﻿{"id":789,"date":"2015-05-13T15:23:52","date_gmt":"2015-05-13T06:23:52","guid":{"rendered":"http:\/\/www.cloudsecurityalliance.jp\/newsite\/?page_id=789"},"modified":"2015-05-13T15:23:52","modified_gmt":"2015-05-13T06:23:52","slug":"csa-japan-summit-2015-%e8%ac%9b%e6%bc%94%e8%b3%87%e6%96%99","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=789","title":{"rendered":"CSA Japan Summit 2015 \u8b1b\u6f14\u8cc7\u6599\u96c6"},"content":{"rendered":"<p>CSA Japan Summit 2015\u306e\u8b1b\u6f14\u8cc7\u6599\u3092\u4ee5\u4e0b\u306b\u516c\u958b\u3057\u307e\u3057\u305f\u306e\u3067\u3001\u3054\u5229\u7528\u304f\u3060\u3055\u3044\u3002<span style=\"color: #ff0000;\"><strong><span style=\"font-family: Courier New;\"><br \/>\n<\/span><\/strong><\/span><\/p>\n<ol>\n<li>\u4e3b\u50ac\u8005\u3054\u6328\u62f6<br \/>\n\uff08\u793e\uff09\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u4f1a\u9577\u3000\u6771\u4eac\u5927\u5b66\u540d\u8a89\u6559\u6388\u3000\u5de5\u5b66\u535a\u58eb\u3000\u5409\u7530\u771e<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/summit2015_doc\/Presntation4Attendants\/\/CSAJC_Summit2015_DL_Yoshida.pdf\" target=\"_blank\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089 <\/a><\/li>\n<li>\u65e5\u672c\u306e\u30af\u30e9\u30a6\u30c9\u8a8d\u8a3c\u57fa\u76e4\u3000\uff5eIDaaS(IDentity as a Service)\uff5e\u306b\u3064\u3044\u3066<br \/>\n\u30a8\u30af\u30b9\u30b8\u30a7\u30f3\u30fb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u682a\u5f0f\u4f1a\u793e\u3000\u4ee3\u8868\u53d6\u7de0\u5f79\u3000\u6c5f\u5ddd\u6df3\u4e00\u6c0f<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/summit2015_doc\/Presntation4Attendants\/CSAJC_Summit2015_DL_Egawa.pdf\" target=\"_blank\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>IoT\u95a2\u9023\u30b5\u30fc\u30d3\u30b9\u306e\u30ea\u30b9\u30af\u3092\u8a55\u4fa1\u3059\u308b\u3000\u3000\uff5e\u7834\u58ca\u7684\u306b\u306a\u308a\u304b\u306d\u306a\u3044\u30b5\u30fc\u30d3\u30b9\u4fb5\u5bb3\u306e\u30ea\u30b9\u30af\u3092\u8003\u3048\u308b\uff5e<br \/>\n\uff08\u793e\uff09\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u4ee3\u8868\u7406\u4e8b\u3000\u30a2\u30eb\u30c6\u30a2\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b3\u30f3\u30b5\u30eb\u30c6\u30a3\u30f3\u30b0\u4ee3\u8868\u3000\u4e8c\u6728\u771f\u660e<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/summit2015_doc\/Presntation4Attendants\/CSAJC_Summit2015_DL_Futagi.pdf\" target=\"_blank\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>Cloud Today, Cloud Tomorrow<br \/>\nJim Reavis, CEO and Co-Founder, Cloud Security Alliance<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/summit2015_doc\/Presntation4Attendants\/CSAJC_Summit2015_DL_Reavis.pdf\" target=\"_blank\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>Connected Intelligence and the 21st Century Digital Enterprise<br \/>\nLewis Carr, Senior Director, Market Research\u00a0&amp; Development, HP Software, Hewlett-Packard Company<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/summit2015_doc\/Presntation4Attendants\/HPSW CSA Todai 20MAY15-slides.pdf\" target=\"_blank\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>\u901a\u4fe1\u4e8b\u696d\u304b\u3089\u307f\u305f\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u4eca\u307e\u3067\u3068\u3053\u308c\u304b\u3089\u3000\u3000\uff5e\u201c\u901a\u4fe1\u306e\u79d8\u5bc6\u201d\u3084\u201c\u30d1\u30fc\u30bd\u30ca\u30eb\u30c7\u30fc\u30bf\u554f\u984c\u201d\u3092\u542b\u3081\u3066\uff5e<br \/>\nTelecom-ISAC\u4f1a\u9577\u3000\u3231\u3050\u308b\u306a\u3073\u4ee3\u8868\u53d6\u7de0\u5f79\u526f\u793e\u9577\u3000\u98ef\u585a\u4e45\u592b\u6c0f<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/summit2015_doc\/Presntation4Attendants\/CSAJC_Summit2015_DL_Iizuka.pdf\" target=\"_blank\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>\u30bd\u30cb\u30fc\u9280\u884c\u306e\u8003\u3048\u308b\u91d1\u878d\u6a5f\u95a2\u306e\u30af\u30e9\u30a6\u30c9\u6d3b\u7528\u65b9\u5f0f\uff08\u904b\u7528\u69cb\u7bc9\u7de8\uff09<br \/>\n\u30bd\u30cb\u30fc\u9280\u884c\u682a\u5f0f\u4f1a\u793e\u30b7\u30b9\u30c6\u30e0\u4f01\u753b\u90e8\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u3000\u57fa\u76e4\u7d71\u62ec\u62c5\u5f53\u3000\u5927\u4e45\u4fdd\u5149\u4f38\u6c0f<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/summit2015_doc\/Presntation4Attendants\/CSAJC_Summit2015_DL_Okubo.pdf\" target=\"_blank\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u306e4\u3064\u306e\u30ea\u30b9\u30af\u306b\u5bfe\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u3000\u3000\uff5e\u5b89\u5168\u306a\u30af\u30e9\u30a6\u30c9\u3092\u5b89\u5168\u306b\u6d3b\u7528\u3057\u3066\u4f01\u696d\u7af6\u4e89\u529b\u5411\u4e0a\uff5e<br \/>\n\u30de\u30af\u30cb\u30ab\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u682a\u5f0f\u4f1a\u793e\u3000\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7b2c2\u4e8b\u696d\u90e8\u30d7\u30ed\u30c0\u30af\u30c8\u7b2c1\u55b6\u696d\u90e8\u3000\u90e8\u9577\u3000\u590f\u76ee\u9053\u751f\u6c0f<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/summit2015_doc\/Presntation4Attendants\/CSAJC_Summit2015_DL_Natsume.pdf\" target=\"_blank\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30fb\u30b1\u30fc\u30b9\u30b9\u30bf\u30c7\u30a3<br \/>\n\u5411\u539f\u30fb\u5ddd\u4e0a\u7dcf\u5408\u6cd5\u5f8b\u4e8b\u52d9\u6240\u3000\u5f01\u8b77\u58eb\u3000\u5409\u4e95\u548c\u660e\u6c0f<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/summit2015_doc\/Presntation4Attendants\/CSAJC_Summit2015_DL_Yoshii.pdf\" target=\"_blank\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<li>\u9589\u4f1a\u3054\u6328\u62f6<br \/>\n\uff08\u793e\uff09\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u3000\u7406\u4e8b\u30fb\u4e8b\u52d9\u5c40\u9577\u3000\u52dd\u898b\u52c9<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/summit2015_doc\/Presntation4Attendants\/CSAJC_Summit2015_DL_Katsumi.pdf\" target=\"_blank\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089<\/a><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>CSA Japan Summit 2015\u306e\u8b1b\u6f14\u8cc7 <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=789\" title=\"CSA Japan Summit 2015 \u8b1b\u6f14\u8cc7\u6599\u96c6\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":480,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-789","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=789"}],"version-history":[{"count":0,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/789\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/480"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}