iotc iotc

    • linkedin
    • facebook
    • twitter
    • YouTube
  • Register Now

  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Register Now

Tokyo Session

東京講演

  • All
  • 3.24(Tue)
  • 3.25(Wed)
  • 3.26(Thu)
  • 3.27(Fri)
  • lunch

Search (possible multiple choice)

Keyword

3.25(Wed)

  • RoomA
  • RoomB
  • RoomC
  • 5F
08:50 | 09:20
  • A2-01

    Investigating the reality of ransomware groups through OSINT

    • Speaker

      Japan Hackers Association

      Takayuki Sugiura

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Other
09:30 | 10:10
  • A2-02

    How Preventive Cyber Risk Controls and Visibility Protect Business Continuity

    • Speaker

      Akamai Technologies GK

      Marketing
      Evangelist

      Kazuhiro Nakanishi

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust

    Presented byAkamai Technologies GK

10:20 | 11:00
  • A2-03

    Coming soon

    Presented bySilverfort PTE LTD

  • WS2-03

    Software Supply Chain Attacks - a silent killer

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

    • Workshop
    • Beginner
11:10 | 11:50
  • A2-04

    Making Zero Trust a Reality
    Getting Started with Agentless Microsegmentation

    • Speaker

      PIOLINK, Inc.

      Partner Sales & Marketing Dept.
      General Manager

      Taro Matsuda

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Managed Security Services

    Presented byPIOLINK, Inc.

12:05 | 12:45
  • A2-05

    Still there internal fraud : How should we approach This.

    • Speaker

      Proofpoint Japan K.K.

      Naoki Isomura

    • Data Leakage Prevention
    • Authentication / Identity Management
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends

    Presented byProofpoint Japan K.K.

  • WS2-05

    A Global Security Perspective on the Blind Spots in Japanese Corporate Culture
    Information Leak Risks—and What “Real” Countermeasures Look Like

    • Speaker

      BlackBox Japan Inc.

      Product Marketing
      Specialist

      Moeka Abe

    • Data Leakage Prevention
    • Zero Trust
    • Monitoring / Detection
    • Workshop

    Presented byBlackBox Japan Inc.

13:20 | 14:00
  • A2-06

    The spread of Ransomware Attacks and the Critical Importance of Identity Security:
    Frontline of Active Directory/Entra ID Defense

    • Speaker

      Tokyo Electron Device LTD

      Yui Iida

    • Ransomware Countermeasures
    • Endpoint Security
    • Authentication / Identity Management

    Presented byTokyo Electron Device LTD

  • B2-06

    How to easily obtain 3 or 4 stars rating under the Ministry of Economy, Trade and Industry's "Supply Chain Security Assessment System" and break free from the security check spiral

    • Speaker

      SOURCE POD, Inc.

      CEO

      Takeshi Yamamoto

    • Security Audits / System Audits
    • Human Resource Development
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends

    Presented bySourcePod, Inc.

  • C2-06

    Cybersecurity Measures Required in the Defense Industry

    • Speaker

      Acquisition Technology and Logistics Agency

      Industrial Cyber Security Office,
      Equipment Security Management Division,
      Department of Equipment Policy
      Director

      Yugo Matsumoto

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • Security Audits / System Audits
  • WS2-06

    Coming soon

    • Workshop

    Presented byCloudbase Inc.

14:15 | 14:55
  • A2-07

    Protecting organizations from ransomware
    - Reforming password custom to prevent breaches × Controlling privileged IDs —

    • Speaker

      CTCP Corporation

      Solution Development & Promotion Division
      General Manager, Business Development Department

      Sayaka Kikuchi

    • Speaker

      Keeper Security APAC K.K.

      Asia Pacific Region
      Lead of Sales Engineering

      Masaki Ikehara

    • Ransomware Countermeasures
    • Authentication / Identity Management
    • Software Supply Chain Attacks

    Presented byKeeper Security APAC K.K.

  • B2-07

    The Reality of Supply Chain Attacks and measures
    Achieving “Business without downtime” through “Cyber Resilience”

    • Speaker

      CyLeague Holdings

      Hiroki Nambu

    • Speaker

      Quest Co., Ltd.

      Koichi Hatanaka

    • Ransomware Countermeasures
    • AI Security
    • SOC / Incident Response

    Presented byQuest Co., Ltd.

  • C2-07

    The Reality of AWS Security: Feedback from Field Analyst

    • Speaker

      SHIFT SECURITY, Inc.

      Koki Maeda

    • Cloud Security
    • SOC / Incident Response
    • Monitoring / Detection

    Presented bySHIFT SECURITY, Inc.

  • WS2-07

    How to Utilize the “Information Security Guidelines for Cloud Services” Published by the Ministry of Internal Affairs and Communications, and an Overview of the Information Disclosure Certification System

    • Speaker

      ASP-SaaS- AI-IoT Cloud Industry Association

      Toru Nakamura

    • Speaker

      ASP-SaaS- AI-IoT Cloud Industry Association

      Keiichi Iwata

    • Cloud Security
    • Workshop
15:10 | 15:50
  • A2-08

    Shadow IT & Attack Surface × Attacker-Perspective Intelligence
    "Now the era ‘invisible assets’ become the greatest risk
    — Proactive attack surface management achieved through attacker-perspective intelligence"

    • Speaker

      Zeami Cyber Security Co., Ltd.

      Hideaki Sato

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Cloud Security

    Presented byZeami Cyber Security Co., Ltd.

  • B2-08

    Ransomware frontline: Addressing the latest threats and vulnerabilities through dark web monitoring and attack surface management (ASM)

    • Speaker

      SMS DataTech Corporation

      Yuki Tokui

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures

    Presented bySMS DataTech Corporation

  • C2-08

    Trends in Vulnerabilities and Security Improvement Insights from Security Assessments

    • Speaker

      NEC Corporation

      Risk Hunting Group,
      Cyber Security Technology Department
      Analyst

      Haruka Nakashima

    • Beginner
16:05 | 16:45
  • A2-09

    How to prevent internal data leaks in the Cloud/SaaS Era?
    -Balancing safe and security with AI-powered CASB × SIEM-

    • Speaker

      Skygate Technologies Inc.

      Hiroo Ohara

    • Cloud Security
    • Data Leakage Prevention
    • Zero Trust

    Presented bySkygate Technologies Inc.

  • B2-09

    Analysis of actual cyber incidents and countermeasures

    • Speaker

      InfoSecure Solutions, Inc.

      CEO

      Tomoya Kumeta

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Managed Security Services

    Presented byInfoSecure Solutions,Inc.

  • C2-09

    How we manage TLS/SSL certificate with the upcoming short validity period

    • Speaker

      DigiCert Japan G.K.

      Product Marketing
      Product Marketing Manager

      Masato Hayashi

    • Authentication / Identity Management
    • Encryption / Certificates
    • Quantum Security

    Presented byDigiCert Japan G.K.

  • WS2-09

    CI CD the keys to the kingdom and some more.

    • Cyfinoid Research

      Anant Shrivastava

    • Workshop
    • Intermediate
17:00 | 17:40
  • A2-10

    What are needed for security testing in AI and Cyber security regulations era?

    • Speaker

      Black Duck Software G.K.

      Sr. Tech Marketing Manager

      Masato Matsuoka

    • AI Security
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
    • Application Security
    • Beginner

    Presented byBlack Duck Software G.K.

  • B2-10

    From “Implemented” to “Mastered” Security:
    The essence of optimization—consolidating dispersed risks and strengthening defenses While reducing operational burden

    • Speaker

      Rapid7 Japan K.K

      Japan CTO, CISSP, CISA

      Katsuya Furukawa

    • XDR
    • SOC / Incident Response
    • Managed Security Services

    Presented byRapid7 Japan K.K.

  • C2-10

    Protecting SMBs from Invisible Threats:
    How to Detect Leaked Credentials on the Dark Web and Build Your Security Strategy

    • Speaker

      ALPS SYSTEM INTEGRATION CO., LTD.

      Product Marketing Sect.
      Reader

      Takuya Inoue

    • Ransomware Countermeasures
    • Zero Trust
    • Monitoring / Detection

    Presented byAlps System Integration Co., Ltd.

17:45 | 18:15
  • A2-11

    10 Major Security Threats and Basic Security Measures [For Organizations]

    • Speaker

      Information-technology Promotion Agency, Japan

      IT Security Center(ISEC) Cyber Situation Analysis Department

      Yoshiharu Inoue

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures
    • Beginner
  • B2-11

    Trade and Industry Initiatives to enhance cybersecurity measures across the Entire supply chain by Ministry of Economy

    • Speaker

      Ministry of Economy, Trade and Industry

      Satoshi Deguchi

  • C2-11

    Latest Developments in Quantum Safe and practical systems utilizing PQC and QKD

    • Speaker

      NTT DOCOMO BUSINESS, Inc.

      Innovation Center
      Quantum Safe Evangelist

      Yasutaka Morioka

    • Encryption / Certificates
    • Quantum Security
18:30 | 19:30
  • A2-12

    Coming soon

  • B2-12

    Coming soon

    Presented byAironWorks Co., Ltd.

  • C2-12

    Preparing Trust Foundations for the Next Phase of Cryptographic Change

    • Speaker

      Keyfactor

      Global Channel Sales Leader
      Senior Vice President

      Louise McEvoy

    • Zero Trust
    • Encryption / Certificates
    • Quantum Security
    • Intermediate

    Presented byKeyfactor Inc.

  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

[25年秋開催]Security Days Fall 2025

Copyright (c) NANO OPT Media, Inc. All rights reserved.