残席僅か

How Should We Proceed After WSUS Ends?
The Migration and Frontline of Vulnerability Management.

Presented byJupiter Technology Corp.

  • Targeted Threat / Cyber Attack
  • Endpoint Security
  • Vulnerability measures / Tampering measures
Speaker

Jupiter Technology Corp.

Business Unit 3, Technical Group

Michiko Ota

Demonstrator

Jupiter Technology Corp.

Business Unit 3, Technical Group

Shoichiro Izaki

Demonstrator

Jupiter Technology Corp.

Business Unit 3, Technical Group

Akane Shimada

close