Tokyo Session
Search (possible multiple choice)
Keyword
3.11(Tue)
-
09:40 | 10:20
-
-
A1-02
Coming soon
-
Speaker
Sky CO., LTD.
- Targeted Threat / Cyber Attack
- Ransomware measures
- Measures against information leakage
Presented bySky CO., LTD.
-
Speaker
-
Closed
WS1-01
A Comprehensive Guide to Email Sender Authentication Technologies
- Email Security
- Domain authentication / DNS Security
- Phishing Attack
- Workshop
-
-
12:15 | 12:55
-
-
A1-05
The Latest Microsoft AI powered & Integrated Security Solutions in the AI Era
-
Speaker
Microsoft Japan Co., Ltd.
Business Executive Officer, Sales Enablement & Operations Security GTM
Mitsunori Fujino
- Cloud security
- SOC / Incident Response
- AI security
Presented byMicrosoft Japan Co., Ltd.
-
Speaker
-
WS1-02
Coming soon
- Workshop
Presented byAeye Security Lab Inc.
-
-
14:10 | 14:50
-
-
Closed
A1-07
Coming soon
-
Speaker
LAC Co., Ltd.
Presented byLAC Co., Ltd. / Microsoft Japan Co., Ltd.
-
Speaker
-
B1-07
Optimizing Zero Trust Strategy with a Risk-Based Approach
-
Speaker
Soliton Systems K.K.
Evangelist
IT Security DepartmentShoko Araki
- Targeted Threat / Cyber Attack
- Authentication / Identity Management
- Zero trust security model
Presented bySoliton Systems K.K.
-
Speaker
-
C1-07
What Should Companies do Strengthen Mobile Security
-
Speaker
Jamf Japan G.K.
Sales Enablement Manager
Shingo Matsushima
- Cloud security
- Endpoint Security
- Zero trust security model
Presented byJamf Japan G.K.
-
Speaker
-
WS1-03
Coming soon
- Workshop
-
-
15:05 | 15:45
-
-
A1-08
The cutting edge of data security: Microsoft Purview brings peace of mind and trust to businesses
-
Speaker
PERSOL CROSS TECHNOLOGY CO., LTD.
Security Consultant
System Solution Headquarters, DX Solution Headquarters, DX Platform Division 1Kota Suzuki
- Cloud security
- Measures against information leakage
- Monitoring and detection
Presented byPERSOL CROSS TECHNOLOGY CO., LTD. / Microsoft Japan Co., Ltd.
-
Speaker
-
Closed
B1-08
Coming soon
-
Speaker
Tenable Network Security Japan K.K.
- Targeted Threat / Cyber Attack
- Cloud security
- Vulnerability measures / Tampering measures
Presented byTenable Network Security Japan K.K.
-
Speaker
-
C1-08
Coming soon
-
Speaker
Vade Japan K.K.
Principal Messaging Engineer
Yoshitaka Hirano
- Email Security
- Domain authentication / DNS Security
- Phishing Attack
Presented byVade Japan K.K.
-
Speaker
-
-
16:00 | 16:40
-
-
A1-09
Coming soon
-
Speaker
SCSK Minori Solutions Corporation
- Measures against information leakage
- Email Security
Presented bySCSK Minori Solutions Corporation
-
Speaker
-
B1-09
Continuous Threat Exposure Management for Those Tired of Security Acronyms
-
Speaker
Rapid7 Japan
Japan SE Lead, CISSP
Toshio Honda
- Targeted Threat / Cyber Attack
- Ransomware measures
- Vulnerability measures / Tampering measures
Presented byRapid Seven Japan Co., LTD.
-
Speaker
-
Closed
C1-09
Protecting the future of companies with privileged ID management
- Daiwa Securities Group case studies and the latest security threats --
Speaker
Daiwa Institute of Research Ltd.
Director
Digital Solution Research and Development Dept.Atsushi Shibuya
-
Speaker
Daiwa Institute of Research Ltd.
Associate Director
Business Solution Dept.Rina Kondo
- Ransomware measures
- Measures against information leakage
- Authentication / Identity Management
Presented byDaiwa Institute of Research Ltd.
-
Speaker
-
WS1-04
Response to Legal and Regulatory Trends in Product Security
- PSIRT / CSIRT
- IoT security
- GDPR / Privacy Mark / ISMS / Laws of the Decree
- Workshop
-
-
16:55 | 17:35
-
-
A1-10
DAMRC, Secure File Transfer and DLP - Maximize the convenience of email security
-
Speaker
imatrix corp
Senior Researcher
Lab/MerketingHibiki Oka
- Ransomware measures
- Measures against information leakage
- Email Security
Presented byimatrix corp.
-
Speaker
-
Closed
B1-10
Recap of 2024 cyber threat incidents from Hidden Channels, and Year 2025 Threat Forecast
-
Speaker
S2W Inc.
Regional Director(Japan)
Business CenterHeita Miyoshi
- Targeted Threat / Cyber Attack
- AI security
- Other
Presented byS2W Inc.
-
Speaker
-
C1-10
Boosting the level of security throughout the company efficiently to defend against cyber-attacks
-
Speaker
Yubico
Vice President Sales, Korea and Japan
Junichi Ohtomo
-
Speaker
International Systems Research Co.
Sales Manager
Sales Division Marketing & Security Key Business Dept.Koichi Uchida
- Targeted Threat / Cyber Attack
- Ransomware measures
- Authentication / Identity Management
Presented byInternational Systems Research Co.
-
Speaker
-
-
17:40 | 18:10
-
-
Closed
A1-11
Threats in Cyberspace
~State-Sponsored Cyberattacks ~-
Speaker
Public Security Intelligence Agency
Cybersecurity Intelligence Office Director
Ippei Suyama
-
Speaker
-
B1-11
Coming soon
-
Speaker
Tokai University
-
Speaker
-
C1-11
Latest trends in Cybersecurity legislation to watch in 2025
-
Speaker
Mori Hamada & Matsumoto
Attorney at Law
Daisuke TSUTA
- Targeted Threat / Cyber Attack
- Critical Infrastructure Security
- GDPR / Privacy Mark / ISMS / Laws of the Decree
-
Speaker
-
3.12(Wed)
-
09:40 | 10:20
-
-
A2-02
AI-Driven Network Security: Latest Threat Trends & Single-Vendor SASE Solutions
-
Speaker
Cato Networks Ltd.
Field CTO Asia Pacific and Japan
Haru Kaneko
- Targeted Threat / Cyber Attack
- Ransomware measures
- SASE
Presented byCato Networks (Japan) K K
-
Speaker
-
Closed
WS2-01
Coming soon
- Endpoint Security
- Authentication / Identity Management
- IoT security
- Workshop
-
-
12:15 | 12:55
-
-
A2-05
Can EDR Alone Stand Against Modern Threats?
Endpoint Security Strategies for the Zero Trust Era-
Speaker
SB C&S Corp.
Evangelist
Masayuki Otsuka
-
Demonstrator
Omnissa Japan GK
Senior Specialist Engineer
Partner & Corporate SE DeptTatsuo Suzuki
- Endpoint Security
- Zero trust security model
Presented bySB C&S Corp.
-
Speaker
-
Closed
WS2-02
Protecting Your Clients, Protecting Your Business: The Rise of Client-Side Attacks
- Vulnerability measures / Tampering measures
- AI security
- GDPR / Privacy Mark / ISMS / Laws of the Decree
- Workshop
Presented byCHEQ JAPAN
-
-
13:30 | 14:10
-
-
A2-06
Coming soon
-
Speaker
GMO Flatt Security Inc.
- Cloud security
- Vulnerability measures / Tampering measures
- AI security
Presented byGMO Flatt Security Inc.
-
Speaker
-
Closed
B2-06
Coming soon
-
Speaker
Canon IT Solutions Inc.
- Targeted Threat / Cyber Attack
- Ransomware measures
- Endpoint Security
Presented byCanon IT Solutions Inc.
-
Speaker
-
C2-06
How Should We Proceed After WSUS Ends?
The Migration and Frontline of Vulnerability Management.-
Speaker
Jupiter Technology Corp.
Business Unit 3, Technical Group
Michiko Ota
-
Demonstrator
Jupiter Technology Corp.
Business Unit 3, Technical Group
Shoichiro Izaki
-
Demonstrator
Jupiter Technology Corp.
Business Unit 3, Technical Group
Akane Shimada
- Targeted Threat / Cyber Attack
- Endpoint Security
- Vulnerability measures / Tampering measures
Presented byJupiter Technology Corp.
-
Speaker
-
-
14:25 | 15:05
-
-
A2-07
Let's get started for SBOM
-
Speaker
Black Duck Software G.K.
Senior Technical Marketing Manager
Masato Matsuoka
- Software chain Attack
- Application Security
- SBOM
Presented byBlack Duck Software G.K.
-
Speaker
-
B2-07
Coming soonThe vulnerability dilemma: How to manage the vast amount of information
-
Speaker
Macnica Inc.
Products Sales
Security Division
Networks CompanyShin Okada
- Targeted Threat / Cyber Attack
- Vulnerability measures / Tampering measures
- Managed security
Presented byMacnica, Inc. / Tanium G.K.
-
Speaker
-
C2-07
Coming soon
-
Speaker
Intelligent Wave Inc.
Sales Planning Dep.
Digital Innovation Dip.Keisuke Shimizu
-
Speaker
EVIDEN
Director of IAM Cybersecurity Products & General Manager of Evidian
David Leporini
- Measures against information leakage
- Authentication / Identity Management
- Zero trust security model
Presented byIntelligent Wave Inc.
-
Speaker
-
WS2-03
The Initiatives of the Japan Cloud Industry Association (ASPIC) on Cloud Security
- Cloud security
- GDPR / Privacy Mark / ISMS / Laws of the Decree
- Workshop
-
-
15:20 | 16:00
-
-
A2-08
Prevent security incidents before they happen
~Key points of countermeasures~-
Speaker
Mitsubishi Electric Information Network Corporation
Maneger
Information Security Service Division
Cyber Fusion Center
Section BAtsushi Katoh
- Targeted Threat / Cyber Attack
- Ransomware measures
- Vulnerability measures / Tampering measures
Presented byMitsubishi Electric Information Network Corporation
-
Speaker
-
B2-08
The Evolution of Zero Trust with SASE: The Roles of IdP and EDR
-
Speaker
INTEC Inc.
Senior High-end Specialist
ICT Business Strategy Dept.
ICT Platform Service Business DivisionOsanai Hironobu
-
Speaker
INTEC Inc.
High-end Specialist
Network Integration Dept.
Network Service Unit
ICT Platform Service Business DivisionSasaki Mamiko
- Cloud security
- Zero trust security model
- SASE
Presented byINTEC Inc.
-
Speaker
-
C2-08
By leveraging an integrated solution centrally managed through cloud, even small and medium-sized companies can achieve an enterprise-grade security system! (TBD)
-
Speaker
WatchGuard Technologies Japan KK
Senior Channel Sales Manager
Tatsuya Okawa
- Ransomware measures
- XDR
- Firewall / UTM
Presented byWatchGuard Technologies Japan KK
-
Speaker
-
-
16:15 | 16:55
-
-
A2-09
Cybersecurity initiatives and future vision that support the business activities of the Dai Nippon Printing Group.
-
Speaker
Dai Nippon Printing Co.,Ltd.
Senior Product Manager
Security Service Department, Cyber Security Business Development Unit,
Advanced Business CenterShun Mori
- XDR
- SOC / Incident Response
- Managed security
Presented byDai Nippon Printing Co., Ltd.
-
Speaker
-
B2-09
The forefront of WSUS replacement
~ Thorough explanation of Intune, Autopatch, and IT asset management tools ~-
Speaker
D.O.S Co.,LTD.
- Endpoint Security
- Measures against information leakage
- Vulnerability measures / Tampering measures
Presented byD.O.S Co.,LTD.
-
Speaker
-
C2-09
Protecting the Organization: Effective Approaches and IT Operations Against Internal and External Threats
-
Speaker
Ivanti Software
Sales Engineer Manager
Takumi Hattori
- Cloud security
- Endpoint Security
- Vulnerability measures / Tampering measures
Presented byIvanti Software K.K.
-
Speaker
-
WS2-04
Learn Through Practical Workshops!
Introduction to Cybersecurity Measures for SMEs- Targeted Threat / Cyber Attack
- Ransomware measures
- Human resource development
- Workshop
-
-
17:10 | 17:50
-
-
A2-10
Defending Against the Surge of DDoS Attacks:
Fastly’s Cutting-Edge Security Solutions for Automated Protection and Advanced Bot Mitigation-
Speaker
FASTLY K.K.
Sr. Sales Engineer
Shumpei Takuma
- Cloud security
- Application Security
- Edge security
Presented byFastly K.K.
-
Speaker
-
B2-10
Coming soon
-
Speaker
KDDI CORPORATION
-
Speaker
KDDI Digital Security Inc.
- Authentication / Identity Management
- IoT security
- Encryption / Certificate
Presented byKDDI CORPORATION
-
Speaker
-
C2-10
Coming soon
-
Speaker
Infoscience, Inc.
- Targeted Threat / Cyber Attack
- Measures against information leakage
- Vulnerability measures / Tampering measures
Presented byInfoscience, Inc.
-
Speaker
-
-
17:55 | 18:25
-
-
A2-11
Cybersecurity Resilience in the Financial Sector
-
Speaker
Financial Services Agency
Office of Policy Coodination for IT Risk,
Cybersecurity and Economic Security Risk Analysis Division Strategy Development and Management BureauMotoshi Matsunaga
- Critical Infrastructure Security
-
Speaker
-
B2-11
Predicting questions!
- Capture "Registered Information Security Specialist Examination".-
Speaker
Japan Registered Information Security Specialists’ Association
Director
Naoki Murayama
- PSIRT / CSIRT
- SOC / Incident Response
- Human resource development
-
Speaker
-
C2-11
Coming soon
-
Speaker
Nishimura & Asahi
- Ransomware measures
- Endpoint Security
- Measures against information leakage
-
Speaker
-
3.13(Thu)
-
13:30 | 14:10
-
-
A3-06
Isn't the security 'common sense' wrong?
~ New security operation standards that have become possible now ~-
Speaker
Rapid7 Japan
CTO
Katsuya Furukawa
- XDR
- Vulnerability measures / Tampering measures
- Managed security
Presented byRapid Seven Japan Co., LTD.
-
Speaker
-
B3-06
Email security and business risks achieved through layered defense
-
Speaker
TwoFive inc.
CTO
Masaki Kase
- Targeted Threat / Cyber Attack
- Ransomware measures
- Phishing Attack
Presented byTwoFive, Inc.
-
Speaker
-
Closed
C3-06
Digital Agency Cyber Security
-
Speaker
Digital Agency
Security Analyst
Group of Strategy and OrganizationMasanori Kamayama
- SOC / Incident Response
- Critical Infrastructure Security
- Other
-
Speaker
-
-
14:25 | 15:05
-
-
A3-07
Is it safe if we protect VPN and Cloud service?
Learn from the latest security incidents about commonly overlooked intrusion routes and countermeasures-
Speaker
Soliton Systems K.K.
- Targeted Threat / Cyber Attack
- Measures against information leakage
- Authentication / Identity Management
Presented bySoliton Systems K.K.
-
Speaker
-
B3-07
Do You Understand the Hidden Risks of SSH Keys in Your Network?: Mitigation Strategies and How to Migrate to Keyless Access
-
Speaker
SSH Communications Security
Solutions Engineering Director
Katsuhiro Shogawa
- Ransomware measures
- Authentication / Identity Management
- Critical Infrastructure Security
Presented bySSH Communications Security Oyj
-
Speaker
-
C3-07
Ransomware Protection Specifically for Private Clouds
〜Toward a sustainable infrastructure-
Speaker
Broadcom
Senior Solutions Architect
Japan Cloud Infrastructure Dept.Takahiro Chiku
- Ransomware measures
- Cloud security
- Critical Infrastructure Security
Presented byVMware K.K. (Broadcom)
-
Speaker
-
Closed
WS3-03
The Security Frontiers by the Trusted Computing Group,
the Influencer of U.S. Government Specifications- Zero trust security model
- Software chain Attack
- Encryption / Certificate
- Workshop
-
-
15:20 | 16:00
-
-
A3-08
Keeper Security Privileged ID management starting with password management
-
Speaker
Keeper Security APAC KK
APAC Lead of Sales Engineering
Masaki Ikehara
- Cloud security
- Measures against information leakage
- Authentication / Identity Management
Presented byDAIWABO INFORMATION SYSTEM CO., LTD. / Keeper Security APAC KK
-
Speaker
-
B3-08
Coming soon
-
Speaker
MACNICA, Inc.
Sales
Networks companyKenta Chikauchi
- Targeted Threat / Cyber Attack
- Authentication / Identity Management
- Zero trust security model
Presented byMacnica, Inc.
-
Speaker
-
C3-08
The effectiveness of Keysight Security Solutions. Introduction based on PoC results using Trellix's NDR products
-
Speaker
Keysight Technologies Japan K.K.
Senior System Engineer
IP Network Engineering Department
Solution Engineering DivisionTakeshi Shimizu
-
Speaker
Musarubra Japan (Trellix)
Consulting Solutions Engineer
Solutions Engineering DivisionKenichi Matsushima
- Targeted Threat / Cyber Attack
- Ransomware measures
- Cloud security
Presented byKeysight Technologies Japan K.K.
-
Speaker
-
-
16:15 | 16:55
-
-
A3-09
Coming soon
-
Speaker
Encourage Technologies Co., Ltd.
- Ransomware measures
- Authentication / Identity Management
- Zero trust security model
Presented byEncourage Technologies Co., Ltd.
-
Speaker
-
B3-09
Coming soon
-
Speaker
Toshiba Digital Engineering Corporation
-
Speaker
Cybereason G.K.
- Targeted Threat / Cyber Attack
- Ransomware measures
- XDR
Presented byToshiba Digital Engineering Corporation
-
Speaker
-
C3-09
Network Security Today: Analyzing Cyber Attacks and NDR Effectiveness
-
Speaker
Vectra AI Japan
Senior Sales Engineer
Kazuo Fukuda
- XDR
- AI security
- Monitoring and detection
Presented byVectra AI Japan KK
-
Speaker
-
Closed
WS3-04
Coming soon
- Security auditing / system audit
- Human resource development
- Workshop
-
-
17:10 | 17:50
-
-
A3-10
Efficiently Diagnosing Large-Scale Websites: Key Points for Selecting the Optimal Method (TBD)
-
Speaker
UBsecure Inc.
- Vulnerability measures / Tampering measures
- Managed security
- Security auditing / system audit
Presented byUBsecure Inc.
-
Speaker
-
B3-10
Coming soon
- Targeted Threat / Cyber Attack
- Endpoint Security
- Zero trust security model
Presented byJ’s Communication Co., Ltd.
-
C3-10
Significant management to protect against cyber attack !
-
Speaker
ULTRA RED Ltd.
Director
Sales EngineeringYuji Sueyoshi
- Targeted Threat / Cyber Attack
- Ransomware measures
- Vulnerability measures / Tampering measures
Presented byKELA K.K.
-
Speaker
-
-
17:55 | 18:25
-
-
A3-11
The Standards on Cybersecurity Measures for Defense Industry
-
Speaker
Acquisition, Technology and Logistics Agency
Director Industrial Cyber Security Office, Equipment Security Management Division, Department of Equipment Policy
Yugo Matsumoto
- Targeted Threat / Cyber Attack
- Measures against information leakage
- Security auditing / system audit
-
Speaker
-
B3-11
Introduction to Japan Cybersecurity Labeling scheme, JC-STAR, for IoT products
-
Speaker
Information-Technology Promotion Agency, Japan(IPA)
General Manager
IT Security Technology Evaluation Department, IT Security CenterMasayuki Kanda
- IoT security
-
Speaker
-
C3-11
Corporate Practices for Cybersecurity Responses:
Measures and Responses in Peacetime and Emergency Situations-
Speaker
TMI Associates
Partner
Attorney-at-Law (Japan & New York)Shunsuke Terakado
- Ransomware measures
- Measures against information leakage
- GDPR / Privacy Mark / ISMS / Laws of the Decree
-
Speaker
-
3.14(Fri)
-
13:30 | 14:10
-
-
A4-06
Revolutionizing Network Security with EntraID Suite and SecurityCopilot
-
Speaker
TIS Inc.
Section Chief
Security Solutions DepartmentMasashi Oguri
- Cloud security
- Authentication / Identity Management
- Zero trust security model
Presented byTIS Inc. / Microsoft Japan Co., Ltd.
-
Speaker
-
B4-06
Coming soon
-
Speaker
MARUBENI IT SOLUTIONS INC.
-
Speaker
International Christian University
- Zero trust security model
Presented byMARUBENI IT SOLUTIONS INC.
-
Speaker
-
Closed
C4-06
Coming soon
-
Speaker
National center of Incident readiness and Strategy for Cybersecurity
Counsellor
Incident Handling and External Collaboration UnitMatsumoto Takashi
- Critical Infrastructure Security
-
Speaker
-
WS4-02
Lessons in Preventing Fraudulent and Deceptive Use of Brands: Practical Exercises and Insights from Tabletop Exercise Kits
- PSIRT / CSIRT
- Human resource development
- Phishing Attack
- Workshop
-
-
14:25 | 15:05
-
-
A4-07
Three Key Actions You Should Take Now to Avoid Ransomware Attacks and Minimize Damage
-
Speaker
Japan Business Systems, Inc.
Cloud Managed Services Div.
Shohei Hanashita
- Ransomware measures
- SOC / Incident Response
- Software chain Attack
Presented byJapan Business Systems, Inc. / Microsoft Japan Co., Ltd.
-
Speaker
-
B4-07
De-VPN and VDI Strategies to Protect Your Organization from Supply Chain Attacks
-
Speaker
Soliton Systems K.K.
Manager
Product Promotion Department, IT Security DivisionKazuki Mitsui
- Targeted Threat / Cyber Attack
- Measures against information leakage
- Container security
Presented bySoliton Systems K.K.
-
Speaker
-
C4-07
Next Generation Micro-segmentation with AI Technology
〜Private Cloud - More Secure-
Speaker
Broadcom
- Targeted Threat / Cyber Attack
- Measures against information leakage
- Critical Infrastructure Security
Presented byVMware K.K. (Broadcom)
-
Speaker
-
-
15:20 | 16:00
-
-
A4-08
Get the most out of Microsoft Sentinel with generative AI and automation!
95% reduction in security alert response operations!-
Speaker
NTT Communications Corporation
General Manager
Managed & Security Services , Security ServiciesYosuke Tobata
- Endpoint Security
- XDR
- SOC / Incident Response
Presented byNTT Communications Corporation / Microsoft Japan Co., Ltd.
-
Speaker
-
B4-08
Coming soon
-
Speaker
3-shake Inc.
- Vulnerability measures / Tampering measures
- Application Security
- Critical Infrastructure Security
Presented by3-shake Inc.
-
Speaker
-
C4-08
Limitations and Dangers of Password Management/Now is the Era of Fully Passwordless
-
Speaker
KDDI Digital Security Inc.
Deputy General Manager
CReation Of the Security&Safety DivisionKenji Okoshi
- Measures against information leakage
- Authentication / Identity Management
- Application Security
Presented byKDDI Digital Security Inc.
-
Speaker
-
-
16:15 | 16:55
-
-
A4-09
Step ahead of attackers: Proactive Security made possible by the latest Threat Intelligence
-
Speaker
Recorded Future Japan KK
Sr Presales Engineer
Tomoyuki Matsuda
- Targeted Threat / Cyber Attack
- PSIRT / CSIRT
- SOC / Incident Response
Presented byRecorded Future Japan KK
-
Speaker
-
B4-09
Balancing Security and Sustainability: The Latest Global Trends in Data Erasure
-
Speaker
Blancco Technology Group / Blancco Japan Inc.
Regional Director, Japan
Motoi Mimatsu
- Endpoint Security
- Measures against information leakage
- Zero trust security model
Presented byBlancco Japan Inc.
-
Speaker
-
C4-09
CTC Discusses Vulnerability Management Strategies in Agile Development Achieved Through ASPM
-
Speaker
IssueHunt
CEO
Kazumasa Yokomizo
- Measures against information leakage
- Software chain Attack
- SBOM
Presented byIssueHunt K.K.
-
Speaker
-
Closed
WS4-04
Coming soon
- PSIRT / CSIRT
- Security auditing / system audit
- Human resource development
- Workshop
-
-
17:10 | 17:50
-
-
A4-10
Solution for prevention of leakage of technologies, for trade secret management, for reducing Human Vulnerability and for Human Risk Management
-
Speaker
Leo United Ginza Law Office
Attorney
Leona Ohki
- Measures against information leakage
- Vulnerability measures / Tampering measures
- Monitoring and detection
Presented byLeo United Ginza Law Office
-
Speaker
-
B4-10
Cyber Resilience for Endpoints: Rapid Recovery from Threats with Absolute Secure Endpoint
-
Speaker
Absolute Software K.K.
Senior System Engineer
Taira Fujita
-
Speaker
Internet Initiative Japan Inc.
DWP Solution Section
Business Promotion Department
Service Product Business DivisionKohei Matsuura
- Endpoint Security
- Zero trust security model
- Application Security
Presented byAbsolute Software K.K. / Internet Initiative Japan Inc.
-
Speaker
-
C4-10
EDR challenges faced by organizations | A new security operations' approach in an era where all organizations are adopting EDR (TBD)
-
Speaker
WithSecure™ Japan
Product Marketing Manager
Cyber Security Products & ServicesYoshimasa Kanda
- Targeted Threat / Cyber Attack
- Ransomware measures
- XDR
Presented byWithSecure KK
-
Speaker
-
-
17:55 | 18:25
-
-
A4-11
What is ASM for visualizing attack surfaces?
- Interpretation and definition of ASM from a practitioner's perspective --
Speaker
Secure Sky Technology Inc.
Specialist
Yu Iwama
-
Speaker
BalaenaTech Co., Ltd.
Company President
Masashi Kouda
- Targeted Threat / Cyber Attack
- Vulnerability measures / Tampering measures
- Software chain Attack
-
Speaker
-
B4-11
Coming soon
-
Speaker
Bank of Japan
- Targeted Threat / Cyber Attack
- Critical Infrastructure Security
-
Speaker
-
C4-11
Amendement of Act on the Protection of Personal Information and its Impact on Corporate Practices
-
Speaker
Ushijima & Partners
Partner
Hiroyasu Kageshima
- GDPR / Privacy Mark / ISMS / Laws of the Decree
-
Speaker
-