- Publication year : 2025
1~7 item / All 7 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationBefore making an inquiry
Download PDF1~7 item / All 7 items
How can we enhance cyber resilience in the face of unrelenting ransomware attacks? ~ Insights from the experiences of various security vendors and recommendations from CSI Japan ~ Amidst the ongoing cyber attack damages, "cyber resilience" is gaining attention. Cyber resilience refers to an organization's ability to respond and recover in order to maintain business continuity and minimize impact when cyber attacks or system failures occur. It is not merely a defensive measure, but a comprehensive approach that enables rapid recovery and business continuity after an attack. At this year's CSI Japan symposium, we will share methods based on the experiences of various security vendors, including Mr. Nishimoto from LAC, with a focus on cyber resilience. Additionally, we will introduce the activities and framework utilization from the CSI Japan evaluation and human resources subcommittees.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationDigital transformation (DX) utilizing digital technology is accelerating as a key to strengthening competitiveness in the manufacturing industry. However, alongside the promotion of DX, new challenges have emerged, such as the expansion of cybersecurity risks and the need to comply with domestic and international security regulations. In this seminar, we will introduce specific examples of DX promotion in the manufacturing industry and provide information that will assist in decision-making from a management perspective on how to address the challenges and risks that arise. [Target Audience] - Decision-makers involved in promoting security in the manufacturing industry, or those responsible for explaining to decision-makers - Decision-makers involved in promoting product security, or those responsible for explaining to decision-makers
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn recent times, with the normalization of cloud utilization and remote work, traditional boundary-based security tends to sacrifice productivity. This seminar will organize the trends of zero trust and market dynamics, explaining the dilemma of "convenience versus control" that companies face from the perspective of balancing control and productivity. Furthermore, focusing on two aspects: VDI for internal employees and VDI for external contractors, we will introduce the enterprise browser "Island," which is gaining attention. We will present specific methods to enhance operational efficiency on a common browser platform while mitigating the risk of information leakage for both employees and contractors, paving the way to seamlessly resolve the challenges faced by both parties. We hope this will be beneficial for a wide range of participants, including those in information systems and security departments, as well as leaders in operational departments and those responsible for managing external partners, in reducing security risks and achieving efficient business operations. [Target Audience] - Personnel from information systems/security departments considering the transition to zero trust or reducing operational costs of VPN/VDI. - Operational leaders and DX promotion personnel in departments seeking to balance SaaS utilization and security control.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWhile corporate security measures are advancing, email spoofing and impersonation attacks remain a serious threat. Recently, information leaks due to unauthorized access to email security products have drawn attention as a problem that undermines business trust. Many companies are moving forward with the implementation of DMARC, but there are noticeable cases where operations have stalled with the "none" setting, and authentication technologies are not being fully utilized. In this context, the sending domain technology "BIMI" and the necessary certificate "VMC" are gaining attention. These technologies display the company logo on compatible email clients, intuitively proving the legitimacy of the sender and contributing to an increase in brand value. This seminar will explain the latest trends in strengthening operations after DMARC implementation and the next steps for brand protection. [Target Audience] - IT and security personnel who have implemented DMARC for their own domain but are unsure about the next steps. - Individuals who have received inquiries from management or public relations about "anti-impersonation measures" or "brand protection" but are unclear on the technical solutions. - Those who have heard of BIMI/VMC but want to understand the reality of their implementation.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn recent years, there has been an increase in cybersecurity attacks targeting not only web systems but also control systems across the manufacturing industry. In developed countries, security laws and standards have been established for various domains of IoT. Recently, regulations such as the European Cyber Resilience Act and the RE Directive, which require cybersecurity measures for product development and operation, are set to be enforced, making compliance with these regulatory requirements urgent in the semiconductor industry. Additionally, as a unique standard for the semiconductor industry, the semiconductor SEMI E187 and E188 were enacted in 2022, requiring manufacturers of semiconductor manufacturing equipment and related suppliers to comply with these regulations and standards. This seminar will focus on the technical aspects by introducing the regulations and standards related to semiconductor manufacturing equipment, along with an overview of each security requirement and countermeasure. [Target Audience] - Personnel responsible for product security in the semiconductor industry - Personnel promoting product security and those involved in product development
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationI believe many people struggle with building a career in the security field. Additionally, since the security sector is constantly evolving, it is important to continue learning about the latest technologies and trends. With the increasing demand for security professionals, there are now numerous training programs and certifications related to security. We are in an era where there are countless options for how to develop technical skills and knowledge within one's career and ultimately what kind of career path to pursue. In this panel discussion, representatives from recruitment agencies, educational departments, and field personnel will discuss career advancement for security professionals from their respective perspectives. I hope this will assist you in your career development. <Panel Discussion> - Current state of security professionals - Career paths for security professionals - Usefulness of security certifications Speaker: Tetsuji Sato, MWH HR Products Speaker: Go Tokita, NRI Secure Technologies Speaker: Junpei Otsuka, NRI Secure Technologies [Target Audience] - Those struggling with career paths in security - Those considering obtaining security certifications
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn this seminar, we will explain the ideal state of a CIAM foundation in the DX era and specific methods for its realization, based on case studies and trends regarding customer ID integration to form a "platform that accelerates DX." *This webinar is a re-broadcast of a seminar held on September 26, 2024. <Session 1> Customer ID Integration to Accelerate DX - Creating Added Value by Aligning with Customers' Lifestyles Speaker: Shigetatsu Kashiwai, Deloitte Tohmatsu Cyber LLC <Session 2> How to Smoothly Advance CIAM Implementation - Beneficial Approaches to Unique Customer ID Challenges Speaker: Kanae Oda, NRI Secure Technologies [Target Audience] - Individuals responsible for or involved in businesses that offer digital services, e-commerce services, etc., to customers.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration