Osaka Session
大阪講演
-
lunch
Search (possible multiple choice)
Keyword
3.10(Tue)
-
09:30 | 10:00
-
-
OA-01
Cyber threat landscape and police initiatives
-
Speaker
National Police Agency
Yosuke Nakagawa
- Ransomware Countermeasures
- Phishing scam
-
Speaker
-
OB-01
Cybersecurity Measures from the Network Side
-
Speaker
Ministry of Internal Affairs and Communications
Office of the Director-General for Cybersecurity
Senior Planning OfficerTakanori Umeki
- IoT Security
- Encryption / Certificates
- Quantum Security
-
Speaker
-
OC-01
Factory Security with Near-Zero Budget and Manpower
— First Steps in an Era Where One in Three Companies Are Attacked —-
Speaker
JNSA(Japan Network Security Association)
Noboru Okamoto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Other
- Beginner
-
Speaker
-
OD-01
Security Strategies for AI and Ransomware Through the Eyes of Attackers
-
Speaker
Hitachi Solutions, Ltd.
Managed Security Service Department
Chief Security AnalystMomoko Aoyama
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- AI Security
-
Speaker
-
OE-01
Resilience Building to Hybread Threat
-
Speaker
Organization for Cyber Defense Innovation
Director
Akihiro Fujii
- Monitoring / Detection
- Human Resource Development
- Other
- Advanced
-
Speaker
-
-
10:10 | 10:50
-
-
OA-02
Prepare for ransomware!
What is the active Cyber Defense needed these days?-
Speaker
Fortinet Japan G.K.
Product Marketing Manager
Fumiaki Ito
- Ransomware Countermeasures
Presented byFortinet Japan G.K.
-
Speaker
-
OB-02
Plug in to a sterile workspace—anywhere.
Sanitize threats harmless. Zero Compromise on your DX.-
Speaker
Menlo Security Japan K.K
Data Security Specialist
Ryo Nakatsuke
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Critical Infrastructure Security
Presented byMenlo Security Japan K.K.
-
Speaker
-
OC-02
Preparing for supply chain evaluation systems
— Strengthening company's security starting with IT asset management-
Speaker
DOS Co., Ltd.
Minori Koga
- Data Leakage Prevention
- Endpoint Security
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
Presented byDOS Co., Ltd.
-
Speaker
-
OD-02
Coming soon
-
Speaker
LRM, Inc.
Tomoyuki Fujii
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Human Resource Development
Presented byLRM, Inc.
-
Speaker
-
OE-02
Controlling Who, What, and How Far:
An Introduction to Policy-Based AI Access Management (Draft)-
Speaker
GMO GlobalSign K.K.
TrustLogin Division
DirectorYuka Nakayama
- Zero Trust
- AI Security
- Authentication / Identity Management
Presented byGMO GlobalSign K.K.
-
Speaker
-
-
11:05 | 11:45
-
-
OA-03
Cybersecurity in the age of AI agents
-
Speaker
Cloudflare Japan K. K.
Koichiro Otobe
- Targeted Attacks / Cyber Attacks
- Zero Trust
- AI Security
Presented byCloudflare Japan K. K.
-
Speaker
-
OB-03
Break Free from the “Chaotic Firefighting” of Vulnerability Management!
What Is Efficient AI-Powered Triage & ASM?-
Speaker
Aeye Security Lab Inc.
Executive Officer&Head of Customer Experience
Teppei Sekine
- Cloud Security
- Vulnerability / Tampering Countermeasures
- Application Security
Presented byAeye Security Lab Inc.
-
Speaker
-
OC-03
How to easily obtain 3 or 4 stars rating under the Ministry of Economy, Trade and Industry's "Supply Chain Security Assessment System" and break free from the security check spiral
-
Speaker
SOURCE POD, Inc.
CEO
Takeshi Yamamoto
- Security Audits / System Audits
- Human Resource Development
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
Presented bySourcePod, Inc.
-
Speaker
-
OD-03
A roadmap to mastering Cloud Security: learning from Japanese companies' cases.
-
Speaker
Cloudbase Inc.
Koya Iwasa
- Cloud Security
- Vulnerability / Tampering Countermeasures
- SBOM (Software Bill of Materials)
Presented byCloudbase Inc.
-
Speaker
-
OE-03
Protecting Internal Networks using WIPS
-
Speaker
KORNIC GLORY CO.,Ltd.
Manager,
Wired Technology TeamChang Minseon
- Data Leakage Prevention
- Monitoring / Detection
Presented byKornic Glory Co.,Ltd.
-
Speaker
-
-
12:05 | 12:45
-
-
OA-04
Practicing proactive cyber defense in response to cybersecurity strategy
-
Speaker
Cybertrust Japan Co., Ltd.
Field Marketing Department
Yumi Tomita
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Zero Trust
Presented byCybertrust Japan Co., Ltd.
-
Speaker
-
OB-04
The ‘Real Ransomware Defense’ nobody talks
-What you have to do first
Essential measures to keep your business running and leveraging the cloud-
Speaker
Turn and Frontier Co.Ltd.
Founder and Chairman
Hirofumi Kono
- Ransomware Countermeasures
- Cloud Security
- Vulnerability / Tampering Countermeasures
- Beginner
Presented byTurn and Frontier Co. Ltd.
-
Speaker
-
OC-04
Is DMARC implementation truly enough to ensure security?
― The reality of potential risks and sustainable operational design revealed through report analysis-
Speaker
Honetsecurity K.K.
Principal Messaging Engineer
Yoshitaka Hirano
- Ransomware Countermeasures
- Email Security
- Phishing scam
Presented byHonetsecurity K.K.
-
Speaker
-
OD-04
How to confront the evolution of threats?
Security strategies for a new era-
Speaker
Illumio Japan
Senior Systems Engineer
Sho Tokunaga
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Zero Trust
Presented byIllumio Japan G.K.
-
Speaker
-
OE-04
Case Studies Reveal! The Frontline of Misdelivery Prevention and Moving Beyond PPAP
-
Speaker
NTT TechnoCross Corporation
Business Innovation Business Department
Nozomi Amamoto
- Data Leakage Prevention
- Email Security
Presented byNTT TechnoCross Corporation
-
Speaker
-
-
12:55 | 13:25
-
-
OA-05
Investigating the reality of ransomware groups through OSINT
-
Speaker
Japan Hackers Association
Takayuki Sugiura
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Other
-
Speaker
-
OB-05
Why won't ransomware attacks stop?
What you need to know now: How attacks work and how to prepare properly-
Speaker
Zscaler, Inc.
Hiroaki Fukatani
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- SASE (Secure Acess Service Edge)
- Beginner
Presented byZscaler, Inc.
-
Speaker
-
OC-05
The Realities of Identity Management and the Right Approach
— A Practical Framework for Organizing, Designing, and Operating User, Device, Privileged ID, and Non-SSO Domains —-
Speaker
ZUNDA Inc.
IT Professional
Solution ArchitectKazuya Endo
- Endpoint Security
- Authentication / Identity Management
- SASE (Secure Acess Service Edge)
- Beginner
Presented byZUNDA Inc.
-
Speaker
-
OD-05
Sales Partner 20 Years of Computer Systems Experience Presents: Google's Recommended Zero Trust Model
-
Speaker
Densan System Co.,Ltd.
Digital Innovation Division,
Social Innovation Division,
Advanced Solutions DepartmentRyuji Miyamoto
- Ransomware Countermeasures
- Zero Trust
Presented byDensan System Co., Ltd.
-
Speaker
-
OE-05
Software Supply Chains Under Attack:
OSS Malware Threats, Lessons from a Japanese Wallet Maker, and Dev-Friendly Countermeasures-
Speaker
AndGo, Inc.
CEO
Toshihide Hara
- Cloud Security
- Vulnerability / Tampering Countermeasures
- Application Security
- Beginner
Presented byAndGo, Inc.
-
Speaker
-
-
13:35 | 14:15
-
-
OA-06
Neglecting software supply chain vulnerabilities poses business risks
Comprehensive vulnerability mitigation using SBOM by yamory-
Speaker
Assured, Inc.
Yuki Fujita
- Vulnerability / Tampering Countermeasures
- SBOM (Software Bill of Materials)
- Software Supply Chain Attacks
Presented byAssured, Inc.
-
Speaker
-
OB-06
Your company's IDs and passwords are truly secure?
-Practical password management strategies achieved with Keeper--
Speaker
MACNICA, Inc.
Kojiro Kubo
- Ransomware Countermeasures
- Data Leakage Prevention
- Authentication / Identity Management
- Beginner
Presented byMACNICA, Inc. / Keeper Security APAC K.K.
-
Speaker
-
OC-06
From “Wait and Lose” to Proactive Defense:
Ransomware Containment Strategies Using Dark Web Intelligence and Active Cyber Defense (ACD/CTI/CTEM) (Draft Title)-
Speaker
KELA Co., Ltd
Sales Engineer
Takayuki Ueno
-
Speaker
ULTRA RED, Ltd.
Regional Product Manager
Hashimoto Kenichiro
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Data Leakage Prevention
Presented byKela K.K.
-
Speaker
-
OD-06
The latest data erasure management to avoid being told 'Why? That's enough!'
-
Speaker
Blancco Japan Inc. / Blancco Technology Group
President & CEO / Regional Director, Japan
Motoi Mimatsu
- Data Leakage Prevention
- Zero Trust
- Security Audits / System Audits
Presented byBlancco Japan Inc.
-
Speaker
-
OE-06
【Essential strategies for the AI coexistence era】
-Why won't cut It anymore relying on IT departments-
The critical importance of AI security training for all employees-
Speaker
KnowBe4 Japan
Tsutomu Hirose
Presented byTop Out Human Capital Inc.
-
Speaker
-
-
14:30 | 15:10
-
-
OA-07
Ride the Big Wave Now or Never!
Ex-IT Information Systems department discuss Reiwa-Era “Proper AI Native” Security!-
Panelist
Marubeni I-DIGIO Group
Masatsugu Inage
-
Panelist
Marubeni I-DIGIO Group
Yusaku Sakiyama
-
Moderator
Marubeni I-DIGIO Group
Daisuke Soga
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- AI Security
Presented byMarubeni I-DIGIO Group
-
Panelist
-
OB-07
How to address the rapidly growing problems of smartphones?
-New essentials for smartphone management and security measures--
Speaker
Jamf Japan G.K.
Sales Engineer
Kenichi Babata
- Endpoint Security
- Zero Trust
- Phishing scam
Presented byJamf Japan G.K.
-
Speaker
-
OC-07
2025: What did you do for Email security?
The reality of selecting,implementing and operating DMARC, misdelivery prevention, and PPAP elimination-
Speaker
imatrix corp.
CEO
Hibiki Oka
- Ransomware Countermeasures
- Data Leakage Prevention
- Email Security
Presented byimatrix corp.
-
Speaker
-
OD-07
M365 Users must attend the lecture!
Latest trends in Email misdelivery and the ultimate weapon for the “New Outlook”-
Speaker
SCSK Minori Solutions Corporation
Kuniyasu Hayashi
- Data Leakage Prevention
- Email Security
Presented bySCSK Minori Solutions Corporation
-
Speaker
-
OE-07
Thinking ahead to 2026:The new norm for smart security investment
-The exposure management-
Speaker
Tenable Network Security Japan K.K.
Junpei Abe
- Cloud Security
- Vulnerability / Tampering Countermeasures
- AI Security
- Beginner
Presented byTenable Network Security Japan K.K.
-
Speaker
-
-
15:20 | 15:50
-
-
OA-08
Essential points to 'absolutely' must know when utilizing Microsoft 365 and security measures recommendations
-
Speaker
MOTEX Inc.
Product Marketing Department, Marketing Division
DirectorRyo Muto
- Targeted Attacks / Cyber Attacks
- Cloud Security
- Data Leakage Prevention
- Beginner
Presented byMOTEX Inc.
-
Speaker
-
OB-08
Toward a Password-less World
~Overview and Latest Status of Passkeys~-
Speaker
FIDO Alliance, Inc.
APAC Market Developent Sr. Manager
Atsuhiro Tsuchiya
- Targeted Attacks / Cyber Attacks
- Authentication / Identity Management
- Phishing scam
- Beginner
-
Speaker
-
OC-08
What is ransomware defense in an era where even EDR can't stop?
-New essentials for avoiding victimization: Insights from incident case study--
Speaker
Blue Planet-works, Inc.
Hideki Fukushima
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
- Intermediate
Presented byBlue Planet-works, Inc.
-
Speaker
-
OD-08
How should CIS respond to the ever-increasing security risks?
- Security of the "PC Lifecycle Final Process" that is often overlooked --
Speaker
Pacific Net Co.,Ltd.
IT Solutions Department
ManagerTakuma Yoshida
- Data Leakage Prevention
Presented byPacific Net Co.,Ltd.
-
Speaker
-
OE-08
What We Can Do to Keep Our Factories Running
-
Speaker
Santen Pharmaceutical Co., Ltd.
Digital & IT
Cybersecurity Architecture & Solutions Senior ManagerFumito Masaki
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Critical Infrastructure Security
- Beginner
-
Speaker
-
-
16:00 | 16:40
-
-
OA-09
Insights from Major Cyberattacks in Japan and the Hidden Pitfalls of Security Measures
— Why Do Cyber Incidents Still Happen Despite “Doing Everything Right”?-
Speaker
Macnica Solutions Corp.
Sales Representative, Sales Division 1, Section 1
Yuki Otsubo
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- DDoS Countermeasures
- Intermediate
Presented byAkamai Technologies GK / Macnica Solutions Corp.
-
Speaker
-
OB-09
Unraveling the Currently Required Security Measures: A Deeper Look from the Security Assessment Framework for Strengthening Supply Chains (Tentative)
-
Speaker
HENNGE K.K.
Corporate Communication Division, Marketing Section
Shinsuke Itagaki
- Targeted Attacks / Cyber Attacks
- Authentication / Identity Management
- Business Email Compromise Countermeasures
- Beginner
Presented byHENNGE K.K.
-
Speaker
-
OC-09
A three-Solutions plan to enhance global supply chain security
-
Speaker
Internet Initiative Japan Inc.
Global Business Unit
Service SpecialistKo Yukitake
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Zero Trust
Presented byInternet Initiative Japan Inc.
-
Speaker
-
OD-09
Prevent "spoofed logins"! How to stop ransomware intrusions with "authentication"
-
Speaker
CSE Co.,Ltd
Secure Business Division
Deputy General Manager /
SECUREMATRIX Development ManagerTetsuya Shimodaira
- Ransomware Countermeasures
- Zero Trust
- Authentication / Identity Management
- Beginner
Presented byCSE Co.,Ltd.
-
Speaker
-
OE-09
Preparing for Phishing and Fake SNS – Latest Trends in External Threats and Practical Countermeasures
-
Speaker
TwoFive, Inc.
Senior Consultant
Ken-ichi Kirihara
- Data Leakage Prevention
- Monitoring / Detection
- Phishing scam
Presented byTwoFive Co., Ltd.
-
Speaker
-
-
16:55 | 17:35
-
-
OA-10
The Full Picture of Ransomware Attacks and Defensive Measures to Protect Your Business
-
Speaker
NTT DATA KANSAI CORPORATION
Ryo Hoshino
- Ransomware Countermeasures
- Email Security
- Authentication / Identity Management
Presented byNTT DATA KANSAI CORPORATION
-
Speaker
-
OB-10
Latest Countermeasures Against Cross-Domain Attacks Including Ransomware
-
Speaker
CrowdStrike Japan GK
Sales Engineering Dept,
Senior Sales EngineerTakayuki Moto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
Presented byCrowdStrike Japan GK
-
Speaker
-
OC-10
-
Speaker
Netskope Japan
Taiki Sekine
-
Speaker
Netskope Japan
Koji Yamada
- Ransomware Countermeasures
- Zero Trust
- SASE (Secure Acess Service Edge)
- Beginner
Presented byNetskope Japan K.K.
-
Speaker
-
OD-10
How to address evolving threats in cloud environments
— Security operations in the AI era and Datadog's approach-
Speaker
Datadog Japan G.K.
Masaki Takemoto
- Vulnerability / Tampering Countermeasures
- Security Audits / System Audits
- Monitoring / Detection
- Beginner
Presented byDatadog Japan G.K.
-
Speaker
-
OE-10
The trust and competitiveness from SOC2 reports
Auditors reveal the reality of SOC2 acquisition and on-site challenges-
Speaker
Reiwa & Company / Meneside Co., Ltd.
Syota Oikawa
-
Speaker
Meneside Co., Ltd.
Naoki Matsuda
- Cloud Security
- Security Audits / System Audits
- Other
Presented byReiwa & Company
-
Speaker
-
-
17:40 | 18:10
-
-
OA-11
Threats in Cyberspace
-State-sponsored Cyberattack-
Speaker
Public Security Intelligence Agency
Ippei Suyama
- Targeted Attacks / Cyber Attacks
-
Speaker
-
OB-11
10 Major Security Threats and Basic Security Measures [For Organizations]
-
Speaker
Information-technology Promotion Agency, Japan
IT Security Center(ISEC) Cyber Situation Analysis Department
ResearcherShigenori Kaneko
- Ransomware Countermeasures
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
- Beginner
-
Speaker
-
OC-11
The Dangers of Public Data Leaks and Exposed Attack Surfaces
- A Former Cyber Operations Officer’s Perspective-
Speaker
NSHC Inc.
Director
Park Bumjoon
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
-
Speaker
-
OD-11
Strengthening cybersecurity measures at Ports
— Insights from training to confirm response procedures during terminal operation system disruptions—-
Speaker
Ministry of Land, Infrastructure, Transport and Tourism
Tomohide Sugimoto
- Critical Infrastructure Security
- Other
-
Speaker
-
OE-11
Security measures to protect the entire supply chain
-
Speaker
CRIC-SC3
Steering Committee
ChairToshinori Kajiura
- Targeted Attacks / Cyber Attacks
- Software Supply Chain Attacks
- Intermediate
-
Speaker
-
-
18:20 | 19:00
-
-
OA-12
The Most Cost-Effective Security Strategies on a Limited Budget
— A Practical Approach to Protecting Against Cyberattacks, Including Ransomware —-
Speaker
ZOHO Japan Corporation
Marketing Division ManageEngine Marketing Department
Content Creator EvangelistShun Horiuchi
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
Presented byZOHO Japan Corporation
-
Speaker
-
OB-12
Presented bySnyk Inc.
-
OC-12
Confronting evolving threats:The front lines of endpoint security
-Perspectives for addressing recent large-scale cyber incidents-
Speaker
HP Japan Inc.
Takashi Otsuyama
- Ransomware Countermeasures
- Endpoint Security
- Zero Trust
Presented byHP Japan Inc.
-
Speaker
-
OD-12
Proven success against the trending of ransomware “Qilin”
Defense strategy beyond EDR limits built with the Ransomware countermeasure platform “Halcyon”-
Speaker
TAKACHIHO KOHEKI CO., LTD.
Yusuke Hasunuma
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
Presented byTAKACHIHO KOHEKI CO., LTD.
-
Speaker
-