Tokyo Session
東京講演
Search (possible multiple choice)
Keyword
3.26(Thu)
-
10:20 | 11:00
-
-
A3-03
Cloud security transcends 'Borders'
-How to achieve fully integrated internal and external security with Wiz ASM-
Speaker
Wiz Cloud Japan K.K.
Principal Customer Engineer
Shogo Katsurada
Presented byWiz Cloud Japan K.K.
-
Speaker
-
WS3-03
Mapping SBOMs for Fun and Profit
-
Speaker
Cyfinoid Research
Anant Shrivastava
- Workshop
- Beginner
-
Speaker
-
-
13:20 | 14:00
-
-
A3-06
The Final Bastion: The Ideal State of Endpoint Security
-
Speaker
WithSecure Japan
Cyber Security Products and Services
Solution ArchitectKoji Ohta
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
- Intermediate
Presented byWithSecure KK
-
Speaker
-
B3-06
Inside IIJ’s ZTNA Adoption:
The ZTNA Approach That Delivers Both Comfort and Security for More Than 5,200 Employees-
Speaker
Internet Initiative Japan Inc.
DWP Solution Section
Business Promotion Department
Service Product Business DivisionKohei Matsuura
-
Speaker
Absolute Software K.K.
Senior Account Manager
Naoto Nishida
- Cloud Security
- Zero Trust
- Workstyle Innovation
Presented byAbsolute Software K.K. / Internet Initiative Japan Inc.
-
Speaker
-
C3-06
Battlefield Cyber, Part II :
Cyberwarfare in the Ukraine War and Endpoint Security-
Speaker
The National Institute for Defense Studies, Ministry of Defense
Global Security Division, Policy Studies Department
Senior Felow, Colonel, Ph.D (Security Studies)Kawamura Koki
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
-
Speaker
-
WS3-06
Coming soon
- Workshop
Presented byKeyfactor Inc.
-
-
14:15 | 14:55
-
-
A3-07
Coming soon
Presented bySoliton Systems K.K.
-
B3-07
Cyber attack countermeasures in the AI Era |
Automated verification from the attacker's perspective with Pentera-
Speaker
Pentera Security SG Pte Ltd.
Japan Country Manager
Mitchell DeBerdt
Presented byPentera Security SG Pte Ltd. / TECHMATRIX CORPORATION
-
Speaker
-
C3-07
Privileged ID management moves to the next stage
―The full scope of next-generation privileged access management with password protection and network control-
Speaker
Encourage Technologies Co., Ltd.
Yoshiharu Hioki
- Ransomware Countermeasures
- Zero Trust
- Authentication / Identity Management
Presented byEncourage Technologies Co., Ltd.
-
Speaker
-
WS3-07
What's the next step after your EDR has been breached?
Experience-based zero trust segmentation using ColorTokens' Xshield based on case studies.-
Speaker
Denkosha Inc.
Professional Servies
ManagerIshibashi Masahiko
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Zero Trust
- Workshop
- Beginner
Presented byDENKOSHA Corporation
-
Speaker
-
-
15:10 | 15:50
-
-
A3-08
Toward a Network That “Contains” Attacks
— Case Studies of Zero Networks Enabling Easy Zero Trust Implementation in Internal Environments —-
Speaker
Marubeni I-DIGIO Group
Atsushi Kobayashi
-
Speaker
Zero Networks ltd
Yasunori Koda
- Ransomware Countermeasures
- Zero Trust
- Critical Infrastructure Security
Presented byMarubeni I-DIGIO Group
-
Speaker
-
B3-08
"Log Management as a Pillar of Security Incident Response: What Future Approaches to Log Utilization Will Be Required?"
-
Speaker
Infoscience Inc.
Product Division, Cybersecurity Consulting Team
Team LeaderShotaro Abiru
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Security Audits / System Audits
Presented byInfoscience Corporation
-
Speaker
-
C3-08
Security Strategies for AI and Ransomware Through the Eyes of Attackers
-
Speaker
Hitachi Solutions, Ltd.
Managed Security Service Department
Chief Security AnalystMomoko Aoyama
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- AI Security
-
Speaker
-
-
16:05 | 16:45
-
-
A3-09
An Available Way to Enhance User Authentication Methods Using Cisco Duo for a Small IT Department
-
Speaker
NTT DATA Luweave Corporation
Tatsuro Okisasaki
-
Speaker
Cisco Systems, G.K.
Hiroki Hata
- Endpoint Security
- Zero Trust
- Authentication / Identity Management
Presented byNTT DATA Luweave Corporation
-
Speaker
-
B3-09
How to integrate fragmented security measures:
Co-managed solution combining "MDR technology and Top analysts” with customers-
Speaker
NTT Security Japan KK
Managed Security Services
Senior Vice PresidentKeiichi Yokoyama
- XDR
- SOC / Incident Response
- Managed Security Services
Presented byNTT Security (Japan) KK
-
Speaker
-
C3-09
The path to threat intelligence
- Security Strategy for Anticipating Attacks --
Speaker
Information Development Co., Ltd.
Cyber Security Solutions Department
Technical SpecialistTakeshi Aoyama
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
Presented byINFORMATION DEVELOPMENT CO., LTD.
-
Speaker
-
WS3-09
Digital transformation is essential for enhancing Japan's international competitiveness, and why plus security human resources are indispensable for achieving this
~Are even these types of people considered security professionals now?~-
Speaker
Professional University of Information and Management for Innovation
Professor
Toshihiro Hirayama
- Human Resource Development
- Workshop
- Intermediate
-
Speaker
-
-
17:00 | 17:40
-
-
A3-10
Proven Success Against the Trending Ransomware “Qilin”!
A Defense Strategy Beyond the Limits of EDR, Built with the Ransomware Countermeasure Platform “Halcyon”-
Speaker
TAKACHIHO KOHEKI CO., LTD.
Yusuke Hasunuma
- Ransomware Countermeasures
- Cloud Security
- Endpoint Security
Presented byTAKACHIHO KOHEKI CO., LTD.
-
Speaker
-
B3-10
Universal Security Measures That Remain Firm Against Sophisticated Cyber Threats:
IT Trends in South Korea, Where Investment in Data Security Continues-
Speaker
Penta Security K.K.
Security Consulting Dept.
Principal Security Consultant, CISSPTakashi Minobe
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Encryption / Certificates
Presented byPenta Security K.K.
-
Speaker
-
C3-10
Are you prepared for insider threats?
-Comprehensive guide to the importance and pitfalls of privileged ID management--
Speaker
Bosco Technologies
SMART Gateway Business Group
Sales Division II
General ManagerKazutoshi Tatebe
-
Speaker
Bosco Technologies
SMART Gateway Business Group
SG Business Development Division
ManagerTakuya Sawano
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
- Authentication / Identity Management
Presented byBOSCO Technologies Inc.
-
Speaker
-
-
17:45 | 18:15
-
-
A3-11
Strengthening cybersecurity in the financial field
-Threats facing Japanese financial field and the financial services agency's measures to enhance cybersecurity at financial institutions--
Speaker
Financial Services Agency
Mitsuhiko Komura
- Critical Infrastructure Security
- Human Resource Development
- Quantum Security
-
Speaker
-
B3-11
Resilience Building to Hybrid Threat
-
Speaker
Organization for Cyber Defense Innovation
Director
Akihiro Fujii
- Monitoring / Detection
- Human Resource Development
- Other
- Advanced
-
Speaker
-
C3-11
Legal Risk Management for Information Security in the Age of Escalating Cyber Incidents
— Preparing for and Responding to Crises-
Speaker
Mori Hamada & Matsumoto
Partner
Atsushi Okada
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Data Leakage Prevention
-
Speaker
-
-
18:30 | 19:30
-
-
A3-12
Using AI and Microsoft 365 Safely:
Controllable Security Instead of Blocking- Data Leakage Prevention
- Zero Trust
- Workstyle Innovation
Presented bySOFTCAMP Co.Ltd
-
B3-12
Coming soon
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Human Resource Development
Presented byLRM, Inc.
-
C3-12
Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
-
Speaker
Cyfinoid Research
Anant Shrivastava
-
Speaker
-