iotc iotc

    • facebook
    • twitter
    • YouTube
  • Registration Registration

  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration Registration

Session

  • All
  • 10.22(Tue)
  • 10.23(Wed)
  • 10.24(Thu)
  • 10.25(Fri)
  • simultaneous interpreting

  • lunch

Search (possible multiple choice)

Keyword

10.22(Tue)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:40
  • A1-01

    Cyber Resilience for Supply Chain

    • Speaker

      Institute of Information Security

      President

      Atsuhiro Goto

    • Software chain Attack
    • Critical Infrastructure Security
    • IoT security
09:50 | 10:30
  • A1-02

    Coming soon

    • Speaker

      Sky CO., LTD.

    • Targeted Theat / Cyber Aattack
    • Endpoint Security
    • Measures against information leakag

    Presented bySky CO., LTD.

  • WS1-01

    CoinTantei
    ~Frontline of Japan's Virtual Asset Hacking Accident~

    • Targeted Theat / Cyber Aattack
    • Measures against information leakag
    • Phishing Attack
    • Workshop

    Presented byNSHC Japan Inc.

10:40 | 11:20
  • A1-03

    Latest trends in information security incidents and countermeasures for incidents caused by human factors

    • Speaker

      NTT RiskManager Corporation

      General Manager
      Planning and General affairs Department

      Hideo Kubo

    • Measures against information leakag
    • Security auditing / system audit
    • Human resource development

    Presented byNTT Risk Manager Corporation

11:30 | 12:10
  • A1-04

    Cyber Threat Hunting and Attack Surface Management (ASM) with Generative AI

    • Speaker

      AI Spera Inc.

      Co-Founder

      Huy Kang Kim

    • Measures against information leakag
    • Vulnerability measures / Tampering measures
    • AI security

    Presented byAI Spera JP Inc.

12:25 | 13:05
  • A1-05

    Corporate Defense Strategies in the DX Era Consistent Cyber Resilience Strategies for Both Normal and Crisis Situations

    • Speaker

      MOTEX Inc.

      Evangelist
      Cybersecurity Division, Security Services Department 1,
      Security Engineering Section

      Saki Fukuoka

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • SOC / Incident Response

    Presented byMOTEX Inc.

  • WS1-02

    "Cybersecurity is Your Own Business": Spread It in Your Company

    • Workshop
13:15 | 13:55
  • A1-06

    Coming soon

    • Speaker

      NISSIN FOODS HOLDINGS CO., LTD.

14:30 | 15:10
  • A1-07

    Empowering Your Business with Smart Zero Trust
    - How MFA Ensures Seamless Operations

    • Speaker

      Soliton Systems K.K.

      CISM, CISSP Evangelist
      IT Security Business Unit

      Shoko Araki

    • Cloud security
    • Authentication / Identity Management
    • Zero trust security model

    Presented bySoliton Systems K.K.

  • B1-07

    Coming soon

    • Speaker

      Illumio Japan G.K.

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Zero trust security model

    Presented byIllumio Japan G.K.

  • C1-07

    No more troublesome password management! Strong password-less authentication with security keys

    • Speaker

      International Systems Research Co.

      Division Head
      Sales Division

      Kazuhito Shibata

    • Measures against information leakag
    • Authentication / Identity Management
    • Zero trust security model

    Presented byInternational Systems Research Co.

  • WS1-03

    Cloud Security and ASPIC's Initiatives

    • Cloud security
    • Workshop
15:20 | 16:00
  • A1-08

    Coming soon

    • Speaker

      Forescout Technologies, Inc.

    Presented byForescout Technologies, Inc.

  • B1-08

    Rely on our services ASM&XDR in both peace and crisis
    - Achieving Comprehensive Cybersecurity Operations with Minimal Resources -

    • Speaker

      Nippon Jimuki Co.,Ltd.

      Senior Marketer
      IT Platform Solutions Planning
      Marketing Division

      Nishinami Kazumasa

    • Speaker

      Trend Micro Inc.

      Senior Product Marketing Manager
      General Business Unit

      Kentaro Sakamoto

    • Ransomware measures
    • XDR
    • Managed security

    Presented byNippon Jimuki Co., Ltd.

  • C1-08

    Automated AI-based solutions block connections to all fraudulent or suspicious sites, and analyze and detect external intrusion routes!

    • Speaker

      SentryMark, Inc.

      Senior Sales Director

      Akihiro Abe

    • Speaker

      Conceal, Inc.

      Chief Executive Officer

      Gordon Lawson

    • Speaker

      Conceal, Inc.

      Sr. Director of Solutions Engineering

      John Kellum

    • Ransomware measures
    • Vulnerability measures / Tampering measures
    • AI security

    Presented bySentryMark, Inc.

16:10 | 16:50
  • A1-09

    From Routine to Revolution: Boost Security Testing Speed 30x with Generative AI, Without Sacrificing Precision

    • Speaker

      Aeye Security Lab Inc.

      Executive Officer&Head of Customer Experience

      Teppei Sekine

    • Cloud security
    • Vulnerability measures / Tampering measures
    • Application Security

    Presented byAeye Security Lab Inc.

  • B1-09

    ~Evolving security platform~
    Threat prevention using SentinelOne Singularity XDR

    • Speaker

      Tokyo Electron Device LTD.

      Shiyuki Ogata

    • Ransomware measures
    • Endpoint Security
    • XDR

    Presented byTokyo Electron Device LTD.

  • C1-09

    What preparations are necessary to enhance defense against cyber attacks?
    Software vulnerability measures to overcome operational challenges of WSUS.

    • Speaker

      Sumitomo Electric Information Systems Co., Ltd.

    • Targeted Theat / Cyber Aattack
    • Measures against information leakag
    • Vulnerability measures / Tampering measures

    Presented bySumitomo Electric Information Systems Co., Ltd.

  • WS1-04

    Lessons in Preventing Fraudulent and Deceptive Use of Brands: Practical Exercises and Insights from Tabletop Exercise Kits

    • PSIRT / CSIRT
    • Human resource development
    • Phishing Attack
    • Workshop

    Council of Anti-Phishing Japan

17:00 | 17:40
  • A1-10

    Lessons from information leaks at major companies. A whole picture of internal fraud measures taken by NI+C(NTT Group).
    ~The trump card is privileged ID management~

    • Speaker

      Nippon Information and Communication Corporation

      Security & Network Business Headquarters
      Senior Security Specialist

      Jinichi Yamamoto

    • Speaker

      NTT TechnoCross Corporation

      Digital Transformation Division
      Business Owner

      Akio Ogawa

    • Measures against information leakag
    • Authentication / Identity Management
    • Zero trust security model

    Presented byNippon Information and Communication Corporation

  • B1-10

    How to effectively protect “Privileged ID” from cyber attacks and internal fraud?
    -Introducing a case study of improving security and reducing operational burden at the same time.-

    • Speaker

      NRI SecureTechnologies, Ltd.

      Control Solution Business Department

      Kento Matsuzaki

    • Measures against information leakag
    • Authentication / Identity Management
    • Security auditing / system audit

    Presented byNRI SecureTechnologies, Ltd.

  • C1-10

    Generative AI Exploitation Attacks and Ransomware Countermeasures to Adopt
    - Learning from the U.S. Department of Health and Human Services White Paper

    • Speaker

      Vade Japan K.K.

      Channel Sales Engineer

      Isao Miyazaki

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Phishing Attack

    Presented byVade Japan K.K.

17:45 | 18:25
  • A1-11

    10 Major Security Threats 2024 for Organizations

    • Speaker

      Information-technology Promotion Agency, Japan

      Chief Executive
      Security Center

      Kouichi Shinotsuka

    • Ransomware measures
    • Measures against information leakag
    • Vulnerability measures / Tampering measures
  • B1-11

    Comparative Analysis of Chinese and Russian Digital Influence Operations and Domestic Private Domain Case Studies

    • Speaker

      Cybersecurity Lab, Meiji University

      Director, Professor

      Dr. Takamichi Saito

    • Other
  • C1-11

    Coming soon

    • Speaker

      Mori Hamada & Matsumoto.

    • Ransomware measures
    • Critical Infrastructure Security
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
18:40 | 20:00
  • A1-12

    【Night Session】
    CyberTantei~Business Risks Lurking on the Dark Web~

    • Speaker

      BRIDGED Co.,Ltd.

      CEO

      Kotaro Takahashi

    • Speaker

      NSHC Japan Inc.

      Director

      Bumjoon Park

    • Measures against information leakag
    • Zero trust security model
    • Managed security

10.23(Wed)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:40
  • A2-01

    Coming soon

    • Speaker

      Ministry of Economy, Trade and Industry

09:50 | 10:30
  • A2-02

    Coming soon

    • Speaker

      ACT.inc

    • Ransomware measures
    • Endpoint Security
    • SOC / Incident Response

    Presented byACT.inc

  • Closed

    WS2-01

    Japan Trends in Cyber Attacks
    - APT Groups and Ransomware Gangs Under the Aegis of the Enemy Nations

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • SOC / Incident Response
    • Workshop

    Presented byNSHC Japan Inc.

10:40 | 11:20
  • A2-03

    Coming soon

    • Speaker

      Veeam Software Japan

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Critical Infrastructure Security

    Presented byVeeam Software Japan

11:30 | 12:10
  • A2-04

    Maximizing Risk Reduction with the Qualys Enterprise TruRisk Platform

    • Speaker

      Qualys, Inc.

      Vice President
      Product Management

      Joe Petrocelli

    • Cloud security
    • Endpoint Security
    • Vulnerability measures / Tampering measures

    Presented byQualys, Inc.

12:25 | 13:05
  • A2-05

    Coming soon

    • Speaker

      AGC Inc.

    • Speaker

      Proofpoint Japan K.K.

    • Targeted Theat / Cyber Aattack
    • Email Security

    Presented byProofpoint Japan K.K.

  • WS2-02

    Experience of Thales IAM platform

    • Authentication / Identity Management
    • Zero trust security model
    • Phishing Attack
    • Workshop

    Presented byTHALES DIS Japan KK.

13:15 | 13:55
  • A2-06

    Coming soon

    • Speaker

      CHUGAI PHARMACEUTICAL CO., LTD.

    • Cloud security
    • PSIRT / CSIRT
    • SOC / Incident Response
14:30 | 15:10
  • A2-07

    Coming soon

    • Speaker

      Cloudflare Japan

      EVANGELIST

      Harunobu Kameda

    Presented byCloudflare Japan K.K.

  • B2-07

    Coming soon

    • Speaker

      Pentera

      Japan Country Manager

      Mitchell DeBerdt

    • Targeted Theat / Cyber Aattack
    • Vulnerability measures / Tampering measures
    • Critical Infrastructure Security

    Presented byTokyo Electron Device LTD.

  • C2-07

    Two proactive defense methods - CTI & CTEM - for ransomware attacks

    • Speaker

      KELA KK

      Threat Intelligence Analyst

      Haruka Ikegami

    • Speaker

      ULTRA RED Ltd.

      Director
      Sales Engineering

      Yuji Sueyoshi

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • PSIRT / CSIRT

    Presented byKELA K.K.

  • WS2-03

    A hands-on workshop to identify the key skills required for each role in your company

    • PSIRT / CSIRT
    • Human resource development
    • Work style reform
    • Workshop

    Japan Trusted Alliance Group for cybersecurity

15:20 | 16:00
  • A2-08

    New Threats Looming. How to Respond to Invisible Threats with Dark Web Monitoring and Attack Surface Management

    • Speaker

      SMS Datatech Co., Ltd.

      leader
      Business development office

      Yuki Hanamura

    • Ransomware measures
    • Measures against information leakag
    • Vulnerability measures / Tampering measures

    Presented bySMS DataTech Corporation

  • B2-08

    Defend againsy supply chain attacks with privileged ID remote access
    ~Introducing optimal zero trust access solution ~

    • Speaker

      Internet Initiative Japan Inc.

      Global Business Director,
      Global Business Division,

      Miki Tanaka

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Zero trust security model

    Presented byInternet Initiative Japan Inc.

  • C2-08

    Coming soon

    • Speaker

      PIOLINK, Inc.

    • Ransomware measures
    • Authentication / Identity Management
    • Zero trust security model

    Presented byPIOLINK, Inc.

16:10 | 16:50
  • A2-09

    Coming soon

    • Speaker

      Cybertrust Japan Co., Ltd.

      Yumi Tomita

    • Targeted Theat / Cyber Aattack
    • Vulnerability measures / Tampering measures
    • Critical Infrastructure Security

    Presented byCybertrust Japan Co., Ltd.

  • B2-09

    Coming soon

    • Speaker

      KDDI CORPORATION

    • Speaker

      KDDI Digital Security Inc.

    • Targeted Theat / Cyber Aattack
    • Zero trust security model
    • Monitoring and detection

    Presented byKDDI CORPORATION

  • C2-09

    How Enterprises Facing a Shortage of Security Talent Should Respond to Cyber Attacks: Exploring the Use of EDR, NDR, XDR, and Generative AI

    • Speaker

      Trend Micro Incorporated

    • Ransomware measures
    • Endpoint Security
    • AI security

    Presented byTrend Micro Incorporated

  • WS2-04

    Change employee awareness! Best practices for targeted attack email training. Practical methods and approaches to make training successful that everyone in charge should know.

    • Targeted Theat / Cyber Aattack
    • Measures against information leakag
    • Business Email Compromise
    • Workshop

    Presented byKnomak Ltd.

17:00 | 17:40
  • A2-10

    Coming soon

    • Speaker

      Alps System Integration Co., Ltd.

    • Targeted Theat / Cyber Aattack
    • Endpoint Security
    • Zero trust security model

    Presented byAlps System Integration Co., Ltd.

  • B2-10

    Key points for selecting MFA, learn from government guidelines
    ~Complete the blind spots of passkey (biometric authentication), The true value of matrix authentication

    • Speaker

      CSE Co.,Ltd

      Deputy General Manager / SECUREMATRIX Development Manager
      Secure Business Division

      Tetsuya Shimodaira

    • Authentication / Identity Management

    Presented byCSE Co.,Ltd.

  • C2-10

    Former SoftBank CISO presents, How we can adopt "CTEM" and "Exposure Management"

    • Speaker

      XM Cyber

      Executive Advisor

      Amane Kito

    • Speaker

      SB C&S Corp.

      Director
      Zero Trust Promotion Office

      Wataru Takeishi

    • Targeted Theat / Cyber Aattack
    • Vulnerability measures / Tampering measures
    • Zero trust security model

    Presented byXM Cyber Ltd.

17:45 | 18:25
  • A2-11

    Coming soon

    • Speaker

      LAC Co., Ltd.

      Sato Atsushi

  • B2-11

    Security Related Status on AI
    - Issues and Regulatory Trends

    • Speaker

      JNSA(Japan Network Security Association)

      Vice Chairman, CISO Support Working Group Leader

      Masakazu Takahashi

    • AI security
  • C2-11

    Approach and Implementation of Factory Security Measures

    • Speaker

      Nagoya Institute of Technology

      Visiting Associate Professor
      Manufacturing and Innovation DX Laboratory

      Hiroshi Sasaki

    • Ransomware measures
    • Critical Infrastructure Security
    • Human resource development
18:40 | 20:00
  • A2-12

    【Night Session】
    This fall's exam.
    - Review "Registered Information Security Specialist Examination".

    • Speaker

      Japan Registered Information Security Specialists’ Association

      Director

      Naoki Murayama

    • PSIRT / CSIRT
    • SOC / Incident Response
    • Human resource development

10.24(Thu)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:40
  • A3-01

    Latest trends in cybersecurity policy in the ICT field

    • Speaker

      Ministry of Internal Affairs and Communications

      Deputy Director
      Office of the Director-General for Cybersecurity

      Masanori Miyake

    • IoT security
    • Human resource development
09:50 | 10:30
  • A3-02

    Optimal Solutions for Cloud Security Learned from Incident Cases. Insights into the Latest Cyber Threats by a Security Researcher

    • Speaker

      Canon IT Solutions Inc.

      Security Researcher
      Cyber Security Laboratory

      Hajime Ichihara

    • Targeted Theat / Cyber Aattack
    • Cloud security
    • Container security

    Presented byCanon IT Solutions Inc.

  • WS3-01

    Introduction_OT Security Advance Training (Smart City&ICS/SCADA)

    • Critical Infrastructure Security
    • IoT security
    • Infrastructure hacking
    • Workshop

    Presented byNSHC Japan Inc.

10:40 | 11:20
  • A3-03

    Latest Edition! What are the Current Threat Trends?
    - Introduction of Security Measures Necessary Now

    • Speaker

      CrowdStrike Japan G.K.

      Manager Sales
      Engineering

      Michio Mori

    • Targeted Theat / Cyber Aattack
    • XDR
    • SOC / Incident Response

    Presented byCrowdStrike Japan GK

11:30 | 12:10
  • A3-04

    Coming soon

    • Speaker

      dit Co., Ltd.

    • Speaker

      Future Corporation

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Vulnerability measures / Tampering measures

    Presented bydit Co., Ltd. / Future Corporation

12:25 | 13:05
  • A3-05

    A multi-layered defense strategy is best for Critical infrastructure

    • Speaker

      OPSWAT Inc.

      CPO

      Yiyi Miao

    • Ransomware measures
    • Zero trust security model
    • Critical Infrastructure Security

    Presented byOPSWAT JAPAN Co., Ltd.

  • Closed

    WS3-02

    Coming soon

    • Vulnerability measures / Tampering measures
    • Software chain Attack
    • Workshop
13:40 | 14:20
  • A3-06

    For those who almost gave up on VDI
    - new options for client virtualization

    • Speaker

      Soliton Systems K.K.

    • Measures against information leakag
    • Work style reform
    • Container security

    Presented bySoliton Systems K.K.

  • B3-06

    Security Strategies for the DX Era: Risk-Based Vulnerability Management and Optimizing the Attack Surface

    • Speaker

      Ivanti Software K.K.

      Manager, Sales Engineer

      Takumi Hattori

    • Cloud security
    • Measures against information leakag
    • Vulnerability measures / Tampering measures

    Presented byIvanti Software K.K.

  • C3-06

    Coming soon

    • Speaker

      Black Duck Software G.K.

      Senior Technical Marketing Manager

      Masato Matsuoka

    • Software chain Attack
    • Application Security
    • Critical Infrastructure Security

    Presented byBlack Duck Software G.K.

14:30 | 15:10
  • A3-07

    Addressing Current Network Security Challenges: Recent Incidents and the Role of NDR Effectiveness

    • Speaker

      Vectra AI Japan

      Senior Sales Engineer

      Kazuo Fukuda

    • Ransomware measures
    • Cloud security
    • XDR

    Presented byVectra AI Inc.

  • B3-07

    Coming soon

    • Speaker

      TECHMATRIX CORPORATION

    • Vulnerability measures / Tampering measures
    • Software chain Attack
    • Security auditing / system audit

    Presented byTECHMATRIX CORPORATION / Tenable Network Security Japan K.K.

  • C3-07

    Vulnerabilities targeted by targeted e-mail attacks and countermeasures

    • Speaker

      QUALITIA Co., LTD.

      Sales Division Field Sales Dept.

      Takiguchi Takayuki

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Email Security

    Presented byQUALITIA CO., LTD.

  • Closed

    WS3-03

    DMARC Implementation Guidelines
    - To properly understand sender authentication technologies -

    • Email Security
    • Domain authentication / DNS Security
    • Phishing Attack
    • Workshop
15:20 | 16:00
  • A3-08

    Learning CAASM for Low-Cost and Continuous Web Vulnerability Assessment

    • Speaker

      Flatt Security Inc.

      Chief Technology Officer

      Takashi Yoneuchi

    • Cloud security
    • Application Security
    • Security auditing / system audit

    Presented byFlatt Security Inc.

  • B3-08

    - AI and Automation makes it happen! -
    Next Generation SIEM SOC Transformation

    • Speaker

      Palo Alto Networks K.K.

      Manager, Domain Consultant, Cortex

      Toshihiko Muroi

    Presented byPalo Alto Networks K.K.

  • C3-08

    Taking complete visibility and command of your attack surface: What it takes to achieve integrated threat exposure management, detection and response operations.

    • Speaker

      Rapid7 Japan K.K.

      Field CTO,
      Japan Security Science Team

      Katsuya Furukawa

    • XDR
    • Vulnerability measures / Tampering measures
    • SOC / Incident Response

    Presented byRapid7 Japan K.K.

16:10 | 16:50
  • A3-09

    Digital Supply Chain Security

    • Speaker

      Eclypsium

      Business Development Manager

      Yoshihisa Ozawa

    • Ransomware measures
    • Vulnerability measures / Tampering measures
    • Software chain Attack

    Presented byEclypsium Inc.

  • B3-09

    Coming soon

    • Speaker

      PFU Limited

      Expert, Security
      Infrastructure Customer Service Division,Infrastructure Managed Services Div.Ⅰ,
      Network Security Dept.Security Services

      Masayuki Sugama

    • Vulnerability measures / Tampering measures
    • SOC / Incident Response
    • Managed security

    Presented byPFU Limited

  • C3-09

    A True Cyber Security Platform - AI Powered, Cloud Delivered.

    • Speaker

      Check Point Software Technologies, Ltd.

      Cyber Security Officer, Japan

      Daiji Ushiro

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • XDR

    Presented byCheck Point Software Technologies Ltd.

  • WS3-04

    CISO-PRACTSIE Workshop for Evaluating the Effectiveness of Security Measures

    • Workshop
17:00 | 17:40
  • A3-10

    Coming soon

    • Speaker

      J’s Communication Co., Ltd.

    • Targeted Theat / Cyber Aattack
    • Endpoint Security
    • Zero trust security model

    Presented byJ’s Communication Co., Ltd.

  • B3-10

    Security for DNP, its ideas and security management practices

    • Speaker

      Dai Nippon Printing Co.,Ltd.

      Senior Product Manager
      Security Service Department, Cyber Security Business Development Unit, Advanced Business Center

      Shun Mori

    • Endpoint Security
    • SOC / Incident Response
    • Managed security

    Presented byDai Nippon Printing Co., Ltd.

  • C3-10

    Coming soon

    • Secure Innovation Inc.

    • Targeted Theat / Cyber Aattack
    • Vulnerability measures / Tampering measures
    • Monitoring and detection

    Presented bySecure Innovation Inc.

17:45 | 18:25
  • A3-11

    Improving Organizational Response through the Consideration and Advancement of Cyber BCP (Business Continuity Planning)

    • Speaker

      Ernst & Young ShinNihon LLC

      Principal, EY Forensics Japan Technology Leader
      Forensic & Integrity Services

      Ichiro Sugiyama

    • Targeted Theat / Cyber Aattack
    • PSIRT / CSIRT
    • SOC / Incident Response
  • B3-11

    Automotive Cyber Security in Software Defined Vehicle

    • Speaker

      Nagoya University

      Designated Associate Professor
      Graduate School of Informatics

      Ryo Kurachi

    • Application Security
    • IoT security
    • Other
  • C3-11

    Coming soon

    • Speaker

      Amazon Web Services Japan G.K.

    • AI security
18:30 | 18:20
  • A3-12

    【Night Session】
    Coming soon

    • Speaker

      Japan Hackers Association

10.25(Fri)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:40
  • A4-01

    Cyber-Enabled Fraud and DPRK IT Workers Trends

    • Speaker

      US Embassy.

      Intelligence Analyst, Legal Attache Office

      Ryan Hull

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Infrastructure hacking
09:50 | 10:30
  • A4-02

    Proposing optimal security for each organization: EDR and MDR for SMBs, EDR and XDR for Enterprises

    • Speaker

      K.K.Kaspersky Labs Japan

      Chief Technology Officer / Technology Evangelist

      Tetsuya Sekiba

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Endpoint Security

    Presented byKaspersky Labs Japan

  • WS4-01

    Introduction_OT Security Advance Training (Smart Mobility_Car&Drone)

    • Critical Infrastructure Security
    • IoT security
    • Infrastructure hacking
    • Workshop

    Presented byNSHC Japan Inc.

10:40 | 11:20
  • A4-03

    Coming soon

    • Speaker

      Cloudbase Inc.

    • Cloud security
    • Measures against information leakag
    • Critical Infrastructure Security

    Presented byCloudbase Inc.

11:30 | 12:10
  • A4-04

    The Future of ChromeOS and Security Strategies

    • Speaker

      Densan System Co.,Ltd.

      Cloud Integration Division

      Ryuji Miyamoto

    • Speaker

      Google Japan G.K.

      Strategic Partner Manager
      ChromeOS Commercial Channels

      Tomofumi Hiroyama

    • Ransomware measures
    • Zero trust security model

    Presented byDensan System Co., Ltd.

12:25 | 13:05
  • A4-05

    Graduated PPAP
    - How to solve the PPAP problem

    • Speaker

      QUALITIA Co., LTD.

      senior staff
      Sales Division Field Sales Dept.

      Fukuyama Kohei

    • Measures against information leakag
    • Email Security

    Presented byQUALITIA CO., LTD.

  • WS4-02

    Introductory workshop for image analysis using OSINT by pinja

    • Human resource development
    • Other
    • Workshop
13:40 | 14:20
  • A4-06

    What is the Key to Achieving the Ideal IT System in the Age of Digital Transformation?
    -Optimal Authentication Balancing Security and Convenience -

    • Speaker

      Soliton Systems K.K

      Product&Service Manegement
      IT Security Division

      Mayu Matsuda

    • Cloud security
    • Endpoint Security
    • Authentication / Identity Management

    Presented bySoliton Systems K.K.

  • B4-06

    Translating Security Value to Executive Language:
    Strategic Approaches for Winning Executive Support and Funding

    • Speaker

      UBsecure, Inc.

      Security Consultant
      Security Design Consulting Dept.

      Masaki Abe

    • Measures against information leakag
    • Vulnerability measures / Tampering measures
    • Security auditing / system audit

    Presented byUBsecure Inc.

  • C4-06

    Dark Energy - Cyber Threats to Satellite Communications During Conflict

    • Speaker

      SANS Instructor

      Justin Parker

    • Targeted Theat / Cyber Aattack
    • Application Security
    • Human resource development

    Presented bySANS Institute

14:30 | 15:10
  • A4-07

    Coming soon

    • Speaker

      Encourage Technologies Co., Ltd.

    • Cloud security
    • Measures against information leakag
    • Authentication / Identity Management

    Presented byEncourage Technologies Co., Ltd.

  • B4-07

    Coming soon

    • Speaker

      3-shake Inc.

    • Vulnerability measures / Tampering measures
    • Application Security
    • Critical Infrastructure Security

    Presented by3-shake Inc.

  • C4-07

    Countermeasures against unauthorized login required by Credit Card Security Guidelines (Version 5.0)

    • Speaker

      Cacco Inc.

      Senior Managing Director

      Kentaro Sekine

    • Measures against information leakag
    • Monitoring and detection
    • Phishing Attack

    Presented byCacco inc.

  • WS4-03

    Learn Practical Cybersecurity Measures for SMEs: A Hands-On Workshop

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • Human resource development
    • Workshop
15:20 | 16:00
  • A4-08

    AI-Driven Attacks Are Becoming a Reality: Advanced Threats and Countermeasures
    – The Strategic Role of AI Tools and the Importance of SOC

    • Speaker

      AP Communications Co., Ltd.

      Sectuion Leader
      iTOC Division BzD Department 0-WAN

      Shiori Ozawa

    • Targeted Theat / Cyber Aattack
    • Ransomware measures
    • SOC / Incident Response

    Presented byAP Communications Co., Ltd.

  • Closed

    B4-08

    Coming soon

    • Speaker

      Sakura Information Systems Co., Ltd.

    Presented bySakura Information Systems Co., Ltd.

  • C4-08

    On-prem assets will remain... How to achieve zero trust with no line load?
    The answer is “AppgateSDP”!

    • Speaker

      TECHMATRIX CORPORATION

      Deputy General Manager
      Security Products Sales Section 3
      Sale Department No.3
      Network Security Division

      Rikihiro Oshio

    • Zero trust security model
    • IoT security
    • Work style reform

    Presented byTECHMATRIX CORPORATION

16:10 | 16:50
  • A4-09

    Introducing cybercrime trends on the dark web and cases of cybercrime in Japan analyzed using AI solutions.

    • Speaker

      S2W

      Team Leader
      Business Development

      Jay Oh

    • Measures against information leakag
    • AI security
    • Monitoring and detection

    Presented byS2W Inc.

  • B4-09

    Achieving Exposure Management to stay ahead of cyber attackers

    • Speaker

      WithSecure K.K.

      Solution Architect
      Cyber Security Technology Division

      Koji Ohta

    • Targeted Theat / Cyber Aattack
    • Vulnerability measures / Tampering measures
    • AI security

    Presented byWithSecure KK

  • C4-09

    Start Here Ransomware Protection and Identity Management.
    What's the right balance between security and cost?

    • Speaker

      Canon IT Solutions Inc.

      IT Service Business Planning Division, IT Service Sales Group

      Daisuke Yoshikawa

    • Ransomware measures
    • Endpoint Security
    • Authentication / Identity Management

    Presented byCanon IT Solutions Inc.

  • WS4-04

    Introduction and demonstration: ZTNA and SD-WAN features in iboss Zero Trust Unified SASE

    • Cloud security
    • Zero trust security model
    • SASE
    • Workshop

    Presented byiboss, Inc.

17:00 | 17:40
  • A4-10

    Coming soon

    • Speaker

      Assured, Inc.

    • Cloud security
    • Measures against information leakag
    • Vulnerability measures / Tampering measures

    Presented byAssured, Inc.

  • B4-10

    What are the risks of using online storage?
    Causes and solutions found in internal improprieties (tentative)

    • Speaker

      NRI SecureTechnologies, Ltd.

      File Security Division

      Naoki Inoue

    • Cloud security
    • Measures against information leakag
    • Monitoring and detection

    Presented byNRI SecureTechnologies, Ltd.

  • C4-10

    Don't Stop Operations! Maximizing Employee Satisfaction by Balancing Defense and Offense
    - Marubeni G's Trial and Error with SASE/EDR

    • Speaker

      MARUBENI IT SOLUTIONS INC.

    • Speaker

      MARUBENI IT SOLUTIONS INC.

    • Ransomware measures
    • Measures against information leakag
    • Zero trust security model

    Presented byMARUBENI IT SOLUTIONS INC.

17:45 | 18:25
  • A4-11

    Social and industrial infrastructure control system security
    - Strategic implementation of OT zero trust -

    • Speaker

      Toshiba Corporation

      General Manager
      Cyber Security Technology Center

      Koji Okada

    • Speaker

      Toshiba Corporation

      General Manager
      Cyber Security Technology Center

      Koji Okada

    • Endpoint Security
    • Zero trust security model
    • IoT security
  • B4-11

    The Standards on Cybersecurity Measures for Defense Industry

    • Speaker

      Acquisition Technology and Logistics Agency

      Director
      Industrial Cyber Security Office, Equipment Security Management Division,
      Department of Equipment Policy

      Yugo Matsumoto

    • Targeted Theat / Cyber Aattack
    • Measures against information leakag
    • Security auditing / system audit
  • C4-11

    Coming soon

    • Speaker

      Minna Bank, Ltd.

    • SOC / Incident Response
    • Software chain Attack
    • Human resource development
  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

[24年春開催]Security Days Spring 2024

Copyright (c) NANO OPT Media, Inc. All rights reserved.