Tokyo Session
東京講演
Search (possible multiple choice)
Keyword
3.24(Tue)
-
10:20 | 11:00
-
-
A1-03
Prepare for Ransomware Attacks!
The Role of Active Cyber Defense in Today’s Threat Landscape-
Speaker
Fortinet Japan G.K.
Product Marketing Manager
Fumiaki Ito
- Ransomware Countermeasures
Presented byFortinet Japan G.K.
-
Speaker
-
WS1-03
Attacking Cloud Misconfigurations
-
Speaker
Cyfinoid Research
Anant Shrivastava
- Workshop
- Intermediate
-
Speaker
-
-
12:05 | 12:45
-
-
A1-05
A Roadmap to Mastering Cloud Security: Lessons from Japanese Enterprise Case Studies
-
Speaker
Cloudbase Inc.
CEO
Koya Iwasa
- Cloud Security
- Vulnerability / Tampering Countermeasures
- SBOM (Software Bill of Materials)
Presented byCloudbase Inc.
-
Speaker
-
WS1-05
Coming soon
-
Speaker
Aeye Security Lab Inc.
Presales Leader, CX Division
Takahiro Takahashi
- Cloud Security
- Vulnerability / Tampering Countermeasures
- Application Security
- Workshop
Presented byAeye Security Lab Inc.
-
Speaker
-
-
13:20 | 14:00
-
-
A1-06
Before Unmanaged Assets Become Attack Vectors
— Enabling ASM with AI —-
Speaker
UBsecure, Inc.
Product Division,
Product Business Promotion DepartmentToyohiro Hotta
- Ransomware Countermeasures
- Vulnerability / Tampering Countermeasures
- Software Supply Chain Attacks
Presented byUBsecure, Inc.
-
Speaker
-
B1-06
From “Wait and Lose” to Proactive Defense:
Ransomware Containment Strategies Using Dark Web Intelligence and Active Cyber Defense (ACD/CTI/CTEM) (Draft Title)-
Speaker
KELA Co., Ltd
Principal Security Engineer
Makoto Kawasaki
-
Speaker
ULTRA RED, Ltd.
Regional Product Manager
Kenichiro Hashimoto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Data Leakage Prevention
Presented byKela K.K.
-
Speaker
-
C1-06
Rethinking Security as Business Operations:
What you can do now, What you can achieve (Tentative Title)-
Speaker
JNSA(Japan Network Security Association)
Vice Chairman, CISO Support Working Group Leader
Masakazu Takahashi
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
-
Speaker
-
WS1-06
Coming soon
-
Speaker
Illumio Japan G.K.
Jun Fukumoto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Zero Trust
- Workshop
Presented byIllumio Japan G.K.
-
Speaker
-
-
14:15 | 14:55
-
-
A1-07
Protecting Internal Networks using WIPS
-
Speaker
KORNIC GLORY CO.,Ltd.
Manager,
Wired Technology TeamChang Minseon
- Data Leakage Prevention
- Monitoring / Detection
Presented byKornic Glory Co.,Ltd.
-
Speaker
-
B1-07
Three Reasons Why Supply Chain Security Stalls in Practice
— Toward a Sustainable, Practical Approach Based on the SCS Evaluation Framework-
Speaker
Soliton Systems K.K.
IT Security Business Unit
EvangelistShoko Araki
- Data Leakage Prevention
- Zero Trust
- Authentication / Identity Management
- Intermediate
Presented bySoliton Systems K.K.
-
Speaker
-
C1-07
SaaS Security Blind Spots: The Risks of Hidden AI
~ A Practical Guide on What to Evaluate and Why ~-
Speaker
Assured, Inc.
Yuya Ueki
- Cloud Security
- Vulnerability / Tampering Countermeasures
Presented byAssured, Inc.
-
Speaker
-
WS1-07
Coming soon
- Workshop
Presented byB Manifold,Inc.
-
-
15:10 | 15:50
-
-
A1-08
Is Implementing DMARC Enough to Keep You Secure?
— Hidden Risks Revealed and Sustainable DMARC Operations Through Report Analysis-
Speaker
Honetsecurity K.K.
Principal Messaging Engineer
Yoshitaka Hirano
- Ransomware Countermeasures
- Email Security
- Phishing scam
Presented byHonetsecurity K.K.
-
Speaker
-
B1-08
2025: What did your company do for Email Security?
The reality of selecting, implementing, and operating DMARC, misdelivery prevention, and PPAP elimination-
Speaker
imatrix corp.
CEO
Hibiki Oka
- Ransomware Countermeasures
- Data Leakage Prevention
- Email Security
Presented byimatrix corp.
-
Speaker
-
C1-08
CSIRTs must not be isolated.
The way of to start a team that protects the organization and the power of community to build connections.-
Speaker
Nippon CSIRT Association
Fumie Watanabe
- PSIRT / CSIRT
- Human Resource Development
- Other
-
Speaker
-
-
16:05 | 16:45
-
-
A1-09
Is your system truly secure?
Efficient penetration testing to prevent business risks.
Explained using Cymulate as an example.-
Speaker
NTT Advanced Technology Corporation
Tetsushi Morita
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
Presented byNTT Advanced Technology Corporation
-
Speaker
-
B1-09
Internal fraud prevention and human risk management
-
Speaker
N&O Partners
Managing Partner
AttorneyLeona Ohki
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
- Monitoring / Detection
Presented byN&O Partners(Leo United Ginza Law Office)
-
Speaker
-
C1-09
Building Trust at Scale:
Preparing Certificate, Device, and AI Identity for the Next Wave of Security Challenges-
Speaker
Keyfactor
Field CTO VP,
Solution EngineeringEric Mizell
- Zero Trust
- AI Security
- Encryption / Certificates
- Intermediate
Presented byKeyfactor Inc.
-
Speaker
-
WS1-09
Are you confident in your security ?
~ Very introductory security audit workshop-
Speaker
Japan information security audit association,
gBrain Co., Ltd.
Toshitsugu Ota
- Security Audits / System Audits
- Human Resource Development
- Workshop
-
Speaker
-
-
17:00 | 17:40
-
-
A1-10
Learn from the 2025 cybersecurity Talent Market Through Data
― From the Latest ISC2 Survey-
Speaker
President, ISC2 Japan Chapter
Member,
APAC Advisory Council,Fumiko Noma, CISSP
- Human Resource Development
- Workstyle Innovation
- Other
- Intermediate
Presented byISC2, Inc.
-
Speaker
-
B1-10
Preparing for the Quantum Age:
Will Your Data Still Be Secure in Ten Years' Time?-
Speaker
SSH Communications Security
Solutions Engineering Director, APAC
Katsuhiro Shogawa
- Targeted Attacks / Cyber Attacks
- Encryption / Certificates
- Quantum Security
- Intermediate
Presented bySSH Communications Security Oyj
-
Speaker
-
C1-10
Ransomware defense strategy to protect the company.
- Comprehensive measures before and after infection --
Speaker
Metro, Inc.
Hideyuki Ishida
- Ransomware Countermeasures
- Endpoint Security
- Email Security
Presented byMetro, Inc.
-
Speaker
-
-
17:45 | 18:15
-
-
Closed
A1-11
Threats in Cyberspace
-Cyberattacks Country supported.-
Speaker
Public Security Intelligence Agency
Ippei Suyama
- Targeted Attacks / Cyber Attacks
-
Speaker
-
B1-11
The importance of public private partnerships in law enforcement in the United States
-
Speaker
Embassy of the United States of America in Japan
-
Speaker
-
C1-11
Hands-On Corporate Cyber Training for Ransomware and Phishing Attacks In Your Company
-
Speaker
NSHC Inc.
Director
Park Bumjoon
- Ransomware Countermeasures
- Data Leakage Prevention
- Human Resource Development
- Beginner
-
Speaker
-
-
18:30 | 19:30
-
-
A1-12
Coming soon
-
B1-12
CNAPP: Partnering with Japanese Enterprises
― Why Companies Keep Choosing Cloudbase: Insights from Long-Term Users- Cloud Security
Presented byCloudbase Inc.
-
C1-12
Shadow AI: Hunting the Unknowns Across Developer Tooling and Deployed Artifacts
-
Speaker
Cyfinoid Research
Anant Shrivastava
-
Speaker
-