Tokyo Session
Search (possible multiple choice)
Keyword
3.13(Thu)
-
13:30 | 14:10
-
-
A3-06
Isn't the security 'common sense' wrong?
~ New security operation standards that have become possible now ~-
Speaker
Rapid7 Japan
CTO
Katsuya Furukawa
- XDR
- Vulnerability measures / Tampering measures
- Managed security
Presented byRapid Seven Japan Co., LTD.
-
Speaker
-
B3-06
Email security and business risks achieved through layered defense
-
Speaker
TwoFive inc.
CTO
Masaki Kase
- Targeted Threat / Cyber Attack
- Ransomware measures
- Phishing Attack
Presented byTwoFive, Inc.
-
Speaker
-
Closed
C3-06
Digital Agency Cyber Security
-
Speaker
Digital Agency
Security Analyst
Group of Strategy and OrganizationMasanori Kamayama
- SOC / Incident Response
- Critical Infrastructure Security
- Other
-
Speaker
-
-
14:25 | 15:05
-
-
A3-07
Is it safe if we protect VPN and Cloud service?
Learn from the latest security incidents about commonly overlooked intrusion routes and countermeasures-
Speaker
Soliton Systems K.K.
- Targeted Threat / Cyber Attack
- Measures against information leakage
- Authentication / Identity Management
Presented bySoliton Systems K.K.
-
Speaker
-
B3-07
Do You Understand the Hidden Risks of SSH Keys in Your Network?: Mitigation Strategies and How to Migrate to Keyless Access
-
Speaker
SSH Communications Security
Solutions Engineering Director
Katsuhiro Shogawa
- Ransomware measures
- Authentication / Identity Management
- Critical Infrastructure Security
Presented bySSH Communications Security Oyj
-
Speaker
-
C3-07
Ransomware Protection Specifically for Private Clouds
〜Toward a sustainable infrastructure-
Speaker
Broadcom
Senior Solutions Architect
Japan Cloud Infrastructure Dept.Takahiro Chiku
- Ransomware measures
- Cloud security
- Critical Infrastructure Security
Presented byVMware K.K. (Broadcom)
-
Speaker
-
Closed
WS3-03
The Security Frontiers by the Trusted Computing Group,
the Influencer of U.S. Government Specifications- Zero trust security model
- Software chain Attack
- Encryption / Certificate
- Workshop
-
-
15:20 | 16:00
-
-
A3-08
Keeper Security Privileged ID management starting with password management
-
Speaker
Keeper Security APAC KK
APAC Lead of Sales Engineering
Masaki Ikehara
- Cloud security
- Measures against information leakage
- Authentication / Identity Management
Presented byDAIWABO INFORMATION SYSTEM CO., LTD. / Keeper Security APAC KK
-
Speaker
-
B3-08
Coming soon
-
Speaker
MACNICA, Inc.
Sales
Networks companyKenta Chikauchi
- Targeted Threat / Cyber Attack
- Authentication / Identity Management
- Zero trust security model
Presented byMacnica, Inc.
-
Speaker
-
C3-08
The effectiveness of Keysight Security Solutions. Introduction based on PoC results using Trellix's NDR products
-
Speaker
Keysight Technologies Japan K.K.
Senior System Engineer
IP Network Engineering Department
Solution Engineering DivisionTakeshi Shimizu
-
Speaker
Musarubra Japan (Trellix)
Consulting Solutions Engineer
Solutions Engineering DivisionKenichi Matsushima
- Targeted Threat / Cyber Attack
- Ransomware measures
- Cloud security
Presented byKeysight Technologies Japan K.K.
-
Speaker
-
-
16:15 | 16:55
-
-
A3-09
Coming soon
-
Speaker
Encourage Technologies Co., Ltd.
- Ransomware measures
- Authentication / Identity Management
- Zero trust security model
Presented byEncourage Technologies Co., Ltd.
-
Speaker
-
B3-09
Coming soon
-
Speaker
Toshiba Digital Engineering Corporation
-
Speaker
Cybereason G.K.
- Targeted Threat / Cyber Attack
- Ransomware measures
- XDR
Presented byToshiba Digital Engineering Corporation
-
Speaker
-
C3-09
Network Security Today: Analyzing Cyber Attacks and NDR Effectiveness
-
Speaker
Vectra AI Japan
Senior Sales Engineer
Kazuo Fukuda
- XDR
- AI security
- Monitoring and detection
Presented byVectra AI Japan KK
-
Speaker
-
Closed
WS3-04
Coming soon
- Security auditing / system audit
- Human resource development
- Workshop
-
-
17:10 | 17:50
-
-
A3-10
Efficiently Diagnosing Large-Scale Websites: Key Points for Selecting the Optimal Method (TBD)
-
Speaker
UBsecure Inc.
- Vulnerability measures / Tampering measures
- Managed security
- Security auditing / system audit
Presented byUBsecure Inc.
-
Speaker
-
B3-10
Coming soon
- Targeted Threat / Cyber Attack
- Endpoint Security
- Zero trust security model
Presented byJ’s Communication Co., Ltd.
-
C3-10
Significant management to protect against cyber attack !
-
Speaker
ULTRA RED Ltd.
Director
Sales EngineeringYuji Sueyoshi
- Targeted Threat / Cyber Attack
- Ransomware measures
- Vulnerability measures / Tampering measures
Presented byKELA K.K.
-
Speaker
-
-
17:55 | 18:25
-
-
A3-11
The Standards on Cybersecurity Measures for Defense Industry
-
Speaker
Acquisition, Technology and Logistics Agency
Director Industrial Cyber Security Office, Equipment Security Management Division, Department of Equipment Policy
Yugo Matsumoto
- Targeted Threat / Cyber Attack
- Measures against information leakage
- Security auditing / system audit
-
Speaker
-
B3-11
Introduction to Japan Cybersecurity Labeling scheme, JC-STAR, for IoT products
-
Speaker
Information-Technology Promotion Agency, Japan(IPA)
General Manager
IT Security Technology Evaluation Department, IT Security CenterMasayuki Kanda
- IoT security
-
Speaker
-
C3-11
Corporate Practices for Cybersecurity Responses:
Measures and Responses in Peacetime and Emergency Situations-
Speaker
TMI Associates
Partner
Attorney-at-Law (Japan & New York)Shunsuke Terakado
- Ransomware measures
- Measures against information leakage
- GDPR / Privacy Mark / ISMS / Laws of the Decree
-
Speaker
-