金融リスクマネジメントフォーラム2017 金融サイバーセキュリティフォーラム2017 金融機関向け2大リスクカンファレンス 2017年10月26日(木)/ロイヤルパークホテル 主催:JTBコミュニケーションデザイン

Workshop Sponsors

Financial Cyber Security Forum 2018

Financial Risk Management Forum 2018

Exhibition Sponsors

Media Partner

Contact us

Secretariat of Financial Risk Management Forum 2017/
Financial Cyber Security Forum 2017

JTB Communication Design, Inc.
Tel: 81-(0)3-5657-0606
Fax: 81-(0)3-5657-0634
E-mail: frisk@jtbcom.co.jp
Contact person: Takasaka, Matsuda, Isogai, Ooya

Exhibition


Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. In capital markets, we support clients in various fields such as maximizing the top line, cost reduction, regulations and risk management, business integration with M&A and launching new technologies and Omni channel services.


 

 

We introduce the AI anti-virus software "Protect Cat Powered by Cylance". How do you deal with malware and manage it with AI? Also, in addition to external threats, how to handle internal fraud in file operations, USB / Web usage, etc. Actually using the demonstration terminal we will show you the operation screen.

Through a wealth of security and BCP-related-supporting experience, Newton Consulting Ltd. has focused on providing “risk management services which truly strengthen corporate management.”

We provide cybersecurity-related assistance, according to various needs of our customers. Some examples are as listed below:

1. objective assessment of current cyber security practices based on guidelines and
regulations for financial organizations issued by FISC, FFIEC, etc.;
2. a variety of cyber exercises customized for each organization;
3. workshops for management teams and practitioners;
4. creation and development of internal rules and processes; and
5. adaptation to foreign regulations, such as GDPR.


Proofpoint boasts a proven track record in Cyber developed regions such as North America and Europe. In Japan as well, over 10% of Nikkei 225 companies are our users. The target of cyber attack now is not infrastructure but people. Considering the viewpoint of the attacker, it is required to intensively protect high risk users. Join us how to detect, block and respond the advanced targeted attacks including BEC before they reach the user's inbox. Also introduce the latest security training solution using Wombat Security Technologies that we aquired in 2018 that provides the latest phishing simulation and e-learning system in more than 30 languages.

Power your SecOps Practice with Rapid7 Insight Platform.
* InsightVM - Our vulnerability risk management solution utilizes the power of Rapid7's Insight platform to collect vulnerability data and minimize risk in modern networks.
* InsightIDR – A SIEM solution that uses attacker analytics to detect intruder activity earlier in attack chain and identifies threats, compromised credentials, detects malware and sets traps for intruders.
* InsightAppSec – Measure your application security risk to check for vulnerabilities against OWASP top 10 vulnerabilities and then create actionable compliance and remediation reports to secure your apps.

In addition to the common threats through internet and clear-web, nowadays new risks such as internal fraud and threat from dark web are emerging. Cyber-attack methods are getting sophisticated and diversified to various as the springboard attack via network device or end point from external open web site. While challenges increase in cyber security, the shortages of human resources are facing a serious situation. In such circumstances, "Visualization" and "Automation" in Vulnerability Risk Management become increasingly important. Terilogy contributes to customers and partners to maintain robust network and platform environment by providing solutions which visualize, manage and operate vulnerability risk in very efficient manners.

#1. 10/25/40/50/100G Ethernet NICs for neural-class data centers that need ultra-high bandwidth, ultra-low latency #2. SolarCapture; high performance packet capture, instrumentation and analytics products - A range of hardware appliances for ultimate flexibility and ease of deployment - Industry-specific customizable analytics-based software applications to provide the metrics and intelligence you need, when and how you need them - High capacity, cost-effective network visibility and management, with 100% lossless packet capture at up to 40 GbE #3. ServerLock; NIC hardware based firewall solution With the introduction of Solarflare’s XtremeScale network interface cards (NICs) we now have a more secure hardware firewall that executes in firmware on the NIC. This firewall not only filters inbound packets, but it can also filter off malicious outbound network traffic. Unlike IPTables or NFTables, ServerLock runs in hardware directly on the NIC, and provides several unique advantages.