iotc iotc

    • linkedin
    • facebook
    • twitter
    • YouTube
  • Register Now

  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Register Now

Osaka Session

大阪講演

  • lunch

Search (possible multiple choice)

Keyword

3.10(Tue)

  • RoomA
  • RoomB
  • RoomC
  • RoomD
  • RoomE
09:30 | 10:00
  • OA-01

    Cyber threat landscape and police initiatives

    • Speaker

      National Police Agency

      Yosuke Nakagawa

    • Ransomware Countermeasures
    • Phishing scam
  • OB-01

    Cybersecurity Measures from the Network Side

    • Speaker

      Ministry of Internal Affairs and Communications

      Office of the Director-General for Cybersecurity
      Senior Planning Officer

      Takanori Umeki

    • IoT Security
    • Encryption / Certificates
    • Quantum Security
  • OC-01

    Factory Security with Near-Zero Budget and Manpower
    — First Steps in an Era Where One in Three Companies Are Attacked —

    • Speaker

      JNSA(Japan Network Security Association)

      Noboru Okamoto

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Other
    • Beginner
  • OD-01

    Security Strategies for AI and Ransomware Through the Eyes of Attackers

    • Speaker

      Hitachi Solutions, Ltd.

      Managed Security Service Department
      Chief Security Analyst

      Momoko Aoyama

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • AI Security
  • OE-01

    Resilience Building to Hybread Threat

    • Speaker

      Organization for Cyber Defense Innovation

      Director

      Akihiro Fujii

    • Monitoring / Detection
    • Human Resource Development
    • Other
    • Advanced
10:10 | 10:50
  • OA-02

    Prepare for ransomware!
    What is the active Cyber Defense needed these days?

    • Speaker

      Fortinet Japan G.K.

      Product Marketing Manager

      Fumiaki Ito

    • Ransomware Countermeasures

    Presented byFortinet Japan G.K.

  • OB-02

    Plug in to a sterile workspace—anywhere.
    Sanitize threats harmless. Zero Compromise on your DX.

    • Speaker

      Menlo Security Japan K.K

      Data Security Specialist

      Ryo Nakatsuke

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Critical Infrastructure Security

    Presented byMenlo Security Japan K.K.

  • OC-02

    Preparing for supply chain evaluation systems
    — Strengthening company's security starting with IT asset management

    • Speaker

      DOS Co., Ltd.

      Minori Koga

    • Data Leakage Prevention
    • Endpoint Security
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends

    Presented byDOS Co., Ltd.

  • OD-02

    Coming soon

    • Speaker

      LRM, Inc.

      Tomoyuki Fujii

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Human Resource Development

    Presented byLRM, Inc.

  • OE-02

    Controlling Who, What, and How Far:
    An Introduction to Policy-Based AI Access Management (Draft)

    • Speaker

      GMO GlobalSign K.K.

      TrustLogin Division
      Director

      Yuka Nakayama

    • Zero Trust
    • AI Security
    • Authentication / Identity Management

    Presented byGMO GlobalSign K.K.

11:05 | 11:45
  • OA-03

    Cybersecurity in the age of AI agents

    • Speaker

      Cloudflare Japan K. K.

      Koichiro Otobe

    • Targeted Attacks / Cyber Attacks
    • Zero Trust
    • AI Security

    Presented byCloudflare Japan K. K.

  • OB-03

    Break Free from the “Chaotic Firefighting” of Vulnerability Management!
    What Is Efficient AI-Powered Triage & ASM?

    • Speaker

      Aeye Security Lab Inc.

      Executive Officer&Head of Customer Experience

      Teppei Sekine

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • Application Security

    Presented byAeye Security Lab Inc.

  • OC-03

    How to easily obtain 3 or 4 stars rating under the Ministry of Economy, Trade and Industry's "Supply Chain Security Assessment System" and break free from the security check spiral

    • Speaker

      SOURCE POD, Inc.

      CEO

      Takeshi Yamamoto

    • Security Audits / System Audits
    • Human Resource Development
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends

    Presented bySourcePod, Inc.

  • OD-03

    A roadmap to mastering Cloud Security: learning from Japanese companies' cases.

    • Speaker

      Cloudbase Inc.

      Koya Iwasa

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • SBOM (Software Bill of Materials)

    Presented byCloudbase Inc.

  • OE-03

    Protecting Internal Networks using WIPS

    • Speaker

      KORNIC GLORY CO.,Ltd.

      Manager,
      Wired Technology Team

      Chang Minseon

    • Data Leakage Prevention
    • Monitoring / Detection

    Presented byKornic Glory Co.,Ltd.

12:05 | 12:45
  • OA-04

    Practicing proactive cyber defense in response to cybersecurity strategy

    • Speaker

      Cybertrust Japan Co., Ltd.

      Field Marketing Department

      Yumi Tomita

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust

    Presented byCybertrust Japan Co., Ltd.

  • OB-04

    The ‘Real Ransomware Defense’ nobody talks
    -What you have to do first
    Essential measures to keep your business running and leveraging the cloud

    • Speaker

      Turn and Frontier Co.Ltd.

      Founder and Chairman

      Hirofumi Kono

    • Ransomware Countermeasures
    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • Beginner

    Presented byTurn and Frontier Co. Ltd.

  • OC-04

    Is DMARC implementation truly enough to ensure security?
    ― The reality of potential risks and sustainable operational design revealed through report analysis

    • Speaker

      Honetsecurity K.K.

      Principal Messaging Engineer

      Yoshitaka Hirano

    • Ransomware Countermeasures
    • Email Security
    • Phishing scam

    Presented byHonetsecurity K.K.

  • OD-04

    How to confront the evolution of threats?
    Security strategies for a new era

    • Speaker

      Illumio Japan

      Senior Systems Engineer

      Sho Tokunaga

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust

    Presented byIllumio Japan G.K.

  • OE-04

    Case Studies Reveal! The Frontline of Misdelivery Prevention and Moving Beyond PPAP

    • Speaker

      NTT TechnoCross Corporation

      Business Innovation Business Department

      Nozomi Amamoto

    • Data Leakage Prevention
    • Email Security

    Presented byNTT TechnoCross Corporation

12:55 | 13:25
  • OA-05

    Investigating the reality of ransomware groups through OSINT

    • Speaker

      Japan Hackers Association

      Takayuki Sugiura

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Other
  • OB-05

    Why won't ransomware attacks stop?
    What you need to know now: How attacks work and how to prepare properly

    • Speaker

      Zscaler, Inc.

      Hiroaki Fukatani

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • SASE (Secure Acess Service Edge)
    • Beginner

    Presented byZscaler, Inc.

  • OC-05

    The Realities of Identity Management and the Right Approach
    — A Practical Framework for Organizing, Designing, and Operating User, Device, Privileged ID, and Non-SSO Domains —

    • Speaker

      ZUNDA Inc.

      IT Professional
      Solution Architect

      Kazuya Endo

    • Endpoint Security
    • Authentication / Identity Management
    • SASE (Secure Acess Service Edge)
    • Beginner

    Presented byZUNDA Inc.

  • OD-05

    Sales Partner 20 Years of Computer Systems Experience Presents: Google's Recommended Zero Trust Model

    • Speaker

      Densan System Co.,Ltd.

      Digital Innovation Division,
      Social Innovation Division,
      Advanced Solutions Department

      Ryuji Miyamoto

    • Ransomware Countermeasures
    • Zero Trust

    Presented byDensan System Co., Ltd.

  • OE-05

    Software Supply Chains Under Attack:
    OSS Malware Threats, Lessons from a Japanese Wallet Maker, and Dev-Friendly Countermeasures

    • Speaker

      AndGo, Inc.

      CEO

      Toshihide Hara

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • Application Security
    • Beginner

    Presented byAndGo, Inc.

13:35 | 14:15
  • OA-06

    Neglecting software supply chain vulnerabilities poses business risks
    Comprehensive vulnerability mitigation using SBOM by yamory

    • Speaker

      Assured, Inc.

      Yuki Fujita

    • Vulnerability / Tampering Countermeasures
    • SBOM (Software Bill of Materials)
    • Software Supply Chain Attacks

    Presented byAssured, Inc.

  • OB-06

    Your company's IDs and passwords are truly secure?
    -Practical password management strategies achieved with Keeper-

    • Speaker

      MACNICA, Inc.

      Kojiro Kubo

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Authentication / Identity Management
    • Beginner

    Presented byMACNICA, Inc. / Keeper Security APAC K.K.

  • OC-06

    From “Wait and Lose” to Proactive Defense:
    Ransomware Containment Strategies Using Dark Web Intelligence and Active Cyber Defense (ACD/CTI/CTEM) (Draft Title)

    • Speaker

      KELA Co., Ltd

      Sales Engineer

      Takayuki Ueno

    • Speaker

      ULTRA RED, Ltd.

      Regional Product Manager

      Hashimoto Kenichiro

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Data Leakage Prevention

    Presented byKela K.K.

  • OD-06

    The latest data erasure management to avoid being told 'Why? That's enough!'

    • Speaker

      Blancco Japan Inc. / Blancco Technology Group

      President & CEO / Regional Director, Japan

      Motoi Mimatsu

    • Data Leakage Prevention
    • Zero Trust
    • Security Audits / System Audits

    Presented byBlancco Japan Inc.

  • OE-06

    【Essential strategies for the AI coexistence era】
    -Why won't cut It anymore relying on IT departments-
    The critical importance of AI security training for all employees

    • Speaker

      KnowBe4 Japan

      Tsutomu Hirose

    Presented byTop Out Human Capital Inc.

14:30 | 15:10
  • OA-07

    Ride the Big Wave Now or Never!
    Ex-IT Information Systems department discuss Reiwa-Era “Proper AI Native” Security!

    • Panelist

      Marubeni I-DIGIO Group

      Masatsugu Inage

    • Panelist

      Marubeni I-DIGIO Group

      Yusaku Sakiyama

    • Moderator

      Marubeni I-DIGIO Group

      Daisuke Soga

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • AI Security

    Presented byMarubeni I-DIGIO Group

  • OB-07

    How to address the rapidly growing problems of smartphones?
    -New essentials for smartphone management and security measures-

    • Speaker

      Jamf Japan G.K.

      Sales Engineer

      Kenichi Babata

    • Endpoint Security
    • Zero Trust
    • Phishing scam

    Presented byJamf Japan G.K.

  • OC-07

    2025: What did you do for Email security?
    The reality of selecting,implementing and operating DMARC, misdelivery prevention, and PPAP elimination

    • Speaker

      imatrix corp.

      CEO

      Hibiki Oka

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Email Security

    Presented byimatrix corp.

  • OD-07

    M365 Users must attend the lecture!
    Latest trends in Email misdelivery and the ultimate weapon for the “New Outlook”

    • Speaker

      SCSK Minori Solutions Corporation

      Kuniyasu Hayashi

    • Data Leakage Prevention
    • Email Security

    Presented bySCSK Minori Solutions Corporation

  • OE-07

    Thinking ahead to 2026:The new norm for smart security investment
    -The exposure management

    • Speaker

      Tenable Network Security Japan K.K.

      Junpei Abe

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • AI Security
    • Beginner

    Presented byTenable Network Security Japan K.K.

15:20 | 15:50
  • OA-08

    Essential points to 'absolutely' must know when utilizing Microsoft 365 and security measures recommendations

    • Speaker

      MOTEX Inc.

      Product Marketing Department, Marketing Division
      Director

      Ryo Muto

    • Targeted Attacks / Cyber Attacks
    • Cloud Security
    • Data Leakage Prevention
    • Beginner

    Presented byMOTEX Inc.

  • OB-08

    Toward a Password-less World
    ~Overview and Latest Status of Passkeys~

    • Speaker

      FIDO Alliance, Inc.

      APAC Market Developent Sr. Manager

      Atsuhiro Tsuchiya

    • Targeted Attacks / Cyber Attacks
    • Authentication / Identity Management
    • Phishing scam
    • Beginner
  • OC-08

    What is ransomware defense in an era where even EDR can't stop?
    -New essentials for avoiding victimization: Insights from incident case study-

    • Speaker

      Blue Planet-works, Inc.

      Hideki Fukushima

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security
    • Intermediate

    Presented byBlue Planet-works, Inc.

  • OD-08

    How should CIS respond to the ever-increasing security risks?
    - Security of the "PC Lifecycle Final Process" that is often overlooked -

    • Speaker

      Pacific Net Co.,Ltd.

      IT Solutions Department
      Manager

      Takuma Yoshida

    • Data Leakage Prevention

    Presented byPacific Net Co.,Ltd.

  • OE-08

    What We Can Do to Keep Our Factories Running

    • Speaker

      Santen Pharmaceutical Co., Ltd.

      Digital & IT
      Cybersecurity Architecture & Solutions Senior Manager

      Fumito Masaki

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Critical Infrastructure Security
    • Beginner
16:00 | 16:40
  • OA-09

    Insights from Major Cyberattacks in Japan and the Hidden Pitfalls of Security Measures
    — Why Do Cyber Incidents Still Happen Despite “Doing Everything Right”?

    • Speaker

      Macnica Solutions Corp.

      Sales Representative, Sales Division 1, Section 1

      Yuki Otsubo

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • DDoS Countermeasures
    • Intermediate

    Presented byAkamai Technologies GK / Macnica Solutions Corp.

  • OB-09

    Unraveling the Currently Required Security Measures: A Deeper Look from the Security Assessment Framework for Strengthening Supply Chains (Tentative)

    • Speaker

      HENNGE K.K.

      Corporate Communication Division, Marketing Section

      Shinsuke Itagaki

    • Targeted Attacks / Cyber Attacks
    • Authentication / Identity Management
    • Business Email Compromise Countermeasures
    • Beginner

    Presented byHENNGE K.K.

  • OC-09

    A three-Solutions plan to enhance global supply chain security

    • Speaker

      Internet Initiative Japan Inc.

      Global Business Unit
      Service Specialist

      Ko Yukitake

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust

    Presented byInternet Initiative Japan Inc.

  • OD-09

    Prevent "spoofed logins"! How to stop ransomware intrusions with "authentication"

    • Speaker

      CSE Co.,Ltd

      Secure Business Division
      Deputy General Manager /
      SECUREMATRIX Development Manager

      Tetsuya Shimodaira

    • Ransomware Countermeasures
    • Zero Trust
    • Authentication / Identity Management
    • Beginner

    Presented byCSE Co.,Ltd.

  • OE-09

    Preparing for Phishing and Fake SNS – Latest Trends in External Threats and Practical Countermeasures

    • Speaker

      TwoFive, Inc.

      Senior Consultant

      Ken-ichi Kirihara

    • Data Leakage Prevention
    • Monitoring / Detection
    • Phishing scam

    Presented byTwoFive Co., Ltd.

16:55 | 17:35
  • OA-10

    The Full Picture of Ransomware Attacks and Defensive Measures to Protect Your Business

    • Speaker

      NTT DATA KANSAI CORPORATION

      Ryo Hoshino

    • Ransomware Countermeasures
    • Email Security
    • Authentication / Identity Management

    Presented byNTT DATA KANSAI CORPORATION

  • OB-10

    Latest Countermeasures Against Cross-Domain Attacks Including Ransomware

    • Speaker

      CrowdStrike Japan GK

      Sales Engineering Dept,
      Senior Sales Engineer

      Takayuki Moto

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security

    Presented byCrowdStrike Japan GK

  • OC-10

    • Speaker

      Netskope Japan

      Taiki Sekine

    • Speaker

      Netskope Japan

      Koji Yamada

    • Ransomware Countermeasures
    • Zero Trust
    • SASE (Secure Acess Service Edge)
    • Beginner

    Presented byNetskope Japan K.K.

  • OD-10

    How to address evolving threats in cloud environments
    — Security operations in the AI era and Datadog's approach

    • Speaker

      Datadog Japan G.K.

      Masaki Takemoto

    • Vulnerability / Tampering Countermeasures
    • Security Audits / System Audits
    • Monitoring / Detection
    • Beginner

    Presented byDatadog Japan G.K.

  • OE-10

    The trust and competitiveness from SOC2 reports
    Auditors reveal the reality of SOC2 acquisition and on-site challenges

    • Speaker

      Reiwa & Company / Meneside Co., Ltd.

      Syota Oikawa

    • Speaker

      Meneside Co., Ltd.

      Naoki Matsuda

    • Cloud Security
    • Security Audits / System Audits
    • Other

    Presented byReiwa & Company

17:40 | 18:10
  • OA-11

    Threats in Cyberspace
    -State-sponsored Cyberattack

    • Speaker

      Public Security Intelligence Agency

      Ippei Suyama

    • Targeted Attacks / Cyber Attacks
  • OB-11

    10 Major Security Threats and Basic Security Measures [For Organizations]

    • Speaker

      Information-technology Promotion Agency, Japan

      IT Security Center(ISEC) Cyber Situation Analysis Department
      Researcher

      Shigenori Kaneko

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures
    • Beginner
  • OC-11

    The Dangers of Public Data Leaks and Exposed Attack Surfaces
    - A Former Cyber Operations Officer’s Perspective

    • Speaker

      NSHC Inc.

      Director

      Park Bumjoon

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures
  • OD-11

    Strengthening cybersecurity measures at Ports
    — Insights from training to confirm response procedures during terminal operation system disruptions—

    • Speaker

      Ministry of Land, Infrastructure, Transport and Tourism

      Tomohide Sugimoto

    • Critical Infrastructure Security
    • Other
  • OE-11

    Security measures to protect the entire supply chain

    • Speaker

      CRIC-SC3

      Steering Committee
      Chair

      Toshinori Kajiura

    • Targeted Attacks / Cyber Attacks
    • Software Supply Chain Attacks
    • Intermediate
18:20 | 19:00
  • OA-12

    The Most Cost-Effective Security Strategies on a Limited Budget
    — A Practical Approach to Protecting Against Cyberattacks, Including Ransomware —

    • Speaker

      ZOHO Japan Corporation

      Marketing Division ManageEngine Marketing Department
      Content Creator Evangelist

      Shun Horiuchi

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security

    Presented byZOHO Japan Corporation

  • OB-12

    Presented bySnyk Inc.

  • OC-12

    Confronting evolving threats:The front lines of endpoint security
    -Perspectives for addressing recent large-scale cyber incidents

    • Speaker

      HP Japan Inc.

      Takashi Otsuyama

    • Ransomware Countermeasures
    • Endpoint Security
    • Zero Trust

    Presented byHP Japan Inc.

  • OD-12

    Proven success against the trending of ransomware “Qilin”
    Defense strategy beyond EDR limits built with the Ransomware countermeasure platform “Halcyon”

    • Speaker

      TAKACHIHO KOHEKI CO., LTD.

      Yusuke Hasunuma

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security

    Presented byTAKACHIHO KOHEKI CO., LTD.

  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

[25年秋開催]Security Days Fall 2025

Copyright (c) NANO OPT Media, Inc. All rights reserved.