Session
-
lunch
Search (possible multiple choice)
Keyword
10.9(Wed)
-
08:40 | 09:20
-
10:30 | 11:10
-
12:25 | 13:05
-
-
71A-05
What is the security required for e-mail?Explain the threats and countermeasures of unstoppable “Targeted e-mail” and “Wrong Transmission e-mail”.
-
Digital Arts Inc.
Product manager, Marketing Dept
Kotaro Haginoya
- Targeted Theat
- Email Security
- Business Email Compromise (BEC) countermeasures
-
-
71D-05
- Cloud security
- GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
- Work style reforms
-
-
14:15 | 14:55
-
-
71A-07
- Measures against information leakage
- Authentication / Identity Management
- Cloud security
-
71B-07
- Authentication / Identity Management
- Work style reforms
-
71C-07
Attention!! Do you WannaCry again? Automation is the answer for insider threat measure.
-
Sumitomo Electric Information Systems Co., Ltd.
Assistant ManagerMCore Development Group
Yukinao Uchiumi
- Targeted Theat
- Measures against information leakage
- Monitoring and detection
-
-
71D-07
-
Speaker
CrowdStrike Japan
Sales Engineer
Shigeru Suzuki
-
Speaker
CrowdStrike Japan
Senior Sales Engineer
Lancine Sako
- Endpoint Security
- Smart device security
- Monitoring and detection
-
Speaker
-
71E-07
- Targeted Theat
- Measures against information leakage
- Cloud security
-
-
15:10 | 15:50
-
-
71A-08
-
Terilogy Worx
DirectorBusiness Development
Yoichi Matsuura
-
-
71B-08
Security in the age of Could Shift
-
Hitachi Solutions, Ltd.
Senior EngineerSecurity Marketing Promotion Department
Hideo Miyazaki
- Measures against information leakage
- Cloud security
-
-
71C-08
- Endpoint Security
- Measures against information leakage
- Work style reforms
-
71D-08
Improve and solve your bad storage environment!
VAULT Series provide security, safety, and comfort for file management.-
Soliton Systems K.K.
Manager, Product Division
Tomoo Kinoshita
- Ransomware measures
- Measures against information leakage
- Monitoring and detection
-
-
-
16:05 | 16:45
-
-
71A-09
- Measures against information leakage
-
71B-09
- Measures against information leakage
- Measures against DDoS
- Cloud security
-
71C-09
Intelligence Driven Cyber Security Solution
– Introducing CYFIRMA Cyber Intelligence Analytics Platform-
CYFIRMA K.K.
Representative Director
Shuhei Igarashi
- Targeted Theat
- Incident response / CSIRT / SOC
- Critical Infrastructure Security
-
-
71D-09
- Targeted Theat
- Monitoring and detection
- Other
-
-
17:00 | 17:40
-
-
71A-10
- Endpoint Security
- Critical Infrastructure Security
- Monitoring and detection
-
71B-10
- Targeted Theat
- Measures against information leakage
- Vulnerability countermeasure / Tamper prevention measures
-
71C-10
- Incident response / CSIRT / SOC
- Cloud security
- Monitoring and detection
-
71D-10
- Measures against information leakage
- GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
- Security auditing / System audit
-
-
17:50 | 18:30
-
-
71A-11
Threats of Cyberattacks on Industrial Control Systems and Importance of Risk Management
- Security Risk Assessment to avoid Business Impact --
Information-technology Promotion Agency, Japan
ResearcherIT Security Center (ISEC), IT Security Countermeasures DepartmentIndustrial Cyber Security Center of Excellence (COE), Operations Department
Satoshi Fukuhara
- Critical Infrastructure Security
- Other
-
-
71B-11
Current countermeasures as we approach the quantum computer era
- Measures against information leakage
- Encryption / Certificate
- Critical Infrastructure Security
-
71C-11
- Incident response / CSIRT / SOC
-
71D-11
Attempts to Maintain the Internet against a Security Threat - Recent trends of IP Address and Domain Name Security
- Domain authentication / DNS security
- Other
-