iotc iotc

    • linkedin
    • facebook
    • twitter
    • YouTube
  • Register Now

  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Register Now

Tokyo Session

東京講演

  • All
  • 3.24(Tue)
  • 3.25(Wed)
  • 3.26(Thu)
  • 3.27(Fri)
  • simultaneous interpreting

  • lunch

Search (possible multiple choice)

Keyword

3.26(Thu)

  • RoomA
  • RoomB
  • RoomC
  • 5F
08:50 | 09:20
  • A3-01

    Cyber threat landscape and police initiatives

    • Speaker

      National Police Agency

      Yosuke Nakagawa

    • Ransomware Countermeasures
    • Phishing scam
09:30 | 10:10
  • A3-02

    Why Organizations Fail to Recover Quickly from Cyber Incidents:
    Analyzing Case Studies to Understand Recovery Challenges and Implement Effective Cyber Recovery Strategies

    • Speaker

      Rubrik Japan

      Sales Engineering
      Head of Sales Engineering

      Daishi Nakai

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust

    Presented byRubrik Japan K.K.

10:20 | 11:00
  • A3-03

    Cloud security transcends 'Borders'
    -How to achieve fully integrated internal and external security with Wiz ASM

    • Speaker

      Wiz Cloud Japan K.K.

      Principal Customer Engineer

      Shogo Katsurada

    Presented byWiz Cloud Japan K.K.

  • WS3-03

    Mapping SBOMs for Fun and Profit

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

    • Workshop
    • Beginner
11:10 | 11:50
  • A3-04

    Latest Countermeasures Against Cross-Domain Attacks Including Ransomware

    • Speaker

      CrowdStrike Japan GK

      Sales Engineering Dept,
      Manager

      Michio Mori

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security

    Presented byCrowdStrike Japan GK

12:05 | 12:45
  • A3-05

    Secure AI agent utilization and shadow AI countermeasures with Chrome Enterprise

    • Speaker

      Google Japan G.K.

      Yoshikazu Suzuki

    • Endpoint Security
    • Zero Trust
    • AI Security

    Presented byGoogle Japan G.K.

  • WS3-05

    Coming soon

    • Workshop
13:20 | 14:00
  • A3-06

    The Final Bastion: The Ideal State of Endpoint Security

    • Speaker

      WithSecure Japan

      Cyber Security Products and Services
      Solution Architect

      Koji Ohta

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security
    • Intermediate

    Presented byWithSecure KK

  • B3-06

    Inside IIJ’s ZTNA Adoption:
    The ZTNA Approach That Delivers Both Comfort and Security for More Than 5,200 Employees

    • Speaker

      Internet Initiative Japan Inc.

      DWP Solution Section
      Business Promotion Department
      Service Product Business Division

      Kohei Matsuura

    • Speaker

      Absolute Software K.K.

      Senior Account Manager

      Naoto Nishida

    • Cloud Security
    • Zero Trust
    • Workstyle Innovation

    Presented byAbsolute Software K.K. / Internet Initiative Japan Inc.

  • C3-06

    Battlefield Cyber, Part II :
    Cyberwarfare in the Ukraine War and Endpoint Security

    • Speaker

      The National Institute for Defense Studies, Ministry of Defense

      Global Security Division, Policy Studies Department
      Senior Felow, Colonel, Ph.D (Security Studies)

      Kawamura Koki

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security
  • WS3-06

    Coming soon

    • Workshop

    Presented byKeyfactor Inc.

14:15 | 14:55
  • A3-07

    Coming soon

    Presented bySoliton Systems K.K.

  • B3-07

    Cyber attack countermeasures in the AI Era |
    Automated verification from the attacker's perspective with Pentera

    • Speaker

      Pentera Security SG Pte Ltd.

      Japan Country Manager

      Mitchell DeBerdt

    Presented byPentera Security SG Pte Ltd. / TECHMATRIX CORPORATION

  • C3-07

    Privileged ID management moves to the next stage
    ―The full scope of next-generation privileged access management with password protection and network control

    • Speaker

      Encourage Technologies Co., Ltd.

      Yoshiharu Hioki

    • Ransomware Countermeasures
    • Zero Trust
    • Authentication / Identity Management

    Presented byEncourage Technologies Co., Ltd.

  • WS3-07

    What's the next step after your EDR has been breached?
    Experience-based zero trust segmentation using ColorTokens' Xshield based on case studies.

    • Speaker

      Denkosha Inc.

      Professional Servies
      Manager

      Ishibashi Masahiko

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust
    • Workshop
    • Beginner

    Presented byDENKOSHA Corporation

15:10 | 15:50
  • A3-08

    Toward a Network That “Contains” Attacks
    — Case Studies of Zero Networks Enabling Easy Zero Trust Implementation in Internal Environments —

    • Speaker

      Marubeni I-DIGIO Group

      Atsushi Kobayashi

    • Speaker

      Zero Networks ltd

      Yasunori Koda

    • Ransomware Countermeasures
    • Zero Trust
    • Critical Infrastructure Security

    Presented byMarubeni I-DIGIO Group

  • B3-08

    "Log Management as a Pillar of Security Incident Response: What Future Approaches to Log Utilization Will Be Required?"

    • Speaker

      Infoscience Inc.

      Product Division, Cybersecurity Consulting Team
      Team Leader

      Shotaro Abiru

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • Security Audits / System Audits

    Presented byInfoscience Corporation

  • C3-08

    Security Strategies for AI and Ransomware Through the Eyes of Attackers

    • Speaker

      Hitachi Solutions, Ltd.

      Managed Security Service Department
      Chief Security Analyst

      Momoko Aoyama

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • AI Security
16:05 | 16:45
  • A3-09

    An Available Way to Enhance User Authentication Methods Using Cisco Duo for a Small IT Department

    • Speaker

      NTT DATA Luweave Corporation

      Tatsuro Okisasaki

    • Speaker

      Cisco Systems, G.K.

      Hiroki Hata

    • Endpoint Security
    • Zero Trust
    • Authentication / Identity Management

    Presented byNTT DATA Luweave Corporation

  • B3-09

    How to integrate fragmented security measures:
    Co-managed solution combining "MDR technology and Top analysts” with customers

    • Speaker

      NTT Security Japan KK

      Managed Security Services
      Senior Vice President

      Keiichi Yokoyama

    • XDR
    • SOC / Incident Response
    • Managed Security Services

    Presented byNTT Security (Japan) KK

  • C3-09

    The path to threat intelligence
    - Security Strategy for Anticipating Attacks -

    • Speaker

      Information Development Co., Ltd.

      Cyber ​​Security Solutions Department
      Technical Specialist

      Takeshi Aoyama

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures

    Presented byINFORMATION DEVELOPMENT CO., LTD.

  • WS3-09

    Digital transformation is essential for enhancing Japan's international competitiveness, and why plus security human resources are indispensable for achieving this
    ~Are even these types of people considered security professionals now?~

    • Speaker

      Professional University of Information and Management for Innovation

      Professor

      Toshihiro Hirayama

    • Human Resource Development
    • Workshop
    • Intermediate
17:00 | 17:40
  • A3-10

    Proven Success Against the Trending Ransomware “Qilin”!
    A Defense Strategy Beyond the Limits of EDR, Built with the Ransomware Countermeasure Platform “Halcyon”

    • Speaker

      TAKACHIHO KOHEKI CO., LTD.

      Yusuke Hasunuma

    • Ransomware Countermeasures
    • Cloud Security
    • Endpoint Security

    Presented byTAKACHIHO KOHEKI CO., LTD.

  • B3-10

    Universal Security Measures That Remain Firm Against Sophisticated Cyber Threats:
    IT Trends in South Korea, Where Investment in Data Security Continues

    • Speaker

      Penta Security K.K.

      Security Consulting Dept.
      Principal Security Consultant, CISSP

      Takashi Minobe

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • Encryption / Certificates

    Presented byPenta Security K.K.

  • C3-10

    Are you prepared for insider threats?
    -Comprehensive guide to the importance and pitfalls of privileged ID management-

    • Speaker

      Bosco Technologies

      SMART Gateway Business Group
      Sales Division II
      General Manager

      Kazutoshi Tatebe

    • Speaker

      Bosco Technologies

      SMART Gateway Business Group
      SG Business Development Division
      Manager

      Takuya Sawano

    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures
    • Authentication / Identity Management

    Presented byBOSCO Technologies Inc.

17:45 | 18:15
  • A3-11

    Strengthening cybersecurity in the financial field
    -Threats facing Japanese financial field and the financial services agency's measures to enhance cybersecurity at financial institutions-

    • Speaker

      Financial Services Agency

      Mitsuhiko Komura

    • Critical Infrastructure Security
    • Human Resource Development
    • Quantum Security
  • B3-11

    Resilience Building to Hybrid Threat

    • Speaker

      Organization for Cyber Defense Innovation

      Director

      Akihiro Fujii

    • Monitoring / Detection
    • Human Resource Development
    • Other
    • Advanced
  • C3-11

    Legal Risk Management for Information Security in the Age of Escalating Cyber Incidents
    — Preparing for and Responding to Crises

    • Speaker

      Mori Hamada & Matsumoto

      Partner

      Atsushi Okada

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Data Leakage Prevention
18:30 | 19:30
  • A3-12

    Using AI and Microsoft 365 Safely:
    Controllable Security Instead of Blocking

    • Data Leakage Prevention
    • Zero Trust
    • Workstyle Innovation

    Presented bySOFTCAMP Co.Ltd

  • B3-12

    Coming soon

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Human Resource Development

    Presented byLRM, Inc.

  • C3-12

    Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

[25年秋開催]Security Days Fall 2025

Copyright (c) NANO OPT Media, Inc. All rights reserved.