• MY PAGE
  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
  • MY PAGE
  • 来場事前登録 Register Now

  • MY PAGE
  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
  • FAQ
    • MY PAGE
    • 来場事前登録 Register Now

  • NOM'S EVENTS
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020

Session

  • All
  • 10.9(Wed)
  • 10.10(Thu)
  • 10.11(Fri)
  • lunch

Search (possible multiple choice)

Keyword

10.9(Wed)

  • RoomA
  • RoomB
  • RoomC
  • RoomD
  • RoomE
08:40 | 09:20
  • 71A-01

09:35 | 10:15
  • 71A-02

    Attack Types in the MITRE ATT&CK and the Splendid Countermeasures

    • ESET Japan Inc.

      Technology and Security Evangelist

      Kiku Chris Nakagawa

    • Targeted Theat
    • Antivirus
    • Endpoint Security
10:30 | 11:10
  • 71A-03

    • Targeted Theat
    • Antivirus
    • Endpoint Security
11:25 | 12:05
  • 71A-04

    How do you, protect confidential and personal information with DX?

    • Speaker

      Microsoft Japan KK

      Madoka Sawa

    • Speaker

      OneBe, Inc.

      CEO

      Takashi Kato

    • Endpoint Security
    • GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
    • Work style reforms
12:25 | 13:05
  • 71A-05

    What is the security required for e-mail?Explain the threats and countermeasures of unstoppable “Targeted e-mail” and “Wrong Transmission e-mail”.

    • Digital Arts Inc.

      Product manager, Marketing Dept

      Kotaro Haginoya

    • Targeted Theat
    • Email Security
    • Business Email Compromise (BEC) countermeasures
  • 71D-05

    • Cloud security
    • GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
    • Work style reforms
13:20 | 14:00
  • 71D-06

  • 71E-06

    • Endpoint Security
    • Measures against information leakage
    • Work style reforms
14:15 | 14:55
  • 71A-07

    • Measures against information leakage
    • Authentication / Identity Management
    • Cloud security
  • 71B-07

    • Authentication / Identity Management
    • Work style reforms
  • 71C-07

    Attention!! Do you WannaCry again? Automation is the answer for insider threat measure.

    • Sumitomo Electric Information Systems Co., Ltd.

      Assistant ManagerMCore Development Group

      Yukinao Uchiumi

    • Targeted Theat
    • Measures against information leakage
    • Monitoring and detection
  • 71D-07

    • Speaker

      CrowdStrike Japan

      Sales Engineer

      Shigeru Suzuki

    • Speaker

      CrowdStrike Japan

      Senior Sales Engineer

      Lancine Sako

    • Endpoint Security
    • Smart device security
    • Monitoring and detection
  • 71E-07

    • Targeted Theat
    • Measures against information leakage
    • Cloud security
15:10 | 15:50
  • 71A-08

    • Terilogy Worx

      DirectorBusiness Development

      Yoichi Matsuura

  • 71B-08

    Security in the age of Could Shift

    • Hitachi Solutions, Ltd.

      Senior EngineerSecurity Marketing Promotion Department

      Hideo Miyazaki

    • Measures against information leakage
    • Cloud security
  • 71C-08

    • Endpoint Security
    • Measures against information leakage
    • Work style reforms
  • 71D-08

    Improve and solve your bad storage environment!
    VAULT Series provide security, safety, and comfort for file management.

    • Soliton Systems K.K.

      Manager, Product Division

      Tomoo Kinoshita

    • Ransomware measures
    • Measures against information leakage
    • Monitoring and detection
16:05 | 16:45
  • 71A-09

    • Measures against information leakage
  • 71B-09

    • Measures against information leakage
    • Measures against DDoS
    • Cloud security
  • 71C-09

    Intelligence Driven Cyber Security Solution
    – Introducing CYFIRMA Cyber Intelligence Analytics Platform

    • CYFIRMA K.K.

      Representative Director

      Shuhei Igarashi

    • Targeted Theat
    • Incident response / CSIRT / SOC
    • Critical Infrastructure Security
  • 71D-09

    • Targeted Theat
    • Monitoring and detection
    • Other
17:00 | 17:40
  • 71A-10

    • Endpoint Security
    • Critical Infrastructure Security
    • Monitoring and detection
  • 71B-10

    • Targeted Theat
    • Measures against information leakage
    • Vulnerability countermeasure / Tamper prevention measures
  • 71C-10

    • Incident response / CSIRT / SOC
    • Cloud security
    • Monitoring and detection
  • 71D-10

    • Measures against information leakage
    • GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
    • Security auditing / System audit
17:50 | 18:30
  • 71A-11

    Threats of Cyberattacks on Industrial Control Systems and Importance of Risk Management
    - Security Risk Assessment to avoid Business Impact -

    • Information-technology Promotion Agency, Japan

      ResearcherIT Security Center (ISEC), IT Security Countermeasures DepartmentIndustrial Cyber Security Center of Excellence (COE), Operations Department

      Satoshi Fukuhara

    • Critical Infrastructure Security
    • Other
  • 71B-11

    Current countermeasures as we approach the quantum computer era

    • Measures against information leakage
    • Encryption / Certificate
    • Critical Infrastructure Security
  • 71C-11

    • Incident response / CSIRT / SOC
  • 71D-11

    Attempts to Maintain the Internet against a Security Threat - Recent trends of IP Address and Domain Name Security

    • Domain authentication / DNS security
    • Other
  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

Copyright (c) NANO OPT Media, Inc. All rights reserved.