPAN

      Country Manager

      Atsushi Takamatsu

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust

    Presented byNet One Partners Co., Ltd.

  • WS4-08

    Coming soon

    • Workshop
16:00 | 16:40
  • A4-09

    What Business Leaders Must Decide in the AI-Driven Era of Zero Trust

    • Speaker

      AP Communications Co., Ltd.

      iTOC Division,
      BzD Department,
      0-WAN
      Engineering Manager

      Yasuhiro Yamane

    • Speaker

      Zscaler K.K.

      Sales Engineering
      Head of Sales Engineering

      Masatoshi Inuzuka

    • Targeted Attacks / Cyber Attacks
    • Zero Trust
    • AI Security

    Presented byAP Communications Co., Ltd.

  • B4-09

    The Trump Card in the Zero Trust Era: The True Value of Enterprise Browsers

    • Speaker

      J’s Communication Co., Ltd.

    • Targeted Attacks / Cyber Attacks
    • Endpoint Security
    • Zero Trust

    Presented byJ’s Communication Co., Ltd.

  • C4-09

    From Innovation to Infiltration: The role of AI in Modern Cybersecurity

    • Speaker

      Radware

      Vice President of Sales Engineering and Security Architecture for Asia Pacific & Japan

      Sharat Nautiyal

    • AI Security
    • DDoS Countermeasures
    • Application Security

    Presented byTerilogy Co., Ltd.

  • WS4-09

    Current email system functions and requirements

    • Panelist

      Anti-Spam Promotion Council

      Acting Chair & Technical Working Group chairperson

      Shuji Sakuraba, Ph.D.

    • Email Security
    • Phishing scam
    • Domain Authentication / DNS Security
    • Workshop
16:55 | 17:35
  • A4-10

    Countermeasures and Responses Required for DDoS Attacks on Critical Systems

    • Speaker

      NetScout Systems Japan K.K.

      Enterprise Business Division
      Account Manager - Security

      Kunihito Yagi

    • Targeted Attacks / Cyber Attacks
    • Monitoring / Detection
    • DDoS Countermeasures

    Presented byTOYO Corporation

  • B4-10

    Why DNP Shifted to Integrated Monitoring
    - Behind the Scenes of Security Reform

    • Panelist

      DNP Infomation Systems Co.,Ltd.

      Cyber Fusion Center,
      Vice Director

      Hirofumi Oyamada

    • Moderator

      Dai Nippon Printing Co.,Ltd.

      Advanced Business Center,
      Cyber Security Business Development Unit,
      Business Promotion Department,
      Senior Planner

      Shun Mori

    • SASE (Secure Acess Service Edge)
    • Human Resource Development
    • Managed Security Services

    Presented byDai Nippon Printing Co., Ltd.

  • C4-10

    OSINT - Field stories & future considerations

    • Speaker

      SANS Institute
      Certified Instructor

      ShadowDragon
      Director of Intelligence, Collection Innovation

      Nico Dekens

    • Targeted Attacks / Cyber Attacks
    • Human Resource Development

    Presented bySANS Institute

17:40 | 18:10
  • A4-11

    AI BOM - Secure and transparent AI in an ecosystem

    • Speaker

      The Linux Foundation

      Japan
      VP of Japan Operations

      Noriaki Fukuyasu

    • AI Security
    • SBOM (Software Bill of Materials)
  • B4-11

    Introducing the "IPA Top 10 Information Security Threats 2025 (Organizational Edition)"
    ~Don't excuse your ignorance! Stay up to date with the latest information to prevent threats~

    • Speaker

      Information-technology Promotion Agency, Japan (IPA)

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Critical Infrastructure Security
  • C4-11

    Centralization of Security Incident Damage Reporting:
    Implementation of a Unified Format and Developments Toward the Enforcement of the Cyber Response Capability Enhancement Act

    • Speaker

      Mori Hamada & Matsumoto

      attorney at law

      Daisuke Tsuta

    • Targeted Attacks / Cyber Attacks
    • Critical Infrastructure Security
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
  • Privacy Policy

[25年春開催]Security Days Spring 2025

Copyright (c) NANO OPT Media, Inc. All rights reserved.