TECHNET TOKYO 2019
March 5-7, 2019 | The New Sanno Hotel | Tokyo, Japan
STEM EDUCATION DAY
TUESDAY MARCH 5, 2019
- Exhibitor Training Sessions
- Technology Demonstrations
- Cyber Defense Workshop / Table Top Exercise
- Kick-Off Dinner & Keynote
TECHNET TOKYO DAY 1
WEDNESDAY MARCH 6, 2019
- STEM Exhibition Hall
- Keynote Lunch
- Keynote Speeches and Panel Discussions
- Evening Networking Social
TECHNET TOKYO DAY 2
THURSDAY MARCH 7, 2019
- STEM Exhibition Hall
- Keynote Lunch
- Keynote Speeches and Panel Discussions
- Evening Networking Social
STEM Education Day
Tuesday March 5, 2019
STEM Education Day Session 1
Simulation, Virtual Reality, and Augmented Reality Technologies: Their Merits for Training Purposes and the Methods of Developing Applications
Abstract: Simulation, virtual reality, and augmented reality technologies are continually growing in their adoption by organizations in both military and non-military markets. A common use is training for vehicle operators (fighter pilots, tank drivers, drone operators, heavy machinery operators, etc.), all participants in full battle scenarios, and emergency responders. Other applications include design/development of all type of vehicles, instrumentation, and infrared/radar sensors. These technologies have merits such as increased quality of training through repetition and usage of unlimited scenarios, decreased costs because of the reduced need for training on real vehicles, and increased safety. This presentation will cover these topics in more detail and show how an actual simulation application can be developed using off-the-shelf software and hardware products. Through the use of a VR head-mounted display, participants will also be able to become fully immersed in that 3D simulation scenario.
Presenter: Wataru Ishikawa, Sales, RealViz; Kenzo Chado, Sales, RealViz; Dale Michihiro Suzuki, Vice President of Sales and Marketing Development, RealViz
STEM Education Day Session 2
Artefacts first: The Magnet Way
Abstract: Experience live demo to assess your needs and dive into the features and capabilities of Magnet AXIOM – a complete digital investigation platform allowing digital forensics examiners and investigators to seamlessly acquire, analyze, and share digital evidence from computers, smartphones, and tablets. With Magnet AXIOM, you will be able to uncover facts quickly, validate your findings with ease and share the meaning of your results clearly.
Company: Magnet Forensics
Presenter: Matthew Simon, Forensic Sales Consultant, APAC
STEM Education Day Session 3
Operationalizing Threat Intelligence
Abstract: Learn how to leverage industry threat intelligence to augment your cyber security workforce, incident response team, security operations center, and more by leveraging automation, detailed and rich reporting, IOC/IOA feeds and more.
STEM Education Day Session 4
Monitoring your Mission-Critical Services from Everywhere
Abstract: Learn how nGeniusPULSE helps ensure the essential elements of your organization are connected and working – even at remote locations. We will share and demonstrate how you can easily and efficiently keep an eye on the performance of SaaS, cloud, Wi-Fi, and infrastructure everywhere in your mission-critical environment.
Presenter: Jason Chaffee, Sr. Product Manager
STEM Education Day Session 5
Enabling Advanced Cyber Threat Defense (ACTD) leveraging next generation HBSS/ESS
Introducing: Next Generation Dynamic Endpoint Security Framework for ePO and HBSS/ESS
In today’s enterprise environment, cybersecurity demands a multi-pronged approach. The endpoints are the new perimeter and must have the most sophisticated protection possible. Gone are the days of just deploying traditional anti-virus, endpoint security must be intelligent and integrated to enable protection, detection and correction across the threat defense lifecycle. If your endpoint security could talk to other security technologies and tell you in plain language what they are seeing and doing, then you’d have an intelligent endpoint security that works for you.
An Intelligent Integrated Security solution provides a comprehensive set of security controls that is easy to extend and adapt over time. It focuses on providing protection against current threats, as well as visibility to identify and adapt to new threats while leveraging existing technologies such as HBSS/ESS and other existing Cyber security solutions inside your environment.
Adaptive Cyber Threat Defense (ACTD) analyzes content from your enterprise – including third party security solutions – and decides what to do based on file reputation, rules, and reputation thresholds. Learn how to perform automated analysis, to contain, block, or clean files with known malicious or unknown reputations while fully integrating with your existing HBSS/ESS environment.
Please join us as we discuss real world examples of the ACTD architecture inside the US Department of Defense and how it’s application improves the security posture, operational readiness, and delivers real-time visibility and reporting to both senior leadership as well as the technical resources that defend the cyber landscape inside the different Areas of Responsibility.
Presenter: Mario Pena, Public Sector and Global Governments, Asia Pacific Lead
STEM Education Day Session 6
Copper and Fiber Splice Closures featuring the COYOTE® HD (High-Density) Dome Closure
Abstract: A “hands-on” overview of a wide-variety of PLP copper and fiber optic splice closures designed for OSP/ISP plant infrastructure cabling applications that range from the Central Office all the way to demarcation. The featured product of this PLP presentation/training event is our new COYOTE® HD Dome Closure that incorporates our new hinged modular/stackable ribbon, single fusion splice trays or a combination of both and supports a maximum splice count capacity of 1,728 or 3,456 fibers depending of cable construction.
Company: Preformed Line Products (PLP)
Presenter: Larry Gerst, Federal Markets Manager and Field Sales Manager
STEM Education Day Session 7
Cyber-Physical Security: Security Evaluation and Trends for Embedded System Security in the Era of Artificial Intelligence.
Abstract: The goal of this presentation is to introduce the importance of cyber-physical security. Since every connected device can be used to corrupt complex cyber systems, the number of potential point of failures is rapidly increasing. It is therefore important to consider how to systematically evaluate security and implement protections against cyber and physical attacks as early as the design phase of chipsets, before they are integrated especially in the case of defense or military applications. Through Secure-IC’s Laboryzr solution, examples of Hardware security and embedded software evaluation will be shown, especially with regards to Side Channel Attacks, that aim at extracting secret information from the hardware.
Last, Artificial Intelligence is emerging as a powerful defense but also attack tool. AI combined with the upcoming quantum computing emergence, classical cryptographic algorithms and current security solutions will become ineffective and will have to evolve.
Presenter: Yan-Tarō Clochard, Director, Secure-IC K.K. and Sales Director North Asia
Doors Open: 18:00
Dinner Commences: 19:00
Keynote: 20:00 (approx)
Attire: Business Casual or Uniform
TechNet Tokyo 2019 Opening Keynote
Mr. William Jokela
CAPT J. Steve Correia
Commerce and Information Policy Bureau
Ministry of Economy, Trade, and Industry (METI)
TechNet Tokyo Day 1
Wednesday March 6, 2019
Session 1: Keynote
Cyber Deterrence: Myths, Realities, and Opportunities
Abstract: The US Department of Defense recently announced a new cyber strategy. Deterring malicious cyber activities utilizing all instruments of national power is a critical component of it. Instruments of cyber deterrence can be either cyber or non-cyber. No single approach works, and different strategies for different types of attacks and actors are needed. However, usage of traditional deterrence analogies from other domains of warfare do not always apply in cyber. This presentation will introduce broad approaches to deterrence in cyberspace. With this background, we will discuss challenges cyber deterrence when factoring in the geopolitical context of cyber global competition. We will finish with recommendations on how norms of responsible state behavior during peacetime can reinforce deterrence strategies.
Presenter: Panayotis Yannakogeorgo, Dean, Air Force Cyber War College
Session 2: Lunch
Session 2: Keynote
Toyota’s Global Cyber Security Strategy
Presenter: Tomoji Furuta, Chief Information Security Officer, Toyota
Session 3: Keynote
Cyber Deterrence by Breaking the Offensive Cost Model
Presenter: Mr. William McGough, Operations Officer, US Navy Blue Team
Session 4: Keynote
Japanese Government Strategy on Cyber Security Deterrence
Presenter: Mr. Kenzo Fujisue, Liberal Democratic Party, Japanese Diet; President, Voice of The People in the House of Councillors
TechNet Tokyo Day 2
Thursday March 7, 2019
Session 5: Keynote
Strategic Threat Intelligence is a Vital Component of Deterrence
Presenter: Scott Jarkoff, Senior Threat Intelligence Advisor
Session 6: Lunch
Session 6: Keynote
Government of Japan Cyber Deterrence Policy Advancements
Abstract: In July 2018, a newly revised “Cybersecurity Strategy” was decided by the Cabinet Office of Japan. Based on the basic principles such as “assurance of the free flow of information”, in order to achieve the goal (realization of a society in which cyberspace develop sustainably), the strategy identified three approaches; i) mission assurance, ii) risk management, iii) collaboration.
Meanwhile, IT Strategic Headquarter, which is chaired by the prime minister, decided new Basic Policies for IT strategy in December 2018. The new policies are “assurance of data safety, security and quality” and “enhancement of digital transformation in the public/private sectors.” Cybersecurity is essential for promoting these basic policies.
Dr. Ikuo will also address specific cybersecurity policy topics related to the above mentioned Strategy and Basic Policies. Specifically, the cyber/physical security framework developed by METI, the establishment of the cybersecurity council based on the newly amended Basic Act of Cybersecurity of 2014.
Presenter: Dr. Ikuo Misumi, Deputy Director-General for Cybersecurity and Information Technology, Ministry of Economy, Trade, and Industry (METI)
Session 7: Panel
US Forces Japan Cyber Security Panel
Moderator: Lt Col Scott Metzler
Panelists: CAPT J. Steve Correia, CO, NCTSFE; LTC Nicholas Prisco, Chief, DISA PAC Japan Field Office