iotc iotc

    • linkedin
    • facebook
    • twitter
    • YouTube
  • Register Now

  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Register Now

Tokyo Session

東京講演

  • All
  • 3.24(Tue)
  • 3.25(Wed)
  • 3.26(Thu)
  • 3.27(Fri)
  • lunch

Search (possible multiple choice)

Keyword

3.27(Fri)

  • RoomA
  • RoomB
  • RoomC
  • 5F
08:50 | 09:20
  • A4-01

    Cybersecurity Measures from the Network Side

    • Speaker

      Ministry of Internal Affairs and Communications

      Office of the Director-General for Cybersecurity
      Senior Planning Officer

      Takanori Umeki

    • IoT Security
    • Encryption / Certificates
    • Quantum Security
09:30 | 10:10
  • A4-02

    Break Free from the “Chaotic Firefighting” of Vulnerability Management!
    What Is Efficient AI-Powered Triage & ASM?

    • Speaker

      Aeye Security Lab Inc.

      Director& Business Planning Division

      Kazuma Abe

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • Application Security

    Presented byAeye Security Lab Inc.

10:20 | 11:00
  • A4-03

    Secure AI Without Fail: What It Really Takes to Protect AI

    • Speaker

      Cato Networks

      Global Product Marketing
      Product Marketing Manager

      Makiko Yamada

    • Zero Trust
    • AI Security
    • SASE (Secure Acess Service Edge)

    Presented byCato Networks (Japan) KK

  • WS4-03

    Fixing What’s Broken : One Line at a Time

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

    • Workshop
    • Beginner
11:10 | 11:50
  • A4-04

    Cybersecurity in the age of AI agents

    • Speaker

      Cloudflare Japan K. K.

      Field CTO / CISO

      Koichiro Otobe

    • Targeted Attacks / Cyber Attacks
    • Zero Trust
    • AI Security

    Presented byCloudflare Japan K. K.

12:05 | 12:45
  • A4-05

    AI-Driven Cybersecurity Innovation: Securing the Future with Symantec and Carbon Black

    • Speaker

      Broadcom Inc.

      Enterprise Security Group
      Global Product Management

      Alpesh Mote

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Cloud Security

    Presented byTD SYNNEX K.K.

  • WS4-05

    Introduction to Cybersecurity for SMEs: A Practical, Hands-On Workshop

    • Speaker

      Greater Tokyo Area Vitalization Association

      Digital Business Producer

      Naoki Ogawa

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Human Resource Development
    • Workshop
    • Beginner
12:55 | 13:35
  • A4-06

    Coming soon

    • Speaker

      Macnica, Inc.

      Yosei Harada

    • Speaker

      CyberArk Software Ltd.

      Yuichiro Suzuki

    • Targeted Attacks / Cyber Attacks
    • Zero Trust
    • Authentication / Identity Management

    Presented byMacnica, Inc.

  • WS4-06

    Experiencing Next-Generation Identity & Device Operations with Iru: A Practical Hands-On Session

    • Speaker

      ZUNDA Inc.

      CEO

      Sho Sawada

    • Endpoint Security
    • Zero Trust
    • Authentication / Identity Management
    • Workshop
    • Beginner

    Presented byZUNDA Inc.

14:10 | 14:50
  • A4-07

    The optimal solution for “managed EDR” and “incident response” against threats in the AI era

    • Speaker

      TechMatrix Corporation

      Shuya Nomura

    • Ransomware Countermeasures
    • SOC / Incident Response
    • Managed Security Services

    Presented byArctic Wolf Networks Inc. / TECHMATRIX CORPORATION

  • B4-07

    Coming soon

    Presented bySoliton Systems K.K.

  • C4-07

    Software Supply Chain Security with Docker:
    Balancing Business Agility and Security for Sustainable Container Development

    • Speaker

      Docker

      Solutions Engineering
      Strategic Solutions Engineer

      Tadashi Nemoto

    • SBOM (Software Bill of Materials)
    • Software Supply Chain Attacks
    • Container Security
  • WS4-07

    Defense Strategies to Neutralize Nation-State APT Attacks: Insights from Cyber Powerhouse South Korea

    • Workshop

    Presented by78researchlab

15:05 | 15:45
  • A4-08

    “The way to overcome shortages of staff in security operations”
    -How to optimize security operations with AI and automation-

    • Speaker

      TechMatrix Corporation

      Network Security Division
      Sales Department 2
      Network Products Sales Section 2
      Chief

      Kohei Suzuki

    • Cloud Security
    • SOC / Incident Response
    • Monitoring / Detection

    Presented byPalo Alto Networks, Inc. / TECHMATRIX CORPORATION

  • B4-08

    M365 Users must attend the lecture!
    Latest trends in Email misdelivery and the ultimate weapon for the “New Outlook”

    • Speaker

      SCSK Minori Solutions Corporation

      Kuniyasu Hayashi

    • Data Leakage Prevention
    • Email Security

    Presented bySCSK Minori Solutions Corporation

  • C4-08

    Plug in to a sterile workspace
    —anywhere. Sanitize threats harmless. Zero Compromise on your DX.

    • Speaker

      Menlo Security Japan K.K

      Data Security Specialist

      Ryo Nakatsuke

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Critical Infrastructure Security

    Presented byMenlo Security Japan K.K.

16:00 | 16:40
  • A4-09

    Is that access really human? Technology to visualize web attacks in the AI era with zero system impact
    -Next-generation standard for log analysis explained by WAF developers-

    • Speaker

      Bitforest Co.,Ltd.

      Tadashi Satoh

    • Vulnerability / Tampering Countermeasures
    • Application Security

    Presented byBitforest Co.,Ltd.

  • B4-09

    Breaking free from outdated data erasure
    -“Deleting” has evolved this far-

    • Speaker

      Blancco Japan Inc. / Blancco Technology Group

      President & CEO / Regional Director, Japan

      Motoi Mimatsu

    • Data Leakage Prevention
    • Zero Trust
    • Security Audits / System Audits

    Presented byBlancco Japan Inc.

  • C4-09

    Resilience lessons to learn from Ukrainian critical infrastructure companies

    • Speaker

      NTT, Inc.

      Security and Trust Office,
      Chief Cybersecurity Strategist

      Mihoko Matsubara

    • Ransomware Countermeasures
    • Critical Infrastructure Security
  • WS4-09

    "What If It Happened Today?" A Hands-on Cyber Incident Response Tabletop Exercise
    - Learning Through Discussion and Experience -

    • Speaker

      Nippon CSIRT Association

      Incident Response Drilling WG
      Chief Examiner

      Hidenori Sakurai

    • Speaker

      Nippon CSIRT Association

      Incident Response Drilling WG
      Deputy Chief Examiner

      Yusuke Ide

    • Speaker

      Nippon CSIRT Association

      Incident Response Drilling WG Table-Top Exercise Methodology Review SubWG
      Chief Examiner

      Keisuke Ito

    • Speaker

      Nippon CSIRT Association

      Incident Response Drilling WG
      Deputy Chief Examiner

      Ayaka Miki

    • SOC / Incident Response
    • PSIRT / CSIRT
    • Human Resource Development
    • Workshop
16:55 | 17:35
  • A4-10

    Confronting evolving threats:The front lines of endpoint security
    -Perspectives for addressing recent large-scale cyber incidents

    • Speaker

      HP Japan Inc.

      Takashi Otsuyama

    • Ransomware Countermeasures
    • Endpoint Security
    • Zero Trust

    Presented byHP Japan Inc.

  • B4-10

    Coming soon

    Presented byKDDI CORPORATION

  • C4-10

    Why Do Corporate Security Measures Keep Getting Breached?
    AI-Powered Predictive Threat Detection: OPSWAT Alin Transforming the Front Lines of Ransomware Defense (TBD)

    • Speaker

      OPSWAT JAPAN

      Country Manager

      Atsushi Takamatsu

    • Ransomware Countermeasures
    • Application Security
17:40 | 18:10
  • A4-11

    Strengthening cybersecurity measures at Ports
    — Insights from training to confirm response procedures during terminal operation system disruptions—

    • Speaker

      Ministry of Land, Infrastructure, Transport and Tourism

      Tomohide Sugimoto

    • Critical Infrastructure Security
    • Other
  • B4-11

    Global standardization updates on security in ITU-T SG17

    • Speaker

      NICT

      Quantum ICT Collaboration Center
      Senior innovation coordinator, ITU-T SG17 Q15 Rapporteur

      Kaoru Kenyoshi

    • Speaker

      Information Security Operation providers Group Japan (ISOG-J)
      Vice Director, WG6 leader

      SCSK Security Corp.
      Evangelist

      Shigenori Takei

    • Speaker

      KDDI Research, Inc.

      Usable Trust Laboratory
      Senior Manager

      Takamasa Isohara

    • AI Security
    • Quantum Security
    • Beginner
  • C4-11

    Ransomware Attacks as a Disaster, and the Heroes Who Fought Back.

    • Speaker

      Nikkei Inc.

      Senior Staff Writer

      Tatsuya Sudo

    • Ransomware Countermeasures
    • SOC / Incident Response
    • Human Resource Development
  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

[25年秋開催]Security Days Fall 2025

Copyright (c) NANO OPT Media, Inc. All rights reserved.