﻿{"id":2070,"date":"2016-05-15T15:08:25","date_gmt":"2016-05-15T06:08:25","guid":{"rendered":"http:\/\/www.cloudsecurityalliance.jp\/newsite\/?page_id=2070"},"modified":"2016-05-15T15:08:25","modified_gmt":"2016-05-15T06:08:25","slug":"csa-japan-summit-2016%e3%80%80%e8%ac%9b%e6%bc%94%e8%b3%87%e6%96%99","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=2070","title":{"rendered":"CSA Japan Summit 2016\u3000\u8b1b\u6f14\u8cc7\u6599"},"content":{"rendered":"<h2>CSA Japan\u00a0Summit 2016\u3000\u8b1b\u6f14\u8cc7\u6599\u306e\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u30da\u30fc\u30b8\u3067\u3059\u3002<\/h2>\n<p>\u5404\u8b1b\u6f14\u30bf\u30a4\u30c8\u30eb\u3092\u30af\u30ea\u30c3\u30af\u3057\u3066\u3044\u305f\u3060\u304d\u3001\u8cc7\u6599\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u304f\u3060\u3055\u3044\u3002<br \/>\n<span style=\"color: #ff0000;\"><strong>\u306a\u304a\u3001\u8cc7\u6599\u306e\u5229\u7528\u6761\u4ef6\u306f\u4ee5\u4e0b\u306b\u306a\u308a\u307e\u3059\u306e\u3067\u3001\u3054\u6ce8\u610f\u304f\u3060\u3055\u3044\u3002<\/strong><\/span><br \/>\n<span style=\"color: #ff0000;\"><strong>&#8211; \u8907\u88fd\u30fb\u8ee2\u8f09\u7b49\u3092\u5e0c\u671b\u3055\u308c\u308b\u5834\u5408\u306f\u3001CSA\u30b8\u30e3\u30d1\u30f3\u307e\u3067\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044\u3002<\/strong><\/span><br \/>\n<span style=\"color: #ff0000;\"><strong> &#8211; \u672c\u8cc7\u6599\u306b\u95a2\u3059\u308b\u4e00\u5207\u306e\u8457\u4f5c\u6a29\u306f\u3001\u7b46\u8005\u304a\u3088\u3073\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u306b\u5e30\u5c5e\u3057\u307e\u3059\u3002<\/strong><\/span><\/p>\n<ol>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/summit2016\/downloads\/CSA_Japan_Summit_2016_yoshida.pdf\" target=\"_blank\">\u958b\u4f1a\u6328\u62f6:\u3000\u5409\u7530\u3000\u771e\u3000\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u4f1a\u9577\u3000\u6771\u4eac\u5927\u5b66\u540d\u8a89\u6559\u6388<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/summit2016\/downloads\/CSA_Japan_Summit_2016_Geltinger.pdf\" target=\"_blank\">\u57fa\u8abf\u8b1b\u6f141\uff1a\u3000\u300c\u30a4\u30f3\u30c0\u30b9\u30c8\u30ea4.0\u306e\u6700\u65b0\u72b6\u6cc1\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \uff08Industrie 4.0 Today and its Security\uff09\u300d\u3000Dr. Christian Geltinger\u3000\u30d0\u30a4\u30a8\u30eb\u30f3\u5dde\u99d0\u65e5\u4ee3\u8868\u90e8\u4ee3\u8868<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/summit2016\/downloads\/CSA_Japan_Summit_2016_masuda_2.pdf\" target=\"_blank\">\u5354\u8cdb\u8b1b\u6f141\uff1a\u3000\u300cIoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ec\u30dd\u30fc\u30c8\u306b\u3088\u308b\u8ab2\u984c\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30e9\u30a4\u30d5\u30b5\u30a4\u30af\u30eb\u30a2\u30d7\u30ed\u30fc\u30c1\u300d\u3000\u5897\u7530\u535a\u53f2\u6c0f\u3000\u65e5\u672c\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8\u30fb\u30d1\u30c3\u30ab\u30fc\u30c9\u682a\u5f0f\u4f1a\u793eIT\u30a2\u30b7\u30e5\u30a2\u30e9\u30f3\u30b9\uff06\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3000\u30b8\u30e3\u30d1\u30f3\u30ab\u30f3\u30c8\u30ea\u30fc\u30ea\u30fc\u30c9\u517c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a8\u30d0\u30f3\u30b8\u30a7\u30ea\u30b9\u30c8<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/summit2016\/downloads\/CSA_Japan_Summit_2016_Reavis.pdf\" target=\"_blank\">\u62db\u5f85\u8b1b\u6f14\uff1a\u3000\u300c\u30af\u30e9\u30a6\u30c9\u306b\u63a5\u7d9a\u3059\u308bIoT\u3092\u5b89\u5168\u306b\u3059\u308bCSA\u306e\u6226\u7565\uff08Strategy for Securing IoT via the Cloud\uff09\u300d\u3000Jim Reavis CEO, Cloud Security Alliance<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/summit2016\/downloads\/CSA_Japan_Summit_2016_ito_2.pdf\" target=\"_blank\">\u7279\u5225\u62db\u5f85\u8b1b\u6f141\uff1a\u3000\u300cIoT\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u78ba\u4fdd\u306b\u5411\u3051\u3066 \uff5e\u653b\u6483\u8005\u306e\u8996\u70b9\u3068\u56fd\u3084CCDS\u306e\u53d6\u7d44\u307f\uff5e\u300d\u3000\u4f0a\u85e4\u516c\u7950\u6c0f\u3000\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u3000\u91cd\u8981\u751f\u6d3b\u6a5f\u5668\u9023\u643a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5354\u8b70\u4f1a\uff08CCDS\uff09\u4e8b\u52d9\u5c40\u9577\u3000IoT\u63a8\u9032\u30b3\u30f3\u30bd\u30fc\u30b7\u30a2\u30e0 IoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG \u30cd\u30c3\u30c8\u30ef\u30fc\u30afSWG\u59d4\u54e1<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/summit2016\/downloads\/CSA_Japan_Summit_2016_Macnica.pdf\" target=\"_blank\">\u5354\u8cdb\u8b1b\u6f142\uff1a\u3000\u300c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30af\u30e9\u30a6\u30c9\u306e\u53ef\u8996\u6027\u3092\u5b9f\u73fe\u3057\u305f\u4e8b\u4f8b\u3068\u306f\uff1f \uff5e\u5206\u6563\u3055\u308c\u305f\u4e16\u754c\u3092\u4e00\u5143\u5316\uff5e\u300d\u3000Chris Cesio, Skyhigh Networks, Inc. VP Business Development &amp; WW Channels<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/summit2016\/downloads\/CSA_Japan_Summit_2016_Borges.pdf\" target=\"_blank\">\u57fa\u8abf\u8b1b\u6f142\uff1a\u3000\u300c\u30a4\u30f3\u30c0\u30b9\u30c8\u30ea4.0\u306b\u304a\u3051\u308bIT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u305f\u3081\u306e\u6cd5\u7684\u67a0\u7d44\u307f\uff08Legal Framework for IT Security in \u201cIndustrie 4.0\u201d\uff09\u300d\u3000Prof. Dr. Georg Borges, Saarland University<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/summit2016\/downloads\/CSA_Japan_Summit_2016_bluecoat_2.pdf\" target=\"_blank\">\u5354\u8cdb\u8b1b\u6f143\uff1a\u3000\u300c\u30af\u30e9\u30a6\u30c9\u3092\u5b89\u5168\u306b\u5229\u7528\u3059\u308b\u305f\u3081\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3(CASB)\u3068\u306f\u300d\u3000\u9ad8\u5c71\u96c5\u4eba\u6c0f\u3000\u30d6\u30eb\u30fc\u30b3\u30fc\u30c8\u30b7\u30b9\u30c6\u30e0\u30ba\u5408\u540c\u4f1a\u793e\u3000\u30b7\u30cb\u30a2\u30fb\u30b7\u30b9\u30c6\u30e0\u30ba\u30fb\u30a8\u30f3\u30b8\u30cb\u30a2<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/summit2016\/downloads\/CSA_Japan_Summit_2016_tamagawa_2.pdf\" target=\"_blank\">\u7279\u5225\u62db\u5f85\u8b1b\u6f142\uff1a\u3000\u300c\u30e2\u30ce\u3068\u30af\u30e9\u30a6\u30c9\u3092\u30bb\u30ad\u30e5\u30a2\u306b\u3064\u306a\u3050\u3000IoT\u901a\u4fe1\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0SORACOM\u300d\u3000\u7389\u5ddd\u61b2\u6c0f\u3000\u682a\u5f0f\u4f1a\u793e\u30bd\u30e9\u30b3\u30e0\u3000\u4ee3\u8868\u53d6\u7de0\u5f79\u793e\u9577<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/summit2016\/downloads\/CSA_Japan_Summit_2016_Futagi.pdf\" target=\"_blank\">\u30c6\u30fc\u30de\u8b1b\u6f14\uff1a\u3000\u300cIoT\u30b7\u30b9\u30c6\u30e0\u306e\u30ea\u30b9\u30af\u3092\u8efd\u8996\u3057\u3066\u3044\u306a\u3044\u304b\uff1f \uff5eIoT\u30cf\u30c3\u30ad\u30f3\u30b0\u304c\u5229\u7528\u8005\u3084\u793e\u4f1a\u306b\u4e0e\u3048\u308b\u5f71\u97ff\u3092\u8003\u3048\u308b\uff5e\u300d\u3000\u4e8c\u6728\u771f\u660e\u3000CSA\u30b8\u30e3\u30d1\u30f3IoT\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u30fb\u30ea\u30fc\u30c0\u30fc<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/summit2016\/downloads\/CSA_Japan_Summit_2016_fujiwara.pdf\" target=\"_blank\">\u7279\u5225\u62db\u5f85\u8b1b\u6f143\uff1a\u3000\u300cIoT\u9769\u547d\u3068\u305d\u306e\u672c\u8cea\u300d\u3000\u85e4\u539f\u6d0b\u6c0f\u3000\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u5354\u4f1a IoT\u63a8\u9032\u59d4\u54e1\u4f1a\u59d4\u54e1\u9577\u3000\u682a\u5f0f\u4f1a\u793e\u30d6\u30ed\u30fc\u30c9\u30d0\u30f3\u30c9\u30bf\u30ef\u30fc\u3000\u4ee3\u8868\u53d6\u7de0\u5f79\u4f1a\u9577\u517c\u793e\u9577\u3000CEO<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/summit2016\/downloads\/CSA_Japan_Summit_2016_Morozumi.pdf\" target=\"_blank\">\u9589\u4f1a\u6328\u62f6\uff1a\u3000\u8af8\u89d2\u660c\u5b8f\u3000\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u3000\u696d\u52d9\u57f7\u884c\u7406\u4e8b\uff0f\u4e8b\u52d9\u5c40\u9577<\/a><\/li>\n<\/ol>\n<p>\u4ee5\u4e0a<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>CSA Japan\u00a0Summit 2016\u3000\u8b1b\u6f14\u8cc7 <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=2070\" title=\"CSA Japan Summit 2016\u3000\u8b1b\u6f14\u8cc7\u6599\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":1852,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2070","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/2070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2070"}],"version-history":[{"count":0,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/2070\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/1852"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}