Nagoya Session
名古屋講演
Search (possible multiple choice)
Keyword
3.18(Wed)
-
09:30 | 10:00
-
-
GA-01

Cyber threat landscape and police initiatives
-
Speaker
National Police Agency
Akira Oe
- Ransomware Countermeasures
- Phishing scam
-
Speaker
-
GB-01

Resilience Building to Hybread Threat
-
Speaker
Organization for Cyber Defense Innovation
Director
Akihiro Fujii
- Monitoring / Detection
- Human Resource Development
- Other
- Advanced
-
Speaker
-
GC-01

Strengthening cybersecurity measures at Ports
— Insights from training to confirm response procedures during terminal operation system disruptions—-
Speaker
Ministry of Land, Infrastructure, Transport and Tourism
Tomohide Sugimoto
- Critical Infrastructure Security
-
Speaker
-
-
10:10 | 10:50
-
-
GA-02

The practical solution of “Integrated SASE” to safeguard supply chain
-
Speaker
Fortinet Japan G.K.
Daisuke Imai
- Ransomware Countermeasures
- Beginner
Presented byFortinet Japan G.K.
-
Speaker
-
GB-02

Plug in to a sterile workspace—anywhere.
Sanitize threats harmless. Zero Compromise on your DX.-
Speaker
Menlo Security Japan K.K
Data Security Specialist
Ryo Nakatsuke
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Critical Infrastructure Security
Presented byMenlo Security Japan K.K.
-
Speaker
-
GC-02

Protecting Internal Networks using WIPS
-
Speaker
KORNIC GLORY CO.,Ltd.
Manager,
Wired Technology TeamChang Minseon
- Data Leakage Prevention
- Monitoring / Detection
Presented byKornic Glory Co.,Ltd.
-
Speaker
-
-
11:05 | 11:45
-
-
GA-03

Cybersecurity in the age of AI agents
-
Speaker
Cloudflare Japan K. K.
Koichiro Otobe
- Targeted Attacks / Cyber Attacks
- Zero Trust
- AI Security
Presented byCloudflare Japan K. K.
-
Speaker
-
GB-03

Preparing for supply chain evaluation systems
— Strengthening company's security starting with IT asset management-
Speaker
DOS Co., Ltd.
Yuka Haruta
- Data Leakage Prevention
- Endpoint Security
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
Presented byDOS Co., Ltd.
-
Speaker
-
GC-03

From “Wait and Lose” to Proactive Defense:
Ransomware Containment Strategies Using Dark Web Intelligence and Active Cyber Defense (ACD/CTI/CTEM)-
Speaker
KELA Ltd.
Senior Sales Engineer
Masato Hori
-
Speaker
ULTRA RED, Ltd.
Regional Product Manager
Kenichiro Hashimoto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Data Leakage Prevention
Presented byKela K.K.
-
Speaker
-
-
12:05 | 12:35
-
-
GA-04

Toward a Password-less World
~Overview and Latest Status of Passkeys~-
Speaker
FIDO Alliance, Inc.
APAC Market Development Sr. Manager
Atsuhiro Tsuchiya
- Authentication / Identity Management
- Phishing scam
- Quantum Security
- Beginner
-
Speaker
-
GB-04

How to address the rapidly growing problems of smartphones?
-New essentials for smartphone management and security measures--
Speaker
Jamf Japan G.K.
Sales Engineer
Maari Koga
- Endpoint Security
- Zero Trust
- Phishing scam
Presented byJamf Japan G.K.
-
Speaker
-
GC-04

The Realities of Identity Management and the Right Approach
— A Practical Framework for Organizing, Designing, and Operating User, Device, Privileged ID, and Non-SSO Domains —-
Speaker
ZUNDA Inc.
IT Professional
Solution ArchitectKazuya Endo
- Endpoint Security
- Authentication / Identity Management
- SASE (Secure Acess Service Edge)
- Beginner
Presented byZUNDA Inc.
-
Speaker
-
-
12:50 | 13:30
-
-
GA-05

Coming soon
-
Speaker
LRM, Inc.
Tomoyuki Fujii
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Human Resource Development
Presented byLRM, Inc.
-
Speaker
-
GB-05

Add security to ID and Password
Start multi-factor authentication for Windows login with UserLock-
Speaker
OceanBridge Inc.
Shunsuke Baba
- Ransomware Countermeasures
- Zero Trust
- Authentication / Identity Management
- Beginner
Presented byOceanBridge Inc.
-
Speaker
-
GC-05

Unraveling the Currently Required Security Measures: A Deeper Look from the Security Assessment Framework for Strengthening Supply Chains (Tentative)
-
Speaker
HENNGE K.K.
Corporate Communication Division,
Marketing SectionShinsuke Itagaki
- Targeted Attacks / Cyber Attacks
- Authentication / Identity Management
- Business Email Compromise Countermeasures
- Beginner
Presented byHENNGE K.K.
-
Speaker
-
-
13:45 | 14:25
-
-
GA-06

Neglecting software supply chain vulnerabilities poses business risks
Comprehensive vulnerability countermeasures utilizing SBOM, as demonstrated by yamory-
Speaker
Assured, Inc.
Satochi Hara
- Vulnerability / Tampering Countermeasures
- SBOM (Software Bill of Materials)
- Software Supply Chain Attacks
Presented byAssured, Inc.
-
Speaker
-
GB-06

M365 Users must attend the lecture!
Latest trends in Email misdelivery and the ultimate weapon for the “New Outlook”-
Speaker
SCSK Minori Solutions Corporation
Kuniyasu Hayashi
- Data Leakage Prevention
- Email Security
Presented bySCSK Minori Solutions Corporation
-
Speaker
-
GC-06

What are other companies doing?
Preventing email misdelivery and internal misconduct
Practical enterprise techniques to stop information leaks-
Speaker
imatrix corp.
Enterprise Sales
ManagerGai Hoshino
- Data Leakage Prevention
- AI Security
- Email Security
Presented byimatrix corp.
-
Speaker
-
-
14:35 | 15:05
-
-
GA-07

The Dangers of Public Data Leaks and Exposed Attack Surfaces
- A Former Cyber Operations Officer’s Perspective-
Speaker
NSHC Inc.
Director
Park Bumjoon
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
-
Speaker
-
GB-07

Security Strategies for AI and Ransomware Through the Eyes of Attackers
-
Speaker
Hitachi Solutions, Ltd.
Managed Security Service Department
Chief Security AnalystMomoko Aoyama
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- AI Security
-
Speaker
-
GC-07

Essential points to 'absolutely' must know when utilizing Microsoft 365 and security measures recommendations
-
Speaker
MOTEX Inc.
Product Marketing Department, Marketing Division
DirectorRyo Muto
- Targeted Attacks / Cyber Attacks
- Cloud Security
- Data Leakage Prevention
Presented byMOTEX Inc.
-
Speaker
-
-
15:15 | 15:55
-
-
GA-08

Latest Countermeasures Against Cross-Domain Attacks Including Ransomware
-
Speaker
CrowdStrike Japan GK
Sales Engineering Dept,
Sales EngineerHirotaka Nakamoto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
Presented byCrowdStrike Japan GK
-
Speaker
-
GB-08

Ride the Big Wave Now or Never!
Ex-IT Information Systems department discuss Reiwa-Era “Proper AI Native” Security!-
Panelist
Marubeni I-DIGIO Group
Yusaku Sakiyama
-
Panelist
Marubeni I-DIGIO Group
Nozomi Marui
-
Moderator
Marubeni I-DIGIO Group
Masatsugu Inage
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- AI Security
Presented byMarubeni I-DIGIO Group
-
Panelist
-
GC-08

OT Security: The lifeline of manufacturing
— Intrusion pathways in the AI Era and Investment strategies for “Never-Stopping Factories” in the coming fiscal year-
Speaker
Tenable Network Security Japan K.K.
Junpei Abe
- Targeted Attacks / Cyber Attacks
- Vulnerability / Tampering Countermeasures
- Critical Infrastructure Security
- Beginner
Presented byTenable Network Security Japan K.K.
-
Speaker
-
-
16:10 | 16:50
-
-
GA-09

How should CIS respond to the ever-increasing security risks?
- Security of the "PC Lifecycle Final Process" that is often overlooked --
Speaker
Pacific Net Co.,Ltd.
IT Solutions Department
ManagerYuuhei Hayakawa
- Data Leakage Prevention
Presented byPacific Net Co.,Ltd.
-
Speaker
-
GB-09

Case study presentation:
Securing supply chain beyond VPN :How to prevent initial Ransomware infiltration-
Speaker
Netskope Japan K.K.
Masahide Aogame
- Ransomware Countermeasures
- Zero Trust
- SASE (Secure Acess Service Edge)
- Beginner
Presented byNetskope Japan K.K.
-
Speaker
-
GC-09

Transforming SOC operations
-The advancement and efficiency of SOCs through AI and automation are becoming real--
Speaker
NRI SecureTechnologies, Ltd.
Junichi Nakayama
- AI Security
- SOC / Incident Response
- Managed Security Services
Presented byNRI SecureTechnologies, Ltd. / Net One Partners Co., Ltd.
-
Speaker
-
-
17:00 | 17:30
-
-
GA-10

Threats in Cyberspace
-State-sponsored Cyberattacks-
Speaker
Public Security Intelligence Agency
Ippei Suyama
- Targeted Attacks / Cyber Attacks
-
Speaker
-
GB-10

Cybersecurity Measures from the Network Side
-
Speaker
Ministry of Internal Affairs and Communications
Office of the Director-General for Cybersecurity
Senior Planning OfficerTakanori Umeki
- IoT Security
- Encryption / Certificates
- Quantum Security
-
Speaker
-
GC-10

10 Major Security Threats and Basic Security Measures [For Organizations]
-
Speaker
Information-technology Promotion Agency, Japan
IT Security Center(ISEC) Cyber Situation Analysis Department
ResearcherShigenori Kaneko
- Ransomware Countermeasures
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
- Beginner
-
Speaker
-
3.19(Thu)
-
11:05 | 11:45
-
12:50 | 13:30
-
13:45 | 14:25
-
15:15 | 15:55