iotc iotc

    • linkedin
    • facebook
    • twitter
    • YouTube
  • Register Now

  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Register Now

Nagoya Session

名古屋講演

  • All
  • 3.18(Wed)
  • 3.19(Thu)
  • lunch

Search (possible multiple choice)

Keyword
  • Security Days Spring 2026 Nagoya
  • Security Days - Automotive Spring 2026

3.18(Wed)

  • RoomA
  • RoomB
  • RoomC
09:30 | 10:00
  • GA-01

    Cyber threat landscape and police initiatives

    • Speaker

      National Police Agency

      Akira Oe

    • Ransomware Countermeasures
    • Phishing scam
  • GB-01

    Resilience Building to Hybread Threat

    • Speaker

      Organization for Cyber Defense Innovation

      Director

      Akihiro Fujii

    • Monitoring / Detection
    • Human Resource Development
    • Other
    • Advanced
  • GC-01

    Strengthening cybersecurity measures at Ports
    — Insights from training to confirm response procedures during terminal operation system disruptions—

    • Speaker

      Ministry of Land, Infrastructure, Transport and Tourism

      Tomohide Sugimoto

    • Critical Infrastructure Security
10:10 | 10:50
  • GA-02

    The practical solution of “Integrated SASE” to safeguard supply chain

    • Speaker

      Fortinet Japan G.K.

      Daisuke Imai

    • Ransomware Countermeasures
    • Beginner

    Presented byFortinet Japan G.K.

  • GB-02

    Plug in to a sterile workspace—anywhere.
    Sanitize threats harmless. Zero Compromise on your DX.

    • Speaker

      Menlo Security Japan K.K

      Data Security Specialist

      Ryo Nakatsuke

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Critical Infrastructure Security

    Presented byMenlo Security Japan K.K.

  • GC-02

    Protecting Internal Networks using WIPS

    • Speaker

      KORNIC GLORY CO.,Ltd.

      Manager,
      Wired Technology Team

      Chang Minseon

    • Data Leakage Prevention
    • Monitoring / Detection

    Presented byKornic Glory Co.,Ltd.

11:05 | 11:45
  • GA-03

    Cybersecurity in the age of AI agents

    • Speaker

      Cloudflare Japan K. K.

      Koichiro Otobe

    • Targeted Attacks / Cyber Attacks
    • Zero Trust
    • AI Security

    Presented byCloudflare Japan K. K.

  • GB-03

    Preparing for supply chain evaluation systems
    — Strengthening company's security starting with IT asset management

    • Speaker

      DOS Co., Ltd.

      Yuka Haruta

    • Data Leakage Prevention
    • Endpoint Security
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends

    Presented byDOS Co., Ltd.

  • GC-03

    From “Wait and Lose” to Proactive Defense:
    Ransomware Containment Strategies Using Dark Web Intelligence and Active Cyber Defense (ACD/CTI/CTEM)

    • Speaker

      KELA Ltd.

      Senior Sales Engineer

      Masato Hori

    • Speaker

      ULTRA RED, Ltd.

      Regional Product Manager

      Kenichiro Hashimoto

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Data Leakage Prevention

    Presented byKela K.K.

12:05 | 12:35
  • GA-04

    Toward a Password-less World
    ~Overview and Latest Status of Passkeys~

    • Speaker

      FIDO Alliance, Inc.

      APAC Market Development Sr. Manager

      Atsuhiro Tsuchiya

    • Authentication / Identity Management
    • Phishing scam
    • Quantum Security
    • Beginner
  • GB-04

    How to address the rapidly growing problems of smartphones?
    -New essentials for smartphone management and security measures-

    • Speaker

      Jamf Japan G.K.

      Sales Engineer

      Maari Koga

    • Endpoint Security
    • Zero Trust
    • Phishing scam

    Presented byJamf Japan G.K.

  • GC-04

    The Realities of Identity Management and the Right Approach
    — A Practical Framework for Organizing, Designing, and Operating User, Device, Privileged ID, and Non-SSO Domains —

    • Speaker

      ZUNDA Inc.

      IT Professional
      Solution Architect

      Kazuya Endo

    • Endpoint Security
    • Authentication / Identity Management
    • SASE (Secure Acess Service Edge)
    • Beginner

    Presented byZUNDA Inc.

12:50 | 13:30
  • GA-05

    Coming soon

    • Speaker

      LRM, Inc.

      Tomoyuki Fujii

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Human Resource Development

    Presented byLRM, Inc.

  • GB-05

    Add security to ID and Password
    Start multi-factor authentication for Windows login with UserLock

    • Speaker

      OceanBridge Inc.

      Shunsuke Baba

    • Ransomware Countermeasures
    • Zero Trust
    • Authentication / Identity Management
    • Beginner

    Presented byOceanBridge Inc.

  • GC-05

    Unraveling the Currently Required Security Measures: A Deeper Look from the Security Assessment Framework for Strengthening Supply Chains (Tentative)

    • Speaker

      HENNGE K.K.

      Corporate Communication Division,
      Marketing Section

      Shinsuke Itagaki

    • Targeted Attacks / Cyber Attacks
    • Authentication / Identity Management
    • Business Email Compromise Countermeasures
    • Beginner

    Presented byHENNGE K.K.

13:45 | 14:25
  • GA-06

    Neglecting software supply chain vulnerabilities poses business risks
    Comprehensive vulnerability countermeasures utilizing SBOM, as demonstrated by yamory

    • Speaker

      Assured, Inc.

      Satochi Hara

    • Vulnerability / Tampering Countermeasures
    • SBOM (Software Bill of Materials)
    • Software Supply Chain Attacks

    Presented byAssured, Inc.

  • GB-06

    M365 Users must attend the lecture!
    Latest trends in Email misdelivery and the ultimate weapon for the “New Outlook”

    • Speaker

      SCSK Minori Solutions Corporation

      Kuniyasu Hayashi

    • Data Leakage Prevention
    • Email Security

    Presented bySCSK Minori Solutions Corporation

  • GC-06

    What are other companies doing?
    Preventing email misdelivery and internal misconduct
    Practical enterprise techniques to stop information leaks

    • Speaker

      imatrix corp.

      Enterprise Sales
      Manager

      Gai Hoshino

    • Data Leakage Prevention
    • AI Security
    • Email Security

    Presented byimatrix corp.

14:35 | 15:05
  • GA-07

    The Dangers of Public Data Leaks and Exposed Attack Surfaces
    - A Former Cyber Operations Officer’s Perspective

    • Speaker

      NSHC Inc.

      Director

      Park Bumjoon

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures
  • GB-07

    Security Strategies for AI and Ransomware Through the Eyes of Attackers

    • Speaker

      Hitachi Solutions, Ltd.

      Managed Security Service Department
      Chief Security Analyst

      Momoko Aoyama

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • AI Security
  • GC-07

    Essential points to 'absolutely' must know when utilizing Microsoft 365 and security measures recommendations

    • Speaker

      MOTEX Inc.

      Product Marketing Department, Marketing Division
      Director

      Ryo Muto

    • Targeted Attacks / Cyber Attacks
    • Cloud Security
    • Data Leakage Prevention

    Presented byMOTEX Inc.

15:15 | 15:55
  • GA-08

    Latest Countermeasures Against Cross-Domain Attacks Including Ransomware

    • Speaker

      CrowdStrike Japan GK

      Sales Engineering Dept,
      Sales Engineer

      Hirotaka Nakamoto

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security

    Presented byCrowdStrike Japan GK

  • GB-08

    Ride the Big Wave Now or Never!
    Ex-IT Information Systems department discuss Reiwa-Era “Proper AI Native” Security!

    • Panelist

      Marubeni I-DIGIO Group

      Yusaku Sakiyama

    • Panelist

      Marubeni I-DIGIO Group

      Nozomi Marui

    • Moderator

      Marubeni I-DIGIO Group

      Masatsugu Inage

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • AI Security

    Presented byMarubeni I-DIGIO Group

  • GC-08

    OT Security: The lifeline of manufacturing
    — Intrusion pathways in the AI Era and Investment strategies for “Never-Stopping Factories” in the coming fiscal year

    • Speaker

      Tenable Network Security Japan K.K.

      Junpei Abe

    • Targeted Attacks / Cyber Attacks
    • Vulnerability / Tampering Countermeasures
    • Critical Infrastructure Security
    • Beginner

    Presented byTenable Network Security Japan K.K.

16:10 | 16:50
  • GA-09

    How should CIS respond to the ever-increasing security risks?
    - Security of the "PC Lifecycle Final Process" that is often overlooked -

    • Speaker

      Pacific Net Co.,Ltd.

      IT Solutions Department
      Manager

      Yuuhei Hayakawa

    • Data Leakage Prevention

    Presented byPacific Net Co.,Ltd.

  • GB-09

    Case study presentation:
    Securing supply chain beyond VPN :How to prevent initial Ransomware infiltration

    • Speaker

      Netskope Japan K.K.

      Masahide Aogame

    • Ransomware Countermeasures
    • Zero Trust
    • SASE (Secure Acess Service Edge)
    • Beginner

    Presented byNetskope Japan K.K.

  • GC-09

    Transforming SOC operations
    -The advancement and efficiency of SOCs through AI and automation are becoming real-

    • Speaker

      NRI SecureTechnologies, Ltd.

      Junichi Nakayama

    • AI Security
    • SOC / Incident Response
    • Managed Security Services

    Presented byNRI SecureTechnologies, Ltd. / Net One Partners Co., Ltd.

17:00 | 17:30
  • GA-10

    Threats in Cyberspace
    -State-sponsored Cyberattacks

    • Speaker

      Public Security Intelligence Agency

      Ippei Suyama

    • Targeted Attacks / Cyber Attacks
  • GB-10

    Cybersecurity Measures from the Network Side

    • Speaker

      Ministry of Internal Affairs and Communications

      Office of the Director-General for Cybersecurity
      Senior Planning Officer

      Takanori Umeki

    • IoT Security
    • Encryption / Certificates
    • Quantum Security
  • GC-10

    10 Major Security Threats and Basic Security Measures [For Organizations]

    • Speaker

      Information-technology Promotion Agency, Japan

      IT Security Center(ISEC) Cyber Situation Analysis Department
      Researcher

      Shigenori Kaneko

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures
    • Beginner

3.19(Thu)

  • RoomA
  • RoomB
  • RoomC
10:10 | 10:50
  • GC2-02

    Toward strengthening Cybersecurity Governance in the complex supply chain world

    • Speaker

      Bitsight Technologies

      Regional Sales Manager

      Kouichi Takano

    • Targeted Attacks / Cyber Attacks
    • Vulnerability / Tampering Countermeasures
    • Software Supply Chain Attacks

    Presented byConstella Security Japan inc.

11:05 | 11:45
  • GC2-03

    Coming soon

12:05 | 12:35
  • GC2-04

    Cybersecurity Initiatives and Information Disclosure Certification System by ASPIC

    • Speaker

      ASP-SaaS- AI-IoT Cloud Industry Association

      Toru Nakamura

    • Cloud Security
    • Security Audits / System Audits
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
12:50 | 13:30
  • GC2-05

    Coming soon

13:45 | 14:25
  • GC2-06

    Coming soon

    Presented bySMS DataTech Corporation

14:35 | 15:05
  • GC2-07

    Software Supply Chain Security with Docker:
    Balancing Business Agility and Security for Sustainable Container Development

    • Speaker

      Docker

      Solutions Engineering
      Strategic Solutions Engineer

      Tadashi Nemoto

    • SBOM (Software Bill of Materials)
    • Software Supply Chain Attacks
    • Container Security
15:15 | 15:55
  • GC2-08

    Coming soon

    Presented byLAC Co., Ltd.

16:10 | 16:50
  • GC2-09

    A Human-Centric Approach to Cybersecurity

    • Speaker

      ISACA Nagoya Chapter Former President /

      Keio University KMD Research Institute

      Kyoko Hanada

    • Ransomware Countermeasures
    • Human Resource Development
    • Phishing scam
17:00 | 17:30
  • GC2-10

    Factory Security with Near-Zero Budget and Manpower
    — First Steps in an Era Where One in Three Companies Are Attacked —

    • Speaker

      JNSA(Japan Network Security Association)

      Noboru Okamoto

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Other
    • Beginner
  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

[25年秋開催]Security Days Fall 2025

Copyright (c) NANO OPT Media, Inc. All rights reserved.