iotc iotc

    • facebook
    • twitter
    • YouTube
  • Registration Registration

  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration Registration

Session

  • lunch

Search (possible multiple choice)

Keyword

10.29(Tue)

  • RoomA
  • RoomB
  • RoomC
  • RoomD
09:30 | 10:10
  • GA-01

    Coming soon

    • Speaker

      NPO Japan Network Security Association(JNSA)

  • GB-01

    Latest trends in cybersecurity policy in the ICT field

    • Speaker

      Tokai Bureau of Telecommunications

      Deputy Director
      Cybersecurity Office

      Kazuki Sekiya

    • IoT security
    • Human resource development
  • GC-01

    Approach and Implementation of Factory Security Measures

    • Speaker

      Nagoya Institute of Technology

      Visiting Associate Professor
      Manufacturing and Innovation DX Laboratory

      Hiroshi Sasaki

    • Ransomware measures
    • Critical Infrastructure Security
    • Human resource development
10:20 | 11:00
  • GA-02

    Coming soon

    • Speaker

      :3-shake Inc.

    • Vulnerability measures / Tampering measures
    • Application Security
    • Critical Infrastructure Security

    Presented by3-shake Inc.

  • GB-02

    Coming soon

    • Speaker

      ACT.inc

    • Ransomware measures
    • Endpoint Security
    • SOC / Incident Response

    Presented byACT.inc

  • GC-02

    Coming soon

    • Speaker

      Veeam Software Japan

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Critical Infrastructure Security

    Presented byVeeam Software Japan

  • WS1-01

    Lessons in Preventing Fraudulent and Deceptive Use of Brands: Practical Exercises and Insights from Tabletop Exercise Kits

    • PSIRT / CSIRT
    • Human resource development
    • Phishing Attack
    • Workshop

     

     

11:15 | 11:55
  • GA-03

    Managing privileged acount and monitoring privileged session by using PAM/PASM

    • Speaker

      Jupiter Technology Corp.

      Chief Engineer
      Business Unit 3, Technical Group

      Hirofumi Noguchi

    • Speaker

      Jupiter Technology Corp.

      Business Unit 3, Technical Group

      Kunio Tamura

    • Authentication / Identity Management
    • Zero trust security model
    • Security auditing / system audit

    Presented byJupiter Technology Corp.

  • GB-03

    Don't Stop Operations! Maximizing Employee Satisfaction by Balancing Defense and Offense
    - Marubeni G's Trial and Error with SASE/EDR

    • Speaker

      MARUBENI IT SOLUTIONS INC.

    • Speaker

      MARUBENI IT SOLUTIONS INC.

    • Ransomware measures
    • Measures against information leakag
    • Zero trust security model

    Presented byMARUBENI IT SOLUTIONS INC.

  • GC-03

    Accelerating implementation in Nagoya! How to securely manage email and chat attachment files with no additional burden on employees?

    • Speaker

      HENNGE K.K.

      Product Planning & Research Division

      Natsumi Tanioka

    • Targeted Theat / Cyber Aattack
    • Email Security
    • Business Email Compromise

    Presented byHENNGE K.K.

12:15 | 12:55
  • GA-04

    Coming soon

    • Speaker

      Verizon Japan Ltd.

      Senior Solutions Principal, Security

    • Targeted Theat / Cyber Aattack
    • Vulnerability measures / Tampering measures
    • Software chain Attack

    Presented byVerizon Japan Ltd.

  • GB-04

    Latest Edition! What are the Current Threat Trends?
    - Introduction of Security Measures Necessary Now

    • Speaker

      CrowdStrike Japan G.K.

      Sales Engineer

      Shun Nakai

    • Targeted Theat / Cyber Aattack
    • XDR
    • SOC / Incident Response

    Presented byCrowdStrike Japan GK

  • GC-04

    ~Evolving security platform~
    Threat prevention using SentinelOne Singularity XDR

    • Speaker

      Tokyo Electron Device LTD.

      katsushi yamashita

    • Ransomware measures
    • Endpoint Security
    • XDR

    Presented byTokyo Electron Device LTD.

  • WS1-02

    The workshop on cybersecurity human resource development using "the Cyber-Poilce Game".

    • Measures against information leakag
    • Human resource development
    • Phishing Attack
    • Workshop
13:05 | 13:45
  • GA-05

    Control system security practices to enhance cyber resilience in connected factories

    • Speaker

      Toshiba Corporation

      General Manager
      Cyber Security Technology Center

      Koji Okada

    • Speaker

      Toshiba Corporation

      Expert
      Cyber Security Technology Center

      Masue Shiba

    • Endpoint Security
    • Software chain Attack
    • IoT security
  • GB-05

    Improving Organizational Response through the Consideration and Advancement of Cyber BCP (Business Continuity Planning)

    • Speaker

      Ernst & Young ShinNihon LLC

      Principal, EY Forensics Japan Technology Leader
      Forensic & Integrity Services

      Ichiro Sugiyama

    • Targeted Theat / Cyber Aattack
    • PSIRT / CSIRT
    • SOC / Incident Response
  • GC-05

    Coming soon

    • Speaker

      Mori Hamada & Matsumoto.

    • Ransomware measures
    • Critical Infrastructure Security
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
14:00 | 14:40
  • GA-06

    Corporate Defense Strategies in the DX Era Consistent Cyber Resilience Strategies for Both Normal and Crisis Situations

    • Speaker

      MOTEX Inc.

      Evangelist
      Cybersecurity Division, Security Services Department 1,
      Security Engineering Section

      Saki Fukuoka

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • SOC / Incident Response

    Presented byMOTEX Inc.

  • GB-06

    Coming soon

    • Speaker

      Tenable Network Security Japan K.K.

    • Vulnerability measures / Tampering measures
    • Critical Infrastructure Security
    • IoT security

    Presented byTenable Network Security Japan K.K.

  • GC-06

    Coming soon

    • Speaker

      A10 Networks, K.K.

    • Zero trust security model
    • Critical Infrastructure Security
    • Work style reform

    Presented byA10 Networks, K.K.

  • WS1-03

    A hands-on workshop to identify the key skills required for each role in your company

    • PSIRT / CSIRT
    • Human resource development
    • Work style reform
    • Workshop
14:55 | 15:35
  • GA-07

    Next Generation Authentication Infrastructure and Global IT Governance at Sumitomo Riko

    • Speaker

      Sumitomo Riko Company Limited

      Manager
      IT Infrastracture Planning Sectuion, Information Security Division

      Ryuma Kishi

    • Speaker

      Okta Japan K.K.

      Enterprise Account Executive
      Enterprise Sales

      Hitoshi Kozushi

    • Cloud security
    • Authentication / Identity Management
    • Zero trust security model

    Presented byOkta Japan K.K.

  • GB-07

    Coming soon

    • Speaker

      PFU Limited

      Expert, Security
      Infrastructure Customer Service Division,Infrastructure Managed Services Div.
      Ⅰ,Network Security Dept.Security Services

      Masayuki Sugama

    • Vulnerability measures / Tampering measures
    • SOC / Incident Response
    • Managed security

    Presented byPFU Limited

  • GC-07

    The natural reason why mission-critical systems succumbed to ransomware: a simple defense and demonstration for manufacturers using A I

    • Speaker

      BlackBerry Japan

      Director
      Field Marketing

      Yuji Yamasaki

    • Ransomware measures
    • Managed security
    • AI security

    Presented byBlackBerry Japan Limited

15:50 | 16:30
  • GA-08

    Maximizing Risk Reduction with the Qualys Enterprise TruRisk Platform

    • Speaker

      Qualys Japan K.K.

      Regional Sales Director, Japan
      Sales Division

      Mitsufusa Sugimoto

    • Demonstrator

      Qualys Japan K.K.

      Technical Account Manager
      Sales Division

      Yukari Miyagawa

    • Cloud security
    • Endpoint Security
    • Vulnerability measures / Tampering measures

    Presented byQualys, Inc.

  • GB-08

    Coming soon

    • Speaker

      Secure Innovation Inc.

    • IoT security
    • Security auditing / system audit
    • GDPR / Privacy Mark / ISMS / Laws of the Decree

    Presented bySecure Innovation Inc.

  • GC-08

    Relationship and Requirements of European Cybersecurity and Privacy-Related Legislation, and Industry Trends in Japan

    • Speaker

      TUV Rheinland Japan Ltd.

      Project Manager
      Industry & Cybersecurity

      Fumiyasu Miura

    • IoT security
    • Security auditing / system audit
    • GDPR / Privacy Mark / ISMS / Laws of the Decree

    Presented byTÜV Rheinland Japan Ltd.

16:35 | 17:15
  • GA-09

    10 Major Security Threats 2024 for Organizations

    • Speaker

      Information-technology Promotion Agency, Japan

      Chief Executive
      Security Center

      Kouichi Shinotsuka

    • Ransomware measures
    • Measures against information leakag
    • Vulnerability measures / Tampering measures
  • GB-09

    Automotive Cyber Security in Software Defined Vehicle

    • Speaker

      Nagoya University

      Designated Associate Professor
      Graduate School of Informatics

      Ryo Kurachi

    • Application Security
    • IoT security
    • Other
  • GC-09

    Coming soon

    • Speaker

      Macnica, Inc.

    • Ransomware measures
    • Measures against information leakag
    • Phishing Attack
  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

[24年春開催]Security Days Spring 2024

Copyright (c) NANO OPT Media, Inc. All rights reserved.