10:00-10:30 | Registration | ||
10:30-11:10 | Keynote Speech 1 |
||
Measures for Cybersecurity in Japan Mr. Nobuhisa Kaneko |
|||
Financial Cyber Security Forum | Financial Risk Management Forum | ||
11:20-12:00 | AB-1:Keynote Speech | C-1:Keynote Speech | |
Cyber Security for Tokyo 2020 Games Mr. Goro Masuzawa |
Financial Business Strategy and Risk Management Mr. Shiro Katsufuji |
||
12:00-13:00 | Lunch Break | ||
13:00-13:40 | A-2 | B-2 | C-2 |
Visibility, Analytics, Automation to Power your SecOps Practice Mr. Hideki Ushigome Buidling a modern vulnerability management program means adapting to modern networks by incorporating three key principles: Ecosystem Visibility, Remediation Workflow Automation & SecOps Agility. With GDPR coming into effect on 25th May 2018, organizations are subject to penalty for non-compliance; and this means collaboration between IT security and IT ops team need to aligned. In this session, delegates will get to understand how visibility, analytics and automation works with real life case local and foreign examples. |
Authentication Technology that Enables the Best Balance Between Usability and Security for Financial Services Mr. Osamu Oshima Recently, the way of annomary access and fraud become more sophisticated. Preventing fraudulent access is nesessary for most financial services. In this session, presenter will show latest authentication technology that enables secure and easy access for financial industry. |
Addressing Disruption Risk in Financial Services Mr. Sam OBrien As digital transformation becomes a primary source of innovation and competitive advantage – especially in Banking and Financial Services organisations. This goes beyond simple apps, but to digital wallets and to process robotics which will fundamentally change the industry.Is your organisation ensuring that the risk asscoaited with these changes are being adequately managed? Join this session for an overview of the changing “Digital Risk” landscape that we all operate within and the tactics you can use to ensure that there is a bridge connecting the worlds of Digital Risk and Business Risk. |
|
13:50-14:30 | A-3 | B-3 | C-3 |
Dealing with AI, IoT, Fintech: in a Cyber-driven World where You Need to Change to Survive Mr. Ryo Uchimi AI, IoT, Fintech — the digital environment of the financial industry is going through a lot of change. This means countermeasures against cyber attacks must also change. With less than two years to Tokyo 2020 Olympic games, and a storm of cyber attacks forecast to come with it, now is the time to act. Cyber inspections and exercises are key to enhancing security capacity. With the experience of supporting hundreds of companies, Newton Consulting will explain the latest practices, and tell you practical inspection and exercise methods to bolster your cyber security. |
How to Fight the Next Generation of Email Fraud Attacks Mr. Youichi Shimoyama BEC (business mail fraud) is increasing rapidly. BEC is not a system vulnerability but an attack that exploits social engineering, and it is characterized by the fact that it is difficult to detect since there is no malicious URLs and attached files in many cases. Based on the latest survey report and actual examples, we will learn the BEC attack mechanism. And we will introduce effective cyber security measures specifically to detect, stop and respond to BEC attacks. |
Stopping Finance Fraud with Global Shared Intelligence Mr. Kenji Hirai · Understanding how banking and brokerage organisations use ThreatMetrix® to enable customers to transact safely as well as quickly · Meeting the needs of your banking customers with secure, fast transactions without delivering an alienating experience · Product Highlight: Reviewing the ThreatMetrix Digital Identity Network® to appreciate it’s integrated device, location, behavioral and threat analytics to deliver frictionless, dynamic authentication · Adhering to global regulations including FFIEC & PSD2, how ThreatMetrix solutions’ are continuously enhanced to help financial institutions comply with the changing regulatory environmen |
|
14:30-14:50 | Coffee Break | ||
14:50-15:30 | A-4 | B-4 | C-4 |
Why did we adopt AI solution for Cyber Security? Mr. Yusuke Maruyama The idea of "Multi-layered defense" is becoming common as a security solution. However, the realization of ideal multi-layered defense is difficult to realize due to the problems of "cost", "manpower" and "skill". Among them, we introduce the reason why we adopted the endpoint solution "CylancePROTECT" and utilizing AI from among various countermeasures, and the effect of introducing it. |
Recent Incident Trends and Security Measures Outsourced. Mr. Yasuo Miyake CSIRT is being developed at financial institutions, and the security level of the entire enterprise is improving. However, there are many companies that operate CSIRT in a limited number of people and they are troubled with placing and nurturing human resources. I will explain the point where the LAC which is pioneer of security monitoring and operation service provision effectively outsources. |
Achieving Network Security Through Compliance Mr. Gordon Boyce Financial institutions face a heavy burden in today's environment, having to comply with regulations such as PCI-DSS, SWIFT CSP, etc. By implementing RedSeal's network modeling and management features and functionality, these burdens can be dramatically reduced. In addition, security holes such as network device misconfigurations and server vulnerabilities can be found beore they are found and exploited, ensuring a network that is resilient to security incidents. |
|
15:40-16:20 | A-5 | B-5 | C-5 |
Use Cases and Benefits of Web Isolation in Finance Industry Mr. Daichi Terada Since 2015, Menlo Security Web Isolation was deployed among many users in global finance industry. In this session, we are introducing reasons and backgrounds of why Menlo has been adopted, and brand new feature enhancement in 2018. |
The Mechanisms and the Concept of Our Cloud-based Mail and Web Security Services Mr. Takayoshi Kiyama "IIJ Secure MX Service" and "IIJ Secure Web Gateway Service" which have been provided by IIJ for 10 years are widely used by the financial enterprises of all sizes because of its high-quality functions and reliability. In this session, I will explain the reason why these 2 services keep high defence rate against the latest cyber attacks, with some example cases, recommended settings and the concept of our services. |
Enhancement of Insurance ERM and Business Management in Light of IFRS17 Mr. Kazuhiro Nishimasa IFRS17 Insurance Contract had been published on May 2017. IFRS17 requires the market-consistent-valuation of asset and liability with the legal accountability for disclosure. On the other hand, various kinds of data that you are collecting to be accountable for market-consistent-valuation would provide valuable insight for ERM whereby helping you make sound decisions. In this session, we are talking about the key to succeed in the area and the trend for leading technologies needed. |
|
16:20-16:40 | Coffee Break | ||
16:40-17:20 | A-6 | B-6 | C-6 : Panel Discussion |
The Enterprise Immune System : The World’s Leading Cyber AI Mr.
Hayato Shigekawa Darktrace is the world’s leading AI company for cyber defense. Created by mathematicians, the Enterprise Immune System uses machine learning and AI algorithms to detect and respond to cyber-threats across diverse digital environments, including cloud and virtualized networks, IoT and industrial control systems. The technology is self-learning and requires no set-up, identifying threats in real time, including zero-days, insiders and stealthy, silent attackers. Darktrace is headquartered in San Francisco and Cambridge, UK, and has over 30 offices worldwide. |
Real-time Cyber Hygiene, Hunting and Risk Management Required by the Financial Industry Mr.
Morifumi Narahara
Mr. Yoshinobu Sakate Under the EU General Data Protection Rule (GDPR), when a security violation is detected, the company must inform the regulators details of the incident within 72 hours. In addition, as an important item of CSIRT, JPCERT raises incident handling such as triage and incident response and responds to vulnerability such as patch application. In this presentation, we introduce the Tanium Platform, which realizes visualization and control of tens of thousands of endpoints in real time, based on examples of utilization by Mega Bank. We will also introduce RSA Archer, which works smoothly with governance, risk management and compliance in cooperation with Tanium, with case studies in the financial industry. |
ERM Approach Responding to Regulatory and Business Model Development in Banking and Insurance Industries 【Panelist】 Mr. Shigeru Yoshifuji Mr. Shigeru Taguchi 【Moderator】 We will discuss on ERM Approach to respond to regulatory requirements and respective business model development in both banking and insurance Insdutries. Mr. Yoshifuji from MUFG and Mr. Taguchi from Tokio Marine will discuss their respective developments and subjects. We would like to exchange the views on medium and long-term prospects as well. |
|
17:30-18:10 | AB-7 : Keynote Speech | ||
Case Study with the Practical Way to implement Cyber Security Exercise in the Financial industries Mr. Yasutake Sayanagi |
Note: Topic, presentation, and speaker might be changed.