Tokyo Session
東京講演
Search (possible multiple choice)
Keyword
3.24(Tue)
-
10:20 | 11:00
-
-
A1-03
Prepare for Ransomware Attacks!
The Role of Active Cyber Defense in Today’s Threat Landscape-
Speaker
Fortinet Japan G.K.
Product Marketing Manager
Fumiaki Ito
- Ransomware Countermeasures
Presented byFortinet Japan G.K.
-
Speaker
-
WS1-03
Attacking Cloud Misconfigurations
-
Speaker
Cyfinoid Research
Anant Shrivastava
- Workshop
- Intermediate
-
Speaker
-
-
12:05 | 12:45
-
-
A1-05
A Roadmap to Mastering Cloud Security: Lessons from Japanese Enterprise Case Studies
-
Speaker
Cloudbase Inc.
CEO
Koya Iwasa
- Cloud Security
- Vulnerability / Tampering Countermeasures
- SBOM (Software Bill of Materials)
Presented byCloudbase Inc.
-
Speaker
-
WS1-05
Coming soon
-
Speaker
Aeye Security Lab Inc.
Presales Leader, CX Division
Takahiro Takahashi
- Cloud Security
- Vulnerability / Tampering Countermeasures
- Application Security
- Workshop
Presented byAeye Security Lab Inc.
-
Speaker
-
-
13:20 | 14:00
-
-
A1-06
Before Unmanaged Assets Become Attack Vectors
— Enabling ASM with AI —-
Speaker
UBsecure, Inc.
Product Division,
Product Business Promotion DepartmentToyohiro Hotta
- Ransomware Countermeasures
- Vulnerability / Tampering Countermeasures
- Software Supply Chain Attacks
Presented byUBsecure, Inc.
-
Speaker
-
B1-06
From “Wait and Lose” to Proactive Defense:
Ransomware Containment Strategies Using Dark Web Intelligence and Active Cyber Defense (ACD/CTI/CTEM) (Draft Title)-
Speaker
KELA Co., Ltd
Principal Security Engineer
Makoto Kawasaki
-
Speaker
ULTRA RED, Ltd.
Regional Product Manager
Kenichiro Hashimoto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Data Leakage Prevention
Presented byKela K.K.
-
Speaker
-
C1-06
Rethinking Security as Business Operations:
What you can do now, What you can achieve (Tentative Title)-
Speaker
JNSA(Japan Network Security Association)
Vice Chairman, CISO Support Working Group Leader
Masakazu Takahashi
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
-
Speaker
-
WS1-06
Coming soon
-
Speaker
Illumio Japan G.K.
Jun Fukumoto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Zero Trust
- Workshop
Presented byIllumio Japan G.K.
-
Speaker
-
-
14:15 | 14:55
-
-
A1-07
Protecting Internal Networks using WIPS
-
Speaker
KORNIC GLORY CO.,Ltd.
Manager,
Wired Technology TeamChang Minseon
- Data Leakage Prevention
- Monitoring / Detection
Presented byKornic Glory Co.,Ltd.
-
Speaker
-
B1-07
Three Reasons Why Supply Chain Security Stalls in Practice
— Toward a Sustainable, Practical Approach Based on the SCS Evaluation Framework-
Speaker
Soliton Systems K.K.
IT Security Business Unit
EvangelistShoko Araki
- Data Leakage Prevention
- Zero Trust
- Authentication / Identity Management
- Intermediate
Presented bySoliton Systems K.K.
-
Speaker
-
C1-07
SaaS Security Blind Spots: The Risks of Hidden AI
~ A Practical Guide on What to Evaluate and Why ~-
Speaker
Assured, Inc.
Yuya Ueki
- Cloud Security
- Vulnerability / Tampering Countermeasures
Presented byAssured, Inc.
-
Speaker
-
WS1-07
Coming soon
- Workshop
Presented byB Manifold,Inc.
-
-
15:10 | 15:50
-
-
A1-08
Is Implementing DMARC Enough to Keep You Secure?
— Hidden Risks Revealed and Sustainable DMARC Operations Through Report Analysis-
Speaker
Honetsecurity K.K.
Principal Messaging Engineer
Yoshitaka Hirano
- Ransomware Countermeasures
- Email Security
- Phishing scam
Presented byHonetsecurity K.K.
-
Speaker
-
B1-08
2025: What did your company do for Email Security?
The reality of selecting, implementing, and operating DMARC, misdelivery prevention, and PPAP elimination-
Speaker
imatrix corp.
CEO
Hibiki Oka
- Ransomware Countermeasures
- Data Leakage Prevention
- Email Security
Presented byimatrix corp.
-
Speaker
-
C1-08
CSIRTs must not be isolated.
The way of to start a team that protects the organization and the power of community to build connections.-
Speaker
Nippon CSIRT Association
Fumie Watanabe
- PSIRT / CSIRT
- Human Resource Development
- Other
-
Speaker
-
-
16:05 | 16:45
-
-
A1-09
Is your system truly secure?
Efficient penetration testing to prevent business risks.
Explained using Cymulate as an example.-
Speaker
NTT Advanced Technology Corporation
Tetsushi Morita
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
Presented byNTT Advanced Technology Corporation
-
Speaker
-
B1-09
Internal fraud prevention and human risk management
-
Speaker
N&O Partners
Managing Partner
AttorneyLeona Ohki
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
- Monitoring / Detection
Presented byN&O Partners(Leo United Ginza Law Office)
-
Speaker
-
C1-09
Building Trust at Scale:
Preparing Certificate, Device, and AI Identity for the Next Wave of Security Challenges-
Speaker
Keyfactor
Field CTO VP,
Solution EngineeringEric Mizell
- Zero Trust
- AI Security
- Encryption / Certificates
- Intermediate
Presented byKeyfactor Inc.
-
Speaker
-
WS1-09
Are you confident in your security ?
~ Very introductory security audit workshop-
Speaker
Japan information security audit association,
gBrain Co., Ltd.
Toshitsugu Ota
- Security Audits / System Audits
- Human Resource Development
- Workshop
-
Speaker
-
-
17:00 | 17:40
-
-
A1-10
Learn from the 2025 cybersecurity Talent Market Through Data
― From the Latest ISC2 Survey-
Speaker
President, ISC2 Japan Chapter
Member,
APAC Advisory Council,Fumiko Noma, CISSP
- Human Resource Development
- Workstyle Innovation
- Other
- Intermediate
Presented byISC2, Inc.
-
Speaker
-
B1-10
Preparing for the Quantum Age:
Will Your Data Still Be Secure in Ten Years' Time?-
Speaker
SSH Communications Security
Solutions Engineering Director, APAC
Katsuhiro Shogawa
- Targeted Attacks / Cyber Attacks
- Encryption / Certificates
- Quantum Security
- Intermediate
Presented bySSH Communications Security Oyj
-
Speaker
-
C1-10
Ransomware defense strategy to protect the company.
- Comprehensive measures before and after infection --
Speaker
Metro, Inc.
Hideyuki Ishida
- Ransomware Countermeasures
- Endpoint Security
- Email Security
Presented byMetro, Inc.
-
Speaker
-
-
17:45 | 18:15
-
-
Closed
A1-11
Threats in Cyberspace
-Cyberattacks Country supported.-
Speaker
Public Security Intelligence Agency
Ippei Suyama
- Targeted Attacks / Cyber Attacks
-
Speaker
-
B1-11
The importance of public private partnerships in law enforcement in the United States
-
Speaker
Embassy of the United States of America in Japan
-
Speaker
-
C1-11
Hands-On Corporate Cyber Training for Ransomware and Phishing Attacks In Your Company
-
Speaker
NSHC Inc.
Director
Park Bumjoon
- Ransomware Countermeasures
- Data Leakage Prevention
- Human Resource Development
- Beginner
-
Speaker
-
-
18:30 | 19:30
-
-
A1-12
Coming soon
-
B1-12
CNAPP: Partnering with Japanese Enterprises
― Why Companies Keep Choosing Cloudbase: Insights from Long-Term Users- Cloud Security
Presented byCloudbase Inc.
-
C1-12
Shadow AI: Hunting the Unknowns Across Developer Tooling and Deployed Artifacts
-
Speaker
Cyfinoid Research
Anant Shrivastava
-
Speaker
-
3.25(Wed)
-
12:05 | 12:45
-
-
A2-05
Still there internal fraud : How should we approach This.
-
Speaker
Proofpoint Japan K.K.
Naoki Isomura
- Data Leakage Prevention
- Authentication / Identity Management
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
Presented byProofpoint Japan K.K.
-
Speaker
-
WS2-05
A Global Security Perspective on the Blind Spots in Japanese Corporate Culture
Information Leak Risks—and What “Real” Countermeasures Look Like-
Speaker
BlackBox Japan Inc.
Product Marketing
SpecialistMoeka Abe
- Data Leakage Prevention
- Zero Trust
- Monitoring / Detection
- Workshop
Presented byBlackBox Japan Inc.
-
Speaker
-
-
13:20 | 14:00
-
-
A2-06
The spread of Ransomware Attacks and the Critical Importance of Identity Security:
Frontline of Active Directory/Entra ID Defense-
Speaker
Tokyo Electron Device LTD
Yui Iida
- Ransomware Countermeasures
- Endpoint Security
- Authentication / Identity Management
Presented byTokyo Electron Device LTD
-
Speaker
-
B2-06
How to easily obtain 3 or 4 stars rating under the Ministry of Economy, Trade and Industry's "Supply Chain Security Assessment System" and break free from the security check spiral
-
Speaker
SOURCE POD, Inc.
CEO
Takeshi Yamamoto
- Security Audits / System Audits
- Human Resource Development
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
Presented bySourcePod, Inc.
-
Speaker
-
C2-06
Cybersecurity Measures Required in the Defense Industry
-
Speaker
Acquisition Technology and Logistics Agency
Industrial Cyber Security Office,
Equipment Security Management Division,
Department of Equipment Policy
DirectorYugo Matsumoto
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Security Audits / System Audits
-
Speaker
-
WS2-06
Coming soon
- Workshop
Presented byCloudbase Inc.
-
-
14:15 | 14:55
-
-
A2-07
Protecting organizations from ransomware
- Reforming password custom to prevent breaches × Controlling privileged IDs —-
Speaker
CTCP Corporation
Solution Development & Promotion Division
General Manager, Business Development DepartmentSayaka Kikuchi
-
Speaker
Keeper Security APAC K.K.
Asia Pacific Region
Lead of Sales EngineeringMasaki Ikehara
- Ransomware Countermeasures
- Authentication / Identity Management
- Software Supply Chain Attacks
Presented byKeeper Security APAC K.K.
-
Speaker
-
B2-07
The Reality of Supply Chain Attacks and measures
Achieving “Business without downtime” through “Cyber Resilience”-
Speaker
CyLeague Holdings
Hiroki Nambu
-
Speaker
Quest Co., Ltd.
Koichi Hatanaka
- Ransomware Countermeasures
- AI Security
- SOC / Incident Response
Presented byQuest Co., Ltd.
-
Speaker
-
C2-07
The Reality of AWS Security: Feedback from Field Analyst
-
Speaker
SHIFT SECURITY, Inc.
Koki Maeda
- Cloud Security
- SOC / Incident Response
- Monitoring / Detection
Presented bySHIFT SECURITY, Inc.
-
Speaker
-
WS2-07
How to Utilize the “Information Security Guidelines for Cloud Services” Published by the Ministry of Internal Affairs and Communications, and an Overview of the Information Disclosure Certification System
-
Speaker
ASP-SaaS- AI-IoT Cloud Industry Association
Toru Nakamura
-
Speaker
ASP-SaaS- AI-IoT Cloud Industry Association
Keiichi Iwata
- Cloud Security
- Workshop
-
Speaker
-
-
15:10 | 15:50
-
-
A2-08
Shadow IT & Attack Surface × Attacker-Perspective Intelligence
"Now the era ‘invisible assets’ become the greatest risk
— Proactive attack surface management achieved through attacker-perspective intelligence"-
Speaker
Zeami Cyber Security Co., Ltd.
Hideaki Sato
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Cloud Security
Presented byZeami Cyber Security Co., Ltd.
-
Speaker
-
B2-08
Ransomware frontline: Addressing the latest threats and vulnerabilities through dark web monitoring and attack surface management (ASM)
-
Speaker
SMS DataTech Corporation
Yuki Tokui
- Ransomware Countermeasures
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
Presented bySMS DataTech Corporation
-
Speaker
-
C2-08
Trends in Vulnerabilities and Security Improvement Insights from Security Assessments
-
Speaker
NEC Corporation
Risk Hunting Group,
Cyber Security Technology Department
AnalystHaruka Nakashima
- Beginner
-
Speaker
-
-
16:05 | 16:45
-
-
A2-09
How to prevent internal data leaks in the Cloud/SaaS Era?
-Balancing safe and security with AI-powered CASB × SIEM--
Speaker
Skygate Technologies Inc.
Hiroo Ohara
- Cloud Security
- Data Leakage Prevention
- Zero Trust
Presented bySkygate Technologies Inc.
-
Speaker
-
B2-09
Analysis of actual cyber incidents and countermeasures
-
Speaker
InfoSecure Solutions, Inc.
CEO
Tomoya Kumeta
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Managed Security Services
Presented byInfoSecure Solutions,Inc.
-
Speaker
-
C2-09
How we manage TLS/SSL certificate with the upcoming short validity period
-
Speaker
DigiCert Japan G.K.
Product Marketing
Product Marketing ManagerMasato Hayashi
- Authentication / Identity Management
- Encryption / Certificates
- Quantum Security
Presented byDigiCert Japan G.K.
-
Speaker
-
WS2-09
CI CD the keys to the kingdom and some more.
-
Cyfinoid Research
Anant Shrivastava
- Workshop
- Intermediate
-
-
-
17:00 | 17:40
-
-
A2-10
What are needed for security testing in AI and Cyber security regulations era?
-
Speaker
Black Duck Software G.K.
Sr. Tech Marketing Manager
Masato Matsuoka
- AI Security
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
- Application Security
- Beginner
Presented byBlack Duck Software G.K.
-
Speaker
-
B2-10
From “Implemented” to “Mastered” Security:
The essence of optimization—consolidating dispersed risks and strengthening defenses While reducing operational burden-
Speaker
Rapid7 Japan K.K
Japan CTO, CISSP, CISA
Katsuya Furukawa
- XDR
- SOC / Incident Response
- Managed Security Services
Presented byRapid7 Japan K.K.
-
Speaker
-
C2-10
Protecting SMBs from Invisible Threats:
How to Detect Leaked Credentials on the Dark Web and Build Your Security Strategy-
Speaker
ALPS SYSTEM INTEGRATION CO., LTD.
Product Marketing Sect.
ReaderTakuya Inoue
- Ransomware Countermeasures
- Zero Trust
- Monitoring / Detection
Presented byAlps System Integration Co., Ltd.
-
Speaker
-
-
17:45 | 18:15
-
-
A2-11
10 Major Security Threats and Basic Security Measures [For Organizations]
-
Speaker
Information-technology Promotion Agency, Japan
IT Security Center(ISEC) Cyber Situation Analysis Department
Yoshiharu Inoue
- Ransomware Countermeasures
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
- Beginner
-
Speaker
-
B2-11
Trade and Industry Initiatives to enhance cybersecurity measures across the Entire supply chain by Ministry of Economy
-
Speaker
Ministry of Economy, Trade and Industry
Satoshi Deguchi
-
Speaker
-
C2-11
Latest Developments in Quantum Safe and practical systems utilizing PQC and QKD
-
Speaker
NTT DOCOMO BUSINESS, Inc.
Innovation Center
Quantum Safe EvangelistYasutaka Morioka
- Encryption / Certificates
- Quantum Security
-
Speaker
-
-
18:30 | 19:30
-
-
A2-12
Coming soon
-
B2-12
Coming soon
Presented byAironWorks Co., Ltd.
-
C2-12
Preparing Trust Foundations for the Next Phase of Cryptographic Change
-
Speaker
Keyfactor
Global Channel Sales Leader
Senior Vice PresidentLouise McEvoy
- Zero Trust
- Encryption / Certificates
- Quantum Security
- Intermediate
Presented byKeyfactor Inc.
-
Speaker
-
3.26(Thu)
-
10:20 | 11:00
-
-
A3-03
Cloud security transcends 'Borders'
-How to achieve fully integrated internal and external security with Wiz ASM-
Speaker
Wiz Cloud Japan K.K.
Principal Customer Engineer
Shogo Katsurada
Presented byWiz Cloud Japan K.K.
-
Speaker
-
WS3-03
Mapping SBOMs for Fun and Profit
-
Speaker
Cyfinoid Research
Anant Shrivastava
- Workshop
- Beginner
-
Speaker
-
-
13:20 | 14:00
-
-
A3-06
The Final Bastion: The Ideal State of Endpoint Security
-
Speaker
WithSecure Japan
Cyber Security Products and Services
Solution ArchitectKoji Ohta
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
- Intermediate
Presented byWithSecure KK
-
Speaker
-
B3-06
Inside IIJ’s ZTNA Adoption:
The ZTNA Approach That Delivers Both Comfort and Security for More Than 5,200 Employees-
Speaker
Internet Initiative Japan Inc.
DWP Solution Section
Business Promotion Department
Service Product Business DivisionKohei Matsuura
-
Speaker
Absolute Software K.K.
Senior Account Manager
Naoto Nishida
- Cloud Security
- Zero Trust
- Workstyle Innovation
Presented byAbsolute Software K.K. / Internet Initiative Japan Inc.
-
Speaker
-
C3-06
Battlefield Cyber, Part II :
Cyberwarfare in the Ukraine War and Endpoint Security-
Speaker
The National Institute for Defense Studies, Ministry of Defense
Global Security Division, Policy Studies Department
Senior Felow, Colonel, Ph.D (Security Studies)Kawamura Koki
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
-
Speaker
-
WS3-06
Coming soon
- Workshop
Presented byKeyfactor Inc.
-
-
14:15 | 14:55
-
-
A3-07
Coming soon
Presented bySoliton Systems K.K.
-
B3-07
Cyber attack countermeasures in the AI Era |
Automated verification from the attacker's perspective with Pentera-
Speaker
Pentera Security SG Pte Ltd.
Japan Country Manager
Mitchell DeBerdt
Presented byPentera Security SG Pte Ltd. / TECHMATRIX CORPORATION
-
Speaker
-
C3-07
Privileged ID management moves to the next stage
―The full scope of next-generation privileged access management with password protection and network control-
Speaker
Encourage Technologies Co., Ltd.
Yoshiharu Hioki
- Ransomware Countermeasures
- Zero Trust
- Authentication / Identity Management
Presented byEncourage Technologies Co., Ltd.
-
Speaker
-
WS3-07
What's the next step after your EDR has been breached?
Experience-based zero trust segmentation using ColorTokens' Xshield based on case studies.-
Speaker
Denkosha Inc.
Professional Servies
ManagerIshibashi Masahiko
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Zero Trust
- Workshop
- Beginner
Presented byDENKOSHA Corporation
-
Speaker
-
-
15:10 | 15:50
-
-
A3-08
Toward a Network That “Contains” Attacks
— Case Studies of Zero Networks Enabling Easy Zero Trust Implementation in Internal Environments —-
Speaker
Marubeni I-DIGIO Group
Atsushi Kobayashi
-
Speaker
Zero Networks ltd
Yasunori Koda
- Ransomware Countermeasures
- Zero Trust
- Critical Infrastructure Security
Presented byMarubeni I-DIGIO Group
-
Speaker
-
B3-08
"Log Management as a Pillar of Security Incident Response: What Future Approaches to Log Utilization Will Be Required?"
-
Speaker
Infoscience Inc.
Product Division, Cybersecurity Consulting Team
Team LeaderShotaro Abiru
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Security Audits / System Audits
Presented byInfoscience Corporation
-
Speaker
-
C3-08
Security Strategies for AI and Ransomware Through the Eyes of Attackers
-
Speaker
Hitachi Solutions, Ltd.
Managed Security Service Department
Chief Security AnalystMomoko Aoyama
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- AI Security
-
Speaker
-
-
16:05 | 16:45
-
-
A3-09
An Available Way to Enhance User Authentication Methods Using Cisco Duo for a Small IT Department
-
Speaker
NTT DATA Luweave Corporation
Tatsuro Okisasaki
-
Speaker
Cisco Systems, G.K.
Hiroki Hata
- Endpoint Security
- Zero Trust
- Authentication / Identity Management
Presented byNTT DATA Luweave Corporation
-
Speaker
-
B3-09
How to integrate fragmented security measures:
Co-managed solution combining "MDR technology and Top analysts” with customers-
Speaker
NTT Security Japan KK
Managed Security Services
Senior Vice PresidentKeiichi Yokoyama
- XDR
- SOC / Incident Response
- Managed Security Services
Presented byNTT Security (Japan) KK
-
Speaker
-
C3-09
The path to threat intelligence
- Security Strategy for Anticipating Attacks --
Speaker
Information Development Co., Ltd.
Cyber Security Solutions Department
Technical SpecialistTakeshi Aoyama
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
Presented byINFORMATION DEVELOPMENT CO., LTD.
-
Speaker
-
WS3-09
Digital transformation is essential for enhancing Japan's international competitiveness, and why plus security human resources are indispensable for achieving this
~Are even these types of people considered security professionals now?~-
Speaker
Professional University of Information and Management for Innovation
Professor
Toshihiro Hirayama
- Human Resource Development
- Workshop
- Intermediate
-
Speaker
-
-
17:00 | 17:40
-
-
A3-10
Proven Success Against the Trending Ransomware “Qilin”!
A Defense Strategy Beyond the Limits of EDR, Built with the Ransomware Countermeasure Platform “Halcyon”-
Speaker
TAKACHIHO KOHEKI CO., LTD.
Yusuke Hasunuma
- Ransomware Countermeasures
- Cloud Security
- Endpoint Security
Presented byTAKACHIHO KOHEKI CO., LTD.
-
Speaker
-
B3-10
Universal Security Measures That Remain Firm Against Sophisticated Cyber Threats:
IT Trends in South Korea, Where Investment in Data Security Continues-
Speaker
Penta Security K.K.
Security Consulting Dept.
Principal Security Consultant, CISSPTakashi Minobe
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Encryption / Certificates
Presented byPenta Security K.K.
-
Speaker
-
C3-10
Are you prepared for insider threats?
-Comprehensive guide to the importance and pitfalls of privileged ID management--
Speaker
Bosco Technologies
SMART Gateway Business Group
Sales Division II
General ManagerKazutoshi Tatebe
-
Speaker
Bosco Technologies
SMART Gateway Business Group
SG Business Development Division
ManagerTakuya Sawano
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
- Authentication / Identity Management
Presented byBOSCO Technologies Inc.
-
Speaker
-
-
17:45 | 18:15
-
-
A3-11
Strengthening cybersecurity in the financial field
-Threats facing Japanese financial field and the financial services agency's measures to enhance cybersecurity at financial institutions--
Speaker
Financial Services Agency
Mitsuhiko Komura
- Critical Infrastructure Security
- Human Resource Development
- Quantum Security
-
Speaker
-
B3-11
Resilience Building to Hybrid Threat
-
Speaker
Organization for Cyber Defense Innovation
Director
Akihiro Fujii
- Monitoring / Detection
- Human Resource Development
- Other
- Advanced
-
Speaker
-
C3-11
Legal Risk Management for Information Security in the Age of Escalating Cyber Incidents
— Preparing for and Responding to Crises-
Speaker
Mori Hamada & Matsumoto
Partner
Atsushi Okada
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Data Leakage Prevention
-
Speaker
-
-
18:30 | 19:30
-
-
A3-12
Using AI and Microsoft 365 Safely:
Controllable Security Instead of Blocking- Data Leakage Prevention
- Zero Trust
- Workstyle Innovation
Presented bySOFTCAMP Co.Ltd
-
B3-12
Coming soon
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Human Resource Development
Presented byLRM, Inc.
-
C3-12
Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
-
Speaker
Cyfinoid Research
Anant Shrivastava
-
Speaker
-
3.27(Fri)
-
10:20 | 11:00
-
-
A4-03
Secure AI Without Fail: What It Really Takes to Protect AI
-
Speaker
Cato Networks
Global Product Marketing
Product Marketing ManagerMakiko Yamada
- Zero Trust
- AI Security
- SASE (Secure Acess Service Edge)
Presented byCato Networks (Japan) KK
-
Speaker
-
WS4-03
Fixing What’s Broken : One Line at a Time
-
Speaker
Cyfinoid Research
Anant Shrivastava
- Workshop
- Beginner
-
Speaker
-
-
12:05 | 12:45
-
-
A4-05
AI-Driven Cybersecurity Innovation: Securing the Future with Symantec and Carbon Black
-
Speaker
Broadcom Inc.
Enterprise Security Group
Global Product ManagementAlpesh Mote
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Cloud Security
Presented byTD SYNNEX K.K.
-
Speaker
-
WS4-05
Introduction to Cybersecurity for SMEs: A Practical, Hands-On Workshop
-
Speaker
Greater Tokyo Area Vitalization Association
Digital Business Producer
Naoki Ogawa
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Human Resource Development
- Workshop
- Beginner
-
Speaker
-
-
12:55 | 13:35
-
-
A4-06
Coming soon
-
Speaker
Macnica, Inc.
Yosei Harada
-
Speaker
CyberArk Software Ltd.
Yuichiro Suzuki
- Targeted Attacks / Cyber Attacks
- Zero Trust
- Authentication / Identity Management
Presented byMacnica, Inc.
-
Speaker
-
WS4-06
Experiencing Next-Generation Identity & Device Operations with Iru: A Practical Hands-On Session
-
Speaker
ZUNDA Inc.
CEO
Sho Sawada
- Endpoint Security
- Zero Trust
- Authentication / Identity Management
- Workshop
- Beginner
Presented byZUNDA Inc.
-
Speaker
-
-
14:10 | 14:50
-
-
A4-07
The optimal solution for “managed EDR” and “incident response” against threats in the AI era
-
Speaker
TechMatrix Corporation
Shuya Nomura
- Ransomware Countermeasures
- SOC / Incident Response
- Managed Security Services
Presented byArctic Wolf Networks Inc. / TECHMATRIX CORPORATION
-
Speaker
-
B4-07
Coming soon
Presented bySoliton Systems K.K.
-
C4-07
Software Supply Chain Security with Docker:
Balancing Business Agility and Security for Sustainable Container Development-
Speaker
Docker
Solutions Engineering
Strategic Solutions EngineerTadashi Nemoto
- SBOM (Software Bill of Materials)
- Software Supply Chain Attacks
- Container Security
-
Speaker
-
WS4-07
Defense Strategies to Neutralize Nation-State APT Attacks: Insights from Cyber Powerhouse South Korea
- Workshop
Presented by78researchlab
-
-
15:05 | 15:45
-
-
A4-08
“The way to overcome shortages of staff in security operations”
-How to optimize security operations with AI and automation--
Speaker
TechMatrix Corporation
Network Security Division
Sales Department 2
Network Products Sales Section 2
ChiefKohei Suzuki
- Cloud Security
- SOC / Incident Response
- Monitoring / Detection
Presented byPalo Alto Networks, Inc. / TECHMATRIX CORPORATION
-
Speaker
-
B4-08
M365 Users must attend the lecture!
Latest trends in Email misdelivery and the ultimate weapon for the “New Outlook”-
Speaker
SCSK Minori Solutions Corporation
Kuniyasu Hayashi
- Data Leakage Prevention
- Email Security
Presented bySCSK Minori Solutions Corporation
-
Speaker
-
C4-08
Plug in to a sterile workspace
—anywhere. Sanitize threats harmless. Zero Compromise on your DX.-
Speaker
Menlo Security Japan K.K
Data Security Specialist
Ryo Nakatsuke
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Critical Infrastructure Security
Presented byMenlo Security Japan K.K.
-
Speaker
-
-
16:00 | 16:40
-
-
A4-09
Is that access really human? Technology to visualize web attacks in the AI era with zero system impact
-Next-generation standard for log analysis explained by WAF developers--
Speaker
Bitforest Co.,Ltd.
Tadashi Satoh
- Vulnerability / Tampering Countermeasures
- Application Security
Presented byBitforest Co.,Ltd.
-
Speaker
-
B4-09
Breaking free from outdated data erasure
-“Deleting” has evolved this far--
Speaker
Blancco Japan Inc. / Blancco Technology Group
President & CEO / Regional Director, Japan
Motoi Mimatsu
- Data Leakage Prevention
- Zero Trust
- Security Audits / System Audits
Presented byBlancco Japan Inc.
-
Speaker
-
C4-09
Resilience lessons to learn from Ukrainian critical infrastructure companies
-
Speaker
NTT, Inc.
Security and Trust Office,
Chief Cybersecurity StrategistMihoko Matsubara
- Ransomware Countermeasures
- Critical Infrastructure Security
-
Speaker
-
WS4-09
"What If It Happened Today?" A Hands-on Cyber Incident Response Tabletop Exercise
- Learning Through Discussion and Experience --
Speaker
Nippon CSIRT Association
Incident Response Drilling WG
Chief ExaminerHidenori Sakurai
-
Speaker
Nippon CSIRT Association
Incident Response Drilling WG
Deputy Chief ExaminerYusuke Ide
-
Speaker
Nippon CSIRT Association
Incident Response Drilling WG Table-Top Exercise Methodology Review SubWG
Chief ExaminerKeisuke Ito
-
Speaker
Nippon CSIRT Association
Incident Response Drilling WG
Deputy Chief ExaminerAyaka Miki
- SOC / Incident Response
- PSIRT / CSIRT
- Human Resource Development
- Workshop
-
Speaker
-
-
16:55 | 17:35
-
-
A4-10
Confronting evolving threats:The front lines of endpoint security
-Perspectives for addressing recent large-scale cyber incidents-
Speaker
HP Japan Inc.
Takashi Otsuyama
- Ransomware Countermeasures
- Endpoint Security
- Zero Trust
Presented byHP Japan Inc.
-
Speaker
-
B4-10
Coming soon
Presented byKDDI CORPORATION
-
C4-10
Why Do Corporate Security Measures Keep Getting Breached?
AI-Powered Predictive Threat Detection: OPSWAT Alin Transforming the Front Lines of Ransomware Defense (TBD)-
Speaker
OPSWAT JAPAN
Country Manager
Atsushi Takamatsu
- Ransomware Countermeasures
- Application Security
-
Speaker
-
-
17:40 | 18:10
-
-
A4-11
Strengthening cybersecurity measures at Ports
— Insights from training to confirm response procedures during terminal operation system disruptions—-
Speaker
Ministry of Land, Infrastructure, Transport and Tourism
Tomohide Sugimoto
- Critical Infrastructure Security
- Other
-
Speaker
-
B4-11
Global standardization updates on security in ITU-T SG17
-
Speaker
NICT
Quantum ICT Collaboration Center
Senior innovation coordinator, ITU-T SG17 Q15 RapporteurKaoru Kenyoshi
-
Speaker
Information Security Operation providers Group Japan (ISOG-J)
Vice Director, WG6 leaderSCSK Security Corp.
EvangelistShigenori Takei
-
Speaker
KDDI Research, Inc.
Usable Trust Laboratory
Senior ManagerTakamasa Isohara
- AI Security
- Quantum Security
- Beginner
-
Speaker
-
C4-11
Ransomware Attacks as a Disaster, and the Heroes Who Fought Back.
-
Speaker
Nikkei Inc.
Senior Staff Writer
Tatsuya Sudo
- Ransomware Countermeasures
- SOC / Incident Response
- Human Resource Development
-
Speaker
-