Program
10:00- 10:30 |
Registration | |
10:30- 11:10 |
Keynote Speech-1 | |
Developments and Challenges for Strengthening Cyber Security in the Financial Sector Mr. Tsuyoshi Mizutani With the progress of digitalization, cyberattacks become increasingly complex and sophisticated. In addition, as Tokyo Olympic and Paralympic Games will be held in 2020, it is pointed out that the financial sector are at higher risk of cyberattack than before. In order to address such risks, the FSA updated the “Policy Approaches” last October. Today I will elaborate recent developments based on the “Policy Approaches” and remaining challenges. |
||
11:20- 12:00 |
Panel Discussion | |
Non-Financial Risks and Enhancement of Risk Management 【Moderator】 ![]() Mr. Shiro Katsufuji 【Panelists】 ![]() Mr. Shuichi Yokoyama ![]() Mr. Tadashi Itagaki ![]() Ms. Megumi Sawa |
||
12:00- 13:00 |
Lunch Break | |
13:00- 13:40 |
A-1 Sold Out | B-1 |
How to Leverage Threat Intelligence to Prevent Cyberattacks Mr. Takefumi Watanabe Many organizations around the world are Facing new social engineering schemes, persistent fraud tactics, and brand impersonation, especially financial organizations remain the number one target for threat actors. We will introduce how to utilize external threat intelligence to defend against endless threats that hinder revenue growth and damage brand reputation. |
The Enterprise Immune System: Mr. Yuki Kohara Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. |
|
13:50- 14:30 |
A-2 | B-2 |
Comparison Point from the Case Studies and Future Prospects of Isolation Technology Mr. Yuji Sekiguchi In the financial industry, many companies have adopted Internet isolation.Recently, as a result of comparing and examining which method is the best, the Implementation of Menlo Security isolation is increasing.In this session, we will explain why the cloud isolation is chosen instead of the application virtualization software solution, the comparison points and the Implement process, and introduce the roadmap drawn by Menlo Security. |
Mr. Seiji Sano |
|
14:30- 14:50 |
Coffee Break | |
14:50- 15:30 |
A-3 | B-3 |
Start Anti-Malware Countermeasures with Minimal Man-Hours Mr. Tsuneyuki Yamagishi Endpoint security solution "CylancePROTECT" that predicts and prevents against all kinds of attacks - advanced threats & malware and the 14th consecutive TOP share Unified Endpoint Management "LanScope Cat" are the tags for the incident response and vulnerability diagnosis with minimal man-hours as in the new FSA (Financial Services Agency) policy. |
Integration Management of Enterprise Risk ~ Introduction of Japan-developed GRC Services Mr. Taku Tokunaga |
|
15:40- 16:20 |
A-4 | B-4 |
Mr. Tsubasa Horie |
Reconsider How You Should Do Your Network Forensic with Latest Case Study From US Mr.Katsuhiko Ikeda The necessity of forensic is at the highest with NIST SP-800, which is expected tobe applied to financial industry, and GDPR, which Marriott International and BritishAirways will be fined, and of course, the rise of threat. In this session, I will explainwhy your current forensic is not enough and how you should do your forensic with latest US case study. |
|
16:20- 16:40 |
Coffee Break | |
16:40- 17:20 |
A-5 | B-5 |
Application Security; A Fresh Approach Mr. Hidehiro Ito Ms. Misaki Yokota Business transformation and digitalization are challenging the financial services industry to provide secure and stable transactions faster than ever. Application security is an ever changing security frontier because the types and nature of attacks targeting Web sites and API’s are taking advantage of the diversity of the application environment. During this session, Imperva will share information about the latest security trends, Imperva’s refreshed approach to mitigating these evolving threats, and, using real-world examples, share how companies today are winning the cyber security battle. |
Mr. Naoya Kishima |
|
17:30- 18:10 |
Keynote Speech-3 | |
![]() How shall Risk Managers Face Deep Impacts on ERM Mr. Shumpei Takizawa |
Note: Topic, presentation, and speaker might be changed.