iotc iotc

  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
    • linkedin
    • facebook
    • twitter
    • YouTube
  • Registration Registration

  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FAQ
    • Registration Registration

  • NOM'S EVENTS
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020

Tokyo Session

  • All
  • 3.11(Tue)
  • 3.12(Wed)
  • 3.13(Thu)
  • 3.14(Fri)
  • simultaneous interpreting

  • lunch

Search (possible multiple choice)

Keyword

3.11(Tue)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:30
  • A1-01

    Latest trends in cybersecurity policy in the ICT field

    • Speaker

      Ministry of Internal Affairs and Communications

      Senior Planning Officer
      Office of the Director-General for Cybersecurity

      Suguru Nishimura

    • IoT security
    • Human resource development
09:40 | 10:20
  • A1-02

    Coming soon

    • Speaker

      Sky CO., LTD.

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Measures against information leakage

    Presented bySky CO., LTD.

  • Closed

    WS1-01

    A Comprehensive Guide to Email Sender Authentication Technologies

    • Email Security
    • Domain authentication / DNS Security
    • Phishing Attack
    • Workshop
10:30 | 11:10
  • A1-03

    he Identity Security Blind Spot
    - Protecting Legacy Systems and Service Accounts

    • Speaker

      Silverfort

      Country Lead, Japan

      Hiro Aoyama

    Presented bySilverfort

11:20 | 12:00
  • A1-04

    Coming soon

    • Speaker

      NTT DATA

    • Speaker

      Proofpoint Japan K.K.

    • Targeted Threat / Cyber Attack
    • Email Security
    • Phishing Attack

    Presented byProofpoint Japan K.K.

12:15 | 12:55
  • A1-05

    The Latest Microsoft AI powered & Integrated Security Solutions in the AI Era

    • Speaker

      Microsoft Japan Co., Ltd.

      Business Executive Officer, Sales Enablement & Operations Security GTM

      Mitsunori Fujino

    • Cloud security
    • SOC / Incident Response
    • AI security

    Presented byMicrosoft Japan Co., Ltd.

  • WS1-02

    Coming soon

    • Workshop

    Presented byAeye Security Lab Inc.

13:05 | 13:35
  • A1-06

    The current state of ransomware damage and how to respond when damage occurs

    • Speaker

      National Police Agency JAPAN

      Assistant Director, Cybercrime Prevention Office, Cyber Affairs Bureau

      Yohsuke Nakagawa

    • Targeted Threat / Cyber Attack
    • Ransomware measures
14:10 | 14:50
  • A1-07

    Coming soon

    • Speaker

      LAC Co., Ltd.

    Presented byLAC Co., Ltd. / Microsoft Japan Co., Ltd.

  • Closed

    B1-07

    Optimizing Zero Trust Strategy with a Risk-Based Approach

    • Speaker

      Soliton Systems K.K.

      Evangelist
      IT Security Department

      Shoko Araki

    • Targeted Threat / Cyber Attack
    • Authentication / Identity Management
    • Zero trust security model

    Presented bySoliton Systems K.K.

  • C1-07

    What Should Companies do Strengthen Mobile Security

    • Speaker

      Jamf Japan G.K.

      Sales Enablement Manager

      Shingo Matsushima

    • Cloud security
    • Endpoint Security
    • Zero trust security model

    Presented byJamf Japan G.K.

15:05 | 15:45
  • A1-08

    The cutting edge of data security: Microsoft Purview brings peace of mind and trust to businesses

    • Speaker

      PERSOL CROSS TECHNOLOGY CO., LTD.

      Security Consultant
      System Solution Headquarters, DX Solution Headquarters, DX Platform Division 1

      Kota Suzuki

    • Cloud security
    • Measures against information leakage
    • Monitoring and detection

    Presented byPERSOL CROSS TECHNOLOGY CO., LTD. / Microsoft Japan Co., Ltd.

  • Closed

    B1-08

    Coming soon

    • Speaker

      Tenable Network Security Japan K.K.

    • Targeted Threat / Cyber Attack
    • Cloud security
    • Vulnerability measures / Tampering measures

    Presented byTenable Network Security Japan K.K.

  • C1-08

    Coming soon

    • Speaker

      Hornetsecurity K.K.

      Principal Messaging Engineer

      Yoshitaka Hirano

    • Email Security
    • Domain authentication / DNS Security
    • Phishing Attack

    Presented byHornetsecurity K.K.(Vade Japan K.K.)

16:00 | 16:40
  • A1-09

    Coming soon

    • Speaker

      SCSK Minori Solutions Corporation

    • Measures against information leakage
    • Email Security

    Presented bySCSK Minori Solutions Corporation

  • B1-09

    Continuous Threat Exposure Management for Those Tired of Security Acronyms

    • Speaker

      Rapid7 Japan

      Japan SE Lead, CISSP

      Toshio Honda

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Vulnerability measures / Tampering measures

    Presented byRapid Seven Japan Co., LTD.

  • Closed

    C1-09

    Protecting the future of companies with privileged ID management
    - Daiwa Securities Group case studies and the latest security threats -

    • Speaker

      Daiwa Institute of Research Ltd.

      Director
      Digital Solution Research and Development Dept.

      Atsushi Shibuya

    • Speaker

      Daiwa Institute of Research Ltd.

      Associate Director
      Business Solution Dept.

      Rina Kondo

    • Ransomware measures
    • Measures against information leakage
    • Authentication / Identity Management

    Presented byDaiwa Institute of Research Ltd.

  • Closed

    WS1-04

    Response to Legal and Regulatory Trends in Product Security

    • PSIRT / CSIRT
    • IoT security
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
    • Workshop
16:55 | 17:35
  • A1-10

    DAMRC, Secure File Transfer and DLP - Maximize the convenience of email security

    • Speaker

      imatrix corp

      Senior Researcher
      Lab/Merketing

      Hibiki Oka

    • Ransomware measures
    • Measures against information leakage
    • Email Security

    Presented byimatrix corp.

  • Closed

    B1-10

    A Deeper Look Into Cyber Threats Targeting Japan:
    What We Can Learn from Cyber Incidents in 2024 and How to Deal with Possible Future Threats

    • Speaker

      S2W Inc.

      Regional Director(Japan)
      Business Center

      Heita Miyoshi

    • Targeted Threat / Cyber Attack
    • AI security
    • Other

    Presented byS2W Inc.

  • C1-10

    Boosting the level of security throughout the company efficiently to defend against cyber-attacks

    • Speaker

      Yubico

      Vice President Sales, Korea and Japan

      Junichi Ohtomo

    • Speaker

      International Systems Research Co.

      Sales Manager
      Sales Division Marketing & Security Key Business Dept.

      Koichi Uchida

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Authentication / Identity Management

    Presented byInternational Systems Research Co.

17:40 | 18:10
  • A1-11

    Threats in Cyberspace
    ~State-Sponsored Cyberattacks ~

    • Speaker

      Public Security Intelligence Agency

      Cybersecurity Intelligence Office Director

      Ippei Suyama

  • B1-11

    Coming soon

    • Speaker

      Tokai University

  • C1-11

    Latest trends in Cybersecurity legislation to watch in 2025

    • Speaker

      Mori Hamada & Matsumoto

      Attorney at Law

      Daisuke TSUTA

    • Targeted Threat / Cyber Attack
    • Critical Infrastructure Security
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
18:20 | 19:20
  • C1-12

    The importance of prevention as a security measure, incorporating the concept of Secure by Design.

    • Speaker

      Secure Code Warrior Limited

      CEO

      Pieter Danhieux

    • PSIRT / CSIRT
    • Application Security
    • Human resource development

    Presented byTECHMATRIX CORPORATION

  • Privacy Policy

[24年秋開催]Security Days Fall 2024

Copyright (c) NANO OPT Media, Inc. All rights reserved.