iotc iotc

    • linkedin
    • facebook
    • twitter
    • YouTube
  • Register Now

  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Register Now

Nagoya Session

名古屋講演

  • All
  • 3.18(Wed)
  • 3.19(Thu)
  • lunch

Search (possible multiple choice)

Keyword
  • Security Days Spring 2026 Nagoya
  • Security Days - Automotive Spring 2026

3.19(Thu)

  • RoomA
  • RoomB
  • RoomC
09:30 | 10:00
  • GA2-01

    Overview of Cyberattacks on Connected Cars and Security Countermeasures, and Activities of J-Auto-ISAC (Tentative Title)

    • Speaker

      Tokyo Denki University

      Professor Emeritus

      Ryoichi Sasaki

    • IoT Security
    • Application Security
    • Managed Security Services
    • Intermediate
  • GB2-01

    Product Security Initiatives in the DX Era

    • Speaker

      DENSO Corporation

      General Manager,
      Product Security

      Keiichiro Hiranaga

    • Zero Trust
    • Security Audits / System Audits
    • PSIRT / CSIRT
    • Intermediate
  • GC2-01

    Latest authority trend of automotive cybersecurity (2026)

    • Speaker

      Japan Automobile Manufacturers Association

      Electronics Platform sub-committee chair person.

      Shigeyuki Kawana

    • Other
    • Beginner
10:10 | 10:50
  • GA2-02

    Learning from Leading European Examples: Data Security for Enhanced Data Utilization

    • Speaker

      Partisia Applications ApS

      Miyoji Kakinuki

    • Zero Trust
    • Authentication / Identity Management
    • Encryption / Certificates

    Presented byPartisia Applications ApS

  • GB2-02

    Vulnerabilities in Generative AI Code and Security Training in the Automotive Industry

    • Speaker

      TECHMATRIX CORPORATION

      Yusuke Iwahashi

    • AI Security
    • PSIRT / CSIRT
    • Human Resource Development

    Presented byTECHMATRIX CORPORATION

  • GC2-02

    Toward strengthening Cybersecurity Governance in the complex supply chain world

    • Speaker

      Bitsight Technologies

      Regional Sales Manager

      Kouichi Takano

    • Targeted Attacks / Cyber Attacks
    • Vulnerability / Tampering Countermeasures
    • Software Supply Chain Attacks

    Presented byConstella Security Japan inc.

11:05 | 11:45
  • GA2-03

    Cybersecurity measures to consider in the SDV Era

    • Speaker

      NDIAS, Ltd.

      Automotive Security Division
      Group Manager

      Ryosuke Uematsu

    • IoT Security
    • Application Security

    Presented byNDIAS, Ltd.

  • GB2-03

    Vulnerability risk management functions necessary to ensure security quality

    • Speaker

      Qualys Japan K.K.

      Sales Headquarter
      Regional Sales Director, Japan

      Mitsufusa Sugimoto

    • Speaker

      Qualys Japan K.K.

      Sales Headquarter
      Technical Account Manager

      Yukari Miyagawa

    • Speaker

      Qualys Japan K.K.

      Sales Headquarter
      Technical Account Manager

      Fuyuki Motono

    • Targeted Attacks / Cyber Attacks
    • Cloud Security
    • Vulnerability / Tampering Countermeasures

    Presented byQualys Japan K.K.

  • GC2-03

    Coming soon

12:05 | 12:35
  • GA2-04

    Continuous cybersecurity activities: Introducing useful content

    • Speaker

      Japan Automotive ISAC INC.

      Toru Inagaki

  • GB2-04

    Open SDV and Activities of Open SDV Initiative

    • Speaker

      Nagoya University

      Graduate School of Informatics,
      Executive Director and Professor of Center for Embedded Computing Systems

      Hiroaki Takada

    • Other
  • GC2-04

    Cybersecurity Initiatives and Information Disclosure Certification System by ASPIC

    • Speaker

      ASP-SaaS- AI-IoT Cloud Industry Association

      Toru Nakamura

    • Cloud Security
    • Security Audits / System Audits
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
12:50 | 13:30
  • GA2-05

    Coming soon

    Presented byPERSOL CROSS TECHNOLOGY CO., LTD.

  • GB2-05

    Protecting in-vehicle systems with ironclad defense and continuous security
    -XGuard's approach and case studies to combat increasingly sophisticated and unknown cyber-attacks-

    • Speaker

      TOYO Corporation

      Toshikazu Iwata

    • Demonstrator

      TOYO Corporation

      Waku Kobayashi

    • Vulnerability / Tampering Countermeasures
    • IoT Security
    • Monitoring / Detection

    Presented byTOYO Corporation

  • GC2-05

    Coming soon

13:45 | 14:25
  • GA2-06

    A practical Roadmap for ECU development in new SDV era, which accelerates you with "Automation" and "Tool chain integration"!

    • Speaker

      ETAS.K.K.

      Security, Information & Diagnostics Solution Field
      Field Application Engineer

      Osamu Terada

    • Vulnerability / Tampering Countermeasures
    • SBOM (Software Bill of Materials)
    • Other

    Presented byETAS K.K.

  • GB2-06

    Coming soon

    • Speaker

      Open SDV Initiative

      Fumihito Kondo

  • GC2-06

    Coming soon

    Presented bySMS DataTech Corporation

14:35 | 15:05
  • GA2-07

    The front line of automotive cybersecurity
    -The industry landscape and the reality of the latest automotive vulnerabilities

    • Speaker

      Japan Automotive ISAC INC.

      Security Operation Center

      Masahiro Aoyama

    • SOC / Incident Response
    • Monitoring / Detection
    • PSIRT / CSIRT
  • GB2-07

    Evolving Cybersecurity Approaches and Holistic Risk Management in the Age of SDV

    • Speaker

      Dloitte Tohmatsu Cyber LLC

      Director

      Taisuke Katayama

    • IoT Security
    • PSIRT / CSIRT
    • Managed Security Services

    Presented byDeloitte Tohmatsu Cyber LLC

  • GC2-07

    Software Supply Chain Security with Docker:
    Balancing Business Agility and Security for Sustainable Container Development

    • Speaker

      Docker

      Solutions Engineering
      Strategic Solutions Engineer

      Tadashi Nemoto

    • SBOM (Software Bill of Materials)
    • Software Supply Chain Attacks
    • Container Security
15:15 | 15:55
  • GA2-08

    Quantifying the Financial impact of “Invisible Cyber risks” and ROI of security investments
    Leveraging objective Security Ratings in the Automotive industry

    • Speaker

      Bitsight Technologies

      Solution Engineer

      Masao Kajihara

    • Targeted Attacks / Cyber Attacks
    • Vulnerability / Tampering Countermeasures
    • Software Supply Chain Attacks

    Presented byConstella Security Japan inc.

  • GB2-08

    Security challenges in cyber-physical systems including automobiles

    • Speaker

      National Institute of Advanced Industrial Science and Technology (AIST)

      Tsutomu Matsumoto

  • GC2-08

    Coming soon

    Presented byLAC Co., Ltd.

16:10 | 16:50
  • GA2-09

    ISO/SAE 21434 Automotive Cybersecurity Process Improvement
    ー Review of process operations and reconsideration of the fundamentals of the standard ー

    • Speaker

      TÜV SÜD Japan Ltd.

      MO&RI Division MO Engineering Department
      Automotive Cyber Security Expert

      Toshiko Nishida

    • Security Audits / System Audits
    • PSIRT / CSIRT
    • Software Supply Chain Attacks

    Presented byTÜV SÜD Japan Ltd.

  • GB2-09

    Securing What Matters in 2026
    — New Standard: The Latest Defense Strategy for the AI Attack Era by AppGuard

    • Ransomware Countermeasures
    • Zero Trust
    • Vulnerability / Tampering Countermeasures

    Presented byGRC Japan K.K.

  • GC2-09

    A Human-Centric Approach to Cybersecurity

    • Speaker

      ISACA Nagoya Chapter Former President /

      Keio University KMD Research Institute

      Kyoko Hanada

    • Ransomware Countermeasures
    • Human Resource Development
    • Phishing scam
17:00 | 17:30
  • GA2-10

    Utilizing SBOM in the automotive industry

    • Speaker

      Japan Automotive ISAC INC.

      Masashi Yamasaki

    • SOC / Incident Response
    • PSIRT / CSIRT
    • SBOM (Software Bill of Materials)
  • GB2-10

    Latest Mobility Initiatives and Security in 2026

    • Speaker

      TMI Associates

      Partner

      Yukitaka Iwata

    • Speaker

      TMI Associates

      Associate

      Yuki Awai

    • Vulnerability / Tampering Countermeasures
    • Critical Infrastructure Security
    • Infrastructure Hacking
    • Intermediate
  • GC2-10

    Factory Security with Near-Zero Budget and Manpower
    — First Steps in an Era Where One in Three Companies Are Attacked —

    • Speaker

      JNSA(Japan Network Security Association)

      Noboru Okamoto

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Other
    • Beginner
  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

[25年秋開催]Security Days Fall 2025

Copyright (c) NANO OPT Media, Inc. All rights reserved.