Tokyo Session
東京講演
Search (possible multiple choice)
Keyword
3.24(Tue)
-
10:20 | 11:00
-
-
A1-03
Prepare for Ransomware Attacks!
The Role of Active Cyber Defense in Today’s Threat Landscape-
Speaker
Fortinet Japan G.K.
Product Marketing Manager
Fumiaki Ito
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
Presented byFortinet Japan G.K.
-
Speaker
-
WS1-03
Attacking Cloud Misconfigurations
-
Speaker
Cyfinoid Research
Anant Shrivastava
- Workshop
- Intermediate
-
Speaker
-
-
12:05 | 12:45
-
-
A1-05
A Roadmap to Mastering Cloud Security: Lessons from Japanese Enterprise Case Studies
-
Speaker
Cloudbase Inc.
CEO
Koya Iwasa
- Cloud Security
- Vulnerability / Tampering Countermeasures
- SBOM (Software Bill of Materials)
Presented byCloudbase Inc.
-
Speaker
-
WS1-05
Coming soon
-
Speaker
Aeye Security Lab Inc.
Presales Leader, CX Division
Takahiro Takahashi
- Cloud Security
- Vulnerability / Tampering Countermeasures
- Application Security
- Workshop
Presented byAeye Security Lab Inc.
-
Speaker
-
-
13:20 | 14:00
-
-
A1-06
Before Unmanaged Assets Become Attack Vectors
— Enabling ASM with AI —-
Speaker
UBsecure, Inc.
Product Division,
Product Business Promotion DepartmentToyohiro Hotta
- Ransomware Countermeasures
- Vulnerability / Tampering Countermeasures
- Software Supply Chain Attacks
Presented byUBsecure, Inc.
-
Speaker
-
B1-06
Security Paradigm Shift:
A Turning Point Where Traditional Wisdom No Longer Applies. Correctly Understanding the Attacker's Perspective.-
Speaker
ULTRA RED, Ltd.
Regional Product Manager
Kenichiro Hashimoto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Data Leakage Prevention
Presented byKela K.K.
-
Speaker
-
C1-06
Security as a Business Operation Revisited:
AI Security Fundamentals Every CISO Should Know-
Speaker
JNSA(Japan Network Security Association)
Vice Chairman, CISO Support Working Group Leader
Masakazu Takahashi
- Data Leakage Prevention
- AI Security
-
Speaker
-
WS1-06
Coming soon
-
Speaker
Illumio Japan G.K.
Managing Sr. Sales Engineer
Jun Fukumoto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Zero Trust
- Workshop
Presented byIllumio Japan G.K.
-
Speaker
-
-
14:15 | 14:55
-
-
A1-07
Protecting Internal Networks using WIPS
-
Speaker
KORNIC GLORY CO.,Ltd.
Manager,
Wired Technology TeamChang Minseon
- Data Leakage Prevention
- Monitoring / Detection
Presented byKornic Glory Co.,Ltd.
-
Speaker
-
B1-07
Three Reasons Why Supply Chain Security Stalls in Practice
— Toward a Sustainable, Practical Approach Based on the SCS Evaluation Framework-
Speaker
Soliton Systems K.K.
IT Security Business Unit
EvangelistShoko Araki
- Data Leakage Prevention
- Zero Trust
- Authentication / Identity Management
- Intermediate
Presented bySoliton Systems K.K.
-
Speaker
-
C1-07
SaaS Security Blind Spots: The Risks of Hidden AI
~ A Practical Guide on What to Evaluate and Why ~-
Speaker
Assured, Inc.
Yuya Ueki
- Cloud Security
- Vulnerability / Tampering Countermeasures
Presented byAssured, Inc.
-
Speaker
-
Closed
WS1-07
Leveraging On-Premises Assets: The Latest Cybersecurity Measures for Small and Medium-Sized Businesses
── Beyond Just Endpoint devices: Hybrid Security Strategy Including Server EDR After the End of WSUS Support- Ransomware Countermeasures
- Cloud Security
- AI Security
- Workshop
- Beginner
Presented byB Manifold,Inc.
-
-
15:10 | 15:50
-
-
A1-08
Coming soon
-
Speaker
Honetsecurity K.K.
Principal Messaging Engineer
Yoshitaka Hirano
- Ransomware Countermeasures
- Email Security
- Phishing scam
Presented byHonetsecurity K.K.
-
Speaker
-
B1-08
2025: What did your company do for Email Security?
The reality of selecting, implementing, and operating DMARC, misdelivery prevention, and PPAP elimination-
Speaker
imatrix corp.
CEO
Hibiki Oka
- Ransomware Countermeasures
- Data Leakage Prevention
- Email Security
Presented byimatrix corp.
-
Speaker
-
C1-08
CSIRTs must not be isolated.
The way of to start a team that protects the organization and the power of community to build connections.-
Speaker
Nippon CSIRT Association
Fumie Watanabe
- PSIRT / CSIRT
- Human Resource Development
- Other
-
Speaker
-
-
16:05 | 16:45
-
-
A1-09
Is your system truly secure?
Efficient penetration testing to prevent business risks.
Explained using Cymulate as an example.-
Speaker
NTT Advanced Technology Corporation
Ryosuke Shimizu
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
Presented byNTT Advanced Technology Corporation
-
Speaker
-
B1-09
Internal fraud prevention and human risk management
-
Speaker
N&O Partners
Managing Partner
AttorneyLeona Ohki
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
- Monitoring / Detection
Presented byN&O Partners(Leo United Ginza Law Office)
-
Speaker
-
C1-09
Building Trust at Scale:
Preparing Certificate, Device, and AI Identity for the Next Wave of Security Challenges-
Speaker
Keyfactor
Field CTO VP,
Solution EngineeringEric Mizell
- Zero Trust
- AI Security
- Encryption / Certificates
- Intermediate
Presented byKeyfactor Inc.
-
Speaker
-
WS1-09
Are you confident in your security ?
~ Very introductory security audit workshop-
Speaker
Japan information security audit association,
gBrain Co., Ltd.
Toshitsugu Ota
- Security Audits / System Audits
- Human Resource Development
- Workshop
-
Speaker
-
-
17:00 | 17:40
-
-
A1-10
Learn from the 2025 cybersecurity Talent Market Through Data
― From the Latest ISC2 Survey-
Speaker
President, ISC2 Japan Chapter
Member,
APAC Advisory Council,Fumiko Noma, CISSP
- Human Resource Development
- Workstyle Innovation
- Other
- Intermediate
Presented byISC2, Inc.
-
Speaker
-
B1-10
Preparing for the Quantum Age:
Will Your Data Still Be Secure in Ten Years' Time?-
Speaker
SSH Communications Security
Solutions Engineering Director, APAC
Katsuhiro Shogawa
- Targeted Attacks / Cyber Attacks
- Encryption / Certificates
- Quantum Security
- Intermediate
Presented bySSH Communications Security Oyj
-
Speaker
-
C1-10
Ransomware defense strategy to protect the company.
- Comprehensive measures before and after infection --
Speaker
Metro, Inc.
Hideyuki Ishida
- Ransomware Countermeasures
- Endpoint Security
- Email Security
Presented byMetro, Inc.
-
Speaker
-
-
17:45 | 18:15
-
-
Closed
A1-11
Threats in Cyberspace
-Cyberattacks Country supported.-
Speaker
Public Security Intelligence Agency
Ippei Suyama
- Targeted Attacks / Cyber Attacks
-
Speaker
-
B1-11
FBI Cyber
- Private Sector Engagement Strategies-
Speaker
The U.S. Embassy Tokyo,
Law Enforcement Attaché,
Federal Bureau of Investigation,
Cyber Assistant Law Enforcement Attaché,Jesse Schibilia
- Other
-
Speaker
-
C1-11
The Dangers of Public Data Leaks and Exposed Attack Surfaces
- A Former Cyber Operations Officer’s Perspective-
Speaker
NSHC Inc.
Director
Park Bumjoon
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
-
Speaker
-
-
18:30 | 19:30
-
-
B1-12
CNAPP: Partnering with Japanese Enterprises
― Why Companies Keep Choosing Cloudbase: Insights from Long-Term Users-
Panelist
SBI Sumishin Net Bank, Ltd.
Takashi Hosono
-
Panelist
TOPPAN Holdings Inc.
Yuichi Kawakami
-
Moderator
Cloudbase Inc.
Makoto Naruse
- Cloud Security
Presented byCloudbase Inc.
-
Panelist
-
C1-12
Shadow AI: Hunting the Unknowns Across Developer Tooling and Deployed Artifacts
-
Speaker
Cyfinoid Research
Anant Shrivastava
-
Speaker
-
3.25(Wed)
-
12:05 | 12:45
-
-
A2-05
Still there internal fraud : How should we approach This.
-
Speaker
Proofpoint Japan K.K.
Naoki Isomura
- Data Leakage Prevention
- Authentication / Identity Management
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
Presented byProofpoint Japan K.K.
-
Speaker
-
WS2-05
A Global Security Perspective on the Blind Spots in Japanese Corporate Culture
Information Leak Risks—and What “Real” Countermeasures Look Like-
Speaker
BlackBox Japan Inc.
Product Engineering
SpecialistAyako Makita
- Data Leakage Prevention
- Zero Trust
- Monitoring / Detection
- Workshop
Presented byBlackBox Japan Inc.
-
Speaker
-
-
13:20 | 14:00
-
-
A2-06
The spread of Ransomware Attacks and the Critical Importance of Identity Security:
Frontline of Active Directory/Entra ID Defense-
Speaker
Tokyo Electron Device LTD
Yui Iida
- Ransomware Countermeasures
- Endpoint Security
- Authentication / Identity Management
Presented byTokyo Electron Device LTD
-
Speaker
-
B2-06
How to easily obtain 3 or 4 stars rating under the Ministry of Economy, Trade and Industry's "Supply Chain Security Assessment System" and break free from the security check spiral
-
Speaker
SOURCE POD, Inc.
CEO
Takeshi Yamamoto
- Security Audits / System Audits
- Human Resource Development
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
Presented bySourcePod, Inc.
-
Speaker
-
C2-06
Cybersecurity Measures Required in the Defense Industry
-
Speaker
Acquisition Technology and Logistics Agency
Industrial Cyber Security Office,
Equipment Security Management Division,
Department of Equipment Policy
DirectorYugo Matsumoto
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Security Audits / System Audits
-
Speaker
-
WS2-06
Coming soon
-
Speaker
Cloudbase Inc.
Makoto Naruse
- Data Leakage Prevention
- AI Security
- Workshop
Presented byCloudbase Inc.
-
Speaker
-
-
14:15 | 14:55
-
-
A2-07
Protecting organizations from ransomware
- Reforming password custom to prevent breaches × Controlling privileged IDs —-
Speaker
CTCP Corporation
Solution Development & Promotion Division
General Manager, Business Development DepartmentSayaka Kikuchi
-
Speaker
Keeper Security APAC K.K.
Asia Pacific Region
Lead of Sales EngineeringMasaki Ikehara
- Ransomware Countermeasures
- Authentication / Identity Management
- Software Supply Chain Attacks
Presented byKeeper Security APAC K.K.
-
Speaker
-
B2-07
The Reality of Supply Chain Attacks and measures
Achieving “Business without downtime” through “Cyber Resilience”-
Speaker
CyLeague Holdings
Hiroki Nambu
-
Speaker
Quest Co., Ltd.
Koichi Hatanaka
- Ransomware Countermeasures
- AI Security
- SOC / Incident Response
Presented byQuest Co., Ltd.
-
Speaker
-
C2-07
The Reality of AWS Security: Feedback from Field Analyst
-
Speaker
SHIFT SECURITY, Inc.
Koki Maeda
- Cloud Security
- SOC / Incident Response
- Monitoring / Detection
Presented bySHIFT SECURITY, Inc.
-
Speaker
-
Closed
WS2-07
“Security incidents can occur even without an attack”
Cloud-specific security management and the information disclosure certification system based on the Ministry of Internal Affairs and Communications guidelines-
Speaker
ASP-SaaS- AI-IoT Cloud Industry Association
Toru Nakamura
-
Speaker
ASP-SaaS- AI-IoT Cloud Industry Association
Keiichi Iwata
- Cloud Security
- Workshop
-
Speaker
-
-
15:10 | 15:50
-
-
A2-08
Shadow IT & Attack Surface × Attacker-Perspective Intelligence
"Now the era ‘invisible assets’ become the greatest risk
— Proactive attack surface management achieved through attacker-perspective intelligence"-
Speaker
Zeami Cyber Security Co., Ltd.
Hideaki Sato
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Cloud Security
Presented byZeami Cyber Security Co., Ltd.
-
Speaker
-
B2-08
Ransomware frontline: Addressing the latest threats and vulnerabilities through dark web monitoring and attack surface management (ASM)
-
Speaker
SMS DataTech Corporation
Yuki Tokui
- Ransomware Countermeasures
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
Presented bySMS DataTech Corporation
-
Speaker
-
C2-08
Trends in Vulnerabilities and Security Improvement Insights from Security Assessments
-
Speaker
NEC Corporation
Risk Hunting Group,
Cyber Security Technology Department
AnalystHaruka Nakashima
- Beginner
-
Speaker
-
-
16:05 | 16:45
-
-
A2-09
How to prevent internal data leaks in the Cloud/SaaS Era?
-Balancing safe and security with AI-powered CASB × SIEM--
Speaker
Skygate Technologies Inc.
Hiroo Ohara
- Cloud Security
- Data Leakage Prevention
- Zero Trust
Presented bySkygate Technologies Inc.
-
Speaker
-
B2-09
Analysis of actual cyber incidents and countermeasures
-
Speaker
InfoSecure Solutions, Inc.
CEO
Tomoya Kumeta
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Managed Security Services
Presented byInfoSecure Solutions,Inc.
-
Speaker
-
C2-09
Coming soon
-
Speaker
DigiCert Japan G.K.
Product Marketing
Product Marketing ManagerMasato Hayashi
- Authentication / Identity Management
- Encryption / Certificates
- Quantum Security
Presented byDigiCert Japan G.K.
-
Speaker
-
WS2-09
CI CD the keys to the kingdom and some more.
-
Cyfinoid Research
Anant Shrivastava
- Workshop
- Intermediate
-
-
-
17:00 | 17:40
-
-
A2-10
What are needed for security testing in AI and Cyber security regulations era?
-
Speaker
Black Duck Software G.K.
Sr. Tech Marketing Manager
Masato Matsuoka
- AI Security
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
- Application Security
- Beginner
Presented byBlack Duck Software G.K.
-
Speaker
-
B2-10
From “Implemented” to “Mastered” Security:
The essence of optimization—consolidating dispersed risks and strengthening defenses While reducing operational burden-
Speaker
Rapid7 Japan K.K
Japan CTO, CISSP, CISA
Katsuya Furukawa
- XDR
- SOC / Incident Response
- Managed Security Services
Presented byRapid7 Japan K.K.
-
Speaker
-
C2-10
Protecting SMBs from Invisible Threats:
How to Detect Leaked Credentials on the Dark Web and Build Your Security Strategy-
Speaker
ALPS SYSTEM INTEGRATION CO., LTD.
Product Marketing Sect.
ReaderTakuya Inoue
- Ransomware Countermeasures
- Zero Trust
- Monitoring / Detection
Presented byAlps System Integration Co., Ltd.
-
Speaker
-
-
17:45 | 18:15
-
-
A2-11
10 Major Security Threats and Basic Security Measures [For Organizations]
-
Speaker
Information-technology Promotion Agency, Japan
IT Security Center(ISEC) Cyber Situation Analysis Department
Yoshiharu Inoue
- Ransomware Countermeasures
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
- Beginner
-
Speaker
-
B2-11
Trade and Industry Initiatives to enhance cybersecurity measures across the Entire supply chain by Ministry of Economy
-
Speaker
Ministry of Economy, Trade and Industry
Ayumu Kawai
-
Speaker
-
C2-11
Latest Developments in Quantum Safe and practical systems utilizing PQC and QKD
-
Speaker
NTT DOCOMO BUSINESS, Inc.
Innovation Center
Quantum Safe EvangelistYasutaka Morioka
- Encryption / Certificates
- Quantum Security
-
Speaker
-
WS2-11
“Security incidents can occur even without an attack”
Cloud-specific security management and the information disclosure certification system based on the Ministry of Internal Affairs and Communications guidelines-
Speaker
ASP-SaaS- AI-IoT Cloud Industry Association
Toru Nakamura
-
Speaker
ASP-SaaS- AI-IoT Cloud Industry Association
Keiichi Iwata
- Cloud Security
- Workshop
-
Speaker
-
-
18:30 | 19:30
-
-
B2-12
Israeli Unit 8200 Veterans Warn: Japan's AI Defense Gap and Solutions (Tentative)
-
Speaker
AironWorks Co., Ltd.
Akihiro Ito
- Targeted Attacks / Cyber Attacks
- Human Resource Development
- Beginner
Presented byAironWorks Co., Ltd.
-
Speaker
-
C2-12
Preparing Trust Foundations for the Next Phase of Cryptographic Change
-
Speaker
Keyfactor
Field CTO - Vice President, Solution Engineering
Eric Mizell
- Zero Trust
- Encryption / Certificates
- Quantum Security
- Intermediate
Presented byKeyfactor Inc.
-
Speaker
-
3.26(Thu)
-
10:20 | 11:00
-
-
A3-03
Cloud security transcends 'Borders'
-How to achieve fully integrated internal and external security with Wiz ASM-
Speaker
Wiz Cloud Japan K.K.
Principal Customer Engineer
Shogo Katsurada
Presented byWiz Cloud Japan K.K.
-
Speaker
-
WS3-03
Mapping SBOMs for Fun and Profit
-
Speaker
Cyfinoid Research
Anant Shrivastava
- Workshop
- Beginner
-
Speaker
-
-
12:05 | 12:45
-
-
A3-05
Secure AI agent utilization and shadow AI countermeasures with Chrome Enterprise
-
Speaker
Google Japan G.K.
Yoshikazu Suzuki
- Endpoint Security
- Zero Trust
- AI Security
Presented byGoogle Japan G.K.
-
Speaker
-
WS3-05
Learn practical techniques for achieving “skill visualization” and accelerating talent development
-
Speaker
Japan Trusted Alliance Group for cybersecurity
HRD Senior Consultant /
Division ManagerKosuke Otsuki
-
Speaker
Japan Trusted Alliance Group for cybersecurity
HRD Senior Consultant/ Executive Director of Foundation
Yoichi Takasaki
- Security Audits / System Audits
- PSIRT / CSIRT
- Human Resource Development
- Workshop
-
Speaker
-
-
13:20 | 14:00
-
-
A3-06
The Final Bastion: The Ideal State of Endpoint Security
-
Speaker
WithSecure Japan
Cyber Security Products and Services
Solution ArchitectKoji Ohta
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
- Intermediate
Presented byWithSecure KK
-
Speaker
-
B3-06
Inside IIJ’s ZTNA Adoption:
The ZTNA Approach That Delivers Both Comfort and Security for More Than 5,200 Employees-
Speaker
Internet Initiative Japan Inc.
DWP Solution Section
Business Promotion Department
Service Product Business DivisionKohei Matsuura
-
Speaker
Absolute Software K.K.
Senior Account Manager
Naoto Nishida
- Cloud Security
- Zero Trust
- Workstyle Innovation
Presented byAbsolute Software K.K. / Internet Initiative Japan Inc.
-
Speaker
-
C3-06
Battlefield Cyber, Part II :
Cyberwarfare in the Ukraine War and Endpoint Security-
Speaker
The National Institute for Defense Studies, Ministry of Defense
Global Security Division, Policy Studies Department
Senior Felow, Colonel, Ph.D (Security Studies)Kawamura Koki
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
-
Speaker
-
WS3-06
Post-Quantum Cryptography for Mobility: Understanding Impact Today and Preparing for What Comes Next
-
Speaker
Keyfactor
Sven Rajala
- IoT Security
- Encryption / Certificates
- Quantum Security
- Workshop
- Intermediate
Presented byKeyfactor Inc.
-
Speaker
-
-
14:15 | 14:55
-
-
A3-07
Multi-Factor Authentication: Burden or Solution? Best Practices from the Toyota Group
-
Speaker
Soliton Systems K.K.
Product & Service Management
IT Security DivisionMayu Matsuda
- Cloud Security
- Zero Trust
- Authentication / Identity Management
- Beginner
Presented bySoliton Systems K.K.
-
Speaker
-
B3-07
Coming soon
-
Speaker
Pentera Security Ltd.
Sales Engineer Japan CISSP
Megumi Shibasaki
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Vulnerability / Tampering Countermeasures
Presented byPentera Security Ltd. / TECHMATRIX CORPORATION
-
Speaker
-
C3-07
Privileged ID management moves to the next stage
―The full scope of next-generation privileged access management with password protection and network control-
Speaker
Encourage Technologies Co., Ltd.
Yoshiharu Hioki
- Ransomware Countermeasures
- Zero Trust
- Authentication / Identity Management
Presented byEncourage Technologies Co., Ltd.
-
Speaker
-
WS3-07
Can't protect yourself with EDR alone? What's the next step?
- Experience the latest IT/OT countermeasures using ColorTokens' "Xshield."-
Speaker
Denkosha Inc.
Professional Servies
ManagerMasahiko Ishibashi
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Zero Trust
- Workshop
- Beginner
Presented byDENKOSHA Corporation
-
Speaker
-
-
15:10 | 15:50
-
-
A3-08
Toward a Network That “Contains” Attacks
— Case Studies of Zero Networks Enabling Easy Zero Trust Implementation in Internal Environments —-
Speaker
Marubeni I-DIGIO Group
Atsushi Kobayashi
-
Speaker
Zero Networks ltd
Yasunori Koda
- Ransomware Countermeasures
- Zero Trust
- Critical Infrastructure Security
Presented byMarubeni I-DIGIO Group
-
Speaker
-
B3-08
"Log Management as a Pillar of Security Incident Response: What Future Approaches to Log Utilization Will Be Required?"
-
Speaker
Infoscience Inc.
Product Division, Cybersecurity Consulting Team
Team LeaderShotaro Abiru
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Security Audits / System Audits
Presented byInfoscience Corporation
-
Speaker
-
Closed
C3-08
Security Strategies for AI and Ransomware Through the Eyes of Attackers
-
Speaker
Hitachi Solutions, Ltd.
Managed Security Service Department
Chief Security AnalystMomoko Aoyama
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- AI Security
-
Speaker
-
-
16:05 | 16:45
-
-
A3-09
An Available Way to Enhance User Authentication Methods Using Cisco Duo for a Small IT Department
-
Speaker
NTT DATA Luweave Corporation
Tatsuro Okisasaki
-
Speaker
Cisco Systems, G.K.
Hiroki Hata
- Endpoint Security
- Zero Trust
- Authentication / Identity Management
Presented byNTT DATA Luweave Corporation
-
Speaker
-
B3-09
How to integrate fragmented security measures:
Co-managed solution combining "MDR technology and Top analysts” with customers-
Speaker
NTT Security Japan KK
Managed Security Services
Senior Vice PresidentKeiichi Yokoyama
- XDR
- SOC / Incident Response
- Managed Security Services
Presented byNTT Security (Japan) KK
-
Speaker
-
C3-09
The path to threat intelligence
- Security Strategy for Anticipating Attacks --
Speaker
Information Development Co., Ltd.
Cyber Security Solutions Department
Technical SpecialistTakeshi Aoyama
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
Presented byINFORMATION DEVELOPMENT CO., LTD.
-
Speaker
-
Closed
WS3-09
Digital transformation is essential for enhancing Japan's international competitiveness, and why plus security human resources are indispensable for achieving this
~Are even these types of people considered security professionals now?~-
Speaker
Professional University of Information and Management for Innovation
Professor
Toshihiro Hirayama
- Human Resource Development
- Workshop
- Intermediate
-
Speaker
-
-
17:00 | 17:40
-
-
A3-10
Proven Success Against the Trending Ransomware “Qilin”!
A Defense Strategy Beyond the Limits of EDR, Built with the Ransomware Countermeasure Platform “Halcyon”-
Speaker
TAKACHIHO KOHEKI CO., LTD.
Yusuke Hasunuma
- Ransomware Countermeasures
- Cloud Security
- Endpoint Security
Presented byTAKACHIHO KOHEKI CO., LTD.
-
Speaker
-
B3-10
Universal Security Measures That Remain Firm Against Sophisticated Cyber Threats:
IT Trends in South Korea, Where Investment in Data Security Continues-
Speaker
Penta Security K.K.
Security Consulting Dept.
Principal Security Consultant, CISSPTakashi Minobe
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Encryption / Certificates
Presented byPenta Security K.K.
-
Speaker
-
C3-10
Are you prepared for insider threats?
-Comprehensive guide to the importance and pitfalls of privileged ID management--
Speaker
Bosco Technologies
SMART Gateway Business Group
QA & Marketing Division
General ManagerShin Shibayama
-
Speaker
Bosco Technologies
SMART Gateway Business Group
SG Business Development Division
ManagerTakuya Sawano
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
- Authentication / Identity Management
Presented byBOSCO Technologies Inc.
-
Speaker
-
-
17:45 | 18:15
-
-
A3-11
Strengthening cybersecurity in the financial field
-Threats facing Japanese financial field and the financial services agency's measures to enhance cybersecurity at financial institutions--
Speaker
Financial Services Agency
Mitsuhiko Komura
- Critical Infrastructure Security
- Human Resource Development
- Quantum Security
-
Speaker
-
B3-11
Resilience Building to Hybrid Threat
-
Speaker
Organization for Cyber Defense Innovation
Director
Akihiro Fujii
- Monitoring / Detection
- Human Resource Development
- Other
- Advanced
-
Speaker
-
C3-11
Legal Risk Management for Information Security in the Age of Escalating Cyber Incidents
— Preparing for and Responding to Crises-
Speaker
Mori Hamada & Matsumoto
Partner
Atsushi Okada
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Data Leakage Prevention
-
Speaker
-
-
18:30 | 19:30
-
-
A3-12
Using AI and Microsoft 365 Safely:
Controllable Security Instead of Blocking-
Speaker
Net One Systems Co., Ltd.
Kazunobu Isomura
-
Speaker
Net One Systems Co., Ltd.
Yukimi Uno
-
Speaker
TD SYNNEX
Kazue Ando
- Data Leakage Prevention
- Zero Trust
- Workstyle Innovation
Presented bySOFTCAMP Co.Ltd
-
Speaker
-
B3-12
Coming soon
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Human Resource Development
Presented byLRM, Inc.
-
C3-12
Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
-
Speaker
Cyfinoid Research
Anant Shrivastava
-
Speaker
-
3.27(Fri)
-
10:20 | 11:00
-
-
A4-03
Secure AI Without Fail: What It Really Takes to Protect AI
-
Speaker
Cato Networks
Global Product Marketing
Product Marketing ManagerMakiko Yamada
- Zero Trust
- AI Security
- SASE (Secure Acess Service Edge)
Presented byCato Networks (Japan) KK
-
Speaker
-
WS4-03
Fixing What’s Broken : One Line at a Time
-
Speaker
Cyfinoid Research
Anant Shrivastava
- Workshop
- Beginner
-
Speaker
-
-
12:05 | 12:45
-
-
A4-05
AI-Driven Cybersecurity Innovation:
Securing the Future with Symantec and Carbon Black-
Speaker
Broadcom Inc.
Enterprise Security Group
Principal Product Manager - Enterprise EDR & XDRDominic Djannesari
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Cloud Security
Presented byTD SYNNEX K.K.
-
Speaker
-
Closed
WS4-05
Introduction to Cybersecurity for SMEs: A Practical, Hands-On Workshop
-
Speaker
Greater Tokyo Area Vitalization Association
Digital Business Producer
Naoki Ogawa
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Human Resource Development
- Workshop
- Beginner
-
Speaker
-
-
12:55 | 13:35
-
-
A4-06
Coming soon
-
Speaker
Macnica, Inc.
Yosei Harada
-
Speaker
CyberArk Software Ltd.
Yuichiro Suzuki
- Targeted Attacks / Cyber Attacks
- Zero Trust
- Authentication / Identity Management
Presented byMacnica, Inc.
-
Speaker
-
WS4-06
Experiencing Next-Generation Identity & Device Operations with Iru: A Practical Hands-On Session
-
Speaker
ZUNDA Inc.
CEO
Sho Sawada
- Endpoint Security
- Zero Trust
- Authentication / Identity Management
- Workshop
- Beginner
Presented byZUNDA Inc.
-
Speaker
-
-
14:10 | 14:50
-
-
A4-07
The optimal solution for “managed EDR” and “incident response” against threats in the AI era
-
Speaker
TechMatrix Corporation
Shuya Nomura
- Ransomware Countermeasures
- SOC / Incident Response
- Managed Security Services
Presented byArctic Wolf Networks Inc. / TECHMATRIX CORPORATION
-
Speaker
-
B4-07
Coming soon
-
Speaker
Soliton Systems K.K.
Waka Maeda
- Data Leakage Prevention
- Endpoint Security
- Authentication / Identity Management
Presented bySoliton Systems K.K.
-
Speaker
-
C4-07
Software Supply Chain Security with Docker:
Balancing Business Agility and Security for Sustainable Container Development-
Speaker
Docker
Solutions Engineering
Strategic Solutions EngineerTadashi Nemoto
- SBOM (Software Bill of Materials)
- Software Supply Chain Attacks
- Container Security
-
Speaker
-
WS4-07
Defensive strategy that utilizes the attack tactics and techniques of nation-state APT attack groups
-
Speaker
78ResearchLab
Attack Tactics Development Division
Principal Researcher,
CPO(Chief Product Officer)Park Moonbeom
- Targeted Attacks / Cyber Attacks
- Vulnerability / Tampering Countermeasures
- Managed Security Services
- Workshop
Presented by78ResearchLab
-
Speaker
-
-
15:05 | 15:45
-
-
A4-08
“The way to overcome shortages of staff in security operations”
-How to optimize security operations with AI and automation--
Speaker
TechMatrix Corporation
Network Security Division
Sales Department 2
Network Products Sales Section 2
ChiefKohei Suzuki
- Cloud Security
- SOC / Incident Response
- Monitoring / Detection
Presented byPalo Alto Networks, Inc. / TECHMATRIX CORPORATION
-
Speaker
-
B4-08
M365 Users must attend the lecture!
Latest trends in Email misdelivery and the ultimate weapon for the “New Outlook”-
Speaker
SCSK Minori Solutions Corporation
Kodai Ishida
- Data Leakage Prevention
- Email Security
Presented bySCSK Minori Solutions Corporation
-
Speaker
-
C4-08
Plug in to a sterile workspace
—anywhere. Sanitize threats harmless. Zero Compromise on your DX.-
Speaker
Menlo Security Japan K.K
Data Security Specialist
Ryo Nakatsuke
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Critical Infrastructure Security
Presented byMenlo Security Japan K.K.
-
Speaker
-
-
16:00 | 16:40
-
-
A4-09
Is that access really human? Technology to visualize web attacks in the AI era with zero system impact
-Next-generation standard for log analysis explained by WAF developers--
Speaker
Bitforest Co.,Ltd.
Tadashi Satoh
- Vulnerability / Tampering Countermeasures
- Application Security
Presented byBitforest Co.,Ltd.
-
Speaker
-
B4-09
Breaking free from outdated data erasure
-“Deleting” has evolved this far--
Speaker
Blancco Japan Inc. / Blancco Technology Group
President & CEO / Regional Director, Japan
Motoi Mimatsu
- Data Leakage Prevention
- Zero Trust
- Security Audits / System Audits
Presented byBlancco Japan Inc.
-
Speaker
-
C4-09
Resilience lessons to learn from Ukrainian critical infrastructure companies
-
Speaker
NTT, Inc.
Security and Trust Office,
Chief Cybersecurity StrategistMihoko Matsubara
- Ransomware Countermeasures
- Critical Infrastructure Security
-
Speaker
-
Closed
WS4-09
"What If It Happened Today?" A Hands-on Cyber Incident Response Tabletop Exercise
- Learning Through Discussion and Experience --
Speaker
Nippon CSIRT Association
Incident Response Drilling WG
Chief ExaminerHidenori Sakurai
-
Speaker
Nippon CSIRT Association
Incident Response Drilling WG
Deputy Chief ExaminerYusuke Ide
-
Speaker
Nippon CSIRT Association
Incident Response Drilling WG Table-Top Exercise Methodology Review SubWG
Chief ExaminerKeisuke Ito
-
Speaker
Nippon CSIRT Association
Incident Response Drilling WG
Deputy Chief ExaminerAyaka Miki
-
Speaker
Nippon CSIRT Association
Incident Response Drilling WG /AIFUL CORPORATION
Tomoya Oshio
-
Speaker
Nippon CSIRT Association
Incident Response Drilling WG /WingArc1st Inc.
IT Strategy Management Department
Executive Manager -
Speaker
Nippon CSIRT Association
Incident Response Drilling WG /Axelspace Holdings Corporation
Information Security Group, DX Infrastructure DivisionHiroaki Kamimaeda
-
Speaker
Nippon CSIRT Association
Incident Response Drilling WG /Future Secure Wave, Inc.
Cyber-Security UnitTakaaki IIDA
-
Speaker
Nippon CSIRT Association
Incident Response Drilling WG
Michinobu Tamura
- SOC / Incident Response
- PSIRT / CSIRT
- Human Resource Development
- Workshop
-
Speaker
-
-
16:55 | 17:35
-
-
A4-10
Confronting evolving threats:The front lines of endpoint security
-Perspectives for addressing recent large-scale cyber incidents-
Speaker
HP Japan Inc.
Takashi Otsuyama
- Ransomware Countermeasures
- Endpoint Security
- Zero Trust
Presented byHP Japan Inc.
-
Speaker
-
B4-10
Coming soon
-
Speaker
KDDI CORPORATION
Yoshihiro Matsuda
-
Speaker
KDDI CORPORATION
Tomohiro Fujita
- SOC / Incident Response
- Monitoring / Detection
- Managed Security Services
Presented byKDDI CORPORATION
-
Speaker
-
C4-10
Why Do Corporate Security Measures Keep Getting Breached?
AI-Powered Predictive Threat Detection: OPSWAT Alin Transforming the Front Lines of Ransomware Defense (TBD)-
Speaker
OPSWAT JAPAN
Country Manager
Atsushi Takamatsu
- Ransomware Countermeasures
- Application Security
-
Speaker
-
-
17:40 | 18:10
-
-
A4-11
Strengthening cybersecurity measures at Ports
— Insights from training to confirm response procedures during terminal operation system disruptions—-
Speaker
Ministry of Land, Infrastructure, Transport and Tourism
Tomohide Sugimoto
- Critical Infrastructure Security
- Other
-
Speaker
-
B4-11
Global standardization updates on security in ITU-T SG17
-
Speaker
NICT
Quantum ICT Collaboration Center
Senior innovation coordinator, ITU-T SG17 Q15 RapporteurKaoru Kenyoshi
-
Speaker
Information Security Operation providers Group Japan (ISOG-J)
Vice Director, WG6 leaderSCSK Security Corp.
EvangelistShigenori Takei
-
Speaker
KDDI Research, Inc.
Usable Trust Laboratory
Senior ManagerTakamasa Isohara
- AI Security
- Quantum Security
- Beginner
-
Speaker
-
C4-11
Ransomware Attacks as a Disaster, and the Heroes Who Fought Back.
-
Speaker
Nikkei Inc.
Senior Staff Writer
Tatsuya Sudo
- Ransomware Countermeasures
- SOC / Incident Response
- Human Resource Development
-
Speaker
-