Session
-
simultaneous interpreting
-
lunch
Search (possible multiple choice)
Keyword
10.9(Wed)
-
08:40 | 09:20
-
10:30 | 11:10
-
12:25 | 13:05
-
-
71A-05
What is the security required for e-mail?Explain the threats and countermeasures of unstoppable “Targeted e-mail” and “Wrong Transmission e-mail”.
-
Digital Arts Inc.
Product manager, Marketing Dept
Kotaro Haginoya
- Targeted Theat
- Email Security
- Business Email Compromise (BEC) countermeasures
-
-
71D-05
- Cloud security
- GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
- Work style reforms
-
-
14:15 | 14:55
-
-
71A-07
- Measures against information leakage
- Authentication / Identity Management
- Cloud security
-
71B-07
- Authentication / Identity Management
- Work style reforms
-
71C-07
Attention!! Do you WannaCry again? Automation is the answer for insider threat measure.
-
Sumitomo Electric Information Systems Co., Ltd.
Assistant ManagerMCore Development Group
Yukinao Uchiumi
- Targeted Theat
- Measures against information leakage
- Monitoring and detection
-
-
71D-07
-
Speaker
CrowdStrike Japan
Sales Engineer
Shigeru Suzuki
-
Speaker
CrowdStrike Japan
Senior Sales Engineer
Lancine Sako
- Endpoint Security
- Smart device security
- Monitoring and detection
-
Speaker
-
71E-07
- Targeted Theat
- Measures against information leakage
- Cloud security
-
-
15:10 | 15:50
-
-
71A-08
-
Terilogy Worx
DirectorBusiness Development
Yoichi Matsuura
-
-
71B-08
Security in the age of Could Shift
-
Hitachi Solutions, Ltd.
Senior EngineerSecurity Marketing Promotion Department
Hideo Miyazaki
- Measures against information leakage
- Cloud security
-
-
71C-08
- Endpoint Security
- Measures against information leakage
- Work style reforms
-
71D-08
Improve and solve your bad storage environment!
VAULT Series provide security, safety, and comfort for file management.-
Soliton Systems K.K.
Manager, Product Division
Tomoo Kinoshita
- Ransomware measures
- Measures against information leakage
- Monitoring and detection
-
-
-
16:05 | 16:45
-
-
71A-09
- Measures against information leakage
-
71B-09
- Measures against information leakage
- Measures against DDoS
- Cloud security
-
71C-09
Intelligence Driven Cyber Security Solution
– Introducing CYFIRMA Cyber Intelligence Analytics Platform-
CYFIRMA K.K.
Representative Director
Shuhei Igarashi
- Targeted Theat
- Incident response / CSIRT / SOC
- Critical Infrastructure Security
-
-
71D-09
- Targeted Theat
- Monitoring and detection
- Other
-
-
17:00 | 17:40
-
-
71A-10
- Endpoint Security
- Critical Infrastructure Security
- Monitoring and detection
-
71B-10
- Targeted Theat
- Measures against information leakage
- Vulnerability countermeasure / Tamper prevention measures
-
71C-10
- Incident response / CSIRT / SOC
- Cloud security
- Monitoring and detection
-
71D-10
- Measures against information leakage
- GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
- Security auditing / System audit
-
-
17:50 | 18:30
-
-
71A-11
Threats of Cyberattacks on Industrial Control Systems and Importance of Risk Management
- Security Risk Assessment to avoid Business Impact --
Information-technology Promotion Agency, Japan
ResearcherIT Security Center (ISEC), IT Security Countermeasures DepartmentIndustrial Cyber Security Center of Excellence (COE), Operations Department
Satoshi Fukuhara
- Critical Infrastructure Security
- Other
-
-
71B-11
Current countermeasures as we approach the quantum computer era
- Measures against information leakage
- Encryption / Certificate
- Critical Infrastructure Security
-
71C-11
- Incident response / CSIRT / SOC
-
71D-11
Attempts to Maintain the Internet against a Security Threat - Recent trends of IP Address and Domain Name Security
- Domain authentication / DNS security
- Other
-
10.10(Thu)
-
12:25 | 13:05
-
-
72A-05
Digital Transformation and Security Transformation
New System Infrastructure beyond Cloud era-
Fortinet Japan K.K.
Vice President (Japan) , Senior Marketing Director
Nobuki Nishizawa
- Targeted Theat
- IoT security
- Critical Infrastructure Security
-
-
72D-05
- Measures against information leakage
- GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
- Security auditing / System audit
-
72E-05
Endpoint security financial industry case study
-
OneBe, Inc.
CEO
Takashi Kato
- Endpoint Security
- Measures against information leakage
- Work style reforms
-
-
-
13:20 | 14:00
-
-
72D-06
Three Top Precautions for Public Cloud utilization
-
Check Point Software Technologies (Japan) Ltd.
Security Evangelist
Daiji Ushiro
- Targeted Theat
- Measures against information leakage
- Cloud security
-
-
72E-06
The Importance of Cyber Defense Exercises in Critical Infrastructures and Cyber Attack Detection Solutions Using AI
-
Strategic Cyber Holdings LLC(CYBERGYM)
CEO
Norihiko Ishihara
- IoT security
- Incident response / CSIRT / SOC
- Critical Infrastructure Security
-
-
-
14:15 | 14:55
-
-
72A-07
- Measures against information leakage
- Remote access / VPN
- Work style reforms
-
72B-07
Zero Trust - Cisco's Practical Approach -
-
Cisco Systems G.K.
Consulting Systems Engineer,.Cybersecurity Sales
Tatsuya Asai
- Targeted Theat
- Cloud security
- Critical Infrastructure Security
-
-
72C-07
The true value of an innovative security platform born in the cloud
-
Zscaler Japan K.K.
Sales Engineer Manager, North Asia
Sugawara Hiroshi
-
Zscaler Japan K.K.
Customer Success Manager
Takano Satoshi
- Remote access / VPN
- Cloud security
- Improve productivity
-
-
72D-07
- Measures against information leakage
- Incident response / CSIRT / SOC
- GDPR / Privacy Mark / ISMS / Trends of laws and ordinances
-
72E-07
What is the security solutions for work style reform and cloud era?
-
Tokyo Electron Device Ltd.
Cloud Technology Departmento Cyber security Technology Group
Tohru Miyoshi
- Endpoint Security
- Cloud security
- Work style reforms
-
-
-
15:10 | 15:50
-
-
72A-08
The role of TiFRONT for the construction of "Zero Trust Network"
-
Speaker
PIOLINK, Inc.
Manager
Taro Matsuda
- Targeted Theat
- Ransomware measures
- Endpoint Security
-
Speaker
-
72B-08
Introducing Threat Management Cisco Firepower
-
Cisco Systems G.K.
Consulting Systems Engineer, Cybersecurity Sales
Tatsuya Kobayashi
- Firewall / UTM
- Anti-Spam
- Security auditing / System audit
-
-
72C-08
- Authentication / Identity Management
- Cloud security
- Improve productivity
-
72D-08
- Targeted Theat
- Ransomware measures
- Firewall / UTM
-
72E-08
- Email Security
- Human resource development
- Business Email Compromise (BEC) countermeasures
-
-
16:05 | 16:45
-
-
72A-09
-
Infoscience Corporation
Seinor ConsultantProduct Department Cyber Security Consulting Team
Hirokazu Muro
- Targeted Theat
- Measures against information leakage
- Cloud security
-
-
72B-09
Cisco's Cloud-based Secure Internet Gateway (SIG) that resolves user complaints
-
Cisco Systems G.K.
Sales Specialist, Cybersecurity Sales
Yasunobu Fukudome
- Cloud security
- Critical Infrastructure Security
- Monitoring and detection
-
-
72C-09
What is the security required for e-mail?Explain the threats and countermeasures of unstoppable “Targeted e-mail” and “Wrong Transmission e-mail”.
-
Digital Arts Inc.
Product manager, Marketing Dept
Munemasa Endo
- Targeted Theat
- Email Security
- Business Email Compromise (BEC) countermeasures
-
-
72D-09
- Targeted Theat
- Endpoint Security
- Measures against information leakage
-
Closed
72E-09
TLPT, the key to changing from defense to detection
-Issues and points understood from the case of NTTDATA--
NTT DATA Corporation
Senior ManagerConsulting Group, Cyber Security Section, Security Engineering Department
Shinichi Matsuzawa
- Targeted Theat
- Measures against information leakage
- Incident response / CSIRT / SOC
-
-
-
17:00 | 17:40
-
-
72A-10
3 Best Practices for Application Security (and Bonus Tip)
-
Imperva
Vice President, World Wide Sales Engineering
Tim Chang
- Measures against DDoS
- Cloud security
- Monitoring and detection
-
-
72B-10
- Measures against information leakage
- Measures against DDoS
- Cloud security
-
72C-10
- Targeted Theat
- Incident response / CSIRT / SOC
- Improve productivity
-
72E-10
How to automate container security and achieve PCI and GDPR compliance?
-
NeuVector
APAC Region Director
Remington Tramel
-
Trident Technology
Director,Japan Region
Masaki Yamakawa
- Targeted Theat
- Firewall / UTM
- Monitoring and detection
-
-
-
17:50 | 18:30
-
-
72A-11
"Security human resource development Next Stage! ~ In addition to "defense", the role of "offensive and active" appears, and what should we be do now."
-
Director Education CommitteeNPO Japan Network Security Association
/ Executive consultanti-Learning Co., Ltd.
Toshihiro Hirayama
- Human resource development
-
-
72B-11
- Encryption / Certificate
-
72C-11
Security issue on 5G Network
-
WG Chair Smart Security Laboratory TTC
Senior Manager Security Working Group KDDI Research Inc.
Yutaka Miyake
- Critical Infrastructure Security
-
-
72D-11
Let's Expand CSIRT Community~Kanto Region~
-
Regional Promotion Committee Chair, Nippon CSIRT Association
DeNA CERT, Cyber Security Dept., System Management Unit, DeNA Co., Ltd.
Fumie Watanabe
- Incident response / CSIRT / SOC
- Improve productivity
- Other
-
-
10.11(Fri)
-
12:25 | 13:05
-
-
73A-05
- Targeted Theat
- Ransomware measures
- Measures against information leakage
-
Closed
73D-05
Preventing Information Leakage and Strengthening Internal Control with Advanced Privileged ID Management
-
Itochu Techno-Solutions Corporation
Products Business Department
Hiroko Doi
- Measures against information leakage
- Authentication / Identity Management
- Security auditing / System audit
-
-
73E-05
Tough call which to pick Picture Stream or Sanitize for web isolation… Now you can do both!
-
K.K.Ashisuto
Virtualization Prod. Promotion Division Marketing Specialist
Hiroaki Aoki
- Targeted Theat
- Endpoint Security
- Phishing Attack
-
-
-
13:20 | 14:00
-
-
Closed
73D-06
The effect of introducing EDR
〜 Demo of latest attack and how to do Incident Response using CB Defense 〜-
Network Value Components Ltd.
Security Evangelist, Solution Planning Div.
Yuki Sato
- Targeted Theat
- Endpoint Security
- Incident response / CSIRT / SOC
-
-
Closed
73E-06
- IoT security
- Vulnerability countermeasure / Tamper prevention measures
-
-
14:15 | 14:55
-
-
73A-07
- Authentication / Identity Management
- Encryption / Certificate
- Improve productivity
-
73C-07
-
McAfee Co.,LTD.
Senior Manager, Sales Engineering
Hidemitsu Sakurai
- Cloud security
- Work style reforms
-
-
73D-07
- Measures against information leakage
- Authentication / Identity Management
- Cloud security
-
Closed
73E-07
-
CrowdStrike Japan
Principal Consultant
Yuichi Uzawa
- Endpoint Security
- Incident response / CSIRT / SOC
- Monitoring and detection
-
-
-
15:10 | 15:50
-
-
73A-08
- Incident response / CSIRT / SOC
- Monitoring and detection
-
73C-08
-
Bitglass
Japan Country General Manager
Yasuyuki Shinmen
- Measures against information leakage
- Cloud security
- Work style reforms
-
-
73D-08
- Measures against information leakage
- Monitoring and detection
- AI
-
73E-08
TLPT, the key to changing from defense to detection
-Issues and points understood from the case of NTTDATA--
Speaker
NTT DATA Corporation
IT Solutions Group, Cyber Secuirty Section,Security Engineering Department
Akira Takeda
- Targeted Theat
- Measures against information leakage
- Incident response / CSIRT / SOC
-
Speaker
-
-
16:05 | 16:45
-
-
73A-09
- Targeted Theat
- Measures against information leakage
- Cloud security
-
73C-09
- Incident response / CSIRT / SOC
- Cloud security
- Monitoring and detection
-
73D-09
- Measures against information leakage
- Encryption / Certificate
- Security auditing / System audit
-
73E-09
- Remote access / VPN
- Smart device security
- Work style reforms
-