Aug.29th,2017
Registration is now open.
Jun.30th,2017
Official Website has Launched.
There are many sessions and exhibitions in Japanese as well as the following.
OK-01、K2-01
Sep 26th (Tue),9:45-10:25、Sep 28th (Thu),8:40-9:20
DaysESCIDM Simultaneous interpretation
Eran Yahav
Professor,Technion,Israel
CTO,Codota
What can you do by learning from all the code in the world?
In this talk, I will show how we use program analysis, machine learning, and the huge amounts of code available on the web to transform vulnerability detection and reverse engineering.
K1-01
Sep 27th (Wed),8:40-9:20
DaysESCIDM Simultaneous interpretation
Jeremiah Grossman
Professional Hacker
Ransomware is center stage, as campaigns are practically guaranteed financial gain. Cyber-criminals profit hundreds of millions of dollars by selling our data back to us. If you look closely, the ransomware economic dynamics closely follow the real-world kidnapping and ransom industry. We’ll explore the eerie similarities, where ransomware is headed, and strategies we can bring to the fight.
Speaker bio:
Jeremiah Grossman
Chief of Security Strategy (SentinelOne), Professional Hacker, Black Belt in Brazilian Jiu-Jitsu, Off-Road Race Car Driver, Founder of WhiteHat Security, and Maui resident.
K3-01
Sep 29th (Fri),9:00-9:40
DaysESCIDM Simultaneous interpretation
Steven M Jones
Executive Director of DMARC.org
LinkedIn Senior Systems Engineer, Email
The goals and motivations of spammers and phishers are clear, but the anti-abuse community is still fighting them after more than three decades. Why haven't those efforts been more effective? Why are some governments now calling for the adoption of DMARC to prevent email abuse, while others hesitate? And how do we put the focus back on fighting the spammers and phishers?
K1-02
Sep 27th (Wed),9:35-10:15
Days Simultaneous interpretation
Jeff Multz
SecureWorks Japan K.K.
General Manager, Global Security Evangelist
[sponsors] SecureWorks, Inc.
K1-04
Sep 27th (Wed),11:25-12:05
Days Simultaneous interpretation
Steve Hanna
Infineon Technologies
Technical Marketing
Senior Principal
[sponsors] Infineon Technologies Japan K.K.
Industrial IoT connects cloud intelligence to the factory. Changes in market conditions can rapidly trigger changes in manufacturing formulations and products built to individual customer requests. Data gathered from sensors can be used to predict and prevent failures. But connecting the factory exposes it to external attacks. In recent years, successful attacks on Industrial IoT have resulted in massive equipment damage and downtime.
Only hardware security can provide the solid foundation needed by Industrial IoT, preserving and increasing all the gains promised by Industrial IoT: lower costs, better safety, and higher profits. International standards for industrial security such as IEC/ISA 62443 have recognized this and started to require hardware security. Leading industrial equipment makers are now including hardware security in every Industrial IoT system, using it for critical use cases like device identity, anti-counterfeiting, secure communications, and secured software and firmware update. In this manner, the security risks of Industrial IoT are greatly reduced.
In this talk, you will learn about the opportunities of Industrial IoT, the security challenges that it brings, and how industry leaders are using hardware security to address those challenges in a sustainable manner.
K2-02
Sep 28th (Thu),9:35-10:15
Days Simultaneous interpretation
Takeshi Mitsuishi
Ni CYBERSECURITY INC.
President & CEO
[sponsors] Ni CYBERSECURITY INC.
Israel is known as a top leading country in cyber security industries in the world. Cyberbit is a Israeli company and a subsidiary of Elbit Systems, one of the top-30 global providers of defense technologies. Cyberbit has been developing products by a team consisting of cyber intelligence researchers from Israeli elite military units, machine learning experts, ICS/SCADA experts, and former CISOs and SOC managers. Cyberbit products have been chosen and used by Israeli Government as well as government facilities and critical infrastructures in other countries.
In this session, you will learn well-proven Cyberbit EDR/SCADA/SOC3D along with best practices in leading countries.
K2-04
Sep 28th (Thu),11:25-12:05
Days Simultaneous interpretation
Ian Jones
F5 Networks, Inc.
Senior Vice President of F5 Silverline Cloud Services
[sponsors] F5 Networks Japan GK
C2-09
Sep 28th (Thu),16:05-16:45
Days Simultaneous interpretation
John Parker
ShieldX Networks,Inc.
VP of Product Management
[sponsors] Tokyo Electron Device LTD.
Attacks against the multi-cloud are becoming more complex and perimeter-based security alone is no longer enough to adequately protect your organization. This session describes how micro-segmentation, done the right way, can be used to solve this problem.
I. What is the problem?
II. Why micro-segment?
III. Why isn’t access control enough?
IV. What does a proper solution look like?
C2-10
Sep 28th (Thu),17:00-17:40
Days Simultaneous interpretation
Bobby Kuzma
Core Security
Security Researcher and Evangelist
[sponsors] Core Security SDI Corporation
With the recently revealed capabilities, and leaked code from several nation-state actors, our threat landscape has changed dramatically in the last few months. Criminals jumped on the exploits, but we should stand ready for criminal actors, as well as less well funded state actors, to begin incorporating similar capabilities into their arsenals. In this talk, join Core Security’s Security Researcher and Evangelist Bobby Kuzma as he explores what we have to look forward to… and be afraid of.
K3-03
Sep 29th (Fri),10:50-11:30
ESC Simultaneous interpretation
Adenike Cosgrove
Proofpoint
Cybersecurity Strategy, EMEA
Cybersecurity Strategist
[sponsors] Proofpoint Japan K.K.
People Make the Best Exploits. Cybercriminals have adapted their techniques by adopting attacks that exploit human flaws rather than system vulnerabilities. They combine sophisticated, targeted lures with convincing email tricks to carry out social engineering at scale, exploiting the one vulnerability that cannot be patched: the human factor.
Join us as we explore the latest techniques that attackers are using to launch targeted email attacks. Learn the best practices for how your organization can identify, block, and respond to these attacks before they reach user inboxes.
E1-09
Sep 27th (Wed),16:05-16:45
Days Consecutive interpretation
Tanaka Katsunori
SentinelOne
Jeremiah Grossman
SentinelOne
[sponsors] SentinelOne Japan K.K.
Malware is multiplying at an increasing rate, within increasingly sophisticated attackers causing damage on a global scale. Traditional AV solutions are helpless to counter the wave, so how can companies protect themselves at the most vulnerable point - the endpoint - where 95% of breaches start?
A robust defense program has multiple parts. It must include dynamic white and black-listing, provide advanced static protection, and dynamic behavior-detection that is based on highly tuned deep learning technologies.
Beyond prevention, however, even the best system has to recognize the possibility that malicious code will enter the network. For this, roll-back and response and associated forensic analysis are essential tools.
With all of these protections, what is the final defensive barrier? A confident provider of security software should stand behind the product with a guarantee. This is the ransomware guarantee that only SentinelOne has the confidence to offer.
Event | Security Week - Security Days Fall 2017 Tokyo / Osaka (Days) - Email Security Conference 2017 (ESC) - ID Management Conference 2017 (IDM) |
---|---|
Date | Osaka : Sep 26th (Tue),2017 Conference Tokyo : Sep 27th (Wed) - Sep 29th (Fri),2017 Exhibition & Conference |
Venue | Osaka : KNOWLEDGE CAPITAL Conference Room (GRAND FRONT OSAKA TOWER C 8F) Tokyo : JP Tower Hall & Conference (KITTE 4F) |
Organizer | NANO OPT Media, Inc. |
Fees | Free |
Security Week Management Office
c/o NANO OPT Media, Inc.
E-mail:sw17-info@f2ff.jp