Site Search

CrowdStrike

CrowdStrike

[CrowdStrike Special Event] Evolving cyberattacks and the key to endpoint security selection
[Visitor benefits]
All visitors will receive an original wireless charger!

<Transfer Individual Consultation> All applicants will receive a “selectable catalog gift”!
Light refreshments will be provided at the venue!
[Survey respondent benefits]
Get an Amazon gift card!

This campaign is provided by Macnica Amazon does not accept inquiries regarding this campaign. Please contact Macnica [045-476-2010]. Please refer to the detailed rules here.

I think there are many customers who think that "endpoint security measures are already sufficient".
In fact, the introduction of NGAV and EDR products is progressing, and many companies are taking countermeasures, but on the other hand, are they really protecting their environments from cyber attacks that are evolving day by day? Was it an appropriate introduction that did not stop the business? Isn't this a source of concern for security personnel?

Security measures centered on "endpoints", which can be the final targets of attackers, are becoming increasingly important.

At this event, we will deliver the "whole picture of ideal security measures" through the following themes and contents, with such endpoint security as the main axis.

  • A special session by Mr. Nawa of Cyber Defense Institute and Mr. Ueno of Tricorda Co., Ltd., who are well versed in the security industry.
  • Do you want to listen to the raw voice? Special Lecture│Case Sessions by CrowdStrike User Companies
  • We will prepare an exhibition booth for each issue that security personnel face! ASM (vulnerability diagnosis of externally disclosed assets) / ID (AD) protection / SOC operation
  • ≪Seeing is believing≫CrowdStrike hands-on operation demo corner! Macnica engineers will provide detailed explanations.

In addition, we have prepared a corner of tea sweets to take a break.

This is a real event where everyone involved in the selection and review of security products can take home useful information, so please take this opportunity to participate.

Schedule/Application

schedule

time

venue

Application

Event requirements

Venue

Tokyo Conference Center Shinagawa

〒108-0075
Tokyo, Minato-ku, Konan 1-9-36 Area Shinagawa 5F
2 minute walk from JR Shinagawa Station Konan Exit (East Exit)
access

Capacity 400 people

※We will close the reception as soon as we reach the capacity.

Preparation
What to prepare on the day
  • Admission ticket (email)
  • Business card
subject
  • Representative of the Corporate Information Systems Department
  • Those who are considering security measures

*We do not accept applications from competitors or other companies in the same industry. Please note.

Cost Free (pre-registration required)

Program

13:00~13:30
Reception
13:30~14:00
Mr. Nawa is on stage!
Illustration of recent changes in iconic cyber threats and ineffective “traditional security controls”
In recent years, there has been an increase in the number of cyberattacks that have a serious impact on business activities. However, all the victim organizations observed through incident response support and second opinion activities continued to be in a situation where they had been promised damage from attacks. And most of them can be asserted to be due to "lack of imagination" and "normalcy bias" in the management layer of the organization. Therefore, in this lecture, I will provide information materials (illustration) to help such managers understand, and introduce explanation points aimed at changing their perceptions and behaviors.
Cyber Defense Institute
Managing Director/Senior Analyst
Mr. Toshio Nawa
14:00~14:30
Necessity of "ITDR" solution that detects and protects ID threats that EDR cannot prevent
Authentication attacks and spoofing that target IDs, mainly AD, are becoming more sophisticated year by year, and it is becoming difficult to deal with them with existing access management alone, such as bypassing multi-factor authentication. Threats to ID authentication are at the center of today's cyber threats. Considering solutions to detect and respond to ID threats based on the premise of breaching the ID infrastructure, just as EDR was introduced on the premise of breaching devices. has become an urgent matter. In this session, we will introduce actual attacks that target IDs and cases of damage, as well as the concept of "ITDR" and specific solutions that can be used to solve them.
Macnica
Chief of Security 3rd Division 2nd Sales Department
Kazuki Tsunemoto
14:30~15:00
Fenrir's Endpoint Security Strategy
- Gradual enhancement of security measures with CrowdStrike -
Fenrir creates products and services that focus on design and technology, and handles over 600 apps for 400 companies in all industries. Based on the recognition that strengthening information security is essential in providing products and services to customers, we have shifted to a "zero trust model" in line with the changing times and are implementing security measures. As for endpoint measures, in addition to advanced security measures for Mac terminals, which account for the majority, we emphasize not only using EPP and EDR alone, but also maximizing the effect by linking them within the framework of Zero Trust. increase. To achieve this, they selected CrowdStrike. The product is multi-platform compatible, with a single agent that can be incrementally expanded and integrated with other solutions and MSS. On the day of the event, we will introduce the reason why Fenrir introduced the CrowdStrike solution and the operation and effects after the introduction.
Fenrir Co., Ltd.
Information Systems Department/Fenrir-CSIRT
Jun Uehara
15:00~15:40
Break
Exhibition corner & [limited number] CrowdStrike hands-on experience
15:40~16:10
Realization of endpoint security that supports safe and secure global business
~Responding to advanced attacks by CrowdStrike and strengthening overseas governance~
For more than 100 years since its founding, Daicel has provided various materials that are beneficial to society globally. In the 4th long-term vision formulated in 2020, we aim to provide greater value together with external people who share our values, with the philosophy of "co-creation". In implementing the IT infrastructure that supports this vision, we consider it particularly important to respond to changes in the business environment and trends in cyberattacks, as well as to strengthen global governance. . On the day, we will talk about the background of the introduction, the reasons for selection, the operation after introduction, and the future outlook.
Daicel Corporation
Chief Staff, System Operation Group, Digital Strategy Office
Mr. Masakazu Daito
16:10~16:40
Mr. Ueno from Tricorda will be on stage!
Cyber Security from an Attacker's Perspective: What is the Optimal Defense Strategy to Minimize Damage?
What will the attackers aim for when your company is attacked? Developing the best defensive strategy in cybersecurity requires incorporating an attacker's perspective. In this presentation, we will understand how modern attackers behave through "Penetration Test", which is a test to actually infiltrate a company. suggest a defensive strategy.
Tricoder Co., Ltd.
Board Director
Mr. Nobu Ueno
16:40~17:00
Summary of the day
~Presentation of specific architecture centered on EDR and CrowdStrike~
We understand that many customers are concerned about the combination of 3rd party products. In this session, as a summary of the entire event, Macnica will specifically introduce the combination of architectures of the Company technologies centered on EDR/ CrowdStrike.
Macnica
Security Division 1 Sales Department 1
Kenta Chikauchi
17:00~17:25
Exhibition corner & [limited number] CrowdStrike hands-on experience

*The program is subject to change without notice. Please note. Please check this web page for the latest information.

Inquiry/Document request

In charge of Macnica CrowdStrike Co., Ltd.

Weekdays: 9:00-17:00