﻿{"id":484,"date":"2015-04-16T11:11:16","date_gmt":"2015-04-16T02:11:16","guid":{"rendered":"http:\/\/www.cloudsecurityalliance.jp\/newsite\/?page_id=484"},"modified":"2015-04-16T11:11:16","modified_gmt":"2015-04-16T02:11:16","slug":"csa-japan-summit-2014-%e8%b3%87%e6%96%99%e9%9b%86","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=484","title":{"rendered":"CSA Japan Summit 2014"},"content":{"rendered":"<h2 class=\"dt_headLine\">CSA Japan Summit 2014<\/h2>\n<p>2014\u5e745\u670823\u65e5\u306b\u958b\u50ac\u3055\u308c\u305f CSA Japan Summit 2014 \u306e\u60c5\u5831\u3092\u30a2\u30c3\u30d7\u3057\u307e\u3059\u3002<\/p>\n<h3 class=\"dt_headLine\">\u958b\u50ac\u8981\u9818<\/h3>\n<ul>\n<li>\u958b\u50ac\u8981\u9818\u306f<a href=\"https:\/\/www.cloudsecurityalliance.jp\/newsite\/wp-content\/uploads\/2016\/02\/CSA_Japan_Summit_V1.0_20140510.pdf\" target=\"_blank\">\u3053\u3061\u3089<\/a>\u306b\u306a\u308a\u307e\u3059\u3002<\/li>\n<\/ul>\n<h3 class=\"dt_headLine\">\u8b1b\u6f14\u8cc7\u6599\u96c6<\/h3>\n<ul>\n<li>\n<div class=\"dt_headLine\">\u4e3b\u50ac\u8005\u3054\u3042\u3044\u3055\u3064<br \/>\n\u5409\u7530\u3000\u771e\u3000\u3000\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u4f1a\u9577\u3001\u6771\u4eac\u5927\u5b66\u540d\u8a89\u6559\u6388<br \/>\n<a href=\"http:\/\/www.cloudsecurityalliance.jp\/Summit%20Presentations\/Summit_Opening_Address.pdf\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/div>\n<\/li>\n<li>\n<div class=\"dt_headLine\">&#8220;Trust in the Cluod &#8211; 2014 and Beyond&#8221; &#8211; \u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u30c8\u30e9\u30b9\u30c8\uff1a2014\u5e74\u3001\u305d\u3057\u3066\u305d\u306e\u5148\u3078<br \/>\nJim Reavis, CEO, Cloud Security Alliance<br \/>\n<a href=\"http:\/\/www.cloudsecurityalliance.jp\/Summit%20Presentations\/CSA-May-Reavis-CSA-Japan-Future-of-Trust-v2.1_J3.1.pdf\" target=\"_blank\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/div>\n<\/li>\n<li>\n<div class=\"dt_headLine\">\u30af\u30e9\u30a6\u30c9\u6642\u4ee3\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\uff5e\u65b0\u3057\u3044\u30ea\u30b9\u30af\u3078\u306e\u5bfe\u5fdc<br \/>\n\u85e4\u7530\u3000\u653f\u58eb\u3000\u3000\u65e5\u672c\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8\u30fb\u30d1\u30c3\u30ab\u30fc\u30c9\u682a\u5f0f\u4f1a\u793e<br \/>\n<a href=\"http:\/\/www.cloudsecurityalliance.jp\/Summit%20Presentations\/CSA-Cloud-Security-20140523hp-P.pdf\" target=\"_blank\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/div>\n<\/li>\n<li>\n<div class=\"dt_headLine\">\u30af\u30e9\u30a6\u30c9\u3067\u62e1\u5927\u3059\u308b\u30d3\u30b8\u30cd\u30b9\uff5e\u5b89\u5168\u306b\u6d3b\u7528\u3059\u308b\u305f\u3081\u306e\u30dd\u30a4\u30f3\u30c8\uff5e<br \/>\n\u4e2d\u5ddd\u3000\u514b\u5e78\u3000\u3000\u682a\u5f0f\u4f1a\u793e\u65e5\u7acb\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u30ba<br \/>\n<a href=\"http:\/\/www.cloudsecurityalliance.jp\/Summit%20Presentations\/CSA_Japan_SummiT_Hitachi-Solutions.pdf\" target=\"_blank\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/div>\n<\/li>\n<li>\n<div class=\"dt_headLine\">Big Data\u3068\u305d\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3in the CLOUD<br \/>\n\u7b39\u539f\u3000\u82f1\u53f8\u3000\u3000\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9<br \/>\n<a href=\"http:\/\/www.cloudsecurityalliance.jp\/Summit%20Presentations\/CSA-JC%20Big%20Data%2020140523%20for%20Print.pdf\" target=\"_blank\"><span style=\"color: #0066cc;\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/span><\/a><\/div>\n<\/li>\n<li>\n<div class=\"dt_headLine\">STAR\u8a8d\u8a3c\u306e\u53d6\u5f97\u306b\u5f53\u305f\u3063\u3066\uff5e\u305d\u306e\u80cc\u666f\u3068\u4eca\u5f8c\u306e\u5c55\u671b\uff5e<br \/>\n\u85e4\u539f\u3000\u6d0b\u3000\u3000\u682a\u5f0f\u4f1a\u793e\u30d6\u30ed\u30fc\u30c9\u30d0\u30f3\u30c9\u30bf\u30ef\u30fc<br \/>\n<a href=\"http:\/\/www.cloudsecurityalliance.jp\/Summit%20Presentations\/CSA_Japan_Summit_BroadBandTower_forDL_20140523.pdf\" target=\"_blank\"><span style=\"color: #0066cc;\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/span><\/a><\/div>\n<\/li>\n<li>\n<div class=\"dt_headLine\">CCM(Cloud Control Matrix)\u306e\u5f79\u5272\u3068\u4f7f\u3044\u65b9<br \/>\n\u5c0f\u5ddd\u3000\u9686\u4e00\u3000\u3000\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/Summit%20Presentations\/CCM%20(Cloud%20Control%20Matrix)-J_140523.pdf\" target=\"_blank\"><span style=\"color: #0066cc;\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/span><\/a><\/div>\n<\/li>\n<li>\n<div class=\"dt_headLine\">\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u306e\u6b69\u307f\u3068\u4eca\u5f8c\u306e\u5c55\u671b<br \/>\n\u52dd\u898b\u3000\u52c9\u3000\u3000\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9<br \/>\n<a href=\"http:\/\/www.cloudsecurityalliance.jp\/Summit%20Presentations\/CSA_Japan_Summit_about_V0%204.pdf\" target=\"_blank\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/div>\n<\/li>\n<\/ul>\n<p class=\"dt_headLine\">\u00a0\u00a0\u00a0\u00a0 \u203b\u30c8\u30ec\u30f3\u30c9\u30de\u30a4\u30af\u30ed\u682a\u5f0f\u4f1a\u793e\u3000\u68ee\u672c\u3000\u7d14\u6c0f\u306e\u8b1b\u6f14\u8cc7\u6599\u306e\u516c\u958b\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u3054\u4e86\u89e3\u304f\u3060\u3055\u3044\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>CSA Japan Summit 2014 201 <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=484\" title=\"CSA Japan Summit 2014\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":480,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-484","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=484"}],"version-history":[{"count":0,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/484\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/480"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}