﻿{"id":13519,"date":"2020-08-01T09:56:39","date_gmt":"2020-08-01T00:56:39","guid":{"rendered":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=13519"},"modified":"2020-08-25T09:49:14","modified_gmt":"2020-08-25T00:49:14","slug":"%e7%ac%ac68%e5%9b%9ecsa%e5%8b%89%e5%bc%b7%e4%bc%9a-%e3%80%8c%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e3%82%a8%e3%83%b3%e3%83%89%e3%83%9d%e3%82%a4%e3%83%b3%e3%83%88%e8%84%85%e5%a8%81","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=13519","title":{"rendered":"\u7b2c68\u56deCSA\u52c9\u5f37\u4f1a \u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u8105\u5a01\u30ec\u30dd\u30fc\u30c8 2019\u300d"},"content":{"rendered":"<h2>\u7b2c68\u56deCSA\u52c9\u5f37\u4f1a\u3092\u4ee5\u4e0b\u306e\u3088\u3046\u306b\u958b\u50ac\u3044\u305f\u3057\u307e\u3059\u3002<\/h2>\n<p><strong>\u30c6\u30fc\u30de\uff1a\u3000\u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u8105\u5a01\u30ec\u30dd\u30fc\u30c8 2019\u300d<\/strong><\/p>\n<p><strong>\u6982\u8981<\/strong>\uff1a<\/p>\n<p>\u672c\u8b1b\u6f14\u3067\u306f\u3001\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u793e\u304c\u8abf\u67fb\u3057\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u6700\u65b0\u52d5\u5411\u3068\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306b\u7279\u5316\u3057\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ec\u30dd\u30fc\u30c8\u300c\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u3000\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u8105\u5a01\u30ec\u30dd\u30fc\u30c8 2019\u300d\u306b\u3064\u3044\u3066\u7d39\u4ecb\u3057\u3066\u3044\u305f\u3060\u304d\u307e\u3059\u3002\u3053\u306e\u30ec\u30dd\u30fc\u30c8\u306f2019\u5e741\uff5e12\u6708\u306b\u304b\u3051\u3066\u306e\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u8105\u5a01\u52d5\u5411\u3092\u7db2\u7f85\u3057\u3001Microsoft\u304c\u5168\u4e16\u754c\u3067\u53ce\u96c6\u3057\u3066\u3044\u308b\u4e00\u65e5\u7d048\u51465000\u5104\u4ef6\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b7\u30b0\u30ca\u30eb\u306e\u5206\u6790\u7d50\u679c\u3082\u53cd\u6620\u3057\u3066\u3044\u308b\u3082\u306e\u3067\u3059\u3002<\/p>\n<p>\u306a\u304a\u3001\u672c\u52c9\u5f37\u4f1a\u306f\u30a6\u30a8\u30d6\u4f1a\u8b70\u3067\u306e\u958b\u50ac\u306b\u306a\u308a\u307e\u3059\u3002\u304a\u7533\u3057\u8fbc\u307f\u8005\u306b\u306f\u3001\u5f8c\u65e5\u3001\u30a6\u30a8\u30d6\u4f1a\u8b70\u306e\u30a2\u30af\u30bb\u30b9\u65b9\u6cd5\u3092\u3054\u9023\u7d61\u3057\u307e\u3059\u3002<\/p>\n<p><strong>\u8b1b\u5e2b<\/strong>\uff1a<\/p>\n<p>\u82b1\u6751 \u5b9f \u6c0f\u3001Microsoft Corporation, Cybersecurity Solutions Group, Chief Security Advisor<\/p>\n<p><strong>\u65e5\u306b\u3061<\/strong><\/p>\n<p>8\u670827\u65e5\uff08\u6728\uff09<\/p>\n<p><strong>\u5834\u6240<\/strong><\/p>\n<p>\u30a6\u30a8\u30d6\u4f1a\u8b70\u3067\u306e\u958b\u50ac\u306b\u306a\u308a\u307e\u3059\u3002<\/p>\n<p><strong>\u30b9\u30b1\u30b8\u30e5\u30fc\u30eb<\/strong><\/p>\n<p>\u53d7\u3051\u4ed8\u3051\uff1a\u300018:20<br \/>\n\u52c9\u5f37\u4f1a\u3001Q&amp;A\uff1a 18:30-20:30<\/p>\n<p><strong>\u52df\u96c6\u4eba\u6570<\/strong><\/p>\n<p>250\u540d<\/p>\n<p><span style=\"color: #000000;\"><strong>\u8cc7\u6599\u306b\u3064\u3044\u3066<\/strong><\/span><\/p>\n<p>\u8cc7\u6599\u306e\u4e8b\u524d\u914d\u5e03\u306f\u3044\u305f\u3057\u307e\u305b\u3093\u3002\u30a6\u30a8\u30d6\u4f1a\u8b70\u306e\u4e2d\u3067\u53c2\u52a0\u8005\u306b\u30a2\u30af\u30bb\u30b9\u65b9\u6cd5\u3092\u304a\u77e5\u3089\u305b\u3057\u307e\u3059\u3002\u306a\u304a\u3001CSA\u30b8\u30e3\u30d1\u30f3\u4f1a\u54e1\u306e\u65b9\u306b\u306f\u3001\u4f1a\u54e1\u30da\u30fc\u30b8\u306b\u8cc7\u6599\u3092\u4e8b\u524d\u516c\u958b\u3044\u305f\u3057\u307e\u3059\u306e\u3067\u3001\u305d\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<p>\u8cc7\u6599\u306e\u5229\u7528\u6761\u4ef6\u306f\u4ee5\u4e0b\u306b\u306a\u308a\u307e\u3059\u306e\u3067\u6ce8\u610f\u3057\u3066\u304f\u3060\u3055\u3044\uff1a<br \/>\n\u2022CSA\u52c9\u5f37\u4f1a\u306b\u53c2\u52a0\u3059\u308b\u306b\u969b\u3057\u3066\u306e\u53c2\u8003\u3068\u3057\u3066\u306e\u307f\u5229\u7528\u3057\u3066\u304f\u3060\u3055\u3044\u3002<br \/>\n\u2022\u8907\u88fd\u30fb\u8ee2\u8f09\u7b49\u3092\u5e0c\u671b\u3055\u308c\u308b\u5834\u5408\u306f\u3001\u304a\u554f\u5408\u305b\u30da\u30fc\u30b8\u3088\u308a\u3001CSA\u30b8\u30e3\u30d1\u30f3\u307e\u3067\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044\u3002<br \/>\n\u2022\u672c\u8cc7\u6599\u306b\u95a2\u3059\u308b\u4e00\u5207\u306e\u8457\u4f5c\u6a29\u306f\u3001\u7b46\u8005\u304a\u3088\u3073\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u306b\u5e30\u5c5e\u3057\u307e\u3059\u3002<\/p>\n<p><strong>\uff23\uff30\uff25\u306b\u3064\u3044\u3066<\/strong><\/p>\n<p>CPE\uff08\u7d99\u7d9a\u7684\u6559\u80b2\u30d7\u30ed\u30b0\u30e9\u30e0\uff09\u306e\u53d7\u8b1b\u8a3c\u660e\u66f8\u306f\u3001CSA\u30b8\u30e3\u30d1\u30f3\u4f1a\u54e1\u3067\u53c2\u52a0\u3055\u308c\u305f\u65b9\u306e\u307f\u306b\u914d\u5e03\u3044\u305f\u3057\u307e\u3059\u3002\u30a6\u30a8\u30d6\u4f1a\u8b70\u306e\u4e2d\u3067\u3001\u53d7\u8b1b\u8a3c\u660e\u66f8\u306e\u7533\u3057\u8fbc\u307f\u65b9\u6cd5\u3092\u3054\u9023\u7d61\u3057\u307e\u3059\u306e\u3067\u3001\u305d\u306e\u624b\u9806\u306b\u5f93\u3063\u3066\u304a\u7533\u3057\u8fbc\u307f\u304f\u3060\u3055\u3044\u3002<\/p>\n<p><strong>\u304a\u7533\u3057\u8fbc\u307f<\/strong><\/p>\n<p>\u7533\u8fbc\u53d7\u4ed8\u306f\u7d42\u4e86\u3057\u307e\u3057\u305f\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u7b2c68\u56deCSA\u52c9\u5f37\u4f1a\u3092\u4ee5\u4e0b\u306e\u3088\u3046\u306b\u958b\u50ac\u3044\u305f\u3057\u307e\u3059\u3002 <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=13519\" title=\"\u7b2c68\u56deCSA\u52c9\u5f37\u4f1a \u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u8105\u5a01\u30ec\u30dd\u30fc\u30c8 2019\u300d\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":206,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-13519","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/13519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13519"}],"version-history":[{"count":3,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/13519\/revisions"}],"predecessor-version":[{"id":14105,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/13519\/revisions\/14105"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/206"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}