iotc iotc

    • linkedin
    • facebook
    • twitter
    • YouTube
  • Register Now

  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FUKUOKA FUKUOKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
    • Register Now

Tokyo Session

東京講演

  • All
  • 3.24(Tue)
  • 3.25(Wed)
  • 3.26(Thu)
  • 3.27(Fri)
  • simultaneous interpreting

  • lunch

Search (possible multiple choice)

Keyword

3.24(Tue)

  • RoomA
  • RoomB
  • RoomC
  • 5F
08:50 | 09:20
  • A1-01

    The current state of Japan's cybersecurity policy

    • Speaker

      Cabinet Secretariat

      National Cybersecurity Office

      Takuyuki Kawauchi

    • Critical Infrastructure Security
    • Other
    • Beginner
09:30 | 10:10
  • A1-02

    Reducing the Burden of Company PC Management:
    A Case Study on Streamlining IT Asset Management

    • Speaker

      Sky CO., LTD.

      Yukako Kondo

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Endpoint Security

    Presented bySky CO., LTD.

10:20 | 11:00
  • A1-03

    Prepare for Ransomware Attacks!
    The Role of Active Cyber Defense in Today’s Threat Landscape

    • Speaker

      Fortinet Japan G.K.

      Product Marketing Manager

      Fumiaki Ito

    • Ransomware Countermeasures

    Presented byFortinet Japan G.K.

  • WS1-03

    Attacking Cloud Misconfigurations

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

    • Workshop
    • Intermediate
11:10 | 11:50
  • A1-04

    The Reality of Ransomware Attacks and How to Defend Against Them
    – Hidden Pitfalls in Seemingly Perfect Security –

    • Speaker

      NTT DATA INTELLILINK Corporation

      Security Innovation Division,
      Security & Technology Consulting Sector
      Executive Manager

      Hideki Fukuda

    • Speaker

      NTT DATA INTELLILINK Corporation

      Security Innovation Division,
      Security & Technology Consulting Sector
      Executive Manager

      Katsuyuki Toda

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures

    Presented byNTT DATA INTELLILINK Corporation

12:05 | 12:45
  • A1-05

    A Roadmap to Mastering Cloud Security: Lessons from Japanese Enterprise Case Studies

    • Speaker

      Cloudbase Inc.

      CEO

      Koya Iwasa

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • SBOM (Software Bill of Materials)

    Presented byCloudbase Inc.

  • WS1-05

    Coming soon

    • Speaker

      Aeye Security Lab Inc.

      Presales Leader, CX Division

      Takahiro Takahashi

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • Application Security
    • Workshop

    Presented byAeye Security Lab Inc.

13:20 | 14:00
  • A1-06

    Before Unmanaged Assets Become Attack Vectors
    — Enabling ASM with AI —

    • Speaker

      UBsecure, Inc.

      Product Division,
      Product Business Promotion Department

      Toyohiro Hotta

    • Ransomware Countermeasures
    • Vulnerability / Tampering Countermeasures
    • Software Supply Chain Attacks

    Presented byUBsecure, Inc.

  • B1-06

    From “Wait and Lose” to Proactive Defense:
    Ransomware Containment Strategies Using Dark Web Intelligence and Active Cyber Defense (ACD/CTI/CTEM) (Draft Title)

    • Speaker

      KELA Co., Ltd

      Principal Security Engineer

      Makoto Kawasaki

    • Speaker

      ULTRA RED, Ltd.

      Regional Product Manager

      Kenichiro Hashimoto

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Data Leakage Prevention

    Presented byKela K.K.

  • C1-06

    Rethinking Security as Business Operations:
    What you can do now, What you can achieve (Tentative Title)

    • Speaker

      JNSA(Japan Network Security Association)

      Vice Chairman, CISO Support Working Group Leader

      Masakazu Takahashi

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
  • WS1-06

    Coming soon

    • Speaker

      Illumio Japan G.K.

      Jun Fukumoto

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust
    • Workshop

    Presented byIllumio Japan G.K.

14:15 | 14:55
  • A1-07

    Protecting Internal Networks using WIPS

    • Speaker

      KORNIC GLORY CO.,Ltd.

      Manager,
      Wired Technology Team

      Chang Minseon

    • Data Leakage Prevention
    • Monitoring / Detection

    Presented byKornic Glory Co.,Ltd.

  • B1-07

    Three Reasons Why Supply Chain Security Stalls in Practice
    — Toward a Sustainable, Practical Approach Based on the SCS Evaluation Framework

    • Speaker

      Soliton Systems K.K.

      IT Security Business Unit
      Evangelist

      Shoko Araki

    • Data Leakage Prevention
    • Zero Trust
    • Authentication / Identity Management
    • Intermediate

    Presented bySoliton Systems K.K.

  • C1-07

    SaaS Security Blind Spots: The Risks of Hidden AI
    ~ A Practical Guide on What to Evaluate and Why ~

    • Speaker

      Assured, Inc.

      Yuya Ueki

    • Cloud Security
    • Vulnerability / Tampering Countermeasures

    Presented byAssured, Inc.

  • WS1-07

    Coming soon

    • Workshop

    Presented byB Manifold,Inc.

15:10 | 15:50
  • A1-08

    Is Implementing DMARC Enough to Keep You Secure?
    — Hidden Risks Revealed and Sustainable DMARC Operations Through Report Analysis

    • Speaker

      Honetsecurity K.K.

      Principal Messaging Engineer

      Yoshitaka Hirano

    • Ransomware Countermeasures
    • Email Security
    • Phishing scam

    Presented byHonetsecurity K.K.

  • B1-08

    2025: What did your company do for Email Security?
    The reality of selecting, implementing, and operating DMARC, misdelivery prevention, and PPAP elimination

    • Speaker

      imatrix corp.

      CEO

      Hibiki Oka

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Email Security

    Presented byimatrix corp.

  • C1-08

    CSIRTs must not be isolated.
    The way of to start a team that protects the organization and the power of community to build connections.

    • Speaker

      Nippon CSIRT Association

      Fumie Watanabe

    • PSIRT / CSIRT
    • Human Resource Development
    • Other
16:05 | 16:45
  • A1-09

    Is your system truly secure?
    Efficient penetration testing to prevent business risks.
    Explained using Cymulate as an example.

    • Speaker

      NTT Advanced Technology Corporation

      Tetsushi Morita

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security

    Presented byNTT Advanced Technology Corporation

  • B1-09

    Internal fraud prevention and human risk management

    • Speaker

      N&O Partners

      Managing Partner
      Attorney

      Leona Ohki

    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures
    • Monitoring / Detection

    Presented byN&O Partners(Leo United Ginza Law Office)

  • C1-09

    Building Trust at Scale:
    Preparing Certificate, Device, and AI Identity for the Next Wave of Security Challenges

    • Speaker

      Keyfactor

      Field CTO VP,
      Solution Engineering

      Eric Mizell

    • Zero Trust
    • AI Security
    • Encryption / Certificates
    • Intermediate

    Presented byKeyfactor Inc.

  • WS1-09

    Are you confident in your security ?
    ~ Very introductory security audit workshop

    • Speaker

      Japan information security audit association,

      gBrain Co., Ltd.

      Toshitsugu Ota

    • Security Audits / System Audits
    • Human Resource Development
    • Workshop
17:00 | 17:40
  • A1-10

    Learn from the 2025 cybersecurity Talent Market Through Data
    ― From the Latest ISC2 Survey

    • Speaker

      President, ISC2 Japan Chapter

      Member,
      APAC Advisory Council,

      Fumiko Noma, CISSP

    • Human Resource Development
    • Workstyle Innovation
    • Other
    • Intermediate

    Presented byISC2, Inc.

  • B1-10

    Preparing for the Quantum Age:
    Will Your Data Still Be Secure in Ten Years' Time?

    • Speaker

      SSH Communications Security

      Solutions Engineering Director, APAC

      Katsuhiro Shogawa

    • Targeted Attacks / Cyber Attacks
    • Encryption / Certificates
    • Quantum Security
    • Intermediate

    Presented bySSH Communications Security Oyj

  • C1-10

    Ransomware defense strategy to protect the company.
    - Comprehensive measures before and after infection -

    • Speaker

      Metro, Inc.

      Hideyuki Ishida

    • Ransomware Countermeasures
    • Endpoint Security
    • Email Security

    Presented byMetro, Inc.

17:45 | 18:15
  • Closed

    A1-11

    Threats in Cyberspace
    -Cyberattacks Country supported.

    • Speaker

      Public Security Intelligence Agency

      Ippei Suyama

    • Targeted Attacks / Cyber Attacks
  • B1-11

    The importance of public private partnerships in law enforcement in the United States

    • Speaker

      Embassy of the United States of America in Japan

  • C1-11

    Hands-On Corporate Cyber Training for Ransomware and Phishing Attacks In Your Company

    • Speaker

      NSHC Inc.

      Director

      Park Bumjoon

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Human Resource Development
    • Beginner
18:30 | 19:30
  • A1-12

    Coming soon

  • B1-12

    CNAPP: Partnering with Japanese Enterprises
    ― Why Companies Keep Choosing Cloudbase: Insights from Long-Term Users

    • Cloud Security

    Presented byCloudbase Inc.

  • C1-12

    Shadow AI: Hunting the Unknowns Across Developer Tooling and Deployed Artifacts

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

3.25(Wed)

  • RoomA
  • RoomB
  • RoomC
  • 5F
08:50 | 09:20
  • A2-01

    Investigating the reality of ransomware groups through OSINT

    • Speaker

      Japan Hackers Association

      Takayuki Sugiura

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Other
09:30 | 10:10
  • A2-02

    How Preventive Cyber Risk Controls and Visibility Protect Business Continuity

    • Speaker

      Akamai Technologies GK

      Marketing
      Evangelist

      Kazuhiro Nakanishi

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust

    Presented byAkamai Technologies GK

10:20 | 11:00
  • A2-03

    Coming soon

    Presented bySilverfort PTE LTD

  • WS2-03

    Software Supply Chain Attacks - a silent killer

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

    • Workshop
    • Beginner
11:10 | 11:50
  • A2-04

    Making Zero Trust a Reality
    Getting Started with Agentless Microsegmentation

    • Speaker

      PIOLINK, Inc.

      Partner Sales & Marketing Dept.
      General Manager

      Taro Matsuda

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Managed Security Services

    Presented byPIOLINK, Inc.

12:05 | 12:45
  • A2-05

    Still there internal fraud : How should we approach This.

    • Speaker

      Proofpoint Japan K.K.

      Naoki Isomura

    • Data Leakage Prevention
    • Authentication / Identity Management
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends

    Presented byProofpoint Japan K.K.

  • WS2-05

    A Global Security Perspective on the Blind Spots in Japanese Corporate Culture
    Information Leak Risks—and What “Real” Countermeasures Look Like

    • Speaker

      BlackBox Japan Inc.

      Product Marketing
      Specialist

      Moeka Abe

    • Data Leakage Prevention
    • Zero Trust
    • Monitoring / Detection
    • Workshop

    Presented byBlackBox Japan Inc.

13:20 | 14:00
  • A2-06

    The spread of Ransomware Attacks and the Critical Importance of Identity Security:
    Frontline of Active Directory/Entra ID Defense

    • Speaker

      Tokyo Electron Device LTD

      Yui Iida

    • Ransomware Countermeasures
    • Endpoint Security
    • Authentication / Identity Management

    Presented byTokyo Electron Device LTD

  • B2-06

    How to easily obtain 3 or 4 stars rating under the Ministry of Economy, Trade and Industry's "Supply Chain Security Assessment System" and break free from the security check spiral

    • Speaker

      SOURCE POD, Inc.

      CEO

      Takeshi Yamamoto

    • Security Audits / System Audits
    • Human Resource Development
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends

    Presented bySourcePod, Inc.

  • C2-06

    Cybersecurity Measures Required in the Defense Industry

    • Speaker

      Acquisition Technology and Logistics Agency

      Industrial Cyber Security Office,
      Equipment Security Management Division,
      Department of Equipment Policy
      Director

      Yugo Matsumoto

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • Security Audits / System Audits
  • WS2-06

    Coming soon

    • Workshop

    Presented byCloudbase Inc.

14:15 | 14:55
  • A2-07

    Protecting organizations from ransomware
    - Reforming password custom to prevent breaches × Controlling privileged IDs —

    • Speaker

      CTCP Corporation

      Solution Development & Promotion Division
      General Manager, Business Development Department

      Sayaka Kikuchi

    • Speaker

      Keeper Security APAC K.K.

      Asia Pacific Region
      Lead of Sales Engineering

      Masaki Ikehara

    • Ransomware Countermeasures
    • Authentication / Identity Management
    • Software Supply Chain Attacks

    Presented byKeeper Security APAC K.K.

  • B2-07

    The Reality of Supply Chain Attacks and measures
    Achieving “Business without downtime” through “Cyber Resilience”

    • Speaker

      CyLeague Holdings

      Hiroki Nambu

    • Speaker

      Quest Co., Ltd.

      Koichi Hatanaka

    • Ransomware Countermeasures
    • AI Security
    • SOC / Incident Response

    Presented byQuest Co., Ltd.

  • C2-07

    The Reality of AWS Security: Feedback from Field Analyst

    • Speaker

      SHIFT SECURITY, Inc.

      Koki Maeda

    • Cloud Security
    • SOC / Incident Response
    • Monitoring / Detection

    Presented bySHIFT SECURITY, Inc.

  • WS2-07

    How to Utilize the “Information Security Guidelines for Cloud Services” Published by the Ministry of Internal Affairs and Communications, and an Overview of the Information Disclosure Certification System

    • Speaker

      ASP-SaaS- AI-IoT Cloud Industry Association

      Toru Nakamura

    • Speaker

      ASP-SaaS- AI-IoT Cloud Industry Association

      Keiichi Iwata

    • Cloud Security
    • Workshop
15:10 | 15:50
  • A2-08

    Shadow IT & Attack Surface × Attacker-Perspective Intelligence
    "Now the era ‘invisible assets’ become the greatest risk
    — Proactive attack surface management achieved through attacker-perspective intelligence"

    • Speaker

      Zeami Cyber Security Co., Ltd.

      Hideaki Sato

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Cloud Security

    Presented byZeami Cyber Security Co., Ltd.

  • B2-08

    Ransomware frontline: Addressing the latest threats and vulnerabilities through dark web monitoring and attack surface management (ASM)

    • Speaker

      SMS DataTech Corporation

      Yuki Tokui

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures

    Presented bySMS DataTech Corporation

  • C2-08

    Trends in Vulnerabilities and Security Improvement Insights from Security Assessments

    • Speaker

      NEC Corporation

      Risk Hunting Group,
      Cyber Security Technology Department
      Analyst

      Haruka Nakashima

    • Beginner
16:05 | 16:45
  • A2-09

    How to prevent internal data leaks in the Cloud/SaaS Era?
    -Balancing safe and security with AI-powered CASB × SIEM-

    • Speaker

      Skygate Technologies Inc.

      Hiroo Ohara

    • Cloud Security
    • Data Leakage Prevention
    • Zero Trust

    Presented bySkygate Technologies Inc.

  • B2-09

    Analysis of actual cyber incidents and countermeasures

    • Speaker

      InfoSecure Solutions, Inc.

      CEO

      Tomoya Kumeta

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Managed Security Services

    Presented byInfoSecure Solutions,Inc.

  • C2-09

    How we manage TLS/SSL certificate with the upcoming short validity period

    • Speaker

      DigiCert Japan G.K.

      Product Marketing
      Product Marketing Manager

      Masato Hayashi

    • Authentication / Identity Management
    • Encryption / Certificates
    • Quantum Security

    Presented byDigiCert Japan G.K.

  • WS2-09

    CI CD the keys to the kingdom and some more.

    • Cyfinoid Research

      Anant Shrivastava

    • Workshop
    • Intermediate
17:00 | 17:40
  • A2-10

    What are needed for security testing in AI and Cyber security regulations era?

    • Speaker

      Black Duck Software G.K.

      Sr. Tech Marketing Manager

      Masato Matsuoka

    • AI Security
    • GDPR / PrivacyMark / ISMS / Legal & Regulatory Trends
    • Application Security
    • Beginner

    Presented byBlack Duck Software G.K.

  • B2-10

    From “Implemented” to “Mastered” Security:
    The essence of optimization—consolidating dispersed risks and strengthening defenses While reducing operational burden

    • Speaker

      Rapid7 Japan K.K

      Japan CTO, CISSP, CISA

      Katsuya Furukawa

    • XDR
    • SOC / Incident Response
    • Managed Security Services

    Presented byRapid7 Japan K.K.

  • C2-10

    Protecting SMBs from Invisible Threats:
    How to Detect Leaked Credentials on the Dark Web and Build Your Security Strategy

    • Speaker

      ALPS SYSTEM INTEGRATION CO., LTD.

      Product Marketing Sect.
      Reader

      Takuya Inoue

    • Ransomware Countermeasures
    • Zero Trust
    • Monitoring / Detection

    Presented byAlps System Integration Co., Ltd.

17:45 | 18:15
  • A2-11

    10 Major Security Threats and Basic Security Measures [For Organizations]

    • Speaker

      Information-technology Promotion Agency, Japan

      IT Security Center(ISEC) Cyber Situation Analysis Department

      Yoshiharu Inoue

    • Ransomware Countermeasures
    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures
    • Beginner
  • B2-11

    Trade and Industry Initiatives to enhance cybersecurity measures across the Entire supply chain by Ministry of Economy

    • Speaker

      Ministry of Economy, Trade and Industry

      Satoshi Deguchi

  • C2-11

    Latest Developments in Quantum Safe and practical systems utilizing PQC and QKD

    • Speaker

      NTT DOCOMO BUSINESS, Inc.

      Innovation Center
      Quantum Safe Evangelist

      Yasutaka Morioka

    • Encryption / Certificates
    • Quantum Security
18:30 | 19:30
  • A2-12

    Coming soon

  • B2-12

    Coming soon

    Presented byAironWorks Co., Ltd.

  • C2-12

    Preparing Trust Foundations for the Next Phase of Cryptographic Change

    • Speaker

      Keyfactor

      Global Channel Sales Leader
      Senior Vice President

      Louise McEvoy

    • Zero Trust
    • Encryption / Certificates
    • Quantum Security
    • Intermediate

    Presented byKeyfactor Inc.

3.26(Thu)

  • RoomA
  • RoomB
  • RoomC
  • 5F
08:50 | 09:20
  • A3-01

    Cyber threat landscape and police initiatives

    • Speaker

      National Police Agency

      Yosuke Nakagawa

    • Ransomware Countermeasures
    • Phishing scam
09:30 | 10:10
  • A3-02

    Why Organizations Fail to Recover Quickly from Cyber Incidents:
    Analyzing Case Studies to Understand Recovery Challenges and Implement Effective Cyber Recovery Strategies

    • Speaker

      Rubrik Japan

      Sales Engineering
      Head of Sales Engineering

      Daishi Nakai

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust

    Presented byRubrik Japan K.K.

10:20 | 11:00
  • A3-03

    Cloud security transcends 'Borders'
    -How to achieve fully integrated internal and external security with Wiz ASM

    • Speaker

      Wiz Cloud Japan K.K.

      Principal Customer Engineer

      Shogo Katsurada

    Presented byWiz Cloud Japan K.K.

  • WS3-03

    Mapping SBOMs for Fun and Profit

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

    • Workshop
    • Beginner
11:10 | 11:50
  • A3-04

    Latest Countermeasures Against Cross-Domain Attacks Including Ransomware

    • Speaker

      CrowdStrike Japan GK

      Sales Engineering Dept,
      Manager

      Michio Mori

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security

    Presented byCrowdStrike Japan GK

12:05 | 12:45
  • A3-05

    Secure AI agent utilization and shadow AI countermeasures with Chrome Enterprise

    • Speaker

      Google Japan G.K.

      Yoshikazu Suzuki

    • Endpoint Security
    • Zero Trust
    • AI Security

    Presented byGoogle Japan G.K.

  • WS3-05

    Coming soon

    • Workshop
13:20 | 14:00
  • A3-06

    The Final Bastion: The Ideal State of Endpoint Security

    • Speaker

      WithSecure Japan

      Cyber Security Products and Services
      Solution Architect

      Koji Ohta

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security
    • Intermediate

    Presented byWithSecure KK

  • B3-06

    Inside IIJ’s ZTNA Adoption:
    The ZTNA Approach That Delivers Both Comfort and Security for More Than 5,200 Employees

    • Speaker

      Internet Initiative Japan Inc.

      DWP Solution Section
      Business Promotion Department
      Service Product Business Division

      Kohei Matsuura

    • Speaker

      Absolute Software K.K.

      Senior Account Manager

      Naoto Nishida

    • Cloud Security
    • Zero Trust
    • Workstyle Innovation

    Presented byAbsolute Software K.K. / Internet Initiative Japan Inc.

  • C3-06

    Battlefield Cyber, Part II :
    Cyberwarfare in the Ukraine War and Endpoint Security

    • Speaker

      The National Institute for Defense Studies, Ministry of Defense

      Global Security Division, Policy Studies Department
      Senior Felow, Colonel, Ph.D (Security Studies)

      Kawamura Koki

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Endpoint Security
  • WS3-06

    Coming soon

    • Workshop

    Presented byKeyfactor Inc.

14:15 | 14:55
  • A3-07

    Coming soon

    Presented bySoliton Systems K.K.

  • B3-07

    Cyber attack countermeasures in the AI Era |
    Automated verification from the attacker's perspective with Pentera

    • Speaker

      Pentera Security SG Pte Ltd.

      Japan Country Manager

      Mitchell DeBerdt

    Presented byPentera Security SG Pte Ltd. / TECHMATRIX CORPORATION

  • C3-07

    Privileged ID management moves to the next stage
    ―The full scope of next-generation privileged access management with password protection and network control

    • Speaker

      Encourage Technologies Co., Ltd.

      Yoshiharu Hioki

    • Ransomware Countermeasures
    • Zero Trust
    • Authentication / Identity Management

    Presented byEncourage Technologies Co., Ltd.

  • WS3-07

    What's the next step after your EDR has been breached?
    Experience-based zero trust segmentation using ColorTokens' Xshield based on case studies.

    • Speaker

      Denkosha Inc.

      Professional Servies
      Manager

      Ishibashi Masahiko

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Zero Trust
    • Workshop
    • Beginner

    Presented byDENKOSHA Corporation

15:10 | 15:50
  • A3-08

    Toward a Network That “Contains” Attacks
    — Case Studies of Zero Networks Enabling Easy Zero Trust Implementation in Internal Environments —

    • Speaker

      Marubeni I-DIGIO Group

      Atsushi Kobayashi

    • Speaker

      Zero Networks ltd

      Yasunori Koda

    • Ransomware Countermeasures
    • Zero Trust
    • Critical Infrastructure Security

    Presented byMarubeni I-DIGIO Group

  • B3-08

    "Log Management as a Pillar of Security Incident Response: What Future Approaches to Log Utilization Will Be Required?"

    • Speaker

      Infoscience Inc.

      Product Division, Cybersecurity Consulting Team
      Team Leader

      Shotaro Abiru

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • Security Audits / System Audits

    Presented byInfoscience Corporation

  • C3-08

    Security Strategies for AI and Ransomware Through the Eyes of Attackers

    • Speaker

      Hitachi Solutions, Ltd.

      Managed Security Service Department
      Chief Security Analyst

      Momoko Aoyama

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • AI Security
16:05 | 16:45
  • A3-09

    An Available Way to Enhance User Authentication Methods Using Cisco Duo for a Small IT Department

    • Speaker

      NTT DATA Luweave Corporation

      Tatsuro Okisasaki

    • Speaker

      Cisco Systems, G.K.

      Hiroki Hata

    • Endpoint Security
    • Zero Trust
    • Authentication / Identity Management

    Presented byNTT DATA Luweave Corporation

  • B3-09

    How to integrate fragmented security measures:
    Co-managed solution combining "MDR technology and Top analysts” with customers

    • Speaker

      NTT Security Japan KK

      Managed Security Services
      Senior Vice President

      Keiichi Yokoyama

    • XDR
    • SOC / Incident Response
    • Managed Security Services

    Presented byNTT Security (Japan) KK

  • C3-09

    The path to threat intelligence
    - Security Strategy for Anticipating Attacks -

    • Speaker

      Information Development Co., Ltd.

      Cyber ​​Security Solutions Department
      Technical Specialist

      Takeshi Aoyama

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures

    Presented byINFORMATION DEVELOPMENT CO., LTD.

  • WS3-09

    Digital transformation is essential for enhancing Japan's international competitiveness, and why plus security human resources are indispensable for achieving this
    ~Are even these types of people considered security professionals now?~

    • Speaker

      Professional University of Information and Management for Innovation

      Professor

      Toshihiro Hirayama

    • Human Resource Development
    • Workshop
    • Intermediate
17:00 | 17:40
  • A3-10

    Proven Success Against the Trending Ransomware “Qilin”!
    A Defense Strategy Beyond the Limits of EDR, Built with the Ransomware Countermeasure Platform “Halcyon”

    • Speaker

      TAKACHIHO KOHEKI CO., LTD.

      Yusuke Hasunuma

    • Ransomware Countermeasures
    • Cloud Security
    • Endpoint Security

    Presented byTAKACHIHO KOHEKI CO., LTD.

  • B3-10

    Universal Security Measures That Remain Firm Against Sophisticated Cyber Threats:
    IT Trends in South Korea, Where Investment in Data Security Continues

    • Speaker

      Penta Security K.K.

      Security Consulting Dept.
      Principal Security Consultant, CISSP

      Takashi Minobe

    • Targeted Attacks / Cyber Attacks
    • Data Leakage Prevention
    • Encryption / Certificates

    Presented byPenta Security K.K.

  • C3-10

    Are you prepared for insider threats?
    -Comprehensive guide to the importance and pitfalls of privileged ID management-

    • Speaker

      Bosco Technologies

      SMART Gateway Business Group
      Sales Division II
      General Manager

      Kazutoshi Tatebe

    • Speaker

      Bosco Technologies

      SMART Gateway Business Group
      SG Business Development Division
      Manager

      Takuya Sawano

    • Data Leakage Prevention
    • Vulnerability / Tampering Countermeasures
    • Authentication / Identity Management

    Presented byBOSCO Technologies Inc.

17:45 | 18:15
  • A3-11

    Strengthening cybersecurity in the financial field
    -Threats facing Japanese financial field and the financial services agency's measures to enhance cybersecurity at financial institutions-

    • Speaker

      Financial Services Agency

      Mitsuhiko Komura

    • Critical Infrastructure Security
    • Human Resource Development
    • Quantum Security
  • B3-11

    Resilience Building to Hybrid Threat

    • Speaker

      Organization for Cyber Defense Innovation

      Director

      Akihiro Fujii

    • Monitoring / Detection
    • Human Resource Development
    • Other
    • Advanced
  • C3-11

    Legal Risk Management for Information Security in the Age of Escalating Cyber Incidents
    — Preparing for and Responding to Crises

    • Speaker

      Mori Hamada & Matsumoto

      Partner

      Atsushi Okada

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Data Leakage Prevention
18:30 | 19:30
  • A3-12

    Using AI and Microsoft 365 Safely:
    Controllable Security Instead of Blocking

    • Data Leakage Prevention
    • Zero Trust
    • Workstyle Innovation

    Presented bySOFTCAMP Co.Ltd

  • B3-12

    Coming soon

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Human Resource Development

    Presented byLRM, Inc.

  • C3-12

    Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

3.27(Fri)

  • RoomA
  • RoomB
  • RoomC
  • 5F
08:50 | 09:20
  • A4-01

    Cybersecurity Measures from the Network Side

    • Speaker

      Ministry of Internal Affairs and Communications

      Office of the Director-General for Cybersecurity
      Senior Planning Officer

      Takanori Umeki

    • IoT Security
    • Encryption / Certificates
    • Quantum Security
09:30 | 10:10
  • A4-02

    Break Free from the “Chaotic Firefighting” of Vulnerability Management!
    What Is Efficient AI-Powered Triage & ASM?

    • Speaker

      Aeye Security Lab Inc.

      Director& Business Planning Division

      Kazuma Abe

    • Cloud Security
    • Vulnerability / Tampering Countermeasures
    • Application Security

    Presented byAeye Security Lab Inc.

10:20 | 11:00
  • A4-03

    Secure AI Without Fail: What It Really Takes to Protect AI

    • Speaker

      Cato Networks

      Global Product Marketing
      Product Marketing Manager

      Makiko Yamada

    • Zero Trust
    • AI Security
    • SASE (Secure Acess Service Edge)

    Presented byCato Networks (Japan) KK

  • WS4-03

    Fixing What’s Broken : One Line at a Time

    • Speaker

      Cyfinoid Research

      Anant Shrivastava

    • Workshop
    • Beginner
11:10 | 11:50
  • A4-04

    Cybersecurity in the age of AI agents

    • Speaker

      Cloudflare Japan K. K.

      Field CTO / CISO

      Koichiro Otobe

    • Targeted Attacks / Cyber Attacks
    • Zero Trust
    • AI Security

    Presented byCloudflare Japan K. K.

12:05 | 12:45
  • A4-05

    AI-Driven Cybersecurity Innovation: Securing the Future with Symantec and Carbon Black

    • Speaker

      Broadcom Inc.

      Enterprise Security Group
      Global Product Management

      Alpesh Mote

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Cloud Security

    Presented byTD SYNNEX K.K.

  • WS4-05

    Introduction to Cybersecurity for SMEs: A Practical, Hands-On Workshop

    • Speaker

      Greater Tokyo Area Vitalization Association

      Digital Business Producer

      Naoki Ogawa

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Human Resource Development
    • Workshop
    • Beginner
12:55 | 13:35
  • A4-06

    Coming soon

    • Speaker

      Macnica, Inc.

      Yosei Harada

    • Speaker

      CyberArk Software Ltd.

      Yuichiro Suzuki

    • Targeted Attacks / Cyber Attacks
    • Zero Trust
    • Authentication / Identity Management

    Presented byMacnica, Inc.

  • WS4-06

    Experiencing Next-Generation Identity & Device Operations with Iru: A Practical Hands-On Session

    • Speaker

      ZUNDA Inc.

      CEO

      Sho Sawada

    • Endpoint Security
    • Zero Trust
    • Authentication / Identity Management
    • Workshop
    • Beginner

    Presented byZUNDA Inc.

14:10 | 14:50
  • A4-07

    The optimal solution for “managed EDR” and “incident response” against threats in the AI era

    • Speaker

      TechMatrix Corporation

      Shuya Nomura

    • Ransomware Countermeasures
    • SOC / Incident Response
    • Managed Security Services

    Presented byArctic Wolf Networks Inc. / TECHMATRIX CORPORATION

  • B4-07

    Coming soon

    Presented bySoliton Systems K.K.

  • C4-07

    Software Supply Chain Security with Docker:
    Balancing Business Agility and Security for Sustainable Container Development

    • Speaker

      Docker

      Solutions Engineering
      Strategic Solutions Engineer

      Tadashi Nemoto

    • SBOM (Software Bill of Materials)
    • Software Supply Chain Attacks
    • Container Security
  • WS4-07

    Defense Strategies to Neutralize Nation-State APT Attacks: Insights from Cyber Powerhouse South Korea

    • Workshop

    Presented by78researchlab

15:05 | 15:45
  • A4-08

    “The way to overcome shortages of staff in security operations”
    -How to optimize security operations with AI and automation-

    • Speaker

      TechMatrix Corporation

      Network Security Division
      Sales Department 2
      Network Products Sales Section 2
      Chief

      Kohei Suzuki

    • Cloud Security
    • SOC / Incident Response
    • Monitoring / Detection

    Presented byPalo Alto Networks, Inc. / TECHMATRIX CORPORATION

  • B4-08

    M365 Users must attend the lecture!
    Latest trends in Email misdelivery and the ultimate weapon for the “New Outlook”

    • Speaker

      SCSK Minori Solutions Corporation

      Kuniyasu Hayashi

    • Data Leakage Prevention
    • Email Security

    Presented bySCSK Minori Solutions Corporation

  • C4-08

    Plug in to a sterile workspace
    —anywhere. Sanitize threats harmless. Zero Compromise on your DX.

    • Speaker

      Menlo Security Japan K.K

      Data Security Specialist

      Ryo Nakatsuke

    • Targeted Attacks / Cyber Attacks
    • Ransomware Countermeasures
    • Critical Infrastructure Security

    Presented byMenlo Security Japan K.K.

16:00 | 16:40
  • A4-09

    Is that access really human? Technology to visualize web attacks in the AI era with zero system impact
    -Next-generation standard for log analysis explained by WAF developers-

    • Speaker

      Bitforest Co.,Ltd.

      Tadashi Satoh

    • Vulnerability / Tampering Countermeasures
    • Application Security

    Presented byBitforest Co.,Ltd.

  • B4-09

    Breaking free from outdated data erasure
    -“Deleting” has evolved this far-

    • Speaker

      Blancco Japan Inc. / Blancco Technology Group

      President & CEO / Regional Director, Japan

      Motoi Mimatsu

    • Data Leakage Prevention
    • Zero Trust
    • Security Audits / System Audits

    Presented byBlancco Japan Inc.

  • C4-09

    Resilience lessons to learn from Ukrainian critical infrastructure companies

    • Speaker

      NTT, Inc.

      Security and Trust Office,
      Chief Cybersecurity Strategist

      Mihoko Matsubara

    • Ransomware Countermeasures
    • Critical Infrastructure Security
  • WS4-09

    "What If It Happened Today?" A Hands-on Cyber Incident Response Tabletop Exercise
    - Learning Through Discussion and Experience -

    • Speaker

      Nippon CSIRT Association

      Incident Response Drilling WG
      Chief Examiner

      Hidenori Sakurai

    • Speaker

      Nippon CSIRT Association

      Incident Response Drilling WG
      Deputy Chief Examiner

      Yusuke Ide

    • Speaker

      Nippon CSIRT Association

      Incident Response Drilling WG Table-Top Exercise Methodology Review SubWG
      Chief Examiner

      Keisuke Ito

    • Speaker

      Nippon CSIRT Association

      Incident Response Drilling WG
      Deputy Chief Examiner

      Ayaka Miki

    • SOC / Incident Response
    • PSIRT / CSIRT
    • Human Resource Development
    • Workshop
16:55 | 17:35
  • A4-10

    Confronting evolving threats:The front lines of endpoint security
    -Perspectives for addressing recent large-scale cyber incidents

    • Speaker

      HP Japan Inc.

      Takashi Otsuyama

    • Ransomware Countermeasures
    • Endpoint Security
    • Zero Trust

    Presented byHP Japan Inc.

  • B4-10

    Coming soon

    Presented byKDDI CORPORATION

  • C4-10

    Why Do Corporate Security Measures Keep Getting Breached?
    AI-Powered Predictive Threat Detection: OPSWAT Alin Transforming the Front Lines of Ransomware Defense (TBD)

    • Speaker

      OPSWAT JAPAN

      Country Manager

      Atsushi Takamatsu

    • Ransomware Countermeasures
    • Application Security
17:40 | 18:10
  • A4-11

    Strengthening cybersecurity measures at Ports
    — Insights from training to confirm response procedures during terminal operation system disruptions—

    • Speaker

      Ministry of Land, Infrastructure, Transport and Tourism

      Tomohide Sugimoto

    • Critical Infrastructure Security
    • Other
  • B4-11

    Global standardization updates on security in ITU-T SG17

    • Speaker

      NICT

      Quantum ICT Collaboration Center
      Senior innovation coordinator, ITU-T SG17 Q15 Rapporteur

      Kaoru Kenyoshi

    • Speaker

      Information Security Operation providers Group Japan (ISOG-J)
      Vice Director, WG6 leader

      SCSK Security Corp.
      Evangelist

      Shigenori Takei

    • Speaker

      KDDI Research, Inc.

      Usable Trust Laboratory
      Senior Manager

      Takamasa Isohara

    • AI Security
    • Quantum Security
    • Beginner
  • C4-11

    Ransomware Attacks as a Disaster, and the Heroes Who Fought Back.

    • Speaker

      Nikkei Inc.

      Senior Staff Writer

      Tatsuya Sudo

    • Ransomware Countermeasures
    • SOC / Incident Response
    • Human Resource Development
  • 個人情報保護方針 Privacy Policy
  • ご協賛・ご出展をご検討の方
  • よくあるお問い合せ

[25年秋開催]Security Days Fall 2025

Copyright (c) NANO OPT Media, Inc. All rights reserved.