Tokyo Session
東京講演
Search (possible multiple choice)
Keyword
3.25(Wed)
-
12:05 | 12:45
-
-
A2-05
Still there internal fraud : How should we approach This.
-
Speaker
Proofpoint Japan K.K.
Naoki Isomura
- Data Leakage Prevention
- Authentication / Identity Management
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
Presented byProofpoint Japan K.K.
-
Speaker
-
WS2-05
A Global Security Perspective on the Blind Spots in Japanese Corporate Culture
Information Leak Risks—and What “Real” Countermeasures Look Like-
Speaker
BlackBox Japan Inc.
Product Marketing
SpecialistMoeka Abe
- Data Leakage Prevention
- Zero Trust
- Monitoring / Detection
- Workshop
Presented byBlackBox Japan Inc.
-
Speaker
-
-
13:20 | 14:00
-
-
A2-06
The spread of Ransomware Attacks and the Critical Importance of Identity Security:
Frontline of Active Directory/Entra ID Defense-
Speaker
Tokyo Electron Device LTD
Yui Iida
- Ransomware Countermeasures
- Endpoint Security
- Authentication / Identity Management
Presented byTokyo Electron Device LTD
-
Speaker
-
B2-06
How to easily obtain 3 or 4 stars rating under the Ministry of Economy, Trade and Industry's "Supply Chain Security Assessment System" and break free from the security check spiral
-
Speaker
SOURCE POD, Inc.
CEO
Takeshi Yamamoto
- Security Audits / System Audits
- Human Resource Development
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
Presented bySourcePod, Inc.
-
Speaker
-
C2-06
Cybersecurity Measures Required in the Defense Industry
-
Speaker
Acquisition Technology and Logistics Agency
Industrial Cyber Security Office,
Equipment Security Management Division,
Department of Equipment Policy
DirectorYugo Matsumoto
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Security Audits / System Audits
-
Speaker
-
WS2-06
Coming soon
- Workshop
Presented byCloudbase Inc.
-
-
14:15 | 14:55
-
-
A2-07
Protecting organizations from ransomware
- Reforming password custom to prevent breaches × Controlling privileged IDs —-
Speaker
CTCP Corporation
Solution Development & Promotion Division
General Manager, Business Development DepartmentSayaka Kikuchi
-
Speaker
Keeper Security APAC K.K.
Asia Pacific Region
Lead of Sales EngineeringMasaki Ikehara
- Ransomware Countermeasures
- Authentication / Identity Management
- Software Supply Chain Attacks
Presented byKeeper Security APAC K.K.
-
Speaker
-
B2-07
The Reality of Supply Chain Attacks and measures
Achieving “Business without downtime” through “Cyber Resilience”-
Speaker
CyLeague Holdings
Hiroki Nambu
-
Speaker
Quest Co., Ltd.
Koichi Hatanaka
- Ransomware Countermeasures
- AI Security
- SOC / Incident Response
Presented byQuest Co., Ltd.
-
Speaker
-
C2-07
The Reality of AWS Security: Feedback from Field Analyst
-
Speaker
SHIFT SECURITY, Inc.
Koki Maeda
- Cloud Security
- SOC / Incident Response
- Monitoring / Detection
Presented bySHIFT SECURITY, Inc.
-
Speaker
-
WS2-07
How to Utilize the “Information Security Guidelines for Cloud Services” Published by the Ministry of Internal Affairs and Communications, and an Overview of the Information Disclosure Certification System
-
Speaker
ASP-SaaS- AI-IoT Cloud Industry Association
Toru Nakamura
-
Speaker
ASP-SaaS- AI-IoT Cloud Industry Association
Keiichi Iwata
- Cloud Security
- Workshop
-
Speaker
-
-
15:10 | 15:50
-
-
A2-08
Shadow IT & Attack Surface × Attacker-Perspective Intelligence
"Now the era ‘invisible assets’ become the greatest risk
— Proactive attack surface management achieved through attacker-perspective intelligence"-
Speaker
Zeami Cyber Security Co., Ltd.
Hideaki Sato
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Cloud Security
Presented byZeami Cyber Security Co., Ltd.
-
Speaker
-
B2-08
Ransomware frontline: Addressing the latest threats and vulnerabilities through dark web monitoring and attack surface management (ASM)
-
Speaker
SMS DataTech Corporation
Yuki Tokui
- Ransomware Countermeasures
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
Presented bySMS DataTech Corporation
-
Speaker
-
C2-08
Trends in Vulnerabilities and Security Improvement Insights from Security Assessments
-
Speaker
NEC Corporation
Risk Hunting Group,
Cyber Security Technology Department
AnalystHaruka Nakashima
- Beginner
-
Speaker
-
-
16:05 | 16:45
-
-
A2-09
How to prevent internal data leaks in the Cloud/SaaS Era?
-Balancing safe and security with AI-powered CASB × SIEM--
Speaker
Skygate Technologies Inc.
Hiroo Ohara
- Cloud Security
- Data Leakage Prevention
- Zero Trust
Presented bySkygate Technologies Inc.
-
Speaker
-
B2-09
Analysis of actual cyber incidents and countermeasures
-
Speaker
InfoSecure Solutions, Inc.
CEO
Tomoya Kumeta
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Managed Security Services
Presented byInfoSecure Solutions,Inc.
-
Speaker
-
C2-09
How we manage TLS/SSL certificate with the upcoming short validity period
-
Speaker
DigiCert Japan G.K.
Product Marketing
Product Marketing ManagerMasato Hayashi
- Authentication / Identity Management
- Encryption / Certificates
- Quantum Security
Presented byDigiCert Japan G.K.
-
Speaker
-
WS2-09
CI CD the keys to the kingdom and some more.
-
Cyfinoid Research
Anant Shrivastava
- Workshop
- Intermediate
-
-
-
17:00 | 17:40
-
-
A2-10
What are needed for security testing in AI and Cyber security regulations era?
-
Speaker
Black Duck Software G.K.
Sr. Tech Marketing Manager
Masato Matsuoka
- AI Security
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
- Application Security
- Beginner
Presented byBlack Duck Software G.K.
-
Speaker
-
B2-10
From “Implemented” to “Mastered” Security:
The essence of optimization—consolidating dispersed risks and strengthening defenses While reducing operational burden-
Speaker
Rapid7 Japan K.K
Japan CTO, CISSP, CISA
Katsuya Furukawa
- XDR
- SOC / Incident Response
- Managed Security Services
Presented byRapid7 Japan K.K.
-
Speaker
-
C2-10
Protecting SMBs from Invisible Threats:
How to Detect Leaked Credentials on the Dark Web and Build Your Security Strategy-
Speaker
ALPS SYSTEM INTEGRATION CO., LTD.
Product Marketing Sect.
ReaderTakuya Inoue
- Ransomware Countermeasures
- Zero Trust
- Monitoring / Detection
Presented byAlps System Integration Co., Ltd.
-
Speaker
-
-
17:45 | 18:15
-
-
A2-11
10 Major Security Threats and Basic Security Measures [For Organizations]
-
Speaker
Information-technology Promotion Agency, Japan
IT Security Center(ISEC) Cyber Situation Analysis Department
Yoshiharu Inoue
- Ransomware Countermeasures
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
- Beginner
-
Speaker
-
B2-11
Trade and Industry Initiatives to enhance cybersecurity measures across the Entire supply chain by Ministry of Economy
-
Speaker
Ministry of Economy, Trade and Industry
Satoshi Deguchi
-
Speaker
-
C2-11
Latest Developments in Quantum Safe and practical systems utilizing PQC and QKD
-
Speaker
NTT DOCOMO BUSINESS, Inc.
Innovation Center
Quantum Safe EvangelistYasutaka Morioka
- Encryption / Certificates
- Quantum Security
-
Speaker
-
-
18:30 | 19:30
-
-
A2-12
Coming soon
-
B2-12
Coming soon
Presented byAironWorks Co., Ltd.
-
C2-12
Preparing Trust Foundations for the Next Phase of Cryptographic Change
-
Speaker
Keyfactor
Global Channel Sales Leader
Senior Vice PresidentLouise McEvoy
- Zero Trust
- Encryption / Certificates
- Quantum Security
- Intermediate
Presented byKeyfactor Inc.
-
Speaker
-