iotc iotc

    • linkedin
    • facebook
    • twitter
    • YouTube
  • Register Now

  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Register Now

Fukuoka Session

福岡講演

  • lunch

Search (possible multiple choice)

Keyword

3.12(Thu)

  • RoomA
  • RoomB
  • RoomC
  • RoomD
09:30 | 10:00
  • FA-01

    Reflecting on the system outage caused by Ransomware.
    Challenges and blind spots during recovery.

    • Speaker

      Osaka Prefectural Hospital Organization

      Hirofumi Moritou

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Beginner
  • FB-01

    Strengthening cybersecurity measures at Ports
    — Insights from training to confirm response procedures during terminal operation system disruptions—

    • Speaker

      Ministry of Land, Infrastructure, Transport and Tourism

      Tomohide Sugimoto

    • Critical Infrastructure Security
    • Other
  • FC-01

    What Working Professionals Really Need to Learn in Cybersecurity
    — From Human Effort to Effectively Leveraging AI

    • Speaker

      Kyushu University

      Research Institute for Information Technology
      Professor

      Hiroshi Koide

    • Targeted Attacks / Cyber Attacks
    • AI Security
    • Human Resource Development
  • FD-01

    Ransomware Threats and How SMEs Should Prepare

    • Speaker

      Area Security Council

      Senior Executive Director

      Masaru Sekihara

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Beginner
10:10 | 10:50
  • FA-02

    Neglecting software supply chain vulnerabilities poses business risks
    Comprehensive vulnerability countermeasures utilizing SBOM, as demonstrated by Yamory

    • Speaker

      Assured, Inc.

      Yuki Sakuma

    • Vulnerability / Tampering Countermeasures
    • SBOM (Software Bill of Materials)
    • Software Supply Chain Attacks

    Presented byAssured, Inc.

  • FB-02

    Coming soon

    • Speaker

      LRM, Inc.

      Tomoyuki Fujii

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Human Resource Development

    Presented byLRM, Inc.

  • FC-02

    Protecting Internal Networks using WIPS

    • Speaker

      KORNIC GLORY CO.,Ltd.

      Manager,
      Wired Technology Team

      Chang Minseon

    • Data Leakage Prevention
    • Monitoring / Detection

    Presented byKornic Glory Co.,Ltd.

  • FD-02

    Preparing for supply chain evaluation systems
    — Strengthening company's security starting with IT asset management

    • Speaker

      DOS Co., Ltd.

      Minori Koga

    • Data Leakage Prevention
    • Endpoint Security
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends

    Presented byDOS Co., Ltd.

11:05 | 11:45
  • FA-03

    Sales Partner 20 Years of Computer Systems Experience Presents: Google's Recommended Zero Trust Model

    • Speaker

      Densan System Co.,Ltd.

      Digital Innovation Division, Social Innovation Division, Advanced Solutions Department

      Ryuji Miyamoto

    • Ransomware Countermeasures
    • Zero Trust

    Presented byDensan System Co., Ltd.

  • FB-03

    Cybersecurity in the age of AI agents

    • Speaker

      Cloudflare Japan K. K.

      Koichiro Otobe

    • Targeted Attacks / Cyber Attacks
    • Zero Trust
    • AI Security

    Presented byCloudflare Japan K. K.

  • FC-03

    The Realities of Identity Management and the Right Approach
    — A Practical Framework for Organizing, Designing, and Operating User, Device, Privileged ID, and Non-SSO Domains —

    • Speaker

      ZUNDA Inc.

      IT Professional
      Solution Architect

      Kazuya Endo

    • Endpoint Security
    • Authentication / Identity Management
    • SASE (Secure Acess Service Edge)
    • Beginner

    Presented byZUNDA Inc.

  • FD-03

    How to easily implement multi-factor authentication and access control for active directory privileged accounts without using PAM

    • Speaker

      OceanBridge Inc.

      Yuta Itaya

    • Ransomware Countermeasures
    • Zero Trust
    • Authentication / Identity Management
    • Beginner

    Presented byOceanBridge Inc.

12:05 | 12:35
  • FA-04

    Cyber threat landscape and police initiatives

    • Speaker

      National Police Agency

      Yosuke Nakagawa

    • Ransomware Countermeasures
    • Phishing scam
  • FB-04

    Mr. President, At Least Understand This…
    “Incidents Cannot Be Prevented”
    — What Is Expected of Executives Under the New Paradigm

    • Speaker

      NTT, Inc
      Group CISO

      NTT Security Holdings
      CEO

      Shinichi Yokohama

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
  • FC-04

    Legal Response to Security Incidents

    • Speaker

      A&S Fukuoka

      Attorney-at-law

      Kenta Sugimoto

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
    • Beginner
  • FD-04

    Software Supply Chain Security with Docker:
    Balancing Business Agility and Security for Sustainable Container Development

    • Speaker

      Docker

      Solutions Engineering
      Strategic Solutions Engineer

      Tadashi Nemoto

    • SBOM (Software Bill of Materials)
    • Software Supply Chain Attacks
    • Container Security
12:50 | 13:30
  • FA-05

    Attackers are targeting your business partners
    - Assessing and visualizing supply chain risks

    • Speaker

      NRI Secure Technologies, Ltd.

      Security Solutions Division
      GRC Platform Department

      Tatsuya Seto

    • Security Audits / System Audits
    • Monitoring / Detection
    • Software Supply Chain Attacks

    Presented byNRI SecureTechnologies, Ltd.

  • FB-05

    How to address the rapidly growing problems of smartphones?
    -New essentials for smartphone management and security measures-

    • Speaker

      Jamf Japan G.K.

      Sales Engineer

      Maari Koga

    • Endpoint Security
    • Zero Trust
    • Phishing scam

    Presented byJamf Japan G.K.

  • FC-05

    Unraveling the Currently Required Security Measures: A Deeper Look from the Security Assessment Framework for Strengthening Supply Chains

    • Speaker

      HENNGE K.K.

      Corporate Communication Division, Marketing Section

      Shinsuke Itagaki

    • Targeted Attacks / Cyber Attacks
    • Authentication / Identity Management
    • Business Email Compromise Countermeasures
    • Beginner

    Presented byHENNGE K.K.

  • FD-05

    Targeted Attacks That Start From a Single Email:
    Learning from Failures to Build “Foolproof” Employee Training and Ransomware Defense(Working Title)

    • Speaker

      HYPER Inc.

      Securitier Department
      Section Manager

      Hiroki Watarai

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Human Resource Development
    • Beginner

    Presented byHYPER Inc.

13:45 | 14:25
  • FA-06

    AI accelerating OT cybersecurity

    • Speaker

      The University of Tokyo

      Professor

      Hiroshi Esaki, Ph.D.

    • Endpoint Security
    • Zero Trust
    • Critical Infrastructure Security
    • Intermediate
  • FB-06

    Software Supply Chains Under Attack:
    OSS Malware Threats, Lessons from a Japanese Wallet Maker, and Dev-Friendly Countermeasures

    • Speaker

      AndGo, Inc.

      CEO

      Toshihide Hara

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • Application Security
    • Beginner

    Presented byAndGo, Inc.

  • FC-06

    Security is now an era of social responsibility!
    How to incorporate the attacker's perspective, grasp the full risk landscape encompassing your company and business partners, and strengthen resilience

    • Speaker

      Seibu Electric Industry Co., Ltd.

      West Japan Branch – ICT Solutions Division, System Development Department (Concurrent)
      Senior Manager, DX Support Consultant

      Junji Matsumoto

    • Targeted Attacks / Cyber Attacks
    • Vulnerability / Tampering Countermeasures
    • Software Supply Chain Attacks

    Presented byEXEO Group, Inc.

  • FD-06

    M365 Users must attend the lecture!
    Latest trends in Email misdelivery and the ultimate weapon for the “New Outlook”

    • Speaker

      SCSK Minori Solutions Corporation

      Kuniyasu Hayashi

    • Data Leakage Prevention
    • Email Security

    Presented bySCSK Minori Solutions Corporation

14:35 | 15:05
  • FA-07

    【Case study presentation】
    IT strategy at major corporations: Rebuilding security infrastructure to accelerate cloud shift
    -Elevating company wide security while pursuing convenience: proactive defense through innovation

    • Speaker

      Hankyu Hanshin Properties Corp.

      Kuniharu Seike

    • Cloud Security
    • Zero Trust
    • SASE (Secure Acess Service Edge)

    Presented byNetskope Japan K.K.

  • FB-07

    Security measures to protect the entire supply chain

    • Speaker

      CRIC-SC3

      Steering Committee
      Chair

      Toshinori Kajiura

    • Targeted Attacks / Cyber Attacks
    • Software Supply Chain Attacks
    • Intermediate
  • FC-07

    What We Can Do to Keep Our Factories Running

    • Speaker

      Santen Pharmaceutical Co., Ltd.

      Digital & IT
      Cybersecurity Architecture & Solutions Senior Manager

      Fumito Masaki

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Critical Infrastructure Security
    • Beginner
  • FD-07

    Resilience Building to Hybrid Threat

    • Speaker

      Organization for Cyber Defense Innovation

      Director

      Akihiro Fujii

    • Monitoring / Detection
    • Human Resource Development
    • Other
    • Advanced
15:15 | 15:55
  • FA-08

    Essential points to absolutely must know when utilizing Microsoft 365 and security measures recommendations

    • Speaker

      MOTEX Inc.

      Product Marketing Department, Marketing Division
      Director

      Ryo Muto

    • Targeted Attacks / Cyber Attacks
    • Cloud Security
    • Data Leakage Prevention

    Presented byMOTEX Inc.

  • FB-08

    Falcon shield:
    Strengthening SaaS Incident detection and response capabilities
    -Security strategies required in the era of SaaS adoption-

    • Speaker

      NRI Secure Technologies, Ltd.

      Cloud Security Division

      Takuya Maeta

    • Cloud Security
    • Data Leakage Prevention
    • Zero Trust

    Presented byNRI SecureTechnologies, Ltd.

  • FC-08

    Ride the Big Wave—Now Is the Only Time!
    Former IT System Professionals Discuss Reiwa-Era “Proper AI-Native” Security!

    • Panelist

      Marubeni I-DIGIO Group

      Naoto Yoshimasa

    • Panelist

      Marubeni I-DIGIO Group

      Nozomi Marui

    • Moderator

      Marubeni I-DIGIO Group

      Masahiro Matsumoto

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • AI Security

    Presented byMarubeni I-DIGIO Group

  • FD-08

    How should CIS respond to the ever-increasing security risks?
    - Security of the "PC Lifecycle Final Process" that is often overlooked -

    • Speaker

      Pacific Net Co.,Ltd.

      IT Solutions Department
      Branch Manager

      Hiroyuki Tanabe

    • Data Leakage Prevention

    Presented byPacific Net Co.,Ltd.

16:10 | 16:50
  • FA-09

    The full picture of ransomware attacks and defensive measures to protect businesses

    • Speaker

      NTT DATA Japan Corporation

      Cybersecurity Section, Security & Network Division
      Executive Manager

      Ryo Hoshino

    • Ransomware Countermeasures
    • Email Security
    • Authentication / Identity Management

    Presented byNTT DATA KYUSHU Corporation

  • FB-09

    Insights from Major Cyberattacks in Japan and the Hidden Pitfalls of Security Measures
    — Why Do Cyber Incidents Still Happen Despite “Doing Everything Right”?

    • Speaker

      Macnica Solutions Corp.

      Sales Representative, Sales Division 1, Section 1

      Yuki Otsubo

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • DDoS Countermeasures
    • Intermediate

    Presented byAkamai Technologies GK / Macnica Solutions Corp.

  • FC-09

    The first step in cybersecurity measures :
    Let's start with vulnerability management

    • Speaker

      Mitsubishi Electric Digital Innovation Corporation

      Information Security Service Division
      Service Planning Section

      Takada Naoki

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Vulnerability / Tampering Countermeasures

    Presented byMitsubishi Electric Digital Innovation Corporation

  • FD-09

    SaaS Is in danger now!
    What are the immediate security risks and key countermeasures lurking in today's business infrastructure?

    • Speaker

      AvePoint Japan K.K.

      Shota Saito

    Presented byAvePoint Japan K.K.

17:00 | 17:30
  • FA-10

    Threats in Cyberspace
    -Cyberattacks Country supported.

    • Speaker

      Public Security Intelligence Agency

      Ippei Suyama

    • Targeted Attacks / Cyber Attacks
  • FB-10

    The Dangers of Public Data Leaks and Exposed Attack Surfaces
    - A Former Cyber Operations Officer’s Perspective

    • Speaker

      NSHC Inc.

      Director

      Park Bumjoon

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures
  • FC-10

    Preparing for Hidden Threats in DNS:
    The Role and Effectiveness of DNS Firewalls [2026 Spring Update]

    • Speaker

      Fukuoka University

      Information Technology Center
      Associate Professor

      Sho Fujimura

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Domain Authentication / DNS Security
  • FD-10

    10 Major Security Threats and Basic Security Measures [For Organizations]

    • Speaker

      Information-technology Promotion Agency, Japan

      IT Security Center(ISEC) Cyber Situation Analysis Department
      Researcher

      Shigenori Kaneko

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures
    • Beginner
  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

Copyright (c) NANO OPT Media, Inc. All rights reserved.