iotc iotc

  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
    • linkedin
    • facebook
    • twitter
    • YouTube
  • Registration Registration

  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FAQ
    • Registration Registration

  • NOM'S EVENTS
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020

Tokyo Session

  • All
  • 3.11(Tue)
  • 3.12(Wed)
  • 3.13(Thu)
  • 3.14(Fri)
  • simultaneous interpreting

  • lunch

Search (possible multiple choice)

Keyword

3.12(Wed)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:30
  • A2-01

    Coming soon

    • Speaker

      Japan Hackers Association

      Representative director

      Takayuki Suguira

09:40 | 10:20
  • A2-02

    AI-Driven Network Security: Latest Threat Trends & Single-Vendor SASE Solutions

    • Speaker

      Cato Networks Ltd.

      Field CTO Asia Pacific and Japan

      Haru Kaneko

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • SASE

    Presented byCato Networks (Japan) K K

  • Closed

    WS2-01

    Coming soon

    • Endpoint Security
    • Authentication / Identity Management
    • IoT security
    • Workshop
10:30 | 11:10
  • A2-03

    Cybersecurity Landscape: A New Frontier

    • Speaker

      CHEQ Japan

      East Asia Sir Solution Engineer

      Evgeny Apukhtin

    • Targeted Threat / Cyber Attack
    • Measures against information leakage
    • AI security

    Presented byCHEQ JAPAN

11:20 | 12:00
  • A2-04

    The New Normal in Cybersecurity: From “Reactive” to “Proactive” in the Age of “Reactive”.

    • Speaker

      Trend Micro Incorporated

      Manager, Platform Marketing Group, Platform Enablement Dept

      Mika Shimizu

    • Ransomware measures
    • Endpoint Security
    • AI security

    Presented byTrend Micro Incorporated

12:15 | 12:55
  • A2-05

    Can EDR Alone Stand Against Modern Threats?
    Endpoint Security Strategies for the Zero Trust Era

    • Speaker

      SB C&S Corp.

      Evangelist

      Masayuki Otsuka

    • Demonstrator

      Omnissa Japan GK

      Senior Specialist Engineer
      Partner & Corporate SE Dept

      Tatsuo Suzuki

    • Endpoint Security
    • Zero trust security model

    Presented bySB C&S Corp.

  • WS2-02

    Protecting Your Clients, Protecting Your Business: The Rise of Client-Side Attacks

    • Vulnerability measures / Tampering measures
    • AI security
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
    • Workshop

    Presented byCHEQ JAPAN

13:30 | 14:10
  • A2-06

    Coming soon

    • Speaker

      GMO Flatt Security Inc.

    • Cloud security
    • Vulnerability measures / Tampering measures
    • AI security

    Presented byGMO Flatt Security Inc.

  • B2-06

    Coming soon

    • Speaker

      Canon IT Solutions Inc.

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Endpoint Security

    Presented byCanon IT Solutions Inc.

  • C2-06

    How Should We Proceed After WSUS Ends?
    The Migration and Frontline of Vulnerability Management.

    • Speaker

      Jupiter Technology Corp.

      Business Unit 3, Technical Group

      Michiko Ota

    • Demonstrator

      Jupiter Technology Corp.

      Business Unit 3, Technical Group

      Shoichiro Izaki

    • Demonstrator

      Jupiter Technology Corp.

      Business Unit 3, Technical Group

      Akane Shimada

    • Targeted Threat / Cyber Attack
    • Endpoint Security
    • Vulnerability measures / Tampering measures

    Presented byJupiter Technology Corp.

14:25 | 15:05
  • A2-07

    Let's get started for SBOM

    • Speaker

      Black Duck Software G.K.

      Senior Technical Marketing Manager

      Masato Matsuoka

    • Software chain Attack
    • Application Security
    • SBOM

    Presented byBlack Duck Software G.K.

  • B2-07

    Coming soonThe vulnerability dilemma: How to manage the vast amount of information

    • Speaker

      Macnica Inc.

      Products Sales
      Security Division
      Networks Company

      Shin Okada

    • Targeted Threat / Cyber Attack
    • Vulnerability measures / Tampering measures
    • Managed security

    Presented byMacnica, Inc. / Tanium G.K.

  • C2-07

    Coming soon

    • Speaker

      Intelligent Wave Inc.

      Sales Planning Dep.
      Digital Innovation Dip.

      Keisuke Shimizu

    • Speaker

      EVIDEN

      Director of IAM Cybersecurity Products & General Manager of Evidian

      David Leporini

    • Measures against information leakage
    • Authentication / Identity Management
    • Zero trust security model

    Presented byIntelligent Wave Inc.

  • Closed

    WS2-03

    The Initiatives of the Japan Cloud Industry Association (ASPIC) on Cloud Security

    • Cloud security
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
    • Workshop
15:20 | 16:00
  • A2-08

    Prevent security incidents before they happen
    ~Key points of countermeasures~

    • Speaker

      Mitsubishi Electric Information Network Corporation

      Maneger
      Information Security Service Division
      Cyber Fusion Center
      Section B

      Atsushi Katoh

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Vulnerability measures / Tampering measures

    Presented byMitsubishi Electric Information Network Corporation

  • B2-08

    The Evolution of Zero Trust with SASE: The Roles of IdP and EDR

    • Speaker

      INTEC Inc.

      Senior High-end Specialist
      ICT Business Strategy Dept.
      ICT Platform Service Business Division

      Osanai Hironobu

    • Speaker

      INTEC Inc.

      High-end Specialist
      Network Integration Dept.
      Network Service Unit
      ICT Platform Service Business Division

      Sasaki Mamiko

    • Cloud security
    • Zero trust security model
    • SASE

    Presented byINTEC Inc.

  • C2-08

    By leveraging an integrated solution centrally managed through cloud, even small and medium-sized companies can achieve an enterprise-grade security system! (TBD)

    • Speaker

      WatchGuard Technologies Japan KK

      Senior Channel Sales Manager

      Tatsuya Okawa

    • Ransomware measures
    • XDR
    • Firewall / UTM

    Presented byWatchGuard Technologies Japan KK

16:15 | 16:55
  • A2-09

    Cybersecurity initiatives and future vision that support the business activities of the Dai Nippon Printing Group.

    • Speaker

      Dai Nippon Printing Co.,Ltd.

      Senior Product Manager
      Security Service Department, Cyber Security Business Development Unit,
      Advanced Business Center

      Shun Mori

    • XDR
    • SOC / Incident Response
    • Managed security

    Presented byDai Nippon Printing Co., Ltd.

  • B2-09

    The forefront of WSUS replacement
    ~ Thorough explanation of Intune, Autopatch, and IT asset management tools ~

    • Speaker

      D.O.S Co.,LTD.

    • Endpoint Security
    • Measures against information leakage
    • Vulnerability measures / Tampering measures

    Presented byD.O.S Co.,LTD.

  • C2-09

    Protecting the Organization: Effective Approaches and IT Operations Against Internal and External Threats

    • Speaker

      Ivanti Software

      Sales Engineer Manager

      Takumi Hattori

    • Cloud security
    • Endpoint Security
    • Vulnerability measures / Tampering measures

    Presented byIvanti Software K.K.

  • Closed

    WS2-04

    Learn Through Practical Workshops!
    Introduction to Cybersecurity Measures for SMEs

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Human resource development
    • Workshop
17:10 | 17:50
  • A2-10

    Defending Against the Surge of DDoS Attacks:
    Fastly’s Cutting-Edge Security Solutions for Automated Protection and Advanced Bot Mitigation

    • Speaker

      FASTLY K.K.

      Sr. Sales Engineer

      Shumpei Takuma

    • Cloud security
    • Application Security
    • Edge security

    Presented byFastly K.K.

  • B2-10

    Coming soon

    • Speaker

      KDDI CORPORATION

    • Speaker

      KDDI Digital Security Inc.

    • Authentication / Identity Management
    • IoT security
    • Encryption / Certificate

    Presented byKDDI CORPORATION

  • C2-10

    Coming soon

    • Speaker

      Infoscience, Inc.

    • Targeted Threat / Cyber Attack
    • Measures against information leakage
    • Vulnerability measures / Tampering measures

    Presented byInfoscience, Inc.

17:55 | 18:25
  • A2-11

    Cybersecurity Resilience in the Financial Sector

    • Speaker

      Financial Services Agency

      Office of Policy Coodination for IT Risk,
      Cybersecurity and Economic Security Risk Analysis Division Strategy Development and Management Bureau

      Motoshi Matsunaga

    • Critical Infrastructure Security
  • B2-11

    Predicting questions!
    - Capture "Registered Information Security Specialist Examination".

    • Speaker

      Japan Registered Information Security Specialists’ Association

      Director

      Naoki Murayama

    • PSIRT / CSIRT
    • SOC / Incident Response
    • Human resource development
  • C2-11

    Coming soon

    • Speaker

      Nishimura & Asahi

    • Ransomware measures
    • Endpoint Security
    • Measures against information leakage
18:35 | 19:35
  • A2-12

    Coming soon

    • Speaker

      AironWorks Co., Ltd.

    Presented byAironWorks Co., Ltd.

  • Privacy Policy

[24年秋開催]Security Days Fall 2024

Copyright (c) NANO OPT Media, Inc. All rights reserved.