iotc iotc

    • linkedin
    • facebook
    • twitter
    • YouTube
  • Registration

    Registration
  • Outline Outline
  • Osaka Osaka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Nagoya Nagoya
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Tokyo Tokyo
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Fukuoka Fukuoka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • Osaka Osaka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Nagoya Nagoya
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Tokyo Tokyo
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • Fukuoka Fukuoka
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Registration

      Registration

Session

  • All
  • 10.16(Thu)
  • 10.17(Fri)

Search (possible multiple choice)

Keyword
  • Security Days Fall 2025 Nagoya
  • Security Days - Automotive

10.16(Thu)

  • RoomA
  • RoomB
  • RoomC
09:30 | 10:00
  • GA-01

    Cyberspace threat situation and police efforts (tentative)

    • Speaker

      National Police Agency JAPAN

      Cybercrime Prevention Office, Cyber Affairs Bureau
      Assistant Director

      Yohsuke Nakagawa

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
  • GB-01

    What is the hot topic of supply chain security right now?
    ~From the changing situation surrounding companies in the Chubu region~ Part 1

    • Panelist

      Information-technology Promotion Agency, Japan (IPA)

    • Panelist

      TOYOTA INDUSTRIES IT SOLUTIONS Inc.

    • Panelist

      Suzuki Motor Corporation

    • Moderator

      Chubu Electric Power Co.,Inc.

  • GC-01

    What Does Identity Really Mean?
    — 2035 is just around the corner —

    • Speaker

      The University of Osaka

      D3 center
      Professor, CISO

      Atsuo Inomata

    • Targeted Attacks / Cyber Attacks
    • Zero Trust
    • Authentication / Identity Management
10:10 | 10:50
  • GA-02

    Evolving Threats, Enhanced Defense: Key Insights from the 2025 Threat Hunting Report

    • Speaker

      CrowdStrike Japan GK

      Sales Engineering Dept.
      Sales Engineer

      Satoshi Sakamoto

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security

    Presented byCrowdStrike Japan GK

  • GB-02

    What is the hot topic of supply chain security right now?
    ~From the changing situation surrounding companies in the Chubu region~ Part 2

    • Panelist

      Information-technology Promotion Agency, Japan (IPA)

    • Panelist

      TOYOTA INDUSTRIES IT SOLUTIONS Inc.

    • Panelist

      Suzuki Motor Corporation

    • Moderator

      Chubu Electric Power Co.,Inc.

  • GC-02

    The Pros and Cons of AI Utilization: The "Offensive and Defensive" Security Strategy Required in the Digital Transformation Era

    • Speaker

      Netskope Japan K.K.

    • Cloud Security
    • Data Leakage Prevention
    • SASE (Secure Acess Service Edge)

    Presented byNetskope Japan K.K.

11:05 | 11:45
  • GA-03

    Effective and efficient security education that encourages employee behavioral change

    • Speaker

      LRM, Inc.

    • Targeted Attacks / Cyber Attacks
    • Human Resource Development
    • Phishing scam

    Presented byLRM, Inc.

  • GB-03

    Next-generation update management after WSUS discontinuation: Migration strategy to IT asset management tools

    • Speaker

      DOS Co., Ltd.

    • Data Leakage Prevention
    • Endpoint Security
    • Vulnerability / Tampering Countermeasures

    Presented byDOS Co., Ltd.

  • GC-03

    Case study presentation: Utilizing "Security Measures System" compliance!
    ~Nitto Kogyo's efforts to visualize security measures~

    • Speaker

      NITTO KOGYO CORPORATION

      Cyber Security Section / ICT Infrastructure Strategy Office
      Senior Project Manager

      Kitazumi Chiho

    • Moderator

      Network Value Components Ltd.

      Sales Div. Sale Department 1 Group 1

      Kondo Takumi

    • Vulnerability / Tampering Countermeasures
    • Security Audits / System Audits
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends

    Presented byNetwork Value Components Ltd.

12:05 | 12:35
  • GA-04

    Battlespace Cyber: Incidents via Wireless Space and Cyber Security

    • Speaker

      Ministry of Defense

      National Institute for Defense Studies
      Police Research Department
      Senior Research Officer

      Kawamura Koki

    • Endpoint Security
  • GB-04

    How to Get Started with Cybersecurity as a Key Enabler of Factory Digital Transformation

    • Speaker

      Nagoya Institute of Technology

      Manufacturing and Innovation DX Laboratory
      Visiting Associate Professor

      Hiroshi Sasaki

    • Targeted Attacks / Cyber Attacks
    • SOC / Incident Response
    • Human Resource Development
  • GC-04

    A control system vendor's approach as a bridge between IT and OT systems

    • Speaker

      Yokogawa Electric Corporation

    • Targeted Attacks / Cyber Attacks
    • IoT Security
    • Critical Infrastructure Security
12:50 | 13:30
  • GA-05

    Why Small Businesses Are the New Targets
    — The Latest Cyber Threats and How EPP × MDR Become the New Standard for Protection

    • Speaker

      Kaspersky Labs Japan

      Enterprise Solution Expert

      Takehiro Ito

    • Ransomware Countermeasures
    • Endpoint Security
    • Managed Security Services

    Presented byK.K. Kaspersky Labs Japan

  • GB-05

    From ad hoc to strategic: Quantitative assessment of internal and external security risks

    • Speaker

      Tsuzuki Denki Co., Ltd.

      Section 1, Security Business Promotion Department

      Takeshi Akiyama

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Security Audits / System Audits

    Presented byTSUZUKI DENKI CO.,LTD.

  • GC-05

    Aiming to minimize the risk of an expanding attack surface through AI
    Understanding the essence of "proactive security"

    • Speaker

      Trend Micro Incorporated

      Manager,
      Platform Marketing Group,
      Platform Enablement Dept

      Shiori Okamoto

    • Ransomware Countermeasures
    • Endpoint Security
    • AI Security

    Presented byTrend Micro Inc.

13:45 | 14:25
  • GA-06

    Strengthening Windows login security with AD integration
    - Multi-factor authentication and access control required for the supply chain -

    • Speaker

      OceanBridge Inc.

    • Zero Trust
    • Authentication / Identity Management
    • Software Supply Chain Attacks

    Presented byOceanBridge Inc.

  • GB-06

    Building a Resilient Supply Chain: Multi-Layered Defense & Email Security with HENNGE One

    • Speaker

      HENNGE K.K.

      Cloud Sales Division,
      Central Japan Sales Section

      Shinya Hatta

    • Targeted Attacks / Cyber Attacks
    • Cloud Security
    • Business Email Compromise Countermeasures

    Presented byHENNGE K.K.

  • GC-06

    The Current State and Future of SASE
    ~Toward the Realization of Secure Digital Transformation and Axon Transformation~

    • Speaker

      SoftBank Corp.

    • Zero Trust
    • AI Security
    • SASE (Secure Acess Service Edge)

    Presented bySoftBank Corp.

14:35 | 15:05
  • GA-07

    Considering the importance of OT security measures in the digital transformation of manufacturing sites through case studies
    ~What's happening between IT and OT?~

    • Speaker

      Mitsubishi Electric Corporation

    • Targeted Attacks / Cyber Attacks
    • Endpoint Security
    • Zero Trust

    Presented byMitsubishi Electric Corporation

  • GB-07

    Response to trends in laws and regulations regarding product security

    • Speaker

      Meiji University

      Institute of Business Information Ethics
      Visiting Researcher

      Eiichi Moriya

    • IoT Security
    • PSIRT / CSIRT
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
  • GC-07

    Agentic AI and LLMs: A Game-Changer in Cybersecurity

    • Speaker

      Institute of Information Security

      Professor

      Akira Otsuka

    • Targeted Attacks / Cyber Attacks
    • AI Security
15:15 | 15:55
  • GA-08

    How to take your vulnerability management to the next level?
    Introducing Continuous Risk Management with Qualys.

    • Speaker

      Qualys Japan K.K.

      Sales Department HQ
      Regional Sales Director, Japan

      Mitsufusa Sugimoto

    • Demonstrator

      Qualys Japan K.K.

      Sales Department HQ
      Technical Account Manager

      Fuyuki Motono

    • Vulnerability / Tampering Countermeasures
    • Security Audits / System Audits
    • PSIRT / CSIRT

    Presented byQualys Japan K.K.

  • GB-08

    In an era where smartphones are targeted - Security strategies to protect mobile devices

    • Speaker

      Jamf Japan G.K.

      Sales Engineer Manager

      Yoshinori Inaba

    • Data Leakage Prevention
    • Endpoint Security
    • Zero Trust

    Presented byJamf Japan G.K.

  • GC-08

    The first step in cybersecurity measures is vulnerability management

    • Speaker

      Mitsubishi Electric Digital Innovation Corporation

      Information Security Service Division
      Service Planning Section

      Takata Naoki

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Vulnerability / Tampering Countermeasures

    Presented byMitsubishi Electric Digital Innovation Corporation

16:10 | 16:50
  • GA-09

    Why Palo Alto Networks Matters Now: In-Depth Discussion (Tentative)

    • Speaker

      Palo Alto Networks K.K.

      Chief Cybersecurity Strategist

      Masayoshi Someya

    • Speaker

      SB C&S Corp.

      Digital Sales Promotion Office
      Network&Security Promotion Division ICT Unit

      Jun Sugata

    • AI Security
    • SASE (Secure Acess Service Edge)

    Presented bySB C&S Corp.

  • GB-09

    The Security Resilience of Japanese Companies Revealed by Sekyumaru
    - Necessary Next Actions from Short- and Long-Term Perspectives - Beyond Zero Trust

    • Speaker

      Marubeni I-DIGIO Group

    • Cloud Security
    • Zero Trust
    • SASE (Secure Acess Service Edge)

    Presented byMarubeni I-DIGIO Group

  • GC-09

    Conquer increasingly complex compliance!
    - Minimizing corporate risk through automation -

    • Speaker

      Dai Nippon Printing Co., Ltd.

    • Security Audits / System Audits
    • Workstyle Innovation

    Presented byDai Nippon Printing Co., Ltd.

17:00 | 17:30
  • GA-10

    Introducing the "IPA Top 10 Information Security Threats 2025 (Organizational Edition)"
    ~Don't excuse your ignorance! Stay up to date with the latest information to prevent threats~

    • Speaker

      Information-technology Promotion Agency, Japan (IPA)

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Critical Infrastructure Security
  • GB-10

    The threat of state-sponsored cyber attacks

    • Speaker

      Public Security Intelligence Agency

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
  • GC-10

    AI BOM - Secure and transparent AI in an ecosystem

    • Speaker

      The Linux Foundation

      Japan
      VP of Japan Operations

      Noriaki Fukuyasu

    • AI Security
    • SBOM (Software Bill of Materials)

10.17(Fri)

  • RoomA
  • RoomB
  • RoomC
09:30 | 10:00
  • GA2-01

    Cyber Attack Trends and Automotive Security Measures

    • Speaker

      Tokyo Denki University

      Emeritus Professor

      Ryoichi Sasaki

    • Targeted Attacks / Cyber Attacks
    • Vulnerability / Tampering Countermeasures
    • IoT Security
  • GB2-01

    DENSO’s Efforts on Product Security to Support the CASE Era

    • Speaker

      DENSO CORPORATION

      CISSP, CCSP, CISA, CEH
      General Manager, Product Security Dept.
      SOMRIE® Security Specialist, Senior
      Information Security Division

      Keiichiro Hiranaga

    • Security Audits / System Audits
    • Critical Infrastructure Security
    • PSIRT / CSIRT
  • GC2-01

    Securing the Mobility Ecosystem in the SDV Era: AWS Security Solutions for Automotive

    • Speaker

      Amazon Web Services Japan G.K.

      Solutions 1 Automotive &Manufacturing Group
      Sr.Solutions Architecture

      Taku Fukushima

    • Cloud Security
    • Zero Trust
    • Critical Infrastructure Security
10:10 | 10:50
  • GA2-02

    Efficiently comply with JAMA guidelines! Strategies for utilizing IT asset management tools

    • Speaker

      DOS Co., Ltd.

    • Data Leakage Prevention
    • Endpoint Security
    • Vulnerability / Tampering Countermeasures

    Presented byDOS Co., Ltd.

  • GB2-02

    The Forefront of Identity Security for Compliance with JAMA/JAPIA Cybersecurity Guidelines: MFA and Access Control with Silverfort

    • Speaker

      Silverfort

      Country Lead, Japan

      Hiro Aoyama

    • Demonstrator

      Silverfort

      Senior Sales Engineer, Japan

      Kimimasa Sato

    • Targeted Attacks / Cyber Attacks
    • Zero Trust
    • Authentication / Identity Management

    Presented bySilverfort PTE LTD

  • GC2-02

    Overview of NXP’s HSE(Hardware Security Engine) root-of-trust at the core of the SDV

    • Speaker

      NXP Japan

      GS Japan Automotive Sales Automotive Business Development
      Senior Principal Field Application Engineer

      Shigehiko Tsumura

    • IoT Security
    • Encryption / Certificates
    • Quantum Security

    Presented byNXP Japan Ltd.

11:05 | 11:45
  • GA2-03

    Effective and efficient security education that encourages employee behavioral change

    • Speaker

      LRM, Inc.

    • Targeted Attacks / Cyber Attacks
    • Human Resource Development
    • Phishing scam

    Presented byLRM, Inc.

  • GB2-03

    Inside the Hacker’s Mind: Lessons from Real Attacks on Software-Defined Vehicles

    • Speaker

      ForAllSecure, Inc.

      CEO

      David Brumley

    • Targeted Attacks / Cyber Attacks
    • IoT Security
    • Application Security

    Presented byTECHMATRIX CORPORATION

  • GC2-03

    Going beyond the limits of SIEM! Defense of the automotive supply chain with XDR

    • XDR
    • SOC / Incident Response
    • IoT Security

    Presented byBroadBand Security, Inc.

12:05 | 12:35
  • GA2-04

    Initiatives to improve practical capabilities in ongoing cybersecurity activities

    • Speaker

      Japan Automotive ISAC INC.

  • GB2-04

    New Values Brought by Software-Defined Vehicles

    • Speaker

      Nagoya University

      Global Research Institute for Mobility in Society
      Director and Professor

      Hiroaki Takada

    • Other
  • GC2-04

    Uncovering This Much from Public Information! The Power of OSINT Through Real-World Industry Cases

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Phishing scam
12:50 | 13:30
  • GA2-05

    Securing Connected Vehicles: Vulnerability Assessment and Mitigation in Embedded Software

    • Speaker

      TOYO Corporation

      Software Solutions
      Chief

      Toshikazu Iwata

    • Vulnerability / Tampering Countermeasures
    • SBOM (Software Bill of Materials)
    • Software Supply Chain Attacks

    Presented byTOYO Corporation

  • GB2-05

    Learning from advanced European examples: Data security for further data utilization

    • Speaker

      Partisia Application ApS

      Commercial Department
      Japan Branch Representative

    • Zero Trust
    • Authentication / Identity Management
    • Encryption / Certificates

    Presented byPartisia Applications ApS

  • GC2-05

    Cybersecurity evaluation methods for automotive ECU development and case studies of ETAS solutions

    • Speaker

      ETAS K.K.

      Security, Information & Diagnostics Solution Field
      Field Application Engineer

      Osamu Terada

    • Vulnerability / Tampering Countermeasures
    • SBOM (Software Bill of Materials)
    • Other

    Presented byETAS K.K.

13:45 | 14:25
  • GA2-06

    Protecting only domestic bases is dangerous!
    Three solutions to prevent rapidly increasing attacks on the global supply chain

    • Speaker

      Internet Initiative Japan Inc.

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust

    Presented byInternet Initiative Japan Inc.

  • GB2-06

    Coming soon

    • Speaker

      BSI Professional Services Japan

      Consulting Services,
      Consultant,PMP

      Akira Nomura

    • Security Audits / System Audits
    • Other

    Presented byBSI Professional Services Japan Co.,Ltd.

  • GC2-06

    JAMA/JAPIA Cybersecurity Guidelines: Gap to Compliance

    • Speaker

      MOTEX Inc.

    Presented byMOTEX Inc.

14:35 | 15:05
  • GA2-07

    Automotive Cyber Threats and Latest Vulnerability Trends

    • Speaker

      General Incorporated Association Japan Automotive ISAC

      Security Operation Center
      Deputy Director

      Masahiro Aoyama

    • SOC / Incident Response
    • Monitoring / Detection
    • PSIRT / CSIRT
  • GB2-07

    Security in Control and Mobility
    — Technologies to Protect Moving Systems

    • Speaker

      The University of Osaka

      Department of Mechanical Engineering
      Professor

      Kenji Sawada

    • Targeted Attacks / Cyber Attacks
    • AI Security
    • Critical Infrastructure Security
  • GC2-07

    Generative AI-Based Autonomous Driving: Threats and Countermeasures

    • Speaker

      Turing Inc.

      Fundamental AI team
      Principal Researcher

      Tsubasa Takahashi

    • AI Security
    • Edge Security
15:15 | 15:55
  • GA2-08

    How to Promote OT Security Measures in the Automotive Industry
    ~Key Points for Meeting Requirements~

    • Speaker

      Mitsubishi Electric Corporation

    • Targeted Attacks / Cyber Attacks
    • Endpoint Security
    • Zero Trust

    Presented byMitsubishi Electric Corporation

  • GB2-08

    Coming soon

    • Speaker

      Macnica, Inc.

      Networks Company
      Security Division #2

      Yusuke Takahashi

    • SOC / Incident Response

    Presented byMacnica, Inc.

  • GC2-08

    Coming sooProtecting Products from Supply Chain Attacks!
    Utilizing SBOM and Strengthening Security in Embedded Softwaren

    • Speaker

      Cybertrust Japan Co., Ltd.

    • Vulnerability / Tampering Countermeasures
    • SBOM (Software Bill of Materials)
    • Software Supply Chain Attacks

    Presented byCybertrust Japan Co., Ltd.

16:10 | 16:50
  • GA2-09

    Balancing "Development Freedom" and "Security" in the SDV Era: Protecting the Automotive Development Environment with Cloud and AI

    • Speaker

      Netskope Japan K.K.

    • Ransomware Countermeasures
    • Cloud Security
    • SASE (Secure Acess Service Edge)

    Presented byNetskope Japan K.K.

  • GB2-09

    [A Must-See for Automotive Industry Professionals!] Security Measures Compliant with JAMA Guidelines

    • Speaker

      Digital Arts Inc.

      Marketing Division
      Manager

      Ryosuke Nakayama

    • Zero Trust
    • Email Security
    • Authentication / Identity Management

    Presented byDigital Arts Inc.

  • GC2-09

    The forefront of automotive security in the SDV era
    - How to prepare for evolving threats

    • Speaker

      Panasonic Automotive Systems Co., Ltd.

    • Vulnerability / Tampering Countermeasures
    • Monitoring / Detection
    • PSIRT / CSIRT

    Presented byPanasonic Automotive Systems Co., Ltd.

17:00 | 17:30
  • GA2-10

    Cybersecurity Measures in the Automotive Supply Chain in the Era of Software-Defined Vehicles (SDV)

    • Speaker

      General Incorporated Association Japan Automotive ISAC
      Cyber Security Ecosystem Construction Center
      Director /

      (Mazda Motor Corporation
      MDI&IT Division
      Director Global Security Officer

      Masashi Yamasaki

    • PSIRT / CSIRT
    • Human Resource Development
    • SBOM (Software Bill of Materials)
  • GB2-10

    A Decade of Automotive Security Through the Eyes of Academia — Past, Present, and Future

    • Speaker

      Graduate School of Informatics, Nagoya University

    • Application Security
    • Software Supply Chain Attacks
    • Edge Security
  • GC2-10

    Regulations for the Cyber Security of Vehicles

    • Speaker

      TMI Associates

      Attorney at Law,
      Partner of TMI Associates

      Yukitaka Iwata

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Critical Infrastructure Security
  • Privacy Policy

[25年春開催]Security Days Spring 2025

Copyright (c) NANO OPT Media, Inc. All rights reserved.