﻿{"id":3610,"date":"2018-05-16T08:48:11","date_gmt":"2018-05-15T23:48:11","guid":{"rendered":"http:\/\/www.cloudsecurityalliance.jp\/newsite\/?page_id=3610"},"modified":"2025-08-01T09:35:18","modified_gmt":"2025-08-01T00:35:18","slug":"csa-japan-summit-2018-%e8%ac%9b%e6%bc%94%e8%b3%87%e6%96%99","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3610","title":{"rendered":"CSA Japan Summit 2018 \u8b1b\u6f14\u8cc7\u6599"},"content":{"rendered":"<h2>CSA Japan Summit 2018\u3000\u8b1b\u6f14\u8cc7\u6599\u306e\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u30da\u30fc\u30b8\u3067\u3059\u3002<\/h2>\n<p>\u5404\u8b1b\u6f14\u30bf\u30a4\u30c8\u30eb\u3092\u30af\u30ea\u30c3\u30af\u3057\u3066\u3044\u305f\u3060\u304d\u3001\u8cc7\u6599\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<p>\u8b1b\u6f14\u8cc7\u6599\u306f\u3001\u6e96\u5099\u3067\u304d\u6b21\u7b2c\u9806\u6b21\u30a2\u30c3\u30d7\u3057\u3066\u3044\u304d\u307e\u3059\u306e\u3067\u3001\u9069\u5b9c\u3001\u8cc7\u6599\u306e\u5f8c\u308d\u306b\u3042\u308b\u65e5\u4ed8\u3092\u78ba\u8a8d\u3057\u3066\u304f\u3060\u3055\u3044\u3002\u307e\u305f\u3001\u8cc7\u6599\u306e\u914d\u5e03\u3092\u884c\u308f\u306a\u3044\u8b1b\u6f14\u3082\u3042\u308a\u307e\u3059\u306e\u3067\u3001\u3054\u4e86\u627f\u304f\u3060\u3055\u3044\u3002<\/p>\n<p><span style=\"color: #ff0000;\"><strong>\u8cc7\u6599\u306e\u5229\u7528\u6761\u4ef6\u306f\u4ee5\u4e0b\u306b\u306a\u308a\u307e\u3059\u306e\u3067\u3001\u3054\u6ce8\u610f\u304f\u3060\u3055\u3044\u3002<\/strong><\/span><strong><br \/>\n<\/strong><span style=\"color: #ff0000;\"><strong>&#8211; \u8907\u88fd\u30fb\u8ee2\u8f09\u7b49\u3092\u5e0c\u671b\u3055\u308c\u308b\u5834\u5408\u306f\u3001CSA\u30b8\u30e3\u30d1\u30f3\u307e\u3067\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044\u3002<\/strong><\/span><br \/>\n<span style=\"color: #ff0000;\"><strong> &#8211; \u672c\u8cc7\u6599\u306b\u95a2\u3059\u308b\u4e00\u5207\u306e\u8457\u4f5c\u6a29\u306f\u3001\u7b46\u8005\u304a\u3088\u3073\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u306b\u5e30\u5c5e\u3057\u307e\u3059\u3002<\/strong><\/span><\/p>\n<ol>\n<li>\u958b\u4f1a\u6328\u62f6\uff1a\u3000\u5409\u7530\u3000\u771e\u3000\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u4f1a\u9577\u3000\u6771\u4eac\u5927\u5b66\u540d\u8a89\u6559\u6388<br \/>\n<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EavRKSu9KjxJm2uDy6hbgzUBcPgxuA8oqCuQuv5sk-CWRw?e=ez2b6M\" target=\"_blank\" rel=\"noopener\">\u8cc7\u6599\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>\u57fa\u8abf\u8b1b\u6f141\uff1a\u3000\u300c\u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba\u30b0\u30ec\u30fc\u30c9\u306e\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u69cb\u7bc9\u304b\u3089\u5b66\u3076\u3053\u3068\uff08Lessons Learned Building Enterprise-Grade Cloud Security\uff09\u300d\u3000Jim Reavis\u3000CEO, Cloud Security Alliance<br \/>\n<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/ESY0I32E44ZDo2Ypiu184dgBPAbe1WpMaZPJyYXmR5C-EQ?e=EcTPUc\" target=\"_blank\" rel=\"noopener\">\u8cc7\u6599\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>\u62db\u5f85\u8b1b\u6f141\uff1a\u3000\u300c\u30af\u30e9\u30a6\u30c9\u6642\u4ee3\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u57fa\u76e4\u306e\u8003\u3048\u65b9\u3068\u4f5c\u308a\u65b9\u300d\u3000\u6cb3\u91ce\u7701\u4e8c\u6c0f\u3000\u65e5\u672c\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u682a\u5f0f\u4f1a\u793e Chief Security Office<br \/>\n<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EfiACAqB8O9DiUd9cwjJuzwB_ZZhLcEXb5Y44_21EDczRQ?e=vnhlC7\" target=\"_blank\" rel=\"noopener\">\u8cc7\u6599\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>\u5354\u8cdb\u8b1b\u6f141\uff1a\u3000\u300cCASB\u306e\u7406\u60f3\u3068\u73fe\u5b9f\u3068\u3053\u308c\u304b\u3089\u3000\uff5e\u30a6\u30a7\u30d6\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u4e00\u4f53\u5316\u3057\u3066\u3044\u304fCASB\u300d\u3000\u9ad8\u5ca1\u9686\u4f73\u6c0f\u3000\u682a\u5f0f\u4f1a\u793e\u30b7\u30de\u30f3\u30c6\u30c3\u30af\u3000\u30a8\u30d0\u30f3\u30b8\u30a7\u30ea\u30b9\u30c8<br \/>\n<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EUUjepUJzgNIpIifeNMMhTUBdFLwNOnBGsTCQ1Fzj1Xfpw?e=OENzLF\" target=\"_blank\" rel=\"noopener\">\u8cc7\u6599\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>\u62db\u5f85\u8b1b\u6f142\uff1a\u3000\u300cSaaS\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6700\u65b0\u52d5\u5411\u3001\u56fd\u5185\u30e6\u30fc\u30b6\u306e\u5c0e\u5165\u72b6\u6cc1\u3068\u5c0e\u5165\u306b\u3042\u305f\u3063\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30dd\u30a4\u30f3\u30c8\u300d\u3000\u9ad8\u6a4b\u609f\u53f2\u6c0f \u682a\u5f0f\u4f1a\u793e\u30bb\u30fc\u30eb\u30b9\u30d5\u30a9\u30fc\u30b9\u30fb\u30c9\u30c3\u30c8\u30b3\u30e0 Security Specialist<br \/>\n<span style=\"color: #3366ff;\">\uff08\u672c\u8b1b\u6f14\u306f\u8cc7\u6599\u306e\u63d0\u4f9b\u306f\u3054\u3056\u3044\u307e\u305b\u3093\uff09<\/span><\/li>\n<li>\u5354\u8cdb\u8b1b\u6f142\uff1a\u3000\u300c\u5b9f\u52d9\u304b\u3089\u307f\u308b\u3001\u30af\u30e9\u30a6\u30c9\u30b9\u30c8\u30ec\u30fc\u30b8\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8003\u616e\u30dd\u30a4\u30f3\u30c8\u300d\u3000\u4f50\u3005\u6728\u88d5\u5b50\u6c0f\u3000\u30d5\u30a1\u30a4\u30eb\u30d5\u30a9\u30fc\u30b9\u682a\u5f0f\u4f1a\u793e\u3000\u30de\u30fc\u30b1\u30c6\u30a3\u30f3\u30b0\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u3000\u30a8\u30d0\u30f3\u30b8\u30a7\u30ea\u30b9\u30c8<br \/>\n<span style=\"color: #3366ff;\"><span style=\"color: #3366ff;\">\uff08\u672c\u8b1b\u6f14\u306f\u8cc7\u6599\u306e\u63d0\u4f9b\u306f\u3054\u3056\u3044\u307e\u305b\u3093\uff09<\/span><\/span><\/li>\n<li>\u62db\u5f85\u8b1b\u6f143\uff1a\u3000\u300c\u30b0\u30fc\u30b0\u30eb\u30af\u30e9\u30a6\u30c9\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d\u3000\u6c34\u6c5f\u4f38\u4e45\u6c0f\u3000Google Japan\u3001\u30ab\u30b9\u30bf\u30de\u30fc\u30a8\u30f3\u30b8\u30cb\u30a2<br \/>\n<span style=\"color: #3366ff;\"><span style=\"color: #3366ff;\">\uff08\u672c\u8b1b\u6f14\u306f\u8cc7\u6599\u306e\u63d0\u4f9b\u306f\u3054\u3056\u3044\u307e\u305b\u3093\uff09<\/span><\/span><\/li>\n<li>\u62db\u5f85\u8b1b\u6f144\uff1a\u3000\u300cIBM Cloud\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5b9f\u88c5\u300d\u3000\u767e\u702c\u5b5d\u4e09\u6c0f\u3000\u65e5\u672c\u30a2\u30a4\u30fb\u30d3\u30fc\u30fb\u30a8\u30e0\u682a\u5f0f\u4f1a\u793e Watson \uff06 Cloud Platform Technical Sales CISSP<br \/>\n<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EeswAJgnjcxBmhMEPqsU2XkBwzTYcHxB85B4WQU0sQRMtA?e=CcqCIb\" target=\"_blank\" rel=\"noopener\">\u8cc7\u6599\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>\u5354\u8cdb\u8b1b\u6f143\uff1a\u3000\u300cMaking Compliance Count\u300d\u3000Mr. David Lenoe\u3000 Director, Product Security, Adobe<br \/>\n<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/ET3rqPFEF9REhqD2DU7IFy0B7UjkL8ZVdILBJ5_7BPSX-w?e=bX5SLf\" target=\"_blank\" rel=\"noopener\">\u8cc7\u6599\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>\u57fa\u8abf\u8b1b\u6f142\uff1a\u3000\u300c\u300cGDPR GDPR \u3084\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30b9 \u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30b9 \u306e\u52b4\u529b \u3084\u7d99\u7d9a\u7684 \u306a\u4fdd\u8a3c\u3002 CSA \u304c\u304a \u624b\u4f1d \u3044\u3057\u307e\u3059\uff01\uff08GDPR, compliance fatigue and continuous assurance: Let CSA help you! \u300d\u3000Daniele Catteddu\u3000 Chief Technology Officer, Cloud Security Alliance<br \/>\n<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/ET-KiqeAlFJFiin5l_ROzUsBgvHgLpGCKgxEYxABW-CaNg?e=jbadfu\" target=\"_blank\" rel=\"noopener\">\u8cc7\u6599\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089\u3000<\/a><\/li>\n<li>\u62db\u5f85\u8b1b\u6f145\uff1a\u3000\u300c\u30af\u30e9\u30a6\u30c9\u306b\u3088\u308b\u30d3\u30b8\u30cd\u30b9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u5b9f\u73fe\u300d\u3000\u6850\u5c71\u96bc\u4eba\u6c0f \u30a2\u30de\u30be\u30f3 \u30a6\u30a7\u30d6 \u30b5\u30fc\u30d3\u30b9 \u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e \u30b7\u30cb\u30a2\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u30a2\u30fc\u30ad\u30c6\u30af\u30c8<br \/>\n<span style=\"color: #3366ff;\">\uff08\u672c\u8b1b\u6f14\u306f\u8cc7\u6599\u306e\u63d0\u4f9b\u306f\u3054\u3056\u3044\u307e\u305b\u3093\uff09<\/span><\/li>\n<li>\u9589\u4f1a\u6328\u62f6\uff1a\u3000\u8af8\u89d2\u660c\u5b8f\u3000\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u3000\u696d\u52d9\u57f7\u884c\u7406\u4e8b\uff0f\u4e8b\u52d9\u5c40\u9577\u3000CSA\u30ea\u30b5\u30fc\u30c1\u30d5\u30a7\u30ed\u30fc CCSP CCSK<br \/>\n<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/ERfNcgy8nrNLgWwWGkSSZ-ABp5kb0S8tUJzqX8pSqfGQbA?e=aBFtJh\" target=\"_blank\" rel=\"noopener\">\u8cc7\u6599\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089\u3000\u3000<\/a><\/li>\n<\/ol>\n<p>\u4ee5\u4e0a<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>CSA Japan Summit 2018\u3000\u8b1b\u6f14\u8cc7 <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3610\" title=\"CSA Japan Summit 2018 \u8b1b\u6f14\u8cc7\u6599\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":3409,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3610","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/3610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3610"}],"version-history":[{"count":4,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/3610\/revisions"}],"predecessor-version":[{"id":39501,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/3610\/revisions\/39501"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/3409"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}