product
- What you can do with CrowdStrike
- CrowdStrike Modules Falcon
- NGAV(Prevent/USB/FW)
- EDR(Falcon Insight)
- Threat Hunting (OverWatch)
- IT Asset Management (Discover)
- Vulnerability Management (Spotlight)
- Threat Intelligence (Intelligence/Sandbox)
- Identity Protection (ITD/ITP)
- Cloud Security (CNAPP)
- EASM(Surface)
service
Application for evaluation machine
- FAQ

CrowdStrike
CrowdStrike
![[CrowdStrike Special Event] Evolving cyberattacks and the key to endpoint security selection](/business/security/crowdstrike/image/crowdstrike_sem51_cover.jpg)

All visitors will receive an original wireless charger!
<Transfer Individual Consultation> All applicants will receive a “selectable catalog gift”!
Light refreshments will be provided at the venue!

Get an Amazon gift card!
This campaign is provided by Macnica Amazon does not accept inquiries regarding this campaign. Please contact Macnica [045-476-2010]. Please refer to the detailed rules here.
I think there are many customers who think that "endpoint security measures are already sufficient".
In fact, the introduction of NGAV and EDR products is progressing, and many companies are taking countermeasures, but on the other hand, are they really protecting their environments from cyber attacks that are evolving day by day? Was it an appropriate introduction that did not stop the business? Isn't this a source of concern for security personnel?
Security measures centered on "endpoints", which can be the final targets of attackers, are becoming increasingly important.
At this event, we will deliver the "whole picture of ideal security measures" through the following themes and contents, with such endpoint security as the main axis.
- A special session by Mr. Nawa of Cyber Defense Institute and Mr. Ueno of Tricorda Co., Ltd., who are well versed in the security industry.
- Do you want to listen to the raw voice? Special Lecture│Case Sessions by CrowdStrike User Companies
- We will prepare an exhibition booth for each issue that security personnel face! ASM (vulnerability diagnosis of externally disclosed assets) / ID (AD) protection / SOC operation
- ≪Seeing is believing≫CrowdStrike hands-on operation demo corner! Macnica engineers will provide detailed explanations.
In addition, we have prepared a corner of tea sweets to take a break.
This is a real event where everyone involved in the selection and review of security products can take home useful information, so please take this opportunity to participate.
Schedule/Application
schedule |
time |
venue |
Application |
- |
- |
- |
- |
Event requirements
Venue |
Tokyo Conference Center Shinagawa 〒108-0075 |
---|---|
Capacity | 400 people ※We will close the reception as soon as we reach the capacity. |
Preparation |
What to prepare on the day
|
subject |
*We do not accept applications from competitors or other companies in the same industry. Please note. |
Cost | Free (pre-registration required) |
Program
13:00~13:30 |
Reception
|
13:30~14:00 |
Mr. Nawa is on stage!
Illustration of recent changes in iconic cyber threats and ineffective “traditional security controls” In recent years, there has been an increase in the number of cyberattacks that have a serious impact on business activities. However, all the victim organizations observed through incident response support and second opinion activities continued to be in a situation where they had been promised damage from attacks. And most of them can be asserted to be due to "lack of imagination" and "normalcy bias" in the management layer of the organization. Therefore, in this lecture, I will provide information materials (illustration) to help such managers understand, and introduce explanation points aimed at changing their perceptions and behaviors.
![]() Cyber Defense Institute
Managing Director/Senior Analyst Mr. Toshio Nawa |
14:00~14:30 |
Necessity of "ITDR" solution that detects and protects ID threats that EDR cannot prevent
Authentication attacks and spoofing that target IDs, mainly AD, are becoming more sophisticated year by year, and it is becoming difficult to deal with them with existing access management alone, such as bypassing multi-factor authentication. Threats to ID authentication are at the center of today's cyber threats. Considering solutions to detect and respond to ID threats based on the premise of breaching the ID infrastructure, just as EDR was introduced on the premise of breaching devices. has become an urgent matter. In this session, we will introduce actual attacks that target IDs and cases of damage, as well as the concept of "ITDR" and specific solutions that can be used to solve them.
![]() Macnica
Chief of Security 3rd Division 2nd Sales Department Kazuki Tsunemoto |
14:30~15:00 |
Fenrir's Endpoint Security Strategy
- Gradual enhancement of security measures with CrowdStrike - Fenrir creates products and services that focus on design and technology, and handles over 600 apps for 400 companies in all industries. Based on the recognition that strengthening information security is essential in providing products and services to customers, we have shifted to a "zero trust model" in line with the changing times and are implementing security measures. As for endpoint measures, in addition to advanced security measures for Mac terminals, which account for the majority, we emphasize not only using EPP and EDR alone, but also maximizing the effect by linking them within the framework of Zero Trust. increase. To achieve this, they selected CrowdStrike. The product is multi-platform compatible, with a single agent that can be incrementally expanded and integrated with other solutions and MSS. On the day of the event, we will introduce the reason why Fenrir introduced the CrowdStrike solution and the operation and effects after the introduction.
![]() Fenrir Co., Ltd.
Information Systems Department/Fenrir-CSIRT Jun Uehara |
15:00~15:40 |
Break
Exhibition corner & [limited number] CrowdStrike hands-on experience
|
15:40~16:10 |
Realization of endpoint security that supports safe and secure global business
~Responding to advanced attacks by CrowdStrike and strengthening overseas governance~ For more than 100 years since its founding, Daicel has provided various materials that are beneficial to society globally. In the 4th long-term vision formulated in 2020, we aim to provide greater value together with external people who share our values, with the philosophy of "co-creation". In implementing the IT infrastructure that supports this vision, we consider it particularly important to respond to changes in the business environment and trends in cyberattacks, as well as to strengthen global governance. . On the day, we will talk about the background of the introduction, the reasons for selection, the operation after introduction, and the future outlook.
![]() Daicel Corporation
Chief Staff, System Operation Group, Digital Strategy Office Mr. Masakazu Daito |
16:10~16:40 |
Mr. Ueno from Tricorda will be on stage!
Cyber Security from an Attacker's Perspective: What is the Optimal Defense Strategy to Minimize Damage? What will the attackers aim for when your company is attacked? Developing the best defensive strategy in cybersecurity requires incorporating an attacker's perspective. In this presentation, we will understand how modern attackers behave through "Penetration Test", which is a test to actually infiltrate a company. suggest a defensive strategy.
![]() Tricoder Co., Ltd.
Board Director Mr. Nobu Ueno |
16:40~17:00 |
Summary of the day
~Presentation of specific architecture centered on EDR and CrowdStrike~ We understand that many customers are concerned about the combination of 3rd party products. In this session, as a summary of the entire event, Macnica will specifically introduce the combination of architectures of the Company technologies centered on EDR/ CrowdStrike.
![]() Macnica
Security Division 1 Sales Department 1 Kenta Chikauchi |
17:00~17:25 |
Exhibition corner & [limited number] CrowdStrike hands-on experience
|
*The program is subject to change without notice. Please note. Please check this web page for the latest information.
Inquiry/Document request
In charge of Macnica CrowdStrike Co., Ltd.
- TEL:045-476-2010
- E-mail:crowdstrike_info@macnica.co.jp
Weekdays: 9:00-17:00