﻿{"id":3409,"date":"2018-03-13T22:17:13","date_gmt":"2018-03-13T13:17:13","guid":{"rendered":"http:\/\/www.cloudsecurityalliance.jp\/newsite\/?page_id=3409"},"modified":"2019-01-05T16:48:27","modified_gmt":"2019-01-05T07:48:27","slug":"csa-japan-summit-2018-%e9%96%8b%e5%82%ac%e6%a1%88%e5%86%85","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3409","title":{"rendered":"CSA Japan Summit 2018 \u958b\u50ac\u6848\u5185"},"content":{"rendered":"<div id=\"header\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3463\" src=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2019\/01\/header1.png\" alt=\"\" width=\"2159\" height=\"525\" \/><\/div>\n<div id=\"menu\">\n<ul>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3409\">\u958b\u50ac\u6982\u8981<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3466\">\u30a2\u30af\u30bb\u30b9<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2019\/01\/program_CSA_Japan_Summit2018_v11_FULL.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u8b1b\u6f14\u30d7\u30ed\u30b0\u30e9\u30e0<\/a><\/li>\n<\/ul>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3464\" src=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2019\/01\/header2.png\" alt=\"\" width=\"2065\" height=\"813\" \/><\/p>\n<h3><strong>\u6982\u8981\uff1a<\/strong><\/h3>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li>\u958b\u50ac\u65e5\u6642\uff1a\u30002018\u5e745\u670822\u65e5\uff08\u706b\uff09\u300010:00-17:40\uff08\u958b\u5834\u30009:30\uff09<\/li>\n<li>\u5834\u6240\uff1a\u3000\u3000\u3000\u6771\u4eac\u5927\u5b66\u4f0a\u85e4\u56fd\u969b\u5b66\u8853\u7814\u7a76\u30bb\u30f3\u30bf\u30fc\u3000\u4f0a\u85e4\u8b1d\u6069\u30db\u30fc\u30eb<br \/>\n\uff08<a href=\"http:\/\/www.u-tokyo.ac.jp\/ext01\/iirc\/access.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.u-tokyo.ac.jp\/ext01\/iirc\/access.html\/<\/a>\uff09<\/li>\n<li>\u53c2\u52a0\u8cbb\uff1a\u3000\u3000\u7121\u6599\uff08\u4e8b\u524d\u767b\u9332\u5236\uff09<\/li>\n<li>\u5b9a\u54e1\uff1a\u3000\u3000\u3000430\u540d<\/li>\n<li>\u8b1b\u6f14\u30d7\u30ed\u30b0\u30e9\u30e0\uff1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2019\/01\/program_CSA_Japan_Summit2018_v11_FULL.pdf\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u3092\u53c2\u7167\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/a><\/li>\n<li>\u53c2\u52a0\u7533\u8fbc\u307f\uff1a\u3000<span style=\"color: #ff0000;\"><strong><span style=\"color: #ff0000;\"><u>\u7533\u8fbc\u8005\u591a\u6570\u306e\u305f\u3081\u53d7\u4ed8\u3092\u7d42\u4e86\u3044\u305f\u3057\u307e\u3057\u305f<\/u><\/span>\u3002<\/strong><\/span><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<h3>\u4e3b\u50ac\uff1a<\/h3>\n<p style=\"text-align: left; padding-left: 60px;\">\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9(CSA\u30b8\u30e3\u30d1\u30f3)<\/p>\n<h3><strong>\u7279\u5225\u5354\u8cdb\uff1a<\/strong><\/h3>\n<p style=\"padding-left: 60px;\">Cloud Security Alliance (CSA) Global HQ and APAC HQ<\/p>\n<h3><strong>\u5f8c\u63f4<\/strong> \uff1a<\/h3>\n<p style=\"padding-left: 60px;\">\u7dcf\u52d9\u7701<br \/>\n\u72ec\u7acb\u884c\u653f\u6cd5\u4eba\u60c5\u5831\u51e6\u7406\u63a8\u9032\u6a5f\u69cb(IPA)<br \/>\n\u7279\u5b9a\u975e\u55b6\u5229\u6d3b\u52d5\u6cd5\u4ebaASP\u30fbSaaS\u30fbIoT \u30af\u30e9\u30a6\u30c9\u30b3\u30f3\u30bd\u30fc\u30b7\u30a2\u30e0(ASPIC)<br \/>\n\u7279\u5b9a\u975e\u55b6\u5229\u6d3b\u52d5\u6cd5\u4eba\u65e5\u672c\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5354\u4f1a(JNSA)<br \/>\n\u7279\u5b9a\u975e\u55b6\u5229\u6d3b\u52d5\u6cd5\u4eba\u65e5\u672c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u76e3\u67fb\u5354\u4f1a(JASA)<br \/>\n\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30b9\u30de\u30fc\u30c8\u30d5\u30a9\u30f3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5354\u4f1a(JSSEC)<br \/>\n\u4e00\u822c\u8ca1\u56e3\u6cd5\u4eba\u65e5\u672c\u60c5\u5831\u7d4c\u6e08\u793e\u4f1a\u63a8\u9032\u5354\u4f1a(JIPDEC)<br \/>\n\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u60c5\u5831\u30b5\u30fc\u30d3\u30b9\u7523\u696d\u5354\u4f1a(JISA)<br \/>\n\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u91cd\u8981\u751f\u6d3b\u6a5f\u5668\u9023\u643a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5354\u8b70\u4f1a(CCDS)<br \/>\n\u7279\u5b9a\u975e\u55b6\u5229\u6d3b\u52d5\u6cd5\u4eba\u30af\u30e9\u30a6\u30c9\u5229\u7528\u4fc3\u9032\u6a5f\u69cb(CUPA)<br \/>\n\u65e5\u672c\u30c7\u30fc\u30bf\u30bb\u30f3\u30bf\u30fc\u5354\u4f1a(JDCC)<br \/>\n\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u30bb\u30ad\u30e5\u30a2 IoT \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u5354\u8b70\u4f1a(SIOTP)<br \/>\n\u65e5\u672cCISO\u5354\u4f1a<br \/>\nOWASP Japan<br \/>\n(ISC)2<\/p>\n<h3><strong>\u5354\u8cdb<\/strong>\uff1a<\/h3>\n<p style=\"padding-left: 60px;\">\u30d5\u30a1\u30a4\u30eb\u30d5\u30a9\u30fc\u30b9\u682a\u5f0f\u4f1a\u793e\uff08\u30d7\u30e9\u30c1\u30ca\u30b9\u30dd\u30f3\u30b5\u30fc\uff09<br \/>\n\u682a\u5f0f\u4f1a\u793e\u30b7\u30de\u30f3\u30c6\u30c3\u30af\uff08\u30d7\u30e9\u30c1\u30ca\u30b9\u30dd\u30f3\u30b5\u30fc\uff09<br \/>\n\u30a2\u30c9\u30d3\u30b7\u30b9\u30c6\u30e0\u30ba\u682a\u5f0f\u4f1a\u793e\uff08\u30d7\u30e9\u30c1\u30ca\u30b9\u30dd\u30f3\u30b5\u30fc\uff09<br \/>\nSecureWorks Japan\u682a\u5f0f\u4f1a\u793e\uff08\u30b4\u30fc\u30eb\u30c9\u30b9\u30dd\u30f3\u30b5\u30fc\uff09<br \/>\nNTT\u30c6\u30af\u30ce\u30af\u30ed\u30b9\u682a\u5f0f\u4f1a\u793e\uff08\u30b4\u30fc\u30eb\u30c9\u30b9\u30dd\u30f3\u30b5\u30fc\uff09<br \/>\n\u682a\u5f0f\u4f1a\u793e\u65e5\u672c\u74b0\u5883\u8a8d\u8a3c\u6a5f\u69cb\uff08\u30b7\u30eb\u30d0\u30fc\u30b9\u30dd\u30f3\u30b5\u30fc\uff09<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3532\" src=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2019\/01\/sponsor2.png\" alt=\"\" width=\"2151\" height=\"907\" \/><\/p>\n<div><\/div>\n<p>&nbsp;<\/p>\n<p><a href=\"#header\">\u30da\u30fc\u30b8\u306e\u30c8\u30c3\u30d7\u3078\u623b\u308b<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u958b\u50ac\u6982\u8981 \u30a2\u30af\u30bb\u30b9 \u8b1b\u6f14\u30d7\u30ed\u30b0\u30e9\u30e0 \u6982\u8981\uff1a \u958b\u50ac\u65e5 <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3409\" title=\"CSA Japan Summit 2018 \u958b\u50ac\u6848\u5185\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":206,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3409","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/3409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3409"}],"version-history":[{"count":2,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/3409\/revisions"}],"predecessor-version":[{"id":4579,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/3409\/revisions\/4579"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/206"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}