Fukuoka Session
福岡講演
-
lunch
Search (possible multiple choice)
Keyword
3.12(Thu)
-
09:30 | 10:00
-
-
FA-01
Reflecting on the system outage caused by Ransomware.
Challenges and blind spots during recovery.-
Speaker
Osaka Prefectural Hospital Organization
Hirofumi Moritou
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Beginner
-
Speaker
-
FB-01
Strengthening cybersecurity measures at Ports
— Insights from training to confirm response procedures during terminal operation system disruptions—-
Speaker
Ministry of Land, Infrastructure, Transport and Tourism
Tomohide Sugimoto
- Critical Infrastructure Security
- Other
-
Speaker
-
FC-01
What Working Professionals Really Need to Learn in Cybersecurity
— From Human Effort to Effectively Leveraging AI-
Speaker
Kyushu University
Research Institute for Information Technology
ProfessorHiroshi Koide
- Targeted Attacks / Cyber Attacks
- AI Security
- Human Resource Development
-
Speaker
-
FD-01
Ransomware Threats and How SMEs Should Prepare
-
Speaker
Area Security Council
Senior Executive Director
Masaru Sekihara
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Beginner
-
Speaker
-
-
10:10 | 10:50
-
-
FA-02
Neglecting software supply chain vulnerabilities poses business risks
Comprehensive vulnerability countermeasures utilizing SBOM, as demonstrated by Yamory-
Speaker
Assured, Inc.
Yuki Sakuma
- Vulnerability / Tampering Countermeasures
- SBOM (Software Bill of Materials)
- Software Supply Chain Attacks
Presented byAssured, Inc.
-
Speaker
-
FB-02
Coming soon
-
Speaker
LRM, Inc.
Tomoyuki Fujii
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Human Resource Development
Presented byLRM, Inc.
-
Speaker
-
FC-02
Protecting Internal Networks using WIPS
-
Speaker
KORNIC GLORY CO.,Ltd.
Manager,
Wired Technology TeamChang Minseon
- Data Leakage Prevention
- Monitoring / Detection
Presented byKornic Glory Co.,Ltd.
-
Speaker
-
FD-02
Preparing for supply chain evaluation systems
— Strengthening company's security starting with IT asset management-
Speaker
DOS Co., Ltd.
Minori Koga
- Data Leakage Prevention
- Endpoint Security
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
Presented byDOS Co., Ltd.
-
Speaker
-
-
11:05 | 11:45
-
-
FA-03
Sales Partner 20 Years of Computer Systems Experience Presents: Google's Recommended Zero Trust Model
-
Speaker
Densan System Co.,Ltd.
Digital Innovation Division, Social Innovation Division, Advanced Solutions Department
Ryuji Miyamoto
- Ransomware Countermeasures
- Zero Trust
Presented byDensan System Co., Ltd.
-
Speaker
-
FB-03
Cybersecurity in the age of AI agents
-
Speaker
Cloudflare Japan K. K.
Koichiro Otobe
- Targeted Attacks / Cyber Attacks
- Zero Trust
- AI Security
Presented byCloudflare Japan K. K.
-
Speaker
-
FC-03
The Realities of Identity Management and the Right Approach
— A Practical Framework for Organizing, Designing, and Operating User, Device, Privileged ID, and Non-SSO Domains —-
Speaker
ZUNDA Inc.
IT Professional
Solution ArchitectKazuya Endo
- Endpoint Security
- Authentication / Identity Management
- SASE (Secure Acess Service Edge)
- Beginner
Presented byZUNDA Inc.
-
Speaker
-
FD-03
How to easily implement multi-factor authentication and access control for active directory privileged accounts without using PAM
-
Speaker
OceanBridge Inc.
Yuta Itaya
- Ransomware Countermeasures
- Zero Trust
- Authentication / Identity Management
- Beginner
Presented byOceanBridge Inc.
-
Speaker
-
-
12:05 | 12:35
-
-
FA-04
Cyber threat landscape and police initiatives
-
Speaker
National Police Agency
Yosuke Nakagawa
- Ransomware Countermeasures
- Phishing scam
-
Speaker
-
FB-04
Mr. President, At Least Understand This…
“Incidents Cannot Be Prevented”
— What Is Expected of Executives Under the New Paradigm-
Speaker
NTT, Inc
Group CISONTT Security Holdings
CEOShinichi Yokohama
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
-
Speaker
-
FC-04
Legal Response to Security Incidents
-
Speaker
A&S Fukuoka
Attorney-at-law
Kenta Sugimoto
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
- Beginner
-
Speaker
-
FD-04
Software Supply Chain Security with Docker:
Balancing Business Agility and Security for Sustainable Container Development-
Speaker
Docker
Solutions Engineering
Strategic Solutions EngineerTadashi Nemoto
- SBOM (Software Bill of Materials)
- Software Supply Chain Attacks
- Container Security
-
Speaker
-
-
12:50 | 13:30
-
-
FA-05
Attackers are targeting your business partners
- Assessing and visualizing supply chain risks-
Speaker
NRI Secure Technologies, Ltd.
Security Solutions Division
GRC Platform DepartmentTatsuya Seto
- Security Audits / System Audits
- Monitoring / Detection
- Software Supply Chain Attacks
Presented byNRI SecureTechnologies, Ltd.
-
Speaker
-
FB-05
How to address the rapidly growing problems of smartphones?
-New essentials for smartphone management and security measures--
Speaker
Jamf Japan G.K.
Sales Engineer
Maari Koga
- Endpoint Security
- Zero Trust
- Phishing scam
Presented byJamf Japan G.K.
-
Speaker
-
FC-05
Unraveling the Currently Required Security Measures: A Deeper Look from the Security Assessment Framework for Strengthening Supply Chains
-
Speaker
HENNGE K.K.
Corporate Communication Division, Marketing Section
Shinsuke Itagaki
- Targeted Attacks / Cyber Attacks
- Authentication / Identity Management
- Business Email Compromise Countermeasures
- Beginner
Presented byHENNGE K.K.
-
Speaker
-
FD-05
Targeted Attacks That Start From a Single Email:
Learning from Failures to Build “Foolproof” Employee Training and Ransomware Defense(Working Title)-
Speaker
HYPER Inc.
Securitier Department
Section ManagerHiroki Watarai
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Human Resource Development
- Beginner
Presented byHYPER Inc.
-
Speaker
-
-
13:45 | 14:25
-
-
FA-06
AI accelerating OT cybersecurity
-
Speaker
The University of Tokyo
Professor
Hiroshi Esaki, Ph.D.
- Endpoint Security
- Zero Trust
- Critical Infrastructure Security
- Intermediate
-
Speaker
-
FB-06
Software Supply Chains Under Attack:
OSS Malware Threats, Lessons from a Japanese Wallet Maker, and Dev-Friendly Countermeasures-
Speaker
AndGo, Inc.
CEO
Toshihide Hara
- Cloud Security
- Vulnerability / Tampering Countermeasures
- Application Security
- Beginner
Presented byAndGo, Inc.
-
Speaker
-
FC-06
Security is now an era of social responsibility!
How to incorporate the attacker's perspective, grasp the full risk landscape encompassing your company and business partners, and strengthen resilience-
Speaker
Seibu Electric Industry Co., Ltd.
West Japan Branch – ICT Solutions Division, System Development Department (Concurrent)
Senior Manager, DX Support ConsultantJunji Matsumoto
- Targeted Attacks / Cyber Attacks
- Vulnerability / Tampering Countermeasures
- Software Supply Chain Attacks
Presented byEXEO Group, Inc.
-
Speaker
-
FD-06
M365 Users must attend the lecture!
Latest trends in Email misdelivery and the ultimate weapon for the “New Outlook”-
Speaker
SCSK Minori Solutions Corporation
Kuniyasu Hayashi
- Data Leakage Prevention
- Email Security
Presented bySCSK Minori Solutions Corporation
-
Speaker
-
-
14:35 | 15:05
-
-
FA-07
【Case study presentation】
IT strategy at major corporations: Rebuilding security infrastructure to accelerate cloud shift
-Elevating company wide security while pursuing convenience: proactive defense through innovation-
Speaker
Hankyu Hanshin Properties Corp.
Kuniharu Seike
- Cloud Security
- Zero Trust
- SASE (Secure Acess Service Edge)
Presented byNetskope Japan K.K.
-
Speaker
-
FB-07
Security measures to protect the entire supply chain
-
Speaker
CRIC-SC3
Steering Committee
ChairToshinori Kajiura
- Targeted Attacks / Cyber Attacks
- Software Supply Chain Attacks
- Intermediate
-
Speaker
-
FC-07
What We Can Do to Keep Our Factories Running
-
Speaker
Santen Pharmaceutical Co., Ltd.
Digital & IT
Cybersecurity Architecture & Solutions Senior ManagerFumito Masaki
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Critical Infrastructure Security
- Beginner
-
Speaker
-
FD-07
Resilience Building to Hybrid Threat
-
Speaker
Organization for Cyber Defense Innovation
Director
Akihiro Fujii
- Monitoring / Detection
- Human Resource Development
- Other
- Advanced
-
Speaker
-
-
15:15 | 15:55
-
-
FA-08
Essential points to absolutely must know when utilizing Microsoft 365 and security measures recommendations
-
Speaker
MOTEX Inc.
Product Marketing Department, Marketing Division
DirectorRyo Muto
- Targeted Attacks / Cyber Attacks
- Cloud Security
- Data Leakage Prevention
Presented byMOTEX Inc.
-
Speaker
-
FB-08
Falcon shield:
Strengthening SaaS Incident detection and response capabilities
-Security strategies required in the era of SaaS adoption--
Speaker
NRI Secure Technologies, Ltd.
Cloud Security Division
Takuya Maeta
- Cloud Security
- Data Leakage Prevention
- Zero Trust
Presented byNRI SecureTechnologies, Ltd.
-
Speaker
-
FC-08
Ride the Big Wave—Now Is the Only Time!
Former IT System Professionals Discuss Reiwa-Era “Proper AI-Native” Security!-
Panelist
Marubeni I-DIGIO Group
Naoto Yoshimasa
-
Panelist
Marubeni I-DIGIO Group
Nozomi Marui
-
Moderator
Marubeni I-DIGIO Group
Masahiro Matsumoto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- AI Security
Presented byMarubeni I-DIGIO Group
-
Panelist
-
FD-08
How should CIS respond to the ever-increasing security risks?
- Security of the "PC Lifecycle Final Process" that is often overlooked --
Speaker
Pacific Net Co.,Ltd.
IT Solutions Department
Branch ManagerHiroyuki Tanabe
- Data Leakage Prevention
Presented byPacific Net Co.,Ltd.
-
Speaker
-
-
16:10 | 16:50
-
-
FA-09
The full picture of ransomware attacks and defensive measures to protect businesses
-
Speaker
NTT DATA Japan Corporation
Cybersecurity Section, Security & Network Division
Executive ManagerRyo Hoshino
- Ransomware Countermeasures
- Email Security
- Authentication / Identity Management
Presented byNTT DATA KYUSHU Corporation
-
Speaker
-
FB-09
Insights from Major Cyberattacks in Japan and the Hidden Pitfalls of Security Measures
— Why Do Cyber Incidents Still Happen Despite “Doing Everything Right”?-
Speaker
Macnica Solutions Corp.
Sales Representative, Sales Division 1, Section 1
Yuki Otsubo
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- DDoS Countermeasures
- Intermediate
Presented byAkamai Technologies GK / Macnica Solutions Corp.
-
Speaker
-
FC-09
The first step in cybersecurity measures :
Let's start with vulnerability management-
Speaker
Mitsubishi Electric Digital Innovation Corporation
Information Security Service Division
Service Planning SectionTakada Naoki
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Vulnerability / Tampering Countermeasures
Presented byMitsubishi Electric Digital Innovation Corporation
-
Speaker
-
FD-09
SaaS Is in danger now!
What are the immediate security risks and key countermeasures lurking in today's business infrastructure?-
Speaker
AvePoint Japan K.K.
Shota Saito
Presented byAvePoint Japan K.K.
-
Speaker
-
-
17:00 | 17:30
-
-
FA-10
Threats in Cyberspace
-Cyberattacks Country supported.-
Speaker
Public Security Intelligence Agency
Ippei Suyama
- Targeted Attacks / Cyber Attacks
-
Speaker
-
FB-10
The Dangers of Public Data Leaks and Exposed Attack Surfaces
- A Former Cyber Operations Officer’s Perspective-
Speaker
NSHC Inc.
Director
Park Bumjoon
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
-
Speaker
-
FC-10
Preparing for Hidden Threats in DNS:
The Role and Effectiveness of DNS Firewalls [2026 Spring Update]-
Speaker
Fukuoka University
Information Technology Center
Associate ProfessorSho Fujimura
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Domain Authentication / DNS Security
-
Speaker
-
FD-10
10 Major Security Threats and Basic Security Measures [For Organizations]
-
Speaker
Information-technology Promotion Agency, Japan
IT Security Center(ISEC) Cyber Situation Analysis Department
ResearcherShigenori Kaneko
- Ransomware Countermeasures
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
- Beginner
-
Speaker
-