iotc iotc

  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
    • linkedin
    • facebook
    • twitter
    • YouTube
  • Registration Registration

  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FAQ
    • Registration Registration

  • NOM'S EVENTS
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020

Tokyo Session

  • All
  • 3.11(Tue)
  • 3.12(Wed)
  • 3.13(Thu)
  • 3.14(Fri)
  • lunch

Search (possible multiple choice)

Keyword

3.13(Thu)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:30
  • A3-01

    Cyber Regulations for Improved Resilience

    • Speaker

      NAIST

      Professor, Laboratory for Cyber Resilience

      Youki Kadobayashi

    • Critical Infrastructure Security
    • AI security
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
09:40 | 10:20
  • A3-02

    Cloud Security Measures: Not Just Someone Else's Problem, Essential for Every Organization
    – How to Choose from a Variety of Solutions

    • Speaker

      Canon IT Solutions Inc.

      Cybersecurity Laboratory, Security Researcher

      Hajime Ichihara

    • Targeted Threat / Cyber Attack
    • Cloud security
    • Container security

    Presented byCanon IT Solutions Inc.

  • Closed

    WS3-01

    Coming soon

    • GDPR / Privacy Mark / ISMS / Laws of the Decree
    • SBOM
    • Workshop
10:30 | 11:10
  • A3-03

    Security measure that is not being swayed.
    What are realistic ways to strengthen security for small and medium-sized enterprises?

    • Speaker

      Kaspersky Labs Japan

      Chief Technology Officer/Evangelist

      Tetsuya Sekiba

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Endpoint Security

    Presented byK.K. Kaspersky Labs Japan

11:20 | 12:00
  • A3-04

    Changes and risks of Web & API attacks that should be noted in 2025, as interpreted from technological innovations and global situations

    • Speaker

      Akamai Technologies GK

      Marketing
      Product Marketing Manager

      Kazuhiro Nakanishi

    • Cloud security
    • Application Security
    • Measures against DDoS

    Presented byAkamai Technologies, Inc.

12:15 | 12:55
  • A3-05

    Coming soon

    • Speaker

      Google Japan G.K.

    • Speaker

      Google Japan G.K.

    • Cloud security
    • Endpoint Security
    • Zero trust security model

    Presented byGoogle Japan G.K.

  • WS3-02

    Coming soon

    • Cloud security
    • Application Security
    • Container security
    • Workshop

    Presented byTECHMATRIX CORPORATION

13:30 | 14:10
  • A3-06

    Isn't the security 'common sense' wrong?
    ~ New security operation standards that have become possible now ~

    • Speaker

      Rapid7 Japan

      CTO

      Katsuya Furukawa

    • XDR
    • Vulnerability measures / Tampering measures
    • Managed security

    Presented byRapid Seven Japan Co., LTD.

  • B3-06

    Email security and business risks achieved through layered defense

    • Speaker

      TwoFive inc.

      CTO

      Masaki Kase

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Phishing Attack

    Presented byTwoFive, Inc.

  • C3-06

    Digital Agency Cyber Security

    • Speaker

      Digital Agency

      Security Analyst
      Group of Strategy and Organization

      Masanori Kamayama

    • SOC / Incident Response
    • Critical Infrastructure Security
    • Other
14:25 | 15:05
  • A3-07

    Is it safe if we protect VPN and Cloud service?
    Learn from the latest security incidents about commonly overlooked intrusion routes and countermeasures

    • Speaker

      Soliton Systems K.K.

    • Targeted Threat / Cyber Attack
    • Measures against information leakage
    • Authentication / Identity Management

    Presented bySoliton Systems K.K.

  • B3-07

    Do You Understand the Hidden Risks of SSH Keys in Your Network?: Mitigation Strategies and How to Migrate to Keyless Access

    • Speaker

      SSH Communications Security

      Solutions Engineering Director

      Katsuhiro Shogawa

    • Ransomware measures
    • Authentication / Identity Management
    • Critical Infrastructure Security

    Presented bySSH Communications Security Oyj

  • C3-07

    Ransomware Protection Specifically for Private Clouds
    〜Toward a sustainable infrastructure

    • Speaker

      Broadcom

      Senior Solutions Architect
      Japan Cloud Infrastructure Dept.

      Takahiro Chiku

    • Ransomware measures
    • Cloud security
    • Critical Infrastructure Security

    Presented byVMware K.K. (Broadcom)

  • Closed

    WS3-03

    The Frontiers of Security from the Trusted Computing Group,
    an Influential U.S. Specification

    • Zero trust security model
    • Software chain Attack
    • Encryption / Certificate
    • Workshop
15:20 | 16:00
  • A3-08

    Keeper Security Privileged ID management starting with password management

    • Speaker

      Keeper Security APAC KK

      APAC Lead of Sales Engineering

      Masaki Ikehara

    • Cloud security
    • Measures against information leakage
    • Authentication / Identity Management

    Presented byDAIWABO INFORMATION SYSTEM CO., LTD. / Keeper Security APAC KK

  • B3-08

    Coming soon

    • Speaker

      MACNICA, Inc.

      Sales
      Networks company

      Kenta Chikauchi

    • Targeted Threat / Cyber Attack
    • Authentication / Identity Management
    • Zero trust security model

    Presented byMacnica, Inc.

  • C3-08

    The effectiveness of Keysight Security Solutions. Introduction based on PoC results using Trellix's NDR products

    • Speaker

      Keysight Technologies Japan K.K.

      Senior System Engineer
      IP Network Engineering Department
      Solution Engineering Division

      Takeshi Shimizu

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Cloud security

    Presented byKeysight Technologies Japan K.K.

16:15 | 16:55
  • A3-09

    Coming soon

    • Speaker

      Encourage Technologies Co., Ltd.

    • Ransomware measures
    • Authentication / Identity Management
    • Zero trust security model

    Presented byEncourage Technologies Co., Ltd.

  • B3-09

    Coming soon

    • Speaker

      Toshiba Digital Engineering Corporation

    • Speaker

      Cybereason G.K.

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • XDR

    Presented byToshiba Digital Engineering Corporation

  • C3-09

    Network Security Today: Analyzing Cyber Attacks and NDR Effectiveness

    • Speaker

      Vectra AI Japan

      Senior Sales Engineer

      Kazuo Fukuda

    • XDR
    • AI security
    • Monitoring and detection

    Presented byVectra AI Japan KK

  • Closed

    WS3-04

    Coming soon

    • Security auditing / system audit
    • Human resource development
    • Workshop
17:10 | 17:50
  • A3-10

    Efficiently Diagnosing Large-Scale Websites: Key Points for Selecting the Optimal Method (TBD)

    • Speaker

      UBsecure Inc.

    • Vulnerability measures / Tampering measures
    • Managed security
    • Security auditing / system audit

    Presented byUBsecure Inc.

  • B3-10

    Coming soon

    • Targeted Threat / Cyber Attack
    • Endpoint Security
    • Zero trust security model

    Presented byJ’s Communication Co., Ltd.

  • C3-10

    Significant management to protect against cyber attack !

    • Speaker

      ULTRA RED Ltd.

      Director
      Sales Engineering

      Yuji Sueyoshi

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Vulnerability measures / Tampering measures

    Presented byKELA K.K.

17:55 | 18:25
  • A3-11

    The Standards on Cybersecurity Measures for Defense Industry

    • Speaker

      Acquisition, Technology and Logistics Agency

      Director Industrial Cyber Security Office, Equipment Security Management Division, Department of Equipment Policy

      Yugo Matsumoto

    • Targeted Threat / Cyber Attack
    • Measures against information leakage
    • Security auditing / system audit
  • B3-11

    Introduction to Japan Cybersecurity Labeling scheme, JC-STAR, for IoT products

    • Speaker

      Information-Technology Promotion Agency, Japan(IPA)

      General Manager
      IT Security Technology Evaluation Department, IT Security Center

      Masayuki Kanda

    • IoT security
  • C3-11

    Corporate Practices for Cybersecurity Responses:
    Measures and Responses in Peacetime and Emergency Situations

    • Speaker

      TMI Associates

      Partner
      Attorney-at-Law (Japan & New York)

      Shunsuke Terakado

    • Ransomware measures
    • Measures against information leakage
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
18:35 | 19:35
  • A3-12

    Coming soon

    • Speaker

      NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION

    • Speaker

      NTT-ME CORPORATION

    • Cloud security
    • Endpoint Security
    • Zero trust security model

    Presented byNIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION

  • Privacy Policy

[24年秋開催]Security Days Fall 2024

Copyright (c) NANO OPT Media, Inc. All rights reserved.