Nagoya Session
名古屋講演
Search (possible multiple choice)
Keyword
3.18(Wed)
-
09:30 | 10:00
-
-
GA-01

Cyber threat landscape and police initiatives
-
Speaker
National Police Agency
Akira Oe
- Ransomware Countermeasures
- Phishing scam
-
Speaker
-
GB-01

Resilience Building to Hybread Threat
-
Speaker
Organization for Cyber Defense Innovation
Director
Akihiro Fujii
- Monitoring / Detection
- Human Resource Development
- Other
- Advanced
-
Speaker
-
GC-01

Strengthening cybersecurity measures at Ports
— Insights from training to confirm response procedures during terminal operation system disruptions—-
Speaker
Ministry of Land, Infrastructure, Transport and Tourism
Tomohide Sugimoto
- Critical Infrastructure Security
-
Speaker
-
-
10:10 | 10:50
-
-
GA-02

The practical solution of “Integrated SASE” to safeguard supply chain
-
Speaker
Fortinet Japan G.K.
Daisuke Imai
- Ransomware Countermeasures
- Beginner
Presented byFortinet Japan G.K.
-
Speaker
-
GB-02

Plug in to a sterile workspace—anywhere.
Sanitize threats harmless. Zero Compromise on your DX.-
Speaker
Menlo Security Japan K.K
Data Security Specialist
Ryo Nakatsuke
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Critical Infrastructure Security
Presented byMenlo Security Japan K.K.
-
Speaker
-
GC-02

Protecting Internal Networks using WIPS
-
Speaker
KORNIC GLORY CO.,Ltd.
Manager,
Wired Technology TeamChang Minseon
- Data Leakage Prevention
- Monitoring / Detection
Presented byKornic Glory Co.,Ltd.
-
Speaker
-
-
11:05 | 11:45
-
-
GA-03

Cybersecurity in the age of AI agents
-
Speaker
Cloudflare Japan K. K.
Koichiro Otobe
- Targeted Attacks / Cyber Attacks
- Zero Trust
- AI Security
Presented byCloudflare Japan K. K.
-
Speaker
-
GB-03

Preparing for supply chain evaluation systems
— Strengthening company's security starting with IT asset management-
Speaker
DOS Co., Ltd.
Yuka Haruta
- Data Leakage Prevention
- Endpoint Security
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
Presented byDOS Co., Ltd.
-
Speaker
-
GC-03

From “Wait and Lose” to Proactive Defense:
Ransomware Containment Strategies Using Dark Web Intelligence and Active Cyber Defense (ACD/CTI/CTEM)-
Speaker
KELA Ltd.
Senior Sales Engineer
Masato Hori
-
Speaker
ULTRA RED, Ltd.
Regional Product Manager
Kenichiro Hashimoto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Data Leakage Prevention
Presented byKela K.K.
-
Speaker
-
-
12:05 | 12:35
-
-
GA-04

Toward a Password-less World
~Overview and Latest Status of Passkeys~-
Speaker
FIDO Alliance, Inc.
APAC Market Development Sr. Manager
Atsuhiro Tsuchiya
- Authentication / Identity Management
- Phishing scam
- Quantum Security
- Beginner
-
Speaker
-
GB-04

How to address the rapidly growing problems of smartphones?
-New essentials for smartphone management and security measures--
Speaker
Jamf Japan G.K.
Sales Engineer
Maari Koga
- Endpoint Security
- Zero Trust
- Phishing scam
Presented byJamf Japan G.K.
-
Speaker
-
GC-04

The Realities of Identity Management and the Right Approach
— A Practical Framework for Organizing, Designing, and Operating User, Device, Privileged ID, and Non-SSO Domains —-
Speaker
ZUNDA Inc.
IT Professional
Solution ArchitectKazuya Endo
- Endpoint Security
- Authentication / Identity Management
- SASE (Secure Acess Service Edge)
- Beginner
Presented byZUNDA Inc.
-
Speaker
-
-
12:50 | 13:30
-
-
GA-05

Coming soon
-
Speaker
LRM, Inc.
Tomoyuki Fujii
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Human Resource Development
Presented byLRM, Inc.
-
Speaker
-
GB-05

Add security to ID and Password
Start multi-factor authentication for Windows login with UserLock-
Speaker
OceanBridge Inc.
Shunsuke Baba
- Ransomware Countermeasures
- Zero Trust
- Authentication / Identity Management
- Beginner
Presented byOceanBridge Inc.
-
Speaker
-
GC-05

Unraveling the Currently Required Security Measures: A Deeper Look from the Security Assessment Framework for Strengthening Supply Chains (Tentative)
-
Speaker
HENNGE K.K.
Corporate Communication Division,
Marketing SectionShinsuke Itagaki
- Targeted Attacks / Cyber Attacks
- Authentication / Identity Management
- Business Email Compromise Countermeasures
- Beginner
Presented byHENNGE K.K.
-
Speaker
-
-
13:45 | 14:25
-
-
GA-06

Neglecting software supply chain vulnerabilities poses business risks
Comprehensive vulnerability countermeasures utilizing SBOM, as demonstrated by yamory-
Speaker
Assured, Inc.
Satochi Hara
- Vulnerability / Tampering Countermeasures
- SBOM (Software Bill of Materials)
- Software Supply Chain Attacks
Presented byAssured, Inc.
-
Speaker
-
GB-06

M365 Users must attend the lecture!
Latest trends in Email misdelivery and the ultimate weapon for the “New Outlook”-
Speaker
SCSK Minori Solutions Corporation
Kuniyasu Hayashi
- Data Leakage Prevention
- Email Security
Presented bySCSK Minori Solutions Corporation
-
Speaker
-
GC-06

What are other companies doing?
Preventing email misdelivery and internal misconduct
Practical enterprise techniques to stop information leaks-
Speaker
imatrix corp.
Enterprise Sales
ManagerGai Hoshino
- Data Leakage Prevention
- AI Security
- Email Security
Presented byimatrix corp.
-
Speaker
-
-
14:35 | 15:05
-
-
GA-07

The Dangers of Public Data Leaks and Exposed Attack Surfaces
- A Former Cyber Operations Officer’s Perspective-
Speaker
NSHC Inc.
Director
Park Bumjoon
- Targeted Attacks / Cyber Attacks
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
-
Speaker
-
GB-07

Security Strategies for AI and Ransomware Through the Eyes of Attackers
-
Speaker
Hitachi Solutions, Ltd.
Managed Security Service Department
Chief Security AnalystMomoko Aoyama
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- AI Security
-
Speaker
-
GC-07

Essential points to 'absolutely' must know when utilizing Microsoft 365 and security measures recommendations
-
Speaker
MOTEX Inc.
Product Marketing Department, Marketing Division
DirectorRyo Muto
- Targeted Attacks / Cyber Attacks
- Cloud Security
- Data Leakage Prevention
Presented byMOTEX Inc.
-
Speaker
-
-
15:15 | 15:55
-
-
GA-08

Latest Countermeasures Against Cross-Domain Attacks Including Ransomware
-
Speaker
CrowdStrike Japan GK
Sales Engineering Dept,
Sales EngineerHirotaka Nakamoto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Endpoint Security
Presented byCrowdStrike Japan GK
-
Speaker
-
GB-08

Ride the Big Wave Now or Never!
Ex-IT Information Systems department discuss Reiwa-Era “Proper AI Native” Security!-
Panelist
Marubeni I-DIGIO Group
Yusaku Sakiyama
-
Panelist
Marubeni I-DIGIO Group
Nozomi Marui
-
Moderator
Marubeni I-DIGIO Group
Masatsugu Inage
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- AI Security
Presented byMarubeni I-DIGIO Group
-
Panelist
-
GC-08

OT Security: The lifeline of manufacturing
— Intrusion pathways in the AI Era and Investment strategies for “Never-Stopping Factories” in the coming fiscal year-
Speaker
Tenable Network Security Japan K.K.
Junpei Abe
- Targeted Attacks / Cyber Attacks
- Vulnerability / Tampering Countermeasures
- Critical Infrastructure Security
- Beginner
Presented byTenable Network Security Japan K.K.
-
Speaker
-
-
16:10 | 16:50
-
-
GA-09

How should CIS respond to the ever-increasing security risks?
- Security of the "PC Lifecycle Final Process" that is often overlooked --
Speaker
Pacific Net Co.,Ltd.
IT Solutions Department
ManagerYuuhei Hayakawa
- Data Leakage Prevention
Presented byPacific Net Co.,Ltd.
-
Speaker
-
GB-09

Case study presentation:
Securing supply chain beyond VPN :How to prevent initial Ransomware infiltration-
Speaker
Netskope Japan K.K.
Masahide Aogame
- Ransomware Countermeasures
- Zero Trust
- SASE (Secure Acess Service Edge)
- Beginner
Presented byNetskope Japan K.K.
-
Speaker
-
GC-09

Transforming SOC operations
-The advancement and efficiency of SOCs through AI and automation are becoming real--
Speaker
NRI SecureTechnologies, Ltd.
Junichi Nakayama
- AI Security
- SOC / Incident Response
- Managed Security Services
Presented byNRI SecureTechnologies, Ltd. / Net One Partners Co., Ltd.
-
Speaker
-
-
17:00 | 17:30
-
-
GA-10

Threats in Cyberspace
-State-sponsored Cyberattacks-
Speaker
Public Security Intelligence Agency
Ippei Suyama
- Targeted Attacks / Cyber Attacks
-
Speaker
-
GB-10

Cybersecurity Measures from the Network Side
-
Speaker
Ministry of Internal Affairs and Communications
Office of the Director-General for Cybersecurity
Senior Planning OfficerTakanori Umeki
- IoT Security
- Encryption / Certificates
- Quantum Security
-
Speaker
-
GC-10

10 Major Security Threats and Basic Security Measures [For Organizations]
-
Speaker
Information-technology Promotion Agency, Japan
IT Security Center(ISEC) Cyber Situation Analysis Department
ResearcherShigenori Kaneko
- Ransomware Countermeasures
- Data Leakage Prevention
- Vulnerability / Tampering Countermeasures
- Beginner
-
Speaker
-
3.19(Thu)
-
09:30 | 10:00
-
-
GA2-01

Overview of Cyberattacks on Connected Cars and Security Countermeasures, and Activities of J-Auto-ISAC (Tentative Title)
-
Speaker
Tokyo Denki University
Professor Emeritus
Ryoichi Sasaki
- IoT Security
- Application Security
- Managed Security Services
- Intermediate
-
Speaker
-
GB2-01

Product Security Initiatives in the DX Era
-
Speaker
DENSO Corporation
General Manager,
Product SecurityKeiichiro Hiranaga
- Zero Trust
- Security Audits / System Audits
- PSIRT / CSIRT
- Intermediate
-
Speaker
-
GC2-01

Latest authority trend of automotive cybersecurity (2026)
-
Speaker
Japan Automobile Manufacturers Association
Electronics Platform sub-committee chair person.
Shigeyuki Kawana
- Other
- Beginner
-
Speaker
-
-
10:10 | 10:50
-
-
GA2-02

Learning from Leading European Examples: Data Security for Enhanced Data Utilization
-
Speaker
Partisia Applications ApS
Miyoji Kakinuki
- Zero Trust
- Authentication / Identity Management
- Encryption / Certificates
Presented byPartisia Applications ApS
-
Speaker
-
GB2-02

Vulnerabilities in Generative AI Code and Security Training in the Automotive Industry
-
Speaker
TECHMATRIX CORPORATION
Yusuke Iwahashi
- AI Security
- PSIRT / CSIRT
- Human Resource Development
Presented byTECHMATRIX CORPORATION
-
Speaker
-
GC2-02

Toward strengthening Cybersecurity Governance in the complex supply chain world
-
Speaker
Bitsight Technologies
Regional Sales Manager
Kouichi Takano
- Targeted Attacks / Cyber Attacks
- Vulnerability / Tampering Countermeasures
- Software Supply Chain Attacks
Presented byConstella Security Japan inc.
-
Speaker
-
-
11:05 | 11:45
-
-
GA2-03

Cybersecurity measures to consider in the SDV Era
-
Speaker
NDIAS, Ltd.
Automotive Security Division
Group ManagerRyosuke Uematsu
- IoT Security
- Application Security
Presented byNDIAS, Ltd.
-
Speaker
-
GB2-03

Vulnerability risk management functions necessary to ensure security quality
-
Speaker
Qualys Japan K.K.
Sales Headquarter
Regional Sales Director, JapanMitsufusa Sugimoto
-
Speaker
Qualys Japan K.K.
Sales Headquarter
Technical Account ManagerYukari Miyagawa
-
Speaker
Qualys Japan K.K.
Sales Headquarter
Technical Account ManagerFuyuki Motono
- Targeted Attacks / Cyber Attacks
- Cloud Security
- Vulnerability / Tampering Countermeasures
Presented byQualys Japan K.K.
-
Speaker
-
GC2-03

Coming soon
-
-
12:05 | 12:35
-
-
GA2-04

Continuous cybersecurity activities: Introducing useful content
-
Speaker
Japan Automotive ISAC INC.
Toru Inagaki
-
Speaker
-
GB2-04

Open SDV and Activities of Open SDV Initiative
-
Speaker
Nagoya University
Graduate School of Informatics,
Executive Director and Professor of Center for Embedded Computing SystemsHiroaki Takada
- Other
-
Speaker
-
GC2-04

Cybersecurity Initiatives and Information Disclosure Certification System by ASPIC
-
Speaker
ASP-SaaS- AI-IoT Cloud Industry Association
Toru Nakamura
- Cloud Security
- Security Audits / System Audits
- GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
-
Speaker
-
-
12:50 | 13:30
-
-
GA2-05

Coming soon
Presented byPERSOL CROSS TECHNOLOGY CO., LTD.
-
GB2-05

Protecting in-vehicle systems with ironclad defense and continuous security
-XGuard's approach and case studies to combat increasingly sophisticated and unknown cyber-attacks--
Speaker
TOYO Corporation
Toshikazu Iwata
-
Demonstrator
TOYO Corporation
Waku Kobayashi
- Vulnerability / Tampering Countermeasures
- IoT Security
- Monitoring / Detection
Presented byTOYO Corporation
-
Speaker
-
GC2-05

Coming soon
-
-
13:45 | 14:25
-
-
GA2-06

A practical Roadmap for ECU development in new SDV era, which accelerates you with "Automation" and "Tool chain integration"!
-
Speaker
ETAS.K.K.
Security, Information & Diagnostics Solution Field
Field Application EngineerOsamu Terada
- Vulnerability / Tampering Countermeasures
- SBOM (Software Bill of Materials)
- Other
Presented byETAS K.K.
-
Speaker
-
GB2-06

Coming soon
-
Speaker
Open SDV Initiative
Fumihito Kondo
-
Speaker
-
GC2-06

Coming soon
Presented bySMS DataTech Corporation
-
-
14:35 | 15:05
-
-
GA2-07

The front line of automotive cybersecurity
-The industry landscape and the reality of the latest automotive vulnerabilities-
Speaker
Japan Automotive ISAC INC.
Security Operation Center
Masahiro Aoyama
- SOC / Incident Response
- Monitoring / Detection
- PSIRT / CSIRT
-
Speaker
-
GB2-07

Evolving Cybersecurity Approaches and Holistic Risk Management in the Age of SDV
-
Speaker
Dloitte Tohmatsu Cyber LLC
Director
Taisuke Katayama
- IoT Security
- PSIRT / CSIRT
- Managed Security Services
Presented byDeloitte Tohmatsu Cyber LLC
-
Speaker
-
GC2-07

Software Supply Chain Security with Docker:
Balancing Business Agility and Security for Sustainable Container Development-
Speaker
Docker
Solutions Engineering
Strategic Solutions EngineerTadashi Nemoto
- SBOM (Software Bill of Materials)
- Software Supply Chain Attacks
- Container Security
-
Speaker
-
-
15:15 | 15:55
-
-
GA2-08

Quantifying the Financial impact of “Invisible Cyber risks” and ROI of security investments
Leveraging objective Security Ratings in the Automotive industry-
Speaker
Bitsight Technologies
Solution Engineer
Masao Kajihara
- Targeted Attacks / Cyber Attacks
- Vulnerability / Tampering Countermeasures
- Software Supply Chain Attacks
Presented byConstella Security Japan inc.
-
Speaker
-
GB2-08

Security challenges in cyber-physical systems including automobiles
-
Speaker
National Institute of Advanced Industrial Science and Technology (AIST)
Tsutomu Matsumoto
-
Speaker
-
GC2-08

Coming soon
Presented byLAC Co., Ltd.
-
-
16:10 | 16:50
-
-
GA2-09

ISO/SAE 21434 Automotive Cybersecurity Process Improvement
ー Review of process operations and reconsideration of the fundamentals of the standard ー-
Speaker
TÜV SÜD Japan Ltd.
MO&RI Division MO Engineering Department
Automotive Cyber Security ExpertToshiko Nishida
- Security Audits / System Audits
- PSIRT / CSIRT
- Software Supply Chain Attacks
Presented byTÜV SÜD Japan Ltd.
-
Speaker
-
GB2-09

Securing What Matters in 2026
— New Standard: The Latest Defense Strategy for the AI Attack Era by AppGuard- Ransomware Countermeasures
- Zero Trust
- Vulnerability / Tampering Countermeasures
Presented byGRC Japan K.K.
-
GC2-09

A Human-Centric Approach to Cybersecurity
-
Speaker
ISACA Nagoya Chapter Former President /
Keio University KMD Research Institute
Kyoko Hanada
- Ransomware Countermeasures
- Human Resource Development
- Phishing scam
-
Speaker
-
-
17:00 | 17:30
-
-
GA2-10

Utilizing SBOM in the automotive industry
-
Speaker
Japan Automotive ISAC INC.
Masashi Yamasaki
- SOC / Incident Response
- PSIRT / CSIRT
- SBOM (Software Bill of Materials)
-
Speaker
-
GB2-10

Latest Mobility Initiatives and Security in 2026
-
Speaker
TMI Associates
Partner
Yukitaka Iwata
-
Speaker
TMI Associates
Associate
Yuki Awai
- Vulnerability / Tampering Countermeasures
- Critical Infrastructure Security
- Infrastructure Hacking
- Intermediate
-
Speaker
-
GC2-10

Factory Security with Near-Zero Budget and Manpower
— First Steps in an Era Where One in Three Companies Are Attacked —-
Speaker
JNSA(Japan Network Security Association)
Noboru Okamoto
- Targeted Attacks / Cyber Attacks
- Ransomware Countermeasures
- Other
- Beginner
-
Speaker
-