iotc iotc

  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
    • linkedin
    • facebook
    • twitter
    • YouTube
  • Registration Registration

  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FAQ
    • Registration Registration

  • NOM'S EVENTS
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020

Nagoya Session

  • lunch

Search (possible multiple choice)

Keyword

3.5(Wed)

  • RoomA
  • RoomB
  • RoomC
  • RoomD
09:30 | 10:00
  • GA-01

    Cyber threats in the AI era

    • Speaker

      NTT Corporation

      Chief Cybersecurity Strategist
      Security and Trust Office

      Mihoko Matsubara

    • Ransomware measures
    • AI security
    • Business Email Compromise
  • GB-01

    Coming soon

    • Speaker

      NPO Japan Network Security Association(JNSA)

  • GC-01

    Coming soon

    • Speaker

      Nagoya Institute of Technology

10:10 | 10:50
  • GA-02

    Boost Cyber Resilience with Higher Reporting Rates:
    Email Training to Prevent Targeted Attacks

    • Speaker

      HENNGE

      Tadrill Sales Strategist
      Product Planning & Research Division

      Koki Iwabu

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Email Security

    Presented byHENNGE K.K.

  • GB-02

    The forefront of WSUS replacement
    ~ Thorough explanation of Intune, Autopatch, and IT asset management tools ~

    • Speaker

      DOS Co., Ltd.

      Chief Evangelist
      Sales Planning

      Minori Koga

    • Endpoint Security
    • Measures against information leakage
    • Zero trust security model

    Presented byD.O.S Co.,LTD.

  • GC-02

    Learning Product Security from examples of Failure cases about SBOM

    • Speaker

      Cybellum Technologies LTD

    • Speaker

      Marubeni Information Systems Co., Ltd.

    • PSIRT / CSIRT
    • IoT security
    • SBOM

    Presented byMarubeni Information Systems Co., Ltd.

  • GW-01

    Coming soonIntroduction to Security Policies for New Employees in Small and Medium-Sized Enterprises:
    The Basics of Creation, Communication, and Implementation from Scratch

    • Endpoint Security
    • Measures against information leakage
    • Human resource development
    • Workshop
11:05 | 11:45
  • Closed

    GA-03

    Cyber Threats in the Age of Generative AI: Evolving Attacks and Security Technologies

    • Speaker

      Net One Partners Co., Ltd.

      Expert
      Business Development Department

      Kenji Mizoshita

    • Ransomware measures
    • Cloud security
    • Endpoint Security

    Presented byDeep Instinct

  • GB-03

    Efficiently Diagnosing Large-Scale Websites: Key Points for Selecting the Optimal Method (TBD)

    • Speaker

      UBsecure Inc.

    • Vulnerability measures / Tampering measures
    • Managed security
    • Security auditing / system audit

    Presented byUBsecure Inc.

  • GC-03

    Coming soon

    • Speaker

      Cloudbase Inc.

    • Cloud security
    • Vulnerability measures / Tampering measures
    • Monitoring and detection

    Presented byCloudbase Inc.

12:05 | 12:45
  • GA-04

    Can EDR Alone Stand Against Modern Threats?
    Endpoint Security Strategies for the Zero Trust Era

    • Speaker

      SB C&S Corp.

      Evangelist

      Masayuki Otsuka

    • Demonstrator

      Omnissa Japan GK

      Senior Specialist Engineer
      Partner & Corporate SE Dept

      Tatsuo Suzuki

    • Endpoint Security
    • Zero trust security model

    Presented bySB C&S Corp.

  • GB-04

    What Should Companies do Strengthen Mobile Security

    • Speaker

      Jamf Japan G.K.

      Manager
      Sales Engineering

      Yoshinori Inaba

    • Cloud security
    • Endpoint Security
    • Zero trust security model

    Presented byJamf Japan G.K.

  • GC-04

    Cybersecurity in the DX Era: Insights from Recent Incident Cases Preparing for Sophisticated Cyber Attacks

    • Speaker

      MOTEX Inc.

      Evangelist
      Cyber ​​Security Headquarters Security Service Department 1 Security Engineering Division

      Saki Fukuoka

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Measures against information leakage

    Presented byMOTEX Inc.

  • GW-02

    The workshop on cybersecurity human resource development using "the Cyber-Poilce Game".

    • Measures against information leakage
    • Human resource development
    • Phishing Attack
    • Workshop
12:55 | 13:25
  • GA-05

    Coming soon

    • Speaker

      Tokai University

  • GB-05

    Introduction to Japan Cybersecurity Labeling scheme, JC-STAR, for IoT products

    • Speaker

      Information-Technology Promotion Agency, Japan (IPA)

      General Manager
      IT Security Technology Evaluation Department, IT Security Center

      Masayuki Kanda

    • IoT security
  • GC-05

    Coming soon

    • Speaker

      MARUBENI IT SOLUTIONS INC.

    • Ransomware measures
    • Measures against information leakage
    • Zero trust security model

    Presented byMARUBENI IT SOLUTIONS INC.

13:40 | 14:20
  • GA-06

    Coming soon

    • Speaker

      CrowdStrike Japan G.K.

    • Targeted Threat / Cyber Attack
    • Endpoint Security
    • SOC / Incident Response

    Presented byCrowdStrike Japan G.K.

  • GB-06

    Coming soon

    • Speaker

      SCSK Minori Solutions Corporation

    • Measures against information leakage
    • Email Security

    Presented bySCSK Minori Solutions Corporation

  • GC-06

    Coming soon

    • Speaker

      3-shake Inc.

    • Vulnerability measures / Tampering measures
    • Application Security
    • Critical Infrastructure Security

    Presented by3-shake Inc.

14:35 | 15:15
  • GA-07

    Prevent security incidents before they happen
    ~Key points of countermeasures~

    • Speaker

      Mitsubishi Electric Information Network Corporation

      Information Security Service Division
      Cyber Fusion Center
      Section A

      Kohdai Nagashima

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Vulnerability measures / Tampering measures

    Presented byMitsubishi Electric Information Network Corporation

  • GB-07

    Coming soon

    • Speaker

      MARUBENI IT SOLUTIONS INC.

    • Zero trust security model

    Presented byMARUBENI IT SOLUTIONS INC.

  • GC-07

    The New Normal in Cybersecurity: From “Reactive” to “Proactive” in the Age of “Reactive”.

    • Speaker

      Trend Micro Incorporated

      Director, Platform Marketing Group, Platform Enablement Dept,

      Shunsuke Fukuda

    • Ransomware measures
    • Endpoint Security
    • AI security

    Presented byTrend Micro Incorporated

  • GW-03

    Coming soon

    • PSIRT / CSIRT
    • Security auditing / system audit
    • Human resource development
    • Workshop
15:30 | 16:10
  • GA-08

    DAMRC, Secure File Transfer and DLP - Maximize the convenience of email security

    • Speaker

      imatrix corp

      Senior Researcher
      Lab/Merketing

      Hibiki Oka

    • Ransomware measures
    • Measures against information leakage
    • Email Security

    Presented byimatrix corp.

  • GB-08

    Coming soon

    • Speaker

      A10 Networks, K.K.

    • Measures against information leakage
    • Zero trust security model
    • Application Security

    Presented byA10 Networks, K.K.

  • GC-08

    Coming soon

    • Speaker

      OceanBridge Inc.

    • Ransomware measures
    • Authentication / Identity Management
    • Zero trust security model

    Presented byOceanBridge Inc.

16:20 | 16:50
  • GA-09

    Threats in Cyberspace
    ~State-Sponsored Cyberattacks ~

    • Speaker

      Public Security Intelligence Agency

      Cybersecurity Intelligence Office
      Director

      Ippei Suyama

  • GB-09

    Predicting questions!
    - Capture "Registered Information Security Specialist Examination".

    • Speaker

      Japan Registered Information Security Specialists’ Association

      Director

      Naoki Murayama

    • PSIRT / CSIRT
    • SOC / Incident Response
    • Human resource development
  • GC-09

    Control System's Cyber Security Efforts of Chubu Electric Power

    • Speaker

      Chubu Electric Power Co., Inc.

      General Manager
      Expert Security Center, Digital Transformation Promotion Office

      Hiroyuki Hasegawa

    • PSIRT / CSIRT
    • Critical Infrastructure Security
    • Human resource development
  • Privacy Policy

[24年秋開催]Security Days Fall 2024

Copyright (c) NANO OPT Media, Inc. All rights reserved.