iotc iotc

    • linkedin
    • facebook
    • twitter
    • YouTube
  • Register Now

  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Register Now

Tokyo Session

東京講演

  • All
  • 3.24(Tue)
  • 3.25(Wed)
  • 3.26(Thu)
  • 3.27(Fri)
  • simultaneous interpreting

  • lunch

Search (possible multiple choice)

Keyword

3.24(Tue)

  • RoomA
  • RoomB
  • RoomC
  • 5F
08:50 | 09:20
  • A1-01

    The current state of Japan's cybersecurity policy

    • Speaker

      Cabinet Secretariat

      National Cybersecurity Office

      Takuyuki Kawauchi

    • Critical Infrastructure Security
    • Other
    • Beginner
09:30 | 10:10
  • A1-02

    Reducing the Burden of Company PC Management:
    A Case Study on Streamlining IT Asset Management

    • Speaker

      Sky CO., LTD.

      Yukako Kondo

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Endpoint Security

    Presented bySky CO., LTD.

10:20 | 11:00
  • A1-03

    Prepare for Ransomware Attacks!
    The Role of Active Cyber Defense in Today’s Threat Landscape

    • Speaker

      Fortinet Japan G.K.

      Product Marketing Manager

      Fumiaki Ito

    • Ransomware Countermeasures

    Presented byFortinet Japan G.K.

  • WS1-03

    Attacking Cloud Misconfigurations

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

    • Workshop
    • Intermediate
11:10 | 11:50
  • A1-04

    The Reality of Ransomware Attacks and How to Defend Against Them
    – Hidden Pitfalls in Seemingly Perfect Security –

    • Speaker

      NTT DATA INTELLILINK Corporation

      Security Innovation Division,
      Security & Technology Consulting Sector
      Executive Manager

      Hideki Fukuda

    • Speaker

      NTT DATA INTELLILINK Corporation

      Security Innovation Division,
      Security & Technology Consulting Sector
      Executive Manager

      Katsuyuki Toda

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures

    Presented byNTT DATA INTELLILINK Corporation

12:05 | 12:45
  • A1-05

    A Roadmap to Mastering Cloud Security: Lessons from Japanese Enterprise Case Studies

    • Speaker

      Cloudbase Inc.

      CEO

      Koya Iwasa

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • SBOM (Software Bill of Materials)

    Presented byCloudbase Inc.

  • WS1-05

    Coming soon

    • Speaker

      Aeye Security Lab Inc.

      Presales Leader, CX Division

      Takahiro Takahashi

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • Application Security
    • Workshop

    Presented byAeye Security Lab Inc.

13:20 | 14:00
  • A1-06

    Before Unmanaged Assets Become Attack Vectors
    — Enabling ASM with AI —

    • Speaker

      UBsecure, Inc.

      Product Division,
      Product Business Promotion Department

      Toyohiro Hotta

    • Ransomware Countermeasures
    • Vulnerability / Tampering Countermeasures
    • Software Supply Chain Attacks

    Presented byUBsecure, Inc.

  • B1-06

    From “Wait and Lose” to Proactive Defense:
    Ransomware Containment Strategies Using Dark Web Intelligence and Active Cyber Defense (ACD/CTI/CTEM) (Draft Title)

    • Speaker

      KELA Co., Ltd

      Principal Security Engineer

      Makoto Kawasaki

    • Speaker

      ULTRA RED, Ltd.

      Regional Product Manager

      Kenichiro Hashimoto

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Data Leakage Prevention

    Presented byKela K.K.

  • C1-06

    Rethinking Security as Business Operations:
    What you can do now, What you can achieve (Tentative Title)

    • Speaker

      JNSA(Japan Network Security Association)

      Vice Chairman, CISO Support Working Group Leader

      Masakazu Takahashi

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
  • WS1-06

    Coming soon

    • Speaker

      Illumio Japan G.K.

      Jun Fukumoto

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust
    • Workshop

    Presented byIllumio Japan G.K.

14:15 | 14:55
  • A1-07

    Protecting Internal Networks using WIPS

    • Speaker

      KORNIC GLORY CO.,Ltd.

      Manager,
      Wired Technology Team

      Chang Minseon

    • Data Leakage Prevention
    • Monitoring / Detection

    Presented byKornic Glory Co.,Ltd.

  • B1-07

    Three Reasons Why Supply Chain Security Stalls in Practice
    — Toward a Sustainable, Practical Approach Based on the SCS Evaluation Framework

    • Speaker

      Soliton Systems K.K.

      IT Security Business Unit
      Evangelist

      Shoko Araki

    • Data Leakage Prevention
    • Zero Trust
    • Authentication / Identity Management
    • Intermediate

    Presented bySoliton Systems K.K.

  • C1-07

    SaaS Security Blind Spots: The Risks of Hidden AI
    ~ A Practical Guide on What to Evaluate and Why ~

    • Speaker

      Assured, Inc.

      Yuya Ueki

    • Cloud Security
    • Vulnerability / Tampering Countermeasures

    Presented byAssured, Inc.

  • WS1-07

    Coming soon

    • Workshop

    Presented byB Manifold,Inc.

15:10 | 15:50
  • A1-08

    Is Implementing DMARC Enough to Keep You Secure?
    — Hidden Risks Revealed and Sustainable DMARC Operations Through Report Analysis

    • Speaker

      Honetsecurity K.K.

      Principal Messaging Engineer

      Yoshitaka Hirano

    • Ransomware Countermeasures
    • Email Security
    • Phishing scam

    Presented byHonetsecurity K.K.

  • B1-08

    2025: What did your company do for Email Security?
    The reality of selecting, implementing, and operating DMARC, misdelivery prevention, and PPAP elimination

    • Speaker

      imatrix corp.

      CEO

      Hibiki Oka

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Email Security

    Presented byimatrix corp.

  • C1-08

    CSIRTs must not be isolated.
    The way of to start a team that protects the organization and the power of community to build connections.

    • Speaker

      Nippon CSIRT Association

      Fumie Watanabe

    • PSIRT / CSIRT
    • Human Resource Development
    • Other
16:05 | 16:45
  • A1-09

    Is your system truly secure?
    Efficient penetration testing to prevent business risks.
    Explained using Cymulate as an example.

    • Speaker

      NTT Advanced Technology Corporation

      Tetsushi Morita

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security

    Presented byNTT Advanced Technology Corporation

  • B1-09

    Internal fraud prevention and human risk management

    • Speaker

      N&O Partners

      Managing Partner
      Attorney

      Leona Ohki

    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures
    • Monitoring / Detection

    Presented byN&O Partners(Leo United Ginza Law Office)

  • C1-09

    Building Trust at Scale:
    Preparing Certificate, Device, and AI Identity for the Next Wave of Security Challenges

    • Speaker

      Keyfactor

      Field CTO VP,
      Solution Engineering

      Eric Mizell

    • Zero Trust
    • AI Security
    • Encryption / Certificates
    • Intermediate

    Presented byKeyfactor Inc.

  • WS1-09

    Are you confident in your security ?
    ~ Very introductory security audit workshop

    • Speaker

      Japan information security audit association,

      gBrain Co., Ltd.

      Toshitsugu Ota

    • Security Audits / System Audits
    • Human Resource Development
    • Workshop
17:00 | 17:40
  • A1-10

    Learn from the 2025 cybersecurity Talent Market Through Data
    ― From the Latest ISC2 Survey

    • Speaker

      President, ISC2 Japan Chapter

      Member,
      APAC Advisory Council,

      Fumiko Noma, CISSP

    • Human Resource Development
    • Workstyle Innovation
    • Other
    • Intermediate

    Presented byISC2, Inc.

  • B1-10

    Preparing for the Quantum Age:
    Will Your Data Still Be Secure in Ten Years' Time?

    • Speaker

      SSH Communications Security

      Solutions Engineering Director, APAC

      Katsuhiro Shogawa

    • Targeted Attacks / Cyber Attacks
    • Encryption / Certificates
    • Quantum Security
    • Intermediate

    Presented bySSH Communications Security Oyj

  • C1-10

    Ransomware defense strategy to protect the company.
    - Comprehensive measures before and after infection -

    • Speaker

      Metro, Inc.

      Hideyuki Ishida

    • Ransomware Countermeasures
    • Endpoint Security
    • Email Security

    Presented byMetro, Inc.

17:45 | 18:15
  • Closed

    A1-11

    Threats in Cyberspace
    -Cyberattacks Country supported.

    • Speaker

      Public Security Intelligence Agency

      Ippei Suyama

    • Targeted Attacks / Cyber Attacks
  • B1-11

    The importance of public private partnerships in law enforcement in the United States

    • Speaker

      Embassy of the United States of America in Japan

  • C1-11

    Hands-On Corporate Cyber Training for Ransomware and Phishing Attacks In Your Company

    • Speaker

      NSHC Inc.

      Director

      Park Bumjoon

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Human Resource Development
    • Beginner
18:30 | 19:30
  • A1-12

    Coming soon

  • B1-12

    CNAPP: Partnering with Japanese Enterprises
    ― Why Companies Keep Choosing Cloudbase: Insights from Long-Term Users

    • Cloud Security

    Presented byCloudbase Inc.

  • C1-12

    Shadow AI: Hunting the Unknowns Across Developer Tooling and Deployed Artifacts

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

[25年秋開催]Security Days Fall 2025

Copyright (c) NANO OPT Media, Inc. All rights reserved.