• MY PAGE
  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
  • MY PAGE
  • 来場事前登録 Register Now

  • MY PAGE
  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
  • FAQ
    • MY PAGE
    • 来場事前登録 Register Now

  • NOM'S EVENTS
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020

Session

  • All
  • 10.9(Wed)
  • 10.10(Thu)
  • 10.11(Fri)
  • simultaneous interpreting

  • lunch

Search (possible multiple choice)

Keyword

10.9(Wed)

  • RoomA
  • RoomB
  • RoomC
  • RoomD
  • RoomE
08:40 | 09:20
  • 71A-01

09:35 | 10:15
  • 71A-02

    Attack Types in the MITRE ATT&CK and the Splendid Countermeasures

    • ESET Japan Inc.

      Technology and Security Evangelist

      Kiku Chris Nakagawa

    • Targeted Theat
    • Antivirus
    • Endpoint Security
10:30 | 11:10
  • 71A-03

    • Targeted Theat
    • Antivirus
    • Endpoint Security
11:25 | 12:05
  • 71A-04

    How do you, protect confidential and personal information with DX?

    • Speaker

      Microsoft Japan KK

      Madoka Sawa

    • Speaker

      OneBe, Inc.

      CEO

      Takashi Kato

    • Endpoint Security
    • GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
    • Work style reforms
12:25 | 13:05
  • 71A-05

    What is the security required for e-mail?Explain the threats and countermeasures of unstoppable “Targeted e-mail” and “Wrong Transmission e-mail”.

    • Digital Arts Inc.

      Product manager, Marketing Dept

      Kotaro Haginoya

    • Targeted Theat
    • Email Security
    • Business Email Compromise (BEC) countermeasures
  • 71D-05

    • Cloud security
    • GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
    • Work style reforms
13:20 | 14:00
  • 71D-06

  • 71E-06

    • Endpoint Security
    • Measures against information leakage
    • Work style reforms
14:15 | 14:55
  • 71A-07

    • Measures against information leakage
    • Authentication / Identity Management
    • Cloud security
  • 71B-07

    • Authentication / Identity Management
    • Work style reforms
  • 71C-07

    Attention!! Do you WannaCry again? Automation is the answer for insider threat measure.

    • Sumitomo Electric Information Systems Co., Ltd.

      Assistant ManagerMCore Development Group

      Yukinao Uchiumi

    • Targeted Theat
    • Measures against information leakage
    • Monitoring and detection
  • 71D-07

    • Speaker

      CrowdStrike Japan

      Sales Engineer

      Shigeru Suzuki

    • Speaker

      CrowdStrike Japan

      Senior Sales Engineer

      Lancine Sako

    • Endpoint Security
    • Smart device security
    • Monitoring and detection
  • 71E-07

    • Targeted Theat
    • Measures against information leakage
    • Cloud security
15:10 | 15:50
  • 71A-08

    • Terilogy Worx

      DirectorBusiness Development

      Yoichi Matsuura

  • 71B-08

    Security in the age of Could Shift

    • Hitachi Solutions, Ltd.

      Senior EngineerSecurity Marketing Promotion Department

      Hideo Miyazaki

    • Measures against information leakage
    • Cloud security
  • 71C-08

    • Endpoint Security
    • Measures against information leakage
    • Work style reforms
  • 71D-08

    Improve and solve your bad storage environment!
    VAULT Series provide security, safety, and comfort for file management.

    • Soliton Systems K.K.

      Manager, Product Division

      Tomoo Kinoshita

    • Ransomware measures
    • Measures against information leakage
    • Monitoring and detection
16:05 | 16:45
  • 71A-09

    • Measures against information leakage
  • 71B-09

    • Measures against information leakage
    • Measures against DDoS
    • Cloud security
  • 71C-09

    Intelligence Driven Cyber Security Solution
    – Introducing CYFIRMA Cyber Intelligence Analytics Platform

    • CYFIRMA K.K.

      Representative Director

      Shuhei Igarashi

    • Targeted Theat
    • Incident response / CSIRT / SOC
    • Critical Infrastructure Security
  • 71D-09

    • Targeted Theat
    • Monitoring and detection
    • Other
17:00 | 17:40
  • 71A-10

    • Endpoint Security
    • Critical Infrastructure Security
    • Monitoring and detection
  • 71B-10

    • Targeted Theat
    • Measures against information leakage
    • Vulnerability countermeasure / Tamper prevention measures
  • 71C-10

    • Incident response / CSIRT / SOC
    • Cloud security
    • Monitoring and detection
  • 71D-10

    • Measures against information leakage
    • GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
    • Security auditing / System audit
17:50 | 18:30
  • 71A-11

    Threats of Cyberattacks on Industrial Control Systems and Importance of Risk Management
    - Security Risk Assessment to avoid Business Impact -

    • Information-technology Promotion Agency, Japan

      ResearcherIT Security Center (ISEC), IT Security Countermeasures DepartmentIndustrial Cyber Security Center of Excellence (COE), Operations Department

      Satoshi Fukuhara

    • Critical Infrastructure Security
    • Other
  • 71B-11

    Current countermeasures as we approach the quantum computer era

    • Measures against information leakage
    • Encryption / Certificate
    • Critical Infrastructure Security
  • 71C-11

    • Incident response / CSIRT / SOC
  • 71D-11

    Attempts to Maintain the Internet against a Security Threat - Recent trends of IP Address and Domain Name Security

    • Domain authentication / DNS security
    • Other

10.10(Thu)

  • RoomA
  • RoomB
  • RoomC
  • RoomD
  • RoomE
08:40 | 09:20
  • 72A-01

    Recent Trend on Cybersecurity

    • Tokyo Denki University

      Special Ordered Professor

      Ryoichi Sasaki

    • Targeted Theat
    • IoT security
    • AI
09:35 | 10:15
  • 72A-02

    • Targeted Theat
    • Authentication / Identity Management
    • Security auditing / System audit
10:30 | 11:10
  • 72A-03

    • SOMPO Risk Management Co., Ltd.

      Fellow and Product Strategy General ManagerCyber Security Business Division Executive

      Toru Atsumi

    • Vulnerability countermeasure / Tamper prevention measures
    • Security auditing / System audit
    • Business Email Compromise (BEC) countermeasures
11:25 | 12:05
  • 72A-04

    • Targeted Theat
    • Email Security
    • Measures against information leakage
12:25 | 13:05
  • 72A-05

    Digital Transformation and Security Transformation
    New System Infrastructure beyond Cloud era

    • Fortinet Japan K.K.

      Vice President (Japan) , Senior Marketing Director

      Nobuki Nishizawa

    • Targeted Theat
    • IoT security
    • Critical Infrastructure Security
  • 72D-05

    • Measures against information leakage
    • GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
    • Security auditing / System audit
  • 72E-05

    Endpoint security financial industry case study

    • OneBe, Inc.

      CEO

      Takashi Kato

    • Endpoint Security
    • Measures against information leakage
    • Work style reforms
13:20 | 14:00
  • 72D-06

    Three Top Precautions for Public Cloud utilization

    • Check Point Software Technologies (Japan) Ltd.

      Security Evangelist

      Daiji Ushiro

    • Targeted Theat
    • Measures against information leakage
    • Cloud security
  • 72E-06

    The Importance of Cyber Defense Exercises in Critical Infrastructures and Cyber Attack Detection Solutions Using AI

    • Strategic Cyber Holdings LLC(CYBERGYM)

      CEO

      Norihiko Ishihara

    • IoT security
    • Incident response / CSIRT / SOC
    • Critical Infrastructure Security
14:15 | 14:55
  • 72A-07

    • Measures against information leakage
    • Remote access / VPN
    • Work style reforms
  • 72B-07

    Zero Trust - Cisco's Practical Approach -

    • Cisco Systems G.K.

      Consulting Systems Engineer,.Cybersecurity Sales

      Tatsuya Asai

    • Targeted Theat
    • Cloud security
    • Critical Infrastructure Security
  • 72C-07

    The true value of an innovative security platform born in the cloud

    • Zscaler Japan K.K.

      Sales Engineer Manager, North Asia

      Sugawara Hiroshi

    • Zscaler Japan K.K.

      Customer Success Manager

      Takano Satoshi

    • Remote access / VPN
    • Cloud security
    • Improve productivity
  • 72D-07

    • Measures against information leakage
    • Incident response / CSIRT / SOC
    • GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
  • 72E-07

    What is the security solutions for work style reform and cloud era?

    • Tokyo Electron Device Ltd.

      Cloud Technology Departmento Cyber security Technology Group

      Tohru Miyoshi

    • Endpoint Security
    • Cloud security
    • Work style reforms
15:10 | 15:50
  • 72A-08

    The role of TiFRONT for the construction of "Zero Trust Network"

    • Speaker

      PIOLINK, Inc.

      Manager

      Taro Matsuda

    • Targeted Theat
    • Ransomware measures
    • Endpoint Security
  • 72B-08

    Introducing Threat Management Cisco Firepower

    • Cisco Systems G.K.

      Consulting Systems Engineer, Cybersecurity Sales

      Tatsuya Kobayashi

    • Firewall / UTM
    • Anti-Spam
    • Security auditing / System audit
  • 72C-08

    • Authentication / Identity Management
    • Cloud security
    • Improve productivity
  • 72D-08

    • Targeted Theat
    • Ransomware measures
    • Firewall / UTM
  • 72E-08

    • Email Security
    • Human resource development
    • Business Email Compromise (BEC) countermeasures
16:05 | 16:45
  • 72A-09

    • Infoscience Corporation

      Seinor ConsultantProduct Department Cyber Security Consulting Team

      Hirokazu Muro

    • Targeted Theat
    • Measures against information leakage
    • Cloud security
  • 72B-09

    Cisco's Cloud-based Secure Internet Gateway (SIG) that resolves user complaints

    • Cisco Systems G.K.

      Sales Specialist, Cybersecurity Sales

      Yasunobu Fukudome

    • Cloud security
    • Critical Infrastructure Security
    • Monitoring and detection
  • 72C-09

    What is the security required for e-mail?Explain the threats and countermeasures of unstoppable “Targeted e-mail” and “Wrong Transmission e-mail”.

    • Digital Arts Inc.

      Product manager, Marketing Dept

      Munemasa Endo

    • Targeted Theat
    • Email Security
    • Business Email Compromise (BEC) countermeasures
  • 72D-09

    • Targeted Theat
    • Endpoint Security
    • Measures against information leakage
  • Closed

    72E-09

    TLPT, the key to changing from defense to detection
    -Issues and points understood from the case of NTTDATA-

    • NTT DATA Corporation

      Senior ManagerConsulting Group, Cyber Security Section, Security Engineering Department

      Shinichi Matsuzawa

    • Targeted Theat
    • Measures against information leakage
    • Incident response / CSIRT / SOC
17:00 | 17:40
  • 72A-10

    3 Best Practices for Application Security (and Bonus Tip)

    • Imperva

      Vice President, World Wide Sales Engineering

      Tim Chang

    • Measures against DDoS
    • Cloud security
    • Monitoring and detection
  • 72B-10

    • Measures against information leakage
    • Measures against DDoS
    • Cloud security
  • 72C-10

    • Targeted Theat
    • Incident response / CSIRT / SOC
    • Improve productivity
  • 72E-10

    How to automate container security and achieve PCI and GDPR compliance?

    • NeuVector

      APAC Region Director

      Remington Tramel

    • Trident Technology

      Director,Japan Region

      Masaki Yamakawa

    • Targeted Theat
    • Firewall / UTM
    • Monitoring and detection
17:50 | 18:30
  • 72A-11

    "Security human resource development Next Stage! ~ In addition to "defense", the role of "offensive and active" appears, and what should we be do now."

    • Director Education CommitteeNPO Japan Network Security Association

      / Executive consultanti-Learning Co., Ltd.

      Toshihiro Hirayama

    • Human resource development
  • 72B-11

    • Encryption / Certificate
  • 72C-11

    Security issue on 5G Network

    • WG Chair Smart Security Laboratory TTC

      Senior Manager Security Working Group KDDI Research Inc.

      Yutaka Miyake

    • Critical Infrastructure Security
  • 72D-11

    Let's Expand CSIRT Community~Kanto Region~

    • Regional Promotion Committee Chair, Nippon CSIRT Association

      DeNA CERT, Cyber Security Dept., System Management Unit, DeNA Co., Ltd.

      Fumie Watanabe

    • Incident response / CSIRT / SOC
    • Improve productivity
    • Other

10.11(Fri)

  • RoomA
  • RoomB
  • RoomC
  • RoomD
  • RoomE
09:35 | 10:15
  • 73A-02

    How do you handle suspicious emails that still slip through the security gateways?
    ~The ultimate email security solution which protects by Human power finally~

    • Cofense G.K.

      Sales EngineerSales Engineering

      Taira Fujita

    • Targeted Theat
    • Email Security
    • Business Email Compromise (BEC) countermeasures
10:30 | 11:10
  • 73A-03

    • Endpoint Security
    • Measures against information leakage
    • Work style reforms
11:25 | 12:05
  • 73A-04

    Security and future guidelines essential for accelerating digital transformation

    • Senior Principal Security Advisor

      Senior Principal Security Advisor

      Katsuya Furukawa

    • Targeted Theat
    • Incident response / CSIRT / SOC
    • Monitoring and detection
12:25 | 13:05
  • 73A-05

    • Targeted Theat
    • Ransomware measures
    • Measures against information leakage
  • Closed

    73D-05

    Preventing Information Leakage and Strengthening Internal Control with Advanced Privileged ID Management

    • Itochu Techno-Solutions Corporation

      Products Business Department

      Hiroko Doi

    • Measures against information leakage
    • Authentication / Identity Management
    • Security auditing / System audit
  • 73E-05

    Tough call which to pick Picture Stream or Sanitize for web isolation… Now you can do both!

    • K.K.Ashisuto

      Virtualization Prod. Promotion Division Marketing Specialist

      Hiroaki Aoki

    • Targeted Theat
    • Endpoint Security
    • Phishing Attack
13:20 | 14:00
  • Closed

    73D-06

    The effect of introducing EDR
    〜 Demo of latest attack and how to do Incident Response using CB Defense 〜

    • Network Value Components Ltd.

      Security Evangelist, Solution Planning Div.

      Yuki Sato

    • Targeted Theat
    • Endpoint Security
    • Incident response / CSIRT / SOC
  • Closed

    73E-06

    • IoT security
    • Vulnerability countermeasure / Tamper prevention measures
14:15 | 14:55
  • 73A-07

    • Authentication / Identity Management
    • Encryption / Certificate
    • Improve productivity
  • 73B-07

    • Email Security
    • Measures against information leakage
    • Cloud security
  • 73C-07

    • McAfee Co.,LTD.

      Senior Manager, Sales Engineering

      Hidemitsu Sakurai

    • Cloud security
    • Work style reforms
  • 73D-07

    • Measures against information leakage
    • Authentication / Identity Management
    • Cloud security
  • Closed

    73E-07

    • CrowdStrike Japan

      Principal Consultant

      Yuichi Uzawa

    • Endpoint Security
    • Incident response / CSIRT / SOC
    • Monitoring and detection
15:10 | 15:50
  • 73A-08

    • Incident response / CSIRT / SOC
    • Monitoring and detection
  • 73B-08

    • Email Security
    • Cloud security
    • Business Email Compromise (BEC) countermeasures
  • 73C-08

    • Bitglass

      Japan Country General Manager

      Yasuyuki Shinmen

    • Measures against information leakage
    • Cloud security
    • Work style reforms
  • 73D-08

    • Measures against information leakage
    • Monitoring and detection
    • AI
  • 73E-08

    TLPT, the key to changing from defense to detection
    -Issues and points understood from the case of NTTDATA-

    • Speaker

      NTT DATA Corporation

      IT Solutions Group, Cyber Secuirty Section,Security Engineering Department

      Akira Takeda

    • Targeted Theat
    • Measures against information leakage
    • Incident response / CSIRT / SOC
16:05 | 16:45
  • 73A-09

    • Targeted Theat
    • Measures against information leakage
    • Cloud security
  • 73B-09

    • Email Security
    • Encryption / Certificate
    • AI
  • 73C-09

    • Incident response / CSIRT / SOC
    • Cloud security
    • Monitoring and detection
  • 73D-09

    • Measures against information leakage
    • Encryption / Certificate
    • Security auditing / System audit
  • 73E-09

    • Remote access / VPN
    • Smart device security
    • Work style reforms
17:00 | 17:40
  • 73A-10

    OSINT starting from email address

    • Japan Hackers Association

      representative director

      Takayuki Sugiura

    • Critical Infrastructure Security
    • Other
  • 73B-10

  • 73C-10

  • 73D-10

スペシャルセッション

10.11(Fri)

  • RoomA
  • RoomB
  • RoomC
  • RoomD
  • RoomE
08:40 | 09:20
  • 73A-01

    Special Session

  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

Copyright (c) NANO OPT Media, Inc. All rights reserved.