iotc iotc

  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
    • linkedin
    • facebook
    • twitter
    • YouTube
  • Registration Registration

  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FAQ
    • Registration Registration

  • NOM'S EVENTS
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020

Tokyo Session

  • All
  • 3.11(Tue)
  • 3.12(Wed)
  • 3.13(Thu)
  • 3.14(Fri)
  • simultaneous interpreting

  • lunch

Search (possible multiple choice)

Keyword

3.11(Tue)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:30
  • A1-01

    Latest trends in cybersecurity policy in the ICT field

    • Speaker

      Ministry of Internal Affairs and Communications

      Senior Planning Officer
      Office of the Director-General for Cybersecurity

      Suguru Nishimura

    • IoT security
    • Human resource development
09:40 | 10:20
  • A1-02

    Coming soon

    • Speaker

      Sky CO., LTD.

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Measures against information leakage

    Presented bySky CO., LTD.

  • Closed

    WS1-01

    A Comprehensive Guide to Email Sender Authentication Technologies

    • Email Security
    • Domain authentication / DNS Security
    • Phishing Attack
    • Workshop
10:30 | 11:10
  • A1-03

    he Identity Security Blind Spot
    - Protecting Legacy Systems and Service Accounts

    • Speaker

      Silverfort

      Country Lead, Japan

      Hiro Aoyama

    Presented bySilverfort

11:20 | 12:00
  • A1-04

    Coming soon

    • Speaker

      NTT DATA

    • Speaker

      Proofpoint Japan K.K.

    • Targeted Threat / Cyber Attack
    • Email Security
    • Phishing Attack

    Presented byProofpoint Japan K.K.

12:15 | 12:55
  • A1-05

    The Latest Microsoft AI powered & Integrated Security Solutions in the AI Era

    • Speaker

      Microsoft Japan Co., Ltd.

      Business Executive Officer, Sales Enablement & Operations Security GTM

      Mitsunori Fujino

    • Cloud security
    • SOC / Incident Response
    • AI security

    Presented byMicrosoft Japan Co., Ltd.

  • WS1-02

    Coming soon

    • Workshop

    Presented byAeye Security Lab Inc.

13:05 | 13:35
  • A1-06

    The current state of ransomware damage and how to respond when damage occurs

    • Speaker

      National Police Agency JAPAN

      Assistant Director, Cybercrime Prevention Office, Cyber Affairs Bureau

      Yohsuke Nakagawa

    • Targeted Threat / Cyber Attack
    • Ransomware measures
14:10 | 14:50
  • A1-07

    Coming soon

    • Speaker

      LAC Co., Ltd.

    Presented byLAC Co., Ltd. / Microsoft Japan Co., Ltd.

  • Closed

    B1-07

    Optimizing Zero Trust Strategy with a Risk-Based Approach

    • Speaker

      Soliton Systems K.K.

      Evangelist
      IT Security Department

      Shoko Araki

    • Targeted Threat / Cyber Attack
    • Authentication / Identity Management
    • Zero trust security model

    Presented bySoliton Systems K.K.

  • C1-07

    What Should Companies do Strengthen Mobile Security

    • Speaker

      Jamf Japan G.K.

      Sales Enablement Manager

      Shingo Matsushima

    • Cloud security
    • Endpoint Security
    • Zero trust security model

    Presented byJamf Japan G.K.

15:05 | 15:45
  • A1-08

    The cutting edge of data security: Microsoft Purview brings peace of mind and trust to businesses

    • Speaker

      PERSOL CROSS TECHNOLOGY CO., LTD.

      Security Consultant
      System Solution Headquarters, DX Solution Headquarters, DX Platform Division 1

      Kota Suzuki

    • Cloud security
    • Measures against information leakage
    • Monitoring and detection

    Presented byPERSOL CROSS TECHNOLOGY CO., LTD. / Microsoft Japan Co., Ltd.

  • Closed

    B1-08

    Coming soon

    • Speaker

      Tenable Network Security Japan K.K.

    • Targeted Threat / Cyber Attack
    • Cloud security
    • Vulnerability measures / Tampering measures

    Presented byTenable Network Security Japan K.K.

  • C1-08

    Coming soon

    • Speaker

      Hornetsecurity K.K.

      Principal Messaging Engineer

      Yoshitaka Hirano

    • Email Security
    • Domain authentication / DNS Security
    • Phishing Attack

    Presented byHornetsecurity K.K.(Vade Japan K.K.)

16:00 | 16:40
  • A1-09

    Coming soon

    • Speaker

      SCSK Minori Solutions Corporation

    • Measures against information leakage
    • Email Security

    Presented bySCSK Minori Solutions Corporation

  • B1-09

    Continuous Threat Exposure Management for Those Tired of Security Acronyms

    • Speaker

      Rapid7 Japan

      Japan SE Lead, CISSP

      Toshio Honda

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Vulnerability measures / Tampering measures

    Presented byRapid Seven Japan Co., LTD.

  • Closed

    C1-09

    Protecting the future of companies with privileged ID management
    - Daiwa Securities Group case studies and the latest security threats -

    • Speaker

      Daiwa Institute of Research Ltd.

      Director
      Digital Solution Research and Development Dept.

      Atsushi Shibuya

    • Speaker

      Daiwa Institute of Research Ltd.

      Associate Director
      Business Solution Dept.

      Rina Kondo

    • Ransomware measures
    • Measures against information leakage
    • Authentication / Identity Management

    Presented byDaiwa Institute of Research Ltd.

  • Closed

    WS1-04

    Response to Legal and Regulatory Trends in Product Security

    • PSIRT / CSIRT
    • IoT security
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
    • Workshop
16:55 | 17:35
  • A1-10

    DAMRC, Secure File Transfer and DLP - Maximize the convenience of email security

    • Speaker

      imatrix corp

      Senior Researcher
      Lab/Merketing

      Hibiki Oka

    • Ransomware measures
    • Measures against information leakage
    • Email Security

    Presented byimatrix corp.

  • Closed

    B1-10

    A Deeper Look Into Cyber Threats Targeting Japan:
    What We Can Learn from Cyber Incidents in 2024 and How to Deal with Possible Future Threats

    • Speaker

      S2W Inc.

      Regional Director(Japan)
      Business Center

      Heita Miyoshi

    • Targeted Threat / Cyber Attack
    • AI security
    • Other

    Presented byS2W Inc.

  • C1-10

    Boosting the level of security throughout the company efficiently to defend against cyber-attacks

    • Speaker

      Yubico

      Vice President Sales, Korea and Japan

      Junichi Ohtomo

    • Speaker

      International Systems Research Co.

      Sales Manager
      Sales Division Marketing & Security Key Business Dept.

      Koichi Uchida

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Authentication / Identity Management

    Presented byInternational Systems Research Co.

17:40 | 18:10
  • A1-11

    Threats in Cyberspace
    ~State-Sponsored Cyberattacks ~

    • Speaker

      Public Security Intelligence Agency

      Cybersecurity Intelligence Office Director

      Ippei Suyama

  • B1-11

    Coming soon

    • Speaker

      Tokai University

  • C1-11

    Latest trends in Cybersecurity legislation to watch in 2025

    • Speaker

      Mori Hamada & Matsumoto

      Attorney at Law

      Daisuke TSUTA

    • Targeted Threat / Cyber Attack
    • Critical Infrastructure Security
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
18:20 | 19:20
  • C1-12

    The importance of prevention as a security measure, incorporating the concept of Secure by Design.

    • Speaker

      Secure Code Warrior Limited

      CEO

      Pieter Danhieux

    • PSIRT / CSIRT
    • Application Security
    • Human resource development

    Presented byTECHMATRIX CORPORATION

3.12(Wed)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:30
  • A2-01

    Coming soon

    • Speaker

      Japan Hackers Association

      Representative director

      Takayuki Suguira

09:40 | 10:20
  • A2-02

    AI-Driven Network Security: Latest Threat Trends & Single-Vendor SASE Solutions

    • Speaker

      Cato Networks Ltd.

      Field CTO Asia Pacific and Japan

      Haru Kaneko

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • SASE

    Presented byCato Networks (Japan) K K

  • Closed

    WS2-01

    Coming soon

    • Endpoint Security
    • Authentication / Identity Management
    • IoT security
    • Workshop
10:30 | 11:10
  • A2-03

    Cybersecurity Landscape: A New Frontier

    • Speaker

      CHEQ Japan

      East Asia Sir Solution Engineer

      Evgeny Apukhtin

    • Targeted Threat / Cyber Attack
    • Measures against information leakage
    • AI security

    Presented byCHEQ JAPAN

11:20 | 12:00
  • A2-04

    The New Normal in Cybersecurity: From “Reactive” to “Proactive” in the Age of “Reactive”.

    • Speaker

      Trend Micro Incorporated

      Manager, Platform Marketing Group, Platform Enablement Dept

      Mika Shimizu

    • Ransomware measures
    • Endpoint Security
    • AI security

    Presented byTrend Micro Incorporated

12:15 | 12:55
  • A2-05

    Can EDR Alone Stand Against Modern Threats?
    Endpoint Security Strategies for the Zero Trust Era

    • Speaker

      SB C&S Corp.

      Evangelist

      Masayuki Otsuka

    • Demonstrator

      Omnissa Japan GK

      Senior Specialist Engineer
      Partner & Corporate SE Dept

      Tatsuo Suzuki

    • Endpoint Security
    • Zero trust security model

    Presented bySB C&S Corp.

  • WS2-02

    Protecting Your Clients, Protecting Your Business: The Rise of Client-Side Attacks

    • Vulnerability measures / Tampering measures
    • AI security
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
    • Workshop

    Presented byCHEQ JAPAN

13:30 | 14:10
  • A2-06

    Coming soon

    • Speaker

      GMO Flatt Security Inc.

    • Cloud security
    • Vulnerability measures / Tampering measures
    • AI security

    Presented byGMO Flatt Security Inc.

  • B2-06

    Coming soon

    • Speaker

      Canon IT Solutions Inc.

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Endpoint Security

    Presented byCanon IT Solutions Inc.

  • C2-06

    How Should We Proceed After WSUS Ends?
    The Migration and Frontline of Vulnerability Management.

    • Speaker

      Jupiter Technology Corp.

      Business Unit 3, Technical Group

      Michiko Ota

    • Demonstrator

      Jupiter Technology Corp.

      Business Unit 3, Technical Group

      Shoichiro Izaki

    • Demonstrator

      Jupiter Technology Corp.

      Business Unit 3, Technical Group

      Akane Shimada

    • Targeted Threat / Cyber Attack
    • Endpoint Security
    • Vulnerability measures / Tampering measures

    Presented byJupiter Technology Corp.

14:25 | 15:05
  • A2-07

    Let's get started for SBOM

    • Speaker

      Black Duck Software G.K.

      Senior Technical Marketing Manager

      Masato Matsuoka

    • Software chain Attack
    • Application Security
    • SBOM

    Presented byBlack Duck Software G.K.

  • B2-07

    Coming soonThe vulnerability dilemma: How to manage the vast amount of information

    • Speaker

      Macnica Inc.

      Products Sales
      Security Division
      Networks Company

      Shin Okada

    • Targeted Threat / Cyber Attack
    • Vulnerability measures / Tampering measures
    • Managed security

    Presented byMacnica, Inc. / Tanium G.K.

  • C2-07

    Coming soon

    • Speaker

      Intelligent Wave Inc.

      Sales Planning Dep.
      Digital Innovation Dip.

      Keisuke Shimizu

    • Speaker

      EVIDEN

      Director of IAM Cybersecurity Products & General Manager of Evidian

      David Leporini

    • Measures against information leakage
    • Authentication / Identity Management
    • Zero trust security model

    Presented byIntelligent Wave Inc.

  • Closed

    WS2-03

    The Initiatives of the Japan Cloud Industry Association (ASPIC) on Cloud Security

    • Cloud security
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
    • Workshop
15:20 | 16:00
  • A2-08

    Prevent security incidents before they happen
    ~Key points of countermeasures~

    • Speaker

      Mitsubishi Electric Information Network Corporation

      Maneger
      Information Security Service Division
      Cyber Fusion Center
      Section B

      Atsushi Katoh

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Vulnerability measures / Tampering measures

    Presented byMitsubishi Electric Information Network Corporation

  • B2-08

    The Evolution of Zero Trust with SASE: The Roles of IdP and EDR

    • Speaker

      INTEC Inc.

      Senior High-end Specialist
      ICT Business Strategy Dept.
      ICT Platform Service Business Division

      Osanai Hironobu

    • Speaker

      INTEC Inc.

      High-end Specialist
      Network Integration Dept.
      Network Service Unit
      ICT Platform Service Business Division

      Sasaki Mamiko

    • Cloud security
    • Zero trust security model
    • SASE

    Presented byINTEC Inc.

  • C2-08

    By leveraging an integrated solution centrally managed through cloud, even small and medium-sized companies can achieve an enterprise-grade security system! (TBD)

    • Speaker

      WatchGuard Technologies Japan KK

      Senior Channel Sales Manager

      Tatsuya Okawa

    • Ransomware measures
    • XDR
    • Firewall / UTM

    Presented byWatchGuard Technologies Japan KK

16:15 | 16:55
  • A2-09

    Cybersecurity initiatives and future vision that support the business activities of the Dai Nippon Printing Group.

    • Speaker

      Dai Nippon Printing Co.,Ltd.

      Senior Product Manager
      Security Service Department, Cyber Security Business Development Unit,
      Advanced Business Center

      Shun Mori

    • XDR
    • SOC / Incident Response
    • Managed security

    Presented byDai Nippon Printing Co., Ltd.

  • B2-09

    The forefront of WSUS replacement
    ~ Thorough explanation of Intune, Autopatch, and IT asset management tools ~

    • Speaker

      D.O.S Co.,LTD.

    • Endpoint Security
    • Measures against information leakage
    • Vulnerability measures / Tampering measures

    Presented byD.O.S Co.,LTD.

  • C2-09

    Protecting the Organization: Effective Approaches and IT Operations Against Internal and External Threats

    • Speaker

      Ivanti Software

      Sales Engineer Manager

      Takumi Hattori

    • Cloud security
    • Endpoint Security
    • Vulnerability measures / Tampering measures

    Presented byIvanti Software K.K.

  • Closed

    WS2-04

    Learn Through Practical Workshops!
    Introduction to Cybersecurity Measures for SMEs

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Human resource development
    • Workshop
17:10 | 17:50
  • A2-10

    Defending Against the Surge of DDoS Attacks:
    Fastly’s Cutting-Edge Security Solutions for Automated Protection and Advanced Bot Mitigation

    • Speaker

      FASTLY K.K.

      Sr. Sales Engineer

      Shumpei Takuma

    • Cloud security
    • Application Security
    • Edge security

    Presented byFastly K.K.

  • B2-10

    Coming soon

    • Speaker

      KDDI CORPORATION

    • Speaker

      KDDI Digital Security Inc.

    • Authentication / Identity Management
    • IoT security
    • Encryption / Certificate

    Presented byKDDI CORPORATION

  • C2-10

    Coming soon

    • Speaker

      Infoscience, Inc.

    • Targeted Threat / Cyber Attack
    • Measures against information leakage
    • Vulnerability measures / Tampering measures

    Presented byInfoscience, Inc.

17:55 | 18:25
  • A2-11

    Cybersecurity Resilience in the Financial Sector

    • Speaker

      Financial Services Agency

      Office of Policy Coodination for IT Risk,
      Cybersecurity and Economic Security Risk Analysis Division Strategy Development and Management Bureau

      Motoshi Matsunaga

    • Critical Infrastructure Security
  • B2-11

    Predicting questions!
    - Capture "Registered Information Security Specialist Examination".

    • Speaker

      Japan Registered Information Security Specialists’ Association

      Director

      Naoki Murayama

    • PSIRT / CSIRT
    • SOC / Incident Response
    • Human resource development
  • C2-11

    Coming soon

    • Speaker

      Nishimura & Asahi

    • Ransomware measures
    • Endpoint Security
    • Measures against information leakage
18:35 | 19:35
  • A2-12

    Coming soon

    • Speaker

      AironWorks Co., Ltd.

    Presented byAironWorks Co., Ltd.

3.13(Thu)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:30
  • A3-01

    Cyber Regulations for Improved Resilience

    • Speaker

      NAIST

      Professor, Laboratory for Cyber Resilience

      Youki Kadobayashi

    • Critical Infrastructure Security
    • AI security
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
09:40 | 10:20
  • A3-02

    Cloud Security Measures: Not Just Someone Else's Problem, Essential for Every Organization
    – How to Choose from a Variety of Solutions

    • Speaker

      Canon IT Solutions Inc.

      Cybersecurity Laboratory, Security Researcher

      Hajime Ichihara

    • Targeted Threat / Cyber Attack
    • Cloud security
    • Container security

    Presented byCanon IT Solutions Inc.

  • Closed

    WS3-01

    Coming soon

    • GDPR / Privacy Mark / ISMS / Laws of the Decree
    • SBOM
    • Workshop
10:30 | 11:10
  • A3-03

    Security measure that is not being swayed.
    What are realistic ways to strengthen security for small and medium-sized enterprises?

    • Speaker

      Kaspersky Labs Japan

      Chief Technology Officer/Evangelist

      Tetsuya Sekiba

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Endpoint Security

    Presented byK.K. Kaspersky Labs Japan

11:20 | 12:00
  • A3-04

    Changes and risks of Web & API attacks that should be noted in 2025, as interpreted from technological innovations and global situations

    • Speaker

      Akamai Technologies GK

      Marketing
      Product Marketing Manager

      Kazuhiro Nakanishi

    • Cloud security
    • Application Security
    • Measures against DDoS

    Presented byAkamai Technologies, Inc.

12:15 | 12:55
  • A3-05

    Coming soon

    • Speaker

      Google Japan G.K.

    • Speaker

      Google Japan G.K.

    • Cloud security
    • Endpoint Security
    • Zero trust security model

    Presented byGoogle Japan G.K.

  • WS3-02

    Coming soon

    • Cloud security
    • Application Security
    • Container security
    • Workshop

    Presented byTECHMATRIX CORPORATION

13:30 | 14:10
  • A3-06

    Isn't the security 'common sense' wrong?
    ~ New security operation standards that have become possible now ~

    • Speaker

      Rapid7 Japan

      CTO

      Katsuya Furukawa

    • XDR
    • Vulnerability measures / Tampering measures
    • Managed security

    Presented byRapid Seven Japan Co., LTD.

  • B3-06

    Email security and business risks achieved through layered defense

    • Speaker

      TwoFive inc.

      CTO

      Masaki Kase

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Phishing Attack

    Presented byTwoFive, Inc.

  • C3-06

    Digital Agency Cyber Security

    • Speaker

      Digital Agency

      Security Analyst
      Group of Strategy and Organization

      Masanori Kamayama

    • SOC / Incident Response
    • Critical Infrastructure Security
    • Other
14:25 | 15:05
  • A3-07

    Is it safe if we protect VPN and Cloud service?
    Learn from the latest security incidents about commonly overlooked intrusion routes and countermeasures

    • Speaker

      Soliton Systems K.K.

    • Targeted Threat / Cyber Attack
    • Measures against information leakage
    • Authentication / Identity Management

    Presented bySoliton Systems K.K.

  • B3-07

    Do You Understand the Hidden Risks of SSH Keys in Your Network?: Mitigation Strategies and How to Migrate to Keyless Access

    • Speaker

      SSH Communications Security

      Solutions Engineering Director

      Katsuhiro Shogawa

    • Ransomware measures
    • Authentication / Identity Management
    • Critical Infrastructure Security

    Presented bySSH Communications Security Oyj

  • C3-07

    Ransomware Protection Specifically for Private Clouds
    〜Toward a sustainable infrastructure

    • Speaker

      Broadcom

      Senior Solutions Architect
      Japan Cloud Infrastructure Dept.

      Takahiro Chiku

    • Ransomware measures
    • Cloud security
    • Critical Infrastructure Security

    Presented byVMware K.K. (Broadcom)

  • Closed

    WS3-03

    The Frontiers of Security from the Trusted Computing Group,
    an Influential U.S. Specification

    • Zero trust security model
    • Software chain Attack
    • Encryption / Certificate
    • Workshop
15:20 | 16:00
  • A3-08

    Keeper Security Privileged ID management starting with password management

    • Speaker

      Keeper Security APAC KK

      APAC Lead of Sales Engineering

      Masaki Ikehara

    • Cloud security
    • Measures against information leakage
    • Authentication / Identity Management

    Presented byDAIWABO INFORMATION SYSTEM CO., LTD. / Keeper Security APAC KK

  • B3-08

    Coming soon

    • Speaker

      MACNICA, Inc.

      Sales
      Networks company

      Kenta Chikauchi

    • Targeted Threat / Cyber Attack
    • Authentication / Identity Management
    • Zero trust security model

    Presented byMacnica, Inc.

  • C3-08

    The effectiveness of Keysight Security Solutions. Introduction based on PoC results using Trellix's NDR products

    • Speaker

      Keysight Technologies Japan K.K.

      Senior System Engineer
      IP Network Engineering Department
      Solution Engineering Division

      Takeshi Shimizu

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Cloud security

    Presented byKeysight Technologies Japan K.K.

16:15 | 16:55
  • A3-09

    Coming soon

    • Speaker

      Encourage Technologies Co., Ltd.

    • Ransomware measures
    • Authentication / Identity Management
    • Zero trust security model

    Presented byEncourage Technologies Co., Ltd.

  • B3-09

    Coming soon

    • Speaker

      Toshiba Digital Engineering Corporation

    • Speaker

      Cybereason G.K.

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • XDR

    Presented byToshiba Digital Engineering Corporation

  • C3-09

    Network Security Today: Analyzing Cyber Attacks and NDR Effectiveness

    • Speaker

      Vectra AI Japan

      Senior Sales Engineer

      Kazuo Fukuda

    • XDR
    • AI security
    • Monitoring and detection

    Presented byVectra AI Japan KK

  • Closed

    WS3-04

    Coming soon

    • Security auditing / system audit
    • Human resource development
    • Workshop
17:10 | 17:50
  • A3-10

    Efficiently Diagnosing Large-Scale Websites: Key Points for Selecting the Optimal Method (TBD)

    • Speaker

      UBsecure Inc.

    • Vulnerability measures / Tampering measures
    • Managed security
    • Security auditing / system audit

    Presented byUBsecure Inc.

  • B3-10

    Coming soon

    • Targeted Threat / Cyber Attack
    • Endpoint Security
    • Zero trust security model

    Presented byJ’s Communication Co., Ltd.

  • C3-10

    Significant management to protect against cyber attack !

    • Speaker

      ULTRA RED Ltd.

      Director
      Sales Engineering

      Yuji Sueyoshi

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • Vulnerability measures / Tampering measures

    Presented byKELA K.K.

17:55 | 18:25
  • A3-11

    The Standards on Cybersecurity Measures for Defense Industry

    • Speaker

      Acquisition, Technology and Logistics Agency

      Director Industrial Cyber Security Office, Equipment Security Management Division, Department of Equipment Policy

      Yugo Matsumoto

    • Targeted Threat / Cyber Attack
    • Measures against information leakage
    • Security auditing / system audit
  • B3-11

    Introduction to Japan Cybersecurity Labeling scheme, JC-STAR, for IoT products

    • Speaker

      Information-Technology Promotion Agency, Japan(IPA)

      General Manager
      IT Security Technology Evaluation Department, IT Security Center

      Masayuki Kanda

    • IoT security
  • C3-11

    Corporate Practices for Cybersecurity Responses:
    Measures and Responses in Peacetime and Emergency Situations

    • Speaker

      TMI Associates

      Partner
      Attorney-at-Law (Japan & New York)

      Shunsuke Terakado

    • Ransomware measures
    • Measures against information leakage
    • GDPR / Privacy Mark / ISMS / Laws of the Decree
18:35 | 19:35
  • A3-12

    Coming soon

    • Speaker

      NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION

    • Speaker

      NTT-ME CORPORATION

    • Cloud security
    • Endpoint Security
    • Zero trust security model

    Presented byNIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION

3.14(Fri)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:30
  • A4-01

    Cyber threats in the AI era

    • Speaker

      NTT Corporation

      Chief Cybersecurity Strategist
      Security and Trust Office

      Mihoko Matsubara

    • Ransomware measures
    • AI security
    • Business Email Compromise
09:40 | 10:20
  • A4-02

    Coming soon

    • Speaker

      Canon Marketing Japan Inc.

    • Speaker

      ESET Japan Inc.

    • XDR
    • Managed security

    Presented byCanon Marketing Japan Inc.

  • WS4-01

    Coming soon

    • Targeted Threat / Cyber Attack
    • Measures against information leakage
    • Human resource development
    • Workshop
10:30 | 11:10
  • A4-03

    Generative AI for Security Testing: Trusted by Global Leaders
    ~ Say Goodbye to Manual Reviews ~

    • Speaker

      Aeye Security Lab Inc.

      Executive Officer&Head of Customer Experience

      Teppei Sekine

    • Cloud security
    • Vulnerability measures / Tampering measures
    • Application Security

    Presented byAeye Security Lab Inc.

11:20 | 12:00
  • A4-04

    Coming soon

    • Speaker

      Cloudbase Inc.

    • Cloud security
    • Vulnerability measures / Tampering measures
    • Monitoring and detection

    Presented byCloudbase Inc.

12:15 | 12:55
  • A4-05

    Coming soon

    • Speaker

      CrowdStrike Japan GK

      Michio Mori

    • Targeted Threat / Cyber Attack
    • SOC / Incident Response
    • Security auditing / system audit

    Presented byCrowdStrike Japan GK

13:30 | 14:10
  • A4-06

    Revolutionizing Network Security with EntraID Suite and SecurityCopilot

    • Speaker

      TIS Inc.

      Section Chief
      Security Solutions Department

      Masashi Oguri

    • Cloud security
    • Authentication / Identity Management
    • Zero trust security model

    Presented byTIS Inc. / Microsoft Japan Co., Ltd.

  • B4-06

    Coming soon

    • Speaker

      MARUBENI IT SOLUTIONS INC.

    • Speaker

      International Christian University

    • Zero trust security model

    Presented byMARUBENI IT SOLUTIONS INC.

  • C4-06

    Coming soon

    • Speaker

      National center of Incident readiness and Strategy for Cybersecurity

      Counsellor
      Incident Handling and External Collaboration Unit

      Matsumoto Takashi

    • Critical Infrastructure Security
  • Closed

    WS4-02

    Lessons in Preventing Fraudulent and Deceptive Use of Brands: Practical Exercises and Insights from Tabletop Exercise Kits

    • PSIRT / CSIRT
    • Human resource development
    • Phishing Attack
    • Workshop
14:25 | 15:05
  • A4-07

    Three Key Actions You Should Take Now to Avoid Ransomware Attacks and Minimize Damage

    • Speaker

      Japan Business Systems, Inc.

      Cloud Managed Services Div.

      Shohei Hanashita

    • Ransomware measures
    • SOC / Incident Response
    • Software chain Attack

    Presented byJapan Business Systems, Inc. / Microsoft Japan Co., Ltd.

  • B4-07

    De-VPN and VDI Strategies to Protect Your Organization from Supply Chain Attacks

    • Speaker

      Soliton Systems K.K.

      Manager
      Product Promotion Department, IT Security Division

      Kazuki Mitsui

    • Targeted Threat / Cyber Attack
    • Measures against information leakage
    • Container security

    Presented bySoliton Systems K.K.

  • C4-07

    Next Generation Micro-segmentation with AI Technology
    〜Private Cloud - More Secure

    • Speaker

      Broadcom

    • Targeted Threat / Cyber Attack
    • Measures against information leakage
    • Critical Infrastructure Security

    Presented byVMware K.K. (Broadcom)

15:20 | 16:00
  • A4-08

    Get the most out of Microsoft Sentinel with generative AI and automation!
    95% reduction in security alert response operations!

    • Speaker

      NTT Communications Corporation

      General Manager
      Managed & Security Services , Security Servicies

      Yosuke Tobata

    • Endpoint Security
    • XDR
    • SOC / Incident Response

    Presented byNTT Communications Corporation / Microsoft Japan Co., Ltd.

  • B4-08

    Coming soon

    • Speaker

      3-shake Inc.

    • Vulnerability measures / Tampering measures
    • Application Security
    • Critical Infrastructure Security

    Presented by3-shake Inc.

  • C4-08

    Limitations and Dangers of Password Management/Now is the Era of Fully Passwordless

    • Speaker

      KDDI Digital Security Inc.

      Deputy General Manager
      CReation Of the Security&Safety Division

      Kenji Okoshi

    • Measures against information leakage
    • Authentication / Identity Management
    • Application Security

    Presented byKDDI Digital Security Inc.

16:15 | 16:55
  • A4-09

    Step ahead of attackers: Proactive Security made possible by the latest Threat Intelligence

    • Speaker

      Recorded Future Japan KK

      Sr Presales Engineer

      Tomoyuki Matsuda

    • Targeted Threat / Cyber Attack
    • PSIRT / CSIRT
    • SOC / Incident Response

    Presented byRecorded Future Japan KK

  • B4-09

    Balancing Security and Sustainability: The Latest Global Trends in Data Erasure

    • Speaker

      Blancco Technology Group / Blancco Japan Inc.

      Regional Director, Japan

      Motoi Mimatsu

    • Endpoint Security
    • Measures against information leakage
    • Zero trust security model

    Presented byBlancco Japan Inc.

  • C4-09

    CTC Discusses Vulnerability Management Strategies in Agile Development Achieved Through ASPM

    • Speaker

      IssueHunt

      CEO

      Kazumasa Yokomizo

    • Measures against information leakage
    • Software chain Attack
    • SBOM

    Presented byIssueHunt K.K.

  • WS4-04

    Coming soon

    • PSIRT / CSIRT
    • Security auditing / system audit
    • Human resource development
    • Workshop
17:10 | 17:50
  • A4-10

    Solution for prevention of leakage of technologies, for trade secret management, for reducing Human Vulnerability and for Human Risk Management

    • Speaker

      Leo United Ginza Law Office

      Attorney

      Leona Ohki

    • Measures against information leakage
    • Vulnerability measures / Tampering measures
    • Monitoring and detection

    Presented byLeo United Ginza Law Office

  • B4-10

    Cyber Resilience for Endpoints: Rapid Recovery from Threats with Absolute Secure Endpoint

    • Speaker

      Absolute Software K.K.

      Senior System Engineer

      Taira Fujita

    • Speaker

      Internet Initiative Japan Inc.

      DWP Solution Section
      Business Promotion Department
      Service Product Business Division

      Kohei Matsuura

    • Endpoint Security
    • Zero trust security model
    • Application Security

    Presented byAbsolute Software K.K. / Internet Initiative Japan Inc.

  • C4-10

    EDR challenges faced by organizations | A new security operations' approach in an era where all organizations are adopting EDR (TBD)

    • Speaker

      WithSecure™ Japan

      Product Marketing Manager
      Cyber Security Products & Services

      Yoshimasa Kanda

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • XDR

    Presented byWithSecure KK

17:55 | 18:25
  • A4-11

    What is ASM for visualizing attack surfaces?
    - Interpretation and definition of ASM from a practitioner's perspective -

    • Speaker

      Secure Sky Technology Inc.

      Specialist

      Yu Iwama

    • Speaker

      BalaenaTech Co., Ltd.

      Company President

      Masashi Kouda

    • Targeted Threat / Cyber Attack
    • Vulnerability measures / Tampering measures
    • Software chain Attack
  • B4-11

    Coming soon

    • Speaker

      Bank of Japan

    • Targeted Threat / Cyber Attack
    • Critical Infrastructure Security
  • C4-11

    Amendement of Act on the Protection of Personal Information and its Impact on Corporate Practices

    • Speaker

      Ushijima & Partners

      Partner

      Hiroyasu Kageshima

    • GDPR / Privacy Mark / ISMS / Laws of the Decree
  • Privacy Policy

[24年秋開催]Security Days Fall 2024

Copyright (c) NANO OPT Media, Inc. All rights reserved.