Session
-
lunch
Search (possible multiple choice)
Keyword
10.9(Wed)
-
08:40 | 09:20
-
10:30 | 11:10
-
12:25 | 13:05
-
-
71A-05

What is the security required for e-mail?Explain the threats and countermeasures of unstoppable “Targeted e-mail” and “Wrong Transmission e-mail”.
-
Digital Arts Inc.
Product manager, Marketing Dept
Kotaro Haginoya
- Targeted Theat
- Email Security
- Business Email Compromise (BEC) countermeasures
-
-
71D-05

- Cloud security
- GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
- Work style reforms
-
-
14:15 | 14:55
-
-
71A-07

- Measures against information leakage
- Authentication / Identity Management
- Cloud security
-
71B-07

- Authentication / Identity Management
- Work style reforms
-
71C-07

Attention!! Do you WannaCry again? Automation is the answer for insider threat measure.
-
Sumitomo Electric Information Systems Co., Ltd.
Assistant ManagerMCore Development Group
Yukinao Uchiumi
- Targeted Theat
- Measures against information leakage
- Monitoring and detection
-
-
71D-07

-
Speaker
CrowdStrike Japan
Sales Engineer
Shigeru Suzuki
-
Speaker
CrowdStrike Japan
Senior Sales Engineer
Lancine Sako
- Endpoint Security
- Smart device security
- Monitoring and detection
-
Speaker
-
71E-07

- Targeted Theat
- Measures against information leakage
- Cloud security
-
-
15:10 | 15:50
-
-
71A-08

-
Terilogy Worx
DirectorBusiness Development
Yoichi Matsuura
-
-
71B-08

Security in the age of Could Shift
-
Hitachi Solutions, Ltd.
Senior EngineerSecurity Marketing Promotion Department
Hideo Miyazaki
- Measures against information leakage
- Cloud security
-
-
71C-08

- Endpoint Security
- Measures against information leakage
- Work style reforms
-
71D-08

Improve and solve your bad storage environment!
VAULT Series provide security, safety, and comfort for file management.-
Soliton Systems K.K.
Manager, Product Division
Tomoo Kinoshita
- Ransomware measures
- Measures against information leakage
- Monitoring and detection
-
-
-
16:05 | 16:45
-
-
71A-09

- Measures against information leakage
-
71B-09

- Measures against information leakage
- Measures against DDoS
- Cloud security
-
71C-09

Intelligence Driven Cyber Security Solution
– Introducing CYFIRMA Cyber Intelligence Analytics Platform-
CYFIRMA K.K.
Representative Director
Shuhei Igarashi
- Targeted Theat
- Incident response / CSIRT / SOC
- Critical Infrastructure Security
-
-
71D-09

- Targeted Theat
- Monitoring and detection
- Other
-
-
17:00 | 17:40
-
-
71A-10

- Endpoint Security
- Critical Infrastructure Security
- Monitoring and detection
-
71B-10

- Targeted Theat
- Measures against information leakage
- Vulnerability countermeasure / Tamper prevention measures
-
71C-10

- Incident response / CSIRT / SOC
- Cloud security
- Monitoring and detection
-
71D-10

- Measures against information leakage
- GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
- Security auditing / System audit
-
-
17:50 | 18:30
-
-
71A-11

Threats of Cyberattacks on Industrial Control Systems and Importance of Risk Management
- Security Risk Assessment to avoid Business Impact --
Information-technology Promotion Agency, Japan
ResearcherIT Security Center (ISEC), IT Security Countermeasures DepartmentIndustrial Cyber Security Center of Excellence (COE), Operations Department
Satoshi Fukuhara
- Critical Infrastructure Security
- Other
-
-
71B-11

Current countermeasures as we approach the quantum computer era
- Measures against information leakage
- Encryption / Certificate
- Critical Infrastructure Security
-
71C-11

- Incident response / CSIRT / SOC
-
71D-11

Attempts to Maintain the Internet against a Security Threat - Recent trends of IP Address and Domain Name Security
- Domain authentication / DNS security
- Other
-