• MY PAGE
  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
  • MY PAGE
  • 来場事前登録 Register Now

  • MY PAGE
  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
  • FAQ
    • MY PAGE
    • 来場事前登録 Register Now

  • NOM'S EVENTS
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020

Session

  • All
  • 10.9(Wed)
  • 10.10(Thu)
  • 10.11(Fri)
  • simultaneous interpreting

  • lunch

Search (possible multiple choice)

Keyword

10.10(Thu)

  • RoomA
  • RoomB
  • RoomC
  • RoomD
  • RoomE
08:40 | 09:20
  • 72A-01

    Recent Trend on Cybersecurity

    • Tokyo Denki University

      Special Ordered Professor

      Ryoichi Sasaki

    • Targeted Theat
    • IoT security
    • AI
09:35 | 10:15
  • 72A-02

    • Targeted Theat
    • Authentication / Identity Management
    • Security auditing / System audit
10:30 | 11:10
  • 72A-03

    • SOMPO Risk Management Co., Ltd.

      Fellow and Product Strategy General ManagerCyber Security Business Division Executive

      Toru Atsumi

    • Vulnerability countermeasure / Tamper prevention measures
    • Security auditing / System audit
    • Business Email Compromise (BEC) countermeasures
11:25 | 12:05
  • 72A-04

    • Targeted Theat
    • Email Security
    • Measures against information leakage
12:25 | 13:05
  • 72A-05

    Digital Transformation and Security Transformation
    New System Infrastructure beyond Cloud era

    • Fortinet Japan K.K.

      Vice President (Japan) , Senior Marketing Director

      Nobuki Nishizawa

    • Targeted Theat
    • IoT security
    • Critical Infrastructure Security
  • 72D-05

    • Measures against information leakage
    • GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
    • Security auditing / System audit
  • 72E-05

    Endpoint security financial industry case study

    • OneBe, Inc.

      CEO

      Takashi Kato

    • Endpoint Security
    • Measures against information leakage
    • Work style reforms
13:20 | 14:00
  • 72D-06

    Three Top Precautions for Public Cloud utilization

    • Check Point Software Technologies (Japan) Ltd.

      Security Evangelist

      Daiji Ushiro

    • Targeted Theat
    • Measures against information leakage
    • Cloud security
  • 72E-06

    The Importance of Cyber Defense Exercises in Critical Infrastructures and Cyber Attack Detection Solutions Using AI

    • Strategic Cyber Holdings LLC(CYBERGYM)

      CEO

      Norihiko Ishihara

    • IoT security
    • Incident response / CSIRT / SOC
    • Critical Infrastructure Security
14:15 | 14:55
  • 72A-07

    • Measures against information leakage
    • Remote access / VPN
    • Work style reforms
  • 72B-07

    Zero Trust - Cisco's Practical Approach -

    • Cisco Systems G.K.

      Consulting Systems Engineer,.Cybersecurity Sales

      Tatsuya Asai

    • Targeted Theat
    • Cloud security
    • Critical Infrastructure Security
  • 72C-07

    The true value of an innovative security platform born in the cloud

    • Zscaler Japan K.K.

      Sales Engineer Manager, North Asia

      Sugawara Hiroshi

    • Zscaler Japan K.K.

      Customer Success Manager

      Takano Satoshi

    • Remote access / VPN
    • Cloud security
    • Improve productivity
  • 72D-07

    • Measures against information leakage
    • Incident response / CSIRT / SOC
    • GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
  • 72E-07

    What is the security solutions for work style reform and cloud era?

    • Tokyo Electron Device Ltd.

      Cloud Technology Departmento Cyber security Technology Group

      Tohru Miyoshi

    • Endpoint Security
    • Cloud security
    • Work style reforms
15:10 | 15:50
  • 72A-08

    The role of TiFRONT for the construction of "Zero Trust Network"

    • Speaker

      PIOLINK, Inc.

      Manager

      Taro Matsuda

    • Targeted Theat
    • Ransomware measures
    • Endpoint Security
  • 72B-08

    Introducing Threat Management Cisco Firepower

    • Cisco Systems G.K.

      Consulting Systems Engineer, Cybersecurity Sales

      Tatsuya Kobayashi

    • Firewall / UTM
    • Anti-Spam
    • Security auditing / System audit
  • 72C-08

    • Authentication / Identity Management
    • Cloud security
    • Improve productivity
  • 72D-08

    • Targeted Theat
    • Ransomware measures
    • Firewall / UTM
  • 72E-08

    • Email Security
    • Human resource development
    • Business Email Compromise (BEC) countermeasures
16:05 | 16:45
  • 72A-09

    • Infoscience Corporation

      Seinor ConsultantProduct Department Cyber Security Consulting Team

      Hirokazu Muro

    • Targeted Theat
    • Measures against information leakage
    • Cloud security
  • 72B-09

    Cisco's Cloud-based Secure Internet Gateway (SIG) that resolves user complaints

    • Cisco Systems G.K.

      Sales Specialist, Cybersecurity Sales

      Yasunobu Fukudome

    • Cloud security
    • Critical Infrastructure Security
    • Monitoring and detection
  • 72C-09

    What is the security required for e-mail?Explain the threats and countermeasures of unstoppable “Targeted e-mail” and “Wrong Transmission e-mail”.

    • Digital Arts Inc.

      Product manager, Marketing Dept

      Munemasa Endo

    • Targeted Theat
    • Email Security
    • Business Email Compromise (BEC) countermeasures
  • 72D-09

    • Targeted Theat
    • Endpoint Security
    • Measures against information leakage
  • Closed

    72E-09

    TLPT, the key to changing from defense to detection
    -Issues and points understood from the case of NTTDATA-

    • NTT DATA Corporation

      Senior ManagerConsulting Group, Cyber Security Section, Security Engineering Department

      Shinichi Matsuzawa

    • Targeted Theat
    • Measures against information leakage
    • Incident response / CSIRT / SOC
17:00 | 17:40
  • 72A-10

    3 Best Practices for Application Security (and Bonus Tip)

    • Imperva

      Vice President, World Wide Sales Engineering

      Tim Chang

    • Measures against DDoS
    • Cloud security
    • Monitoring and detection
  • 72B-10

    • Measures against information leakage
    • Measures against DDoS
    • Cloud security
  • 72C-10

    • Targeted Theat
    • Incident response / CSIRT / SOC
    • Improve productivity
  • 72E-10

    How to automate container security and achieve PCI and GDPR compliance?

    • NeuVector

      APAC Region Director

      Remington Tramel

    • Trident Technology

      Director,Japan Region

      Masaki Yamakawa

    • Targeted Theat
    • Firewall / UTM
    • Monitoring and detection
17:50 | 18:30
  • 72A-11

    "Security human resource development Next Stage! ~ In addition to "defense", the role of "offensive and active" appears, and what should we be do now."

    • Director Education CommitteeNPO Japan Network Security Association

      / Executive consultanti-Learning Co., Ltd.

      Toshihiro Hirayama

    • Human resource development
  • 72B-11

    • Encryption / Certificate
  • 72C-11

    Security issue on 5G Network

    • WG Chair Smart Security Laboratory TTC

      Senior Manager Security Working Group KDDI Research Inc.

      Yutaka Miyake

    • Critical Infrastructure Security
  • 72D-11

    Let's Expand CSIRT Community~Kanto Region~

    • Regional Promotion Committee Chair, Nippon CSIRT Association

      DeNA CERT, Cyber Security Dept., System Management Unit, DeNA Co., Ltd.

      Fumie Watanabe

    • Incident response / CSIRT / SOC
    • Improve productivity
    • Other
  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

Copyright (c) NANO OPT Media, Inc. All rights reserved.