﻿{"id":6125,"date":"2019-05-11T13:35:21","date_gmt":"2019-05-11T04:35:21","guid":{"rendered":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=6125"},"modified":"2025-08-01T09:26:22","modified_gmt":"2025-08-01T00:26:22","slug":"csa-japan-summit-2019-%e8%ac%9b%e6%bc%94%e8%b3%87%e6%96%99","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=6125","title":{"rendered":"CSA Japan Summit 2019 \u8b1b\u6f14\u8cc7\u6599"},"content":{"rendered":"<h2>CSA Japan Summit 2019\u3000\u8b1b\u6f14\u8cc7\u6599\u306e\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u30da\u30fc\u30b8\u3067\u3059\u3002<\/h2>\n<p><span style=\"color: #ff0000;\"><strong>\u8cc7\u6599\u306e\u5229\u7528\u6761\u4ef6\u306f\u4ee5\u4e0b\u306b\u306a\u308a\u307e\u3059\u306e\u3067\u3001\u3054\u6ce8\u610f\u304f\u3060\u3055\u3044\u3002<\/strong><\/span><strong><br \/>\n<\/strong><span style=\"color: #ff0000;\"><strong>&#8211; \u8907\u88fd\u30fb\u8ee2\u8f09\u7b49\u3092\u5e0c\u671b\u3055\u308c\u308b\u5834\u5408\u306f\u3001CSA\u30b8\u30e3\u30d1\u30f3\u307e\u3067\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044\u3002<\/strong><\/span><br \/>\n<span style=\"color: #ff0000;\"><strong> &#8211; \u672c\u8cc7\u6599\u306b\u95a2\u3059\u308b\u4e00\u5207\u306e\u8457\u4f5c\u6a29\u306f\u3001\u7b46\u8005\u304a\u3088\u3073\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u306b\u5e30\u5c5e\u3057\u307e\u3059\u3002<\/strong><\/span><\/p>\n<ol>\n<li>\u958b\u4f1a\u6328\u62f6\uff1a\u3000\u5409\u7530\u3000\u771e\u3000\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u4f1a\u9577\u3000\u6771\u4eac\u5927\u5b66\u540d\u8a89\u6559\u6388<span style=\"display: inline !important; float: none; background-color: #ffffff; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">\uff082019\u5e745\u670811\u65e5\uff09<\/span><br \/>\n<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EUYm_2GgJFRJmAeB5azTFusB_E1zeekhxYnl-8L3obKHKA?e=2PtP7j\" target=\"_blank\" rel=\"noopener\">\u8cc7\u6599\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>CSA CEO\u8b1b\u6f14\uff1a\u3000\u300cThe Future of Cybersecurity will be found at the Intersection of Cloud and Blockchain\u300d\u3000Jim Reavis\u3000CEO, Cloud Security Alliance<span style=\"display: inline !important; float: none; background-color: #ffffff; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">\uff082019\u5e745\u670811\u65e5\uff09<\/span><br \/>\n<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EbIP1aj60UNIgg4-NSWA8hsBPBC5OCqUlYkQm51vpK2Ofg?e=jbg8D5\" target=\"_blank\" rel=\"noopener\">\u8cc7\u6599\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>\u62db\u5f85\u8b1b\u6f141\uff1a\u3000\u300c5G\u306e\u30ea\u30a2\u30eb\u3068\u672a\u6765\u300d\u3000\u4e2d\u6751\u6b66\u5b8f\u6c0f\u3000\u682a\u5f0f\u4f1a\u793eNTT\u30c9\u30b3\u30e2\u3000\u57f7\u884c\u5f79\u54e1\u30005G\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u63a8\u9032\u5ba4\u9577\uff082019\u5e745\u670811\u65e5\uff09<br \/>\n<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EfX6E1r0lC9NjzXIgy1I2CcBX-KgykOh4LPfXHvdvzYlDg?e=8tMfPl\" target=\"_blank\" rel=\"noopener\">\u8cc7\u6599\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>\u5354\u8cdb\u8b1b\u6f141\uff1a\u3000\u300c\u30af\u30e9\u30a6\u30c9\u6642\u4ee3\u306b\u5411\u3051\u3066\u5909\u5316\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u30fb\u904b\u7528\u300d\u3000\u30b8\u30a7\u30d5 \u30e2\u30eb\u30c4\uff08Jeff Multz\uff09\u6c0f\u3001SecureWorks Japan \u682a\u5f0f\u4f1a\u793e \u4ee3\u8868\u53d6\u7de0\u5f79\u793e\u9577 \u30b0\u30ed\u30fc\u30d0\u30eb\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30a8\u30f4\u30a1\u30f3\u30b8\u30a7\u30ea\u30b9\u30c8<br \/>\n<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EZLLVOLtWpFMp574mWidDBAB7tWU9b6gSGX1UlKx-6MMKQ?e=GgRE0M\" target=\"_blank\" rel=\"noopener\">\u8cc7\u6599\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>\u62db\u5f85\u8b1b\u6f142\uff1a\u3000\u300c\u57fa\u5e79\u30b7\u30b9\u30c6\u30e0\u3067\u306e\u30af\u30e9\u30a6\u30c9\u63a1\u7528\u306f20\uff05\u4ee5\u4e0b!?\u3000\uff5e\u5909\u308f\u3089\u306a\u3044\u73fe\u5b9f\u3092\u3069\u3046\u6349\u3048\u308b\u3079\u304d\u304b\uff5e\u300d\u3000\u7554\u4e0a\u6587\u662d\u6c0f\u3001\u9031\u520aBCN\u3000\u7de8\u96c6\u59d4\u54e1<br \/>\n<span style=\"color: #3366ff;\">\uff08\u672c\u8b1b\u6f14\u306f\u8cc7\u6599\u306e\u63d0\u4f9b\u306f\u3054\u3056\u3044\u307e\u305b\u3093\uff09<\/span><\/li>\n<li>\u5354\u8cdb\u8b1b\u6f142\uff1a\u3000\u300cCan you trust your eyes? Using a Software-Defined Perimeter to achieve Zero Trust\u300d\u3000Jason Garbis, Vice President of Products at Cyxtera,<br \/>\nCo-Chair CSA Software-Defined Perimeter Working Group\u3001<br \/>\n\u30c6\u30af\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u682a\u5f0f\u4f1a\u793e\u63d0\u4f9b<span style=\"display: inline !important; float: none; background-color: #ffffff; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">\uff082019\u5e745\u670811\u65e5\uff09<\/span><br \/>\n<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EVdTQG0e2tdGsUvLR5rzfeIBlZWv2ZULgjMfewSiS1hphA?e=LWMnxz\" target=\"_blank\" rel=\"noopener\">\u8cc7\u6599\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>\u62db\u5f85\u8b1b\u6f143\uff1a\u3000\u300c\u4eca\u5f8c\u306e\u30c7\u30fc\u30bf\u653f\u7b56\u3068\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u306e\u5b89\u5168\u6027\u8a55\u4fa1\u306b\u3064\u3044\u3066\u300d\u3000\u677e\u7530\u6d0b\u5e73\u6c0f\u3001\u7d4c\u6e08\u7523\u696d\u7701 \u5546\u52d9\u60c5\u5831\u653f\u7b56\u5c40 \u60c5\u5831\u7d4c\u6e08\u8ab2\u9577<br \/>\n<span style=\"color: #3366ff;\">\uff08\u672c\u8b1b\u6f14\u306f\u8cc7\u6599\u306e\u63d0\u4f9b\u306f\u3054\u3056\u3044\u307e\u305b\u3093\uff09<\/span><\/li>\n<li>\u5354\u8cdb\u8b1b\u6f143\uff1a\u3000\u300cUsing Automation to Help Achieve Security in a Multi-cloud Environment\u300d\u3000Dave Lenoe, Director, Secure Software Engineering at Adobe<span style=\"display: inline !important; float: none; background-color: #ffffff; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">\uff082019\u5e745\u670811\u65e5\uff09<\/span><br \/>\n<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EW6Zc_6WnsBBvP3Pe9Mt6DwBgpiVXn7AK-o12qoXMuxwcw?e=GSLKZj\" target=\"_blank\" rel=\"noopener\">\u8cc7\u6599\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>\u62db\u5f85\u8b1b\u6f144\uff1a\u3000\u300c\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u306a\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u958b\u767a\u306b\u898b\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d\u3000\u4e80\u7530\u6cbb\u4f38\u6c0f\u3001\u30a2\u30de\u30be\u30f3\u30a6\u30a7\u30d6\u30b5\u30fc\u30d3\u30b9\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e\u3000\u30a8\u30d0\u30f3\u30b8\u30a7\u30ea\u30b9\u30c8<br \/>\n<span style=\"color: #3366ff;\">\uff08\u672c\u8b1b\u6f14\u306f\u8cc7\u6599\u306e\u63d0\u4f9b\u306f\u3054\u3056\u3044\u307e\u305b\u3093\uff09<\/span><\/li>\n<li>\u9589\u4f1a\u6328\u62f6\uff1a\u3000\u8af8\u89d2\u660c\u5b8f\u3000\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u3000\u696d\u52d9\u57f7\u884c\u7406\u4e8b\uff0f\u4e8b\u52d9\u5c40\u9577\u3000CSA\u30ea\u30b5\u30fc\u30c1\u30d5\u30a7\u30ed\u30fc CCSP CCSK<span style=\"display: inline !important; float: none; background-color: #ffffff; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">\uff082019\u5e745\u670811\u65e5\uff09<\/span><br \/>\n<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EVRFY-bf4iNFpo5HKGRjwgQBpRtKHUID1EYr4BQPX5O7rA?e=qjWRMD\" target=\"_blank\" rel=\"noopener\">\u8cc7\u6599\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<\/ol>\n<p>\u4ee5\u4e0a<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>CSA Japan Summit 2019\u3000\u8b1b\u6f14\u8cc7 <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=6125\" title=\"CSA Japan Summit 2019 \u8b1b\u6f14\u8cc7\u6599\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":5029,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6125","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/6125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6125"}],"version-history":[{"count":15,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/6125\/revisions"}],"predecessor-version":[{"id":39500,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/6125\/revisions\/39500"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/5029"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}