Session
-
lunch
Search (possible multiple choice)
Keyword
3.5(Tue)
-
10:20 | 11:00
-
-
GA-02
Coming Soon
-
Speaker
Blue Planet-works, Inc.
Principal Security Advisor
Yusuke Shigihara
- Ransomware measures
- Endpoint Security
- Vulnerability countermeasure
Presented byBlue Planet-works, Inc.
-
Speaker
-
GB-02
How to efficiently manage "Privileged ID" targeted by cyber attacks and internal fraud
- Introducing a case study that reduced the operational burden to 1/7 --
Speaker
NRI SecureTechnologies, Ltd.
Control Solution Business Department
Shizuka Fujisawa
- Measures against information leakag
- Authentication / Identity Management
- Security auditing / System auditing
Presented byNRI SecureTechnologies, Ltd.
-
Speaker
-
GC-02
Excerpts of 'Real' Inquiries from Security Personnel!!
Cybersecurity Troubles: 10 Questions and Answers-
Speaker
Act Co., Ltd.
Head of the cybersecurity business unit
Koji Yokoi
- Targeted Theat
- Ransomware measures
- XDR
Presented byACT.inc
-
Speaker
-
-
11:15 | 11:55
-
-
GA-03
Coming Soon
- Ransomware measures
- Authentication / Identity Management
- Zero trust security model
-
GB-03
What is employee personal information management that leads to corporate growth?
Techniques for collecting, managing, and utilizing employee information-
Speaker
SmartHR, Inc.
General Manager
Ryosuke Komai
- Cloud Security
- Human resource development
- Work style reform
Presented bySmartHR, Inc.
-
Speaker
-
GC-03
The elimination of "encrypted ZIPs and passwords sent through the same channel" is accelerating. What capabilities have those companies that have made the decision to change gained?
-
Speaker
imatrix corp.
Messaging Security Research
Senior researcherHibiki Oka
- Measures against information leakag
- Email Security
- Work style reform
Presented byimatrix corp.
-
Speaker
-
-
12:15 | 12:55
-
-
GA-04
Coming Soon
- Targeted Theat
- SOC / Incident response
- Managed Security
Presented byKaspersky Labs Japan
-
GB-04
Case studies for maximize iPhone utilization and security checklist to minimize risks.
-
Speaker
Jamf Japan G.K.
Manager
Sales EngineeringTakuya Iida
- Endpoint Security
- Measures against information leakag
- Zero trust security model
Presented byJamf Japan G.K
-
Speaker
-
GC-04
Coming Soon
Presented bySkyhigh Security Inc
-
-
13:05 | 13:45
-
-
GA-05
Security requirements and responses required for SDV
-
Speaker
Mazda Motor Corporation
Global Security Officer
MDI&IT Division /
General Incorporated Association Japan Automotive ISAC
Chairman
Technical CommitteeMasashi Yamasaki
- SOC / Incident response
- IoT Security
- GDPR / Privacy Mark / ISMS / Laws of the Decree
-
Speaker
-
GB-05
Cyber Security Efforts and the flont line of Chubu Electric Power Grid
-
Speaker
Chubu Electric Power Grid Co., Inc.
Assistant Manager, PG-CSIRT Cybersecurity Evangelist/Specialist
IT&Control System DepartmentHiroyuki Hasegawa
- PSIRT / CSIRT
- Critical Infrastructure Security
- Human resource development
-
Speaker
-
GC-05
Legal Risks Associated with the Use of Generative AI and How to Avoid Them
-
Speaker
Ushijima & Partners
Partner
Hiroyasu Kageshima
- AI Security
- other
-
Speaker
-
-
14:00 | 14:40
-
-
GA-06
DNP Group's Cyber Security ~ From EASM to CTEM
-
Speaker
Dai Nippon Printing Co., Ltd.
Cyber Security Business Development Unit, Advanced Business Center
Shun Mori
- Managed Security
- Monitoring and Detection
- Human resource development
Presented byDai Nippon Printing Co., Ltd.
-
Speaker
-
GB-06
Coming Soon
- Targeted Theat
- Cloud Security
- Work style reform
Presented bySoftBank Corp.
-
GC-06
Coming Soon
-
Speaker
GLOBAL SECURITY EXPERTS Inc.
Nahomi Kuraya
- PSIRT / CSIRT
- Managed Security
- IoT Security
Presented byGLOBAL SECURITY EXPERTS Inc.
-
Speaker
-
-
14:55 | 15:35
-
-
GA-07
Coming Soon
Presented bySCSK Minori Solutions Corporation
-
GB-07
The Best Password Management for Enterprises
-
Speaker
Keeper Security APAC Inc.
Sales
Yousuke Tanabe
-
Speaker
ZUNDA Inc.
Director / Sales & Customer Success
Daichi Fujii
- Cloud Security
- Authentication / Identity Management
- Zero trust security model
Presented byZUNDA Inc.
-
Speaker
-
-
15:50 | 16:30
-
-
GA-08
What will you solve with SBOM?
- Vulnerability countermeasure
- Software supply chain
- Critical Infrastructure Security
Presented byCybertrust Japan Co., Ltd.
-
GB-08
Coming Soon
- Targeted Theat
- Cloud Security
- Measures against information leakag
-
GC-08
Coming Soon
- Measures against information leakag
- Vulnerability countermeasure
Presented byCyber Security Cloud, Inc.
-
-
16:40 | 17:20
-
-
GA-09
Security measures required for website
-
Speaker
Information-technology Promotion Agency
Analysis Engineer
Security Center ,Security Measures Promotion Department ,Vulnerability Countermeasures GroupTaisuke Kimura
- Vulnerability countermeasure
-
Speaker
-
GC-09
Coming Soon
-
Speaker
Ministry of Land, Infrastructure, Transport and Tourism
-
Speaker
-