Nagoya Session
-
lunch
Search (possible multiple choice)
Keyword
3.5(Wed)
-
09:30 | 10:00
-
-
GA-01
Cyber threats in the AI era
-
Speaker
NTT Corporation
Chief Cybersecurity Strategist
Security and Trust OfficeMihoko Matsubara
- Ransomware measures
- AI security
- Business Email Compromise
-
Speaker
-
GB-01
Coming soon
-
Speaker
NPO Japan Network Security Association(JNSA)
-
Speaker
-
GC-01
Coming soon
-
Speaker
Nagoya Institute of Technology
-
Speaker
-
-
10:10 | 10:50
-
-
GA-02
Boost Cyber Resilience with Higher Reporting Rates:
Email Training to Prevent Targeted Attacks-
Speaker
HENNGE
Tadrill Sales Strategist
Product Planning & Research DivisionKoki Iwabu
- Targeted Threat / Cyber Attack
- Ransomware measures
- Email Security
Presented byHENNGE K.K.
-
Speaker
-
GB-02
The forefront of WSUS replacement
~ Thorough explanation of Intune, Autopatch, and IT asset management tools ~-
Speaker
DOS Co., Ltd.
Chief Evangelist
Sales PlanningMinori Koga
- Endpoint Security
- Measures against information leakage
- Zero trust security model
Presented byD.O.S Co.,LTD.
-
Speaker
-
GC-02
Learning Product Security from examples of Failure cases about SBOM
-
Speaker
Cybellum Technologies LTD
-
Speaker
Marubeni Information Systems Co., Ltd.
- PSIRT / CSIRT
- IoT security
- SBOM
Presented byMarubeni Information Systems Co., Ltd.
-
Speaker
-
GW-01
Coming soonIntroduction to Security Policies for New Employees in Small and Medium-Sized Enterprises:
The Basics of Creation, Communication, and Implementation from Scratch- Endpoint Security
- Measures against information leakage
- Human resource development
- Workshop
-
-
11:05 | 11:45
-
-
Closed
GA-03
Cyber Threats in the Age of Generative AI: Evolving Attacks and Security Technologies
-
Speaker
Net One Partners Co., Ltd.
Expert
Business Development DepartmentKenji Mizoshita
- Ransomware measures
- Cloud security
- Endpoint Security
Presented byDeep Instinct
-
Speaker
-
GB-03
Efficiently Diagnosing Large-Scale Websites: Key Points for Selecting the Optimal Method (TBD)
-
Speaker
UBsecure Inc.
- Vulnerability measures / Tampering measures
- Managed security
- Security auditing / system audit
Presented byUBsecure Inc.
-
Speaker
-
GC-03
Coming soon
-
Speaker
Cloudbase Inc.
- Cloud security
- Vulnerability measures / Tampering measures
- Monitoring and detection
Presented byCloudbase Inc.
-
Speaker
-
-
12:05 | 12:45
-
-
GA-04
Can EDR Alone Stand Against Modern Threats?
Endpoint Security Strategies for the Zero Trust Era-
Speaker
SB C&S Corp.
Evangelist
Masayuki Otsuka
-
Demonstrator
Omnissa Japan GK
Senior Specialist Engineer
Partner & Corporate SE DeptTatsuo Suzuki
- Endpoint Security
- Zero trust security model
Presented bySB C&S Corp.
-
Speaker
-
GB-04
What Should Companies do Strengthen Mobile Security
-
Speaker
Jamf Japan G.K.
Manager
Sales EngineeringYoshinori Inaba
- Cloud security
- Endpoint Security
- Zero trust security model
Presented byJamf Japan G.K.
-
Speaker
-
GC-04
Cybersecurity in the DX Era: Insights from Recent Incident Cases Preparing for Sophisticated Cyber Attacks
-
Speaker
MOTEX Inc.
Evangelist
Cyber Security Headquarters Security Service Department 1 Security Engineering DivisionSaki Fukuoka
- Targeted Threat / Cyber Attack
- Ransomware measures
- Measures against information leakage
Presented byMOTEX Inc.
-
Speaker
-
GW-02
The workshop on cybersecurity human resource development using "the Cyber-Poilce Game".
- Measures against information leakage
- Human resource development
- Phishing Attack
- Workshop
-
-
12:55 | 13:25
-
-
GA-05
Coming soon
-
Speaker
Tokai University
-
Speaker
-
GB-05
Introduction to Japan Cybersecurity Labeling scheme, JC-STAR, for IoT products
-
Speaker
Information-Technology Promotion Agency, Japan (IPA)
General Manager
IT Security Technology Evaluation Department, IT Security CenterMasayuki Kanda
- IoT security
-
Speaker
-
GC-05
Coming soon
-
Speaker
MARUBENI IT SOLUTIONS INC.
- Ransomware measures
- Measures against information leakage
- Zero trust security model
Presented byMARUBENI IT SOLUTIONS INC.
-
Speaker
-
-
13:40 | 14:20
-
-
GA-06
Coming soon
-
Speaker
CrowdStrike Japan G.K.
- Targeted Threat / Cyber Attack
- Endpoint Security
- SOC / Incident Response
Presented byCrowdStrike Japan G.K.
-
Speaker
-
GB-06
Coming soon
-
Speaker
SCSK Minori Solutions Corporation
- Measures against information leakage
- Email Security
Presented bySCSK Minori Solutions Corporation
-
Speaker
-
GC-06
Coming soon
-
Speaker
3-shake Inc.
- Vulnerability measures / Tampering measures
- Application Security
- Critical Infrastructure Security
Presented by3-shake Inc.
-
Speaker
-
-
14:35 | 15:15
-
-
GA-07
Prevent security incidents before they happen
~Key points of countermeasures~-
Speaker
Mitsubishi Electric Information Network Corporation
Information Security Service Division
Cyber Fusion Center
Section AKohdai Nagashima
- Targeted Threat / Cyber Attack
- Ransomware measures
- Vulnerability measures / Tampering measures
Presented byMitsubishi Electric Information Network Corporation
-
Speaker
-
GB-07
Coming soon
-
Speaker
MARUBENI IT SOLUTIONS INC.
- Zero trust security model
Presented byMARUBENI IT SOLUTIONS INC.
-
Speaker
-
GC-07
The New Normal in Cybersecurity: From “Reactive” to “Proactive” in the Age of “Reactive”.
-
Speaker
Trend Micro Incorporated
Director, Platform Marketing Group, Platform Enablement Dept,
Shunsuke Fukuda
- Ransomware measures
- Endpoint Security
- AI security
Presented byTrend Micro Incorporated
-
Speaker
-
GW-03
Coming soon
- PSIRT / CSIRT
- Security auditing / system audit
- Human resource development
- Workshop
-
-
15:30 | 16:10
-
-
GA-08
DAMRC, Secure File Transfer and DLP - Maximize the convenience of email security
-
Speaker
imatrix corp
Senior Researcher
Lab/MerketingHibiki Oka
- Ransomware measures
- Measures against information leakage
- Email Security
Presented byimatrix corp.
-
Speaker
-
GB-08
Coming soon
-
Speaker
A10 Networks, K.K.
- Measures against information leakage
- Zero trust security model
- Application Security
Presented byA10 Networks, K.K.
-
Speaker
-
GC-08
Coming soon
-
Speaker
OceanBridge Inc.
- Ransomware measures
- Authentication / Identity Management
- Zero trust security model
Presented byOceanBridge Inc.
-
Speaker
-
-
16:20 | 16:50
-
-
GA-09
Threats in Cyberspace
~State-Sponsored Cyberattacks ~-
Speaker
Public Security Intelligence Agency
Cybersecurity Intelligence Office
DirectorIppei Suyama
-
Speaker
-
GB-09
Predicting questions!
- Capture "Registered Information Security Specialist Examination".-
Speaker
Japan Registered Information Security Specialists’ Association
Director
Naoki Murayama
- PSIRT / CSIRT
- SOC / Incident Response
- Human resource development
-
Speaker
-
GC-09
Control System's Cyber Security Efforts of Chubu Electric Power
-
Speaker
Chubu Electric Power Co., Inc.
General Manager
Expert Security Center, Digital Transformation Promotion OfficeHiroyuki Hasegawa
- PSIRT / CSIRT
- Critical Infrastructure Security
- Human resource development
-
Speaker
-