﻿{"id":1509,"date":"2015-11-16T09:06:16","date_gmt":"2015-11-16T00:06:16","guid":{"rendered":"http:\/\/www.cloudsecurityalliance.jp\/newsite\/?page_id=1509"},"modified":"2015-11-16T09:06:16","modified_gmt":"2015-11-16T00:06:16","slug":"csa-japan-congress-2015%e3%80%80%e8%ac%9b%e6%bc%94%e8%b3%87%e6%96%99","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=1509","title":{"rendered":"CSA Japan Congress 2015\u3000\u8b1b\u6f14\u8cc7\u6599"},"content":{"rendered":"<h2>CSA Japan Congress 2015\u3000\u8b1b\u6f14\u8cc7\u6599\u306e\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u30da\u30fc\u30b8\u3067\u3059\u3002<\/h2>\n<p>\u5404\u8b1b\u6f14\u30bf\u30a4\u30c8\u30eb\u3092\u30af\u30ea\u30c3\u30af\u3057\u3066\u3044\u305f\u3060\u304d\u3001\u8cc7\u6599\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u304f\u3060\u3055\u3044\u3002<br \/>\n<span style=\"color: #ff0000;\"><strong>\u306a\u304a\u3001\u8cc7\u6599\u306e\u5229\u7528\u6761\u4ef6\u306f\u4ee5\u4e0b\u306b\u306a\u308a\u307e\u3059\u306e\u3067\u3001\u3054\u6ce8\u610f\u304f\u3060\u3055\u3044\u3002<\/strong><\/span><br \/>\n<span style=\"color: #ff0000;\"><strong>&#8211; \u8907\u88fd\u30fb\u8ee2\u8f09\u7b49\u3092\u5e0c\u671b\u3055\u308c\u308b\u5834\u5408\u306f\u3001CSA\u30b8\u30e3\u30d1\u30f3\u307e\u3067\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044\u3002<\/strong><\/span><br \/>\n<span style=\"color: #ff0000;\"><strong> &#8211; \u672c\u8cc7\u6599\u306b\u95a2\u3059\u308b\u4e00\u5207\u306e\u8457\u4f5c\u6a29\u306f\u3001\u7b46\u8005\u304a\u3088\u3073\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u306b\u5e30\u5c5e\u3057\u307e\u3059\u3002<br \/>\n<\/strong><\/span><\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li><a href=\"http:\/\/cloudsecurityalliance.jp\/congress2015\/kaikai_yoshida_20151118.pdf\" target=\"_blank\">\u958b\u4f1a\u6328\u62f6:\u3000\u5409\u7530\u3000\u771e\u3000\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u4f1a\u9577\u3000\u6771\u4eac\u5927\u5b66\u540d\u8a89\u6559\u6388<\/a><\/li>\n<li><a href=\"http:\/\/cloudsecurityalliance.jp\/congress2015\/kichou_takatori_201518.pdf\" target=\"_blank\">\u7279\u5225\u62db\u5f85\u8b1b\u6f14\uff1a\u3000\u300cISMS\u3092\u30d9\u30fc\u30b9\u306b\u3057\u305f\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \uff5e ISO27017\u306e\u6700\u65b0\u52d5\u5411\u300d\u3000\u9ad8\u53d6\u654f\u592b\u6c0f\u3000\u3000\u4e00\u822c\u8ca1\u56e3\u6cd5\u4eba\u65e5\u672c\u60c5\u5831\u7d4c\u6e08\u793e\u4f1a\u63a8\u9032\u5354\u4f1a(JIPDEC)\u3000\u53c2\u4e8b<\/a><\/li>\n<li><a href=\"http:\/\/cloudsecurityalliance.jp\/congress2015\/theme_1_takahashi_20151118.pdf\" target=\"_blank\">\u30c6\u30fc\u30de\u8b1b\u6f141\uff1a\u3000\u300c\u8fd1\u6642\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e8b\u4ef6\u306e\u7dcf\u5408\u7684\u8003\u5bdf\u300d\u3000\u9ad8\u6a4b\u90c1\u592b\u3000\u99d2\u6fa4\u7d9c\u5408\u6cd5\u5f8b\u4e8b\u52d9\u6240 \/ \u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u3000\u76e3\u4e8b<\/a><\/li>\n<li><a href=\"http:\/\/cloudsecurityalliance.jp\/congress2015\/kichou_1_natsume_20151118.pdf\" target=\"_blank\">\u57fa\u8abf\u8b1b\u6f141\uff1a\u3000\u300cCASB\u306e\u6982\u8981\u3001\u30af\u30e9\u30a6\u30c9\u3092\u5b89\u5168\u306b\u6d3b\u7528\u3059\u308b\u70ba\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u300d\u3000\u590f\u76ee\u9053\u751f\u6c0f\u3000\u30de\u30af\u30cb\u30ab\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u682a\u5f0f\u4f1a\u793e\u3000\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7b2c2\u4e8b\u696d\u90e8\u3000\u30d7\u30ed\u30c0\u30af\u30c8\u7b2c1\u55b6\u696d\u90e8\u3000\u90e8\u9577<\/a><\/li>\n<li>\u7279\u5225\u30c6\u30fc\u30de \u8b1b\u6f14\uff1a\u3000\u300cFIDO &#8211; \u6b21\u4e16\u4ee3\u8a8d\u8a3c\u65b9\u5f0f\u3068\u30af\u30e9\u30a6\u30c9\u300d\u3000\u4e94\u5473\u79c0\u4ec1\u6c0f\u3000\u30e4\u30d5\u30fc\u682a\u5f0f\u4f1a\u793e\u3000\u4e0a\u5e2d\u7814\u7a76\u54e1\u3000\u535a\u58eb(\u60c5\u5831\u5b66)<br \/>\n\u6ce8\uff09\u672c\u8b1b\u6f14\u8cc7\u6599\u306f\u4e00\u822c\u516c\u958b\u3044\u305f\u3057\u307e\u305b\u3093\u3002<\/li>\n<li><a href=\"http:\/\/cloudsecurityalliance.jp\/congress2015\/kichou_2_okino_20151118.pdf\" target=\"_blank\">\u57fa\u8abf\u8b1b\u6f142\uff1a\u3000\u300c\u30af\u30e9\u30a6\u30c9\u6d3b\u7528\u306e\u6c42\u3081\u3089\u308c\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528\u3068\u306f\uff01\uff01\u300d\u3000\u6c96\u91ce\u6e05\u7f8e\u6c0f\u3000JB\u30b5\u30fc\u30d3\u30b9\u682a\u5f0f\u4f1a\u793e\u3000\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e8b\u696d\u90e8\u3000\u672c\u90e8\u9577<\/a><\/li>\n<li><a href=\"http:\/\/cloudsecurityalliance.jp\/congress2015\/theme_2_morozumi_20151118.pdf\" target=\"_blank\">\u30c6\u30fc\u30de\u8b1b\u6f142\uff1a\u3000\u300cCCM \/ STAR\u306e\u6982\u8981\u3068ISO27017\u300d\u3000\u8af8\u89d2\u660c\u5b8f \u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9 CCM\/STAR WG<\/a><\/li>\n<li><a href=\"http:\/\/cloudsecurityalliance.jp\/congress2015\/kichou_3_minami_20151118_2.pdf\" target=\"_blank\">\u57fa\u8abf\u8b1b\u6f143\uff1a\u3000\u300c\u30d1\u30d6\u30ea\u30c3\u30af\u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u306e\u5b9f\u65bd\u57fa\u6e96 ISO\/IEC27018\u8a8d\u8a3c\u300d\u3000\u5357\u5b5d\u4f38\u6c0f BSI\u30b0\u30eb\u30fc\u30d7\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e ISMS\u30b0\u30ed\u30fc\u30d0\u30eb\u30b9\u30ad\u30fc\u30e0\u30de\u30cd\u30fc\u30b8\u30e3\u30fc<\/a><\/li>\n<li><a href=\"http:\/\/cloudsecurityalliance.jp\/congress2015\/theme_3_sasahara_20151118.pdf\" target=\"_blank\">\u30c6\u30fc\u30de\u8b1b\u6f143\uff1a\u3000\u300c\u6b27\u7c73\u306eIoT\/\u30d3\u30c3\u30b0\u30c7\u30fc\u30bf\u30fb\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d\u3000\u7b39\u539f\u82f1\u53f8\u3000\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u3000\u4ee3\u8868\u7406\u4e8b\uff0fIoT, BigData WG<\/a><\/li>\n<li>\u30d1\u30cd\u30eb\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\uff1a\u3000\u300c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u652f\u3048\u308b\u65b0\u6280\u8853\u306e\u53f0\u982d\u300d\n<ol>\n<li><a href=\"http:\/\/cloudsecurityalliance.jp\/congress2015\/paneru_natsume_20151118.pdf\" target=\"_blank\">\u590f\u76ee\u9053\u751f\u6c0f\u3000\u30de\u30af\u30cb\u30ab\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u682a\u5f0f\u4f1a\u793e<\/a><\/li>\n<li><a href=\"http:\/\/cloudsecurityalliance.jp\/congress2015\/panel_kudo_20151118_2.pdf\" target=\"_blank\">\u5de5\u85e4\u6e05\u4ec1\u6c0f\u3000\u30d9\u30e9\u30a4\u30be\u30f3\u30b8\u30e3\u30d1\u30f3\u5408\u540c\u4f1a\u793e<\/a><\/li>\n<li><a href=\"http:\/\/cloudsecurityalliance.jp\/congress2015\/panel_masuda_151118_2.pdf\" target=\"_blank\">\u5897\u7530\u535a\u53f2\u6c0f\u3000\u65e5\u672c\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8\u30d1\u30c3\u30ab\u30fc\u30c9\u682a\u5f0f\u4f1a\u793e<\/a><\/li>\n<li><a href=\"http:\/\/cloudsecurityalliance.jp\/congress2015\/panel_narita_20151118.pdf\" target=\"_blank\">\u6210\u7530\u6cf0\u5f66\u6c0f\u3000\u682a\u5f0f\u4f1a\u793e\u30bb\u30fc\u30eb\u30b9\u30d5\u30a9\u30fc\u30b9\u30fb\u30c9\u30c3\u30c8\u30b3\u30e0<\/a><\/li>\n<\/ol>\n<\/li>\n<li><a href=\"http:\/\/cloudsecurityalliance.jp\/congress2015\/syuuryou_morozumi_151118.pdf\" target=\"_blank\">\u9589\u4f1a\u6328\u62f6\uff1a\u3000\u8af8\u89d2\u660c\u5b8f\u3000\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u3000\u696d\u52d9\u57f7\u884c\u7406\u4e8b\uff0f\u4e8b\u52d9\u5c40\u9577<\/a><\/li>\n<\/ol>\n<p>\u4ee5\u4e0a<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>CSA Japan Congress 2015\u3000\u8b1b <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=1509\" title=\"CSA Japan Congress 2015\u3000\u8b1b\u6f14\u8cc7\u6599\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":1246,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1509","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/1509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1509"}],"version-history":[{"count":0,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/1509\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/1246"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}