﻿{"id":925,"date":"2015-06-27T07:59:23","date_gmt":"2015-06-26T22:59:23","guid":{"rendered":"http:\/\/www.cloudsecurityalliance.jp\/newsite\/?page_id=925"},"modified":"2015-06-27T07:59:23","modified_gmt":"2015-06-26T22:59:23","slug":"%e7%ac%ac13%e5%9b%9e%e5%8b%89%e5%bc%b7%e4%bc%9a%e8%b3%87%e6%96%99","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=925","title":{"rendered":"\u7b2c13\u56de\u52c9\u5f37\u4f1a\u8cc7\u6599"},"content":{"rendered":"<h2>\u7b2c13\u56de\u52c9\u5f37\u4f1a\u300cCSA Summit 2015&amp;RSA conference\u5831\u544a\u4f1a\u300d\u306e\u8cc7\u6599\u3067\u3059\u3002<\/h2>\n<p><strong><span style=\"color: #ff0000;\">\u306a\u304a\u3001\u8cc7\u6599\u306e\u5229\u7528\u6761\u4ef6\u306f\u4ee5\u4e0b\u306e\u3088\u3046\u306b\u306a\u308a\u307e\u3059\u306e\u3067\u3054\u6ce8\u610f\u304f\u3060\u3055\u3044\u3002<\/span><\/strong><\/p>\n<ul>\n<li><strong><span style=\"color: #ff0000;\">\u8907\u88fd\u30fb\u8ee2\u8f09\u7b49\u3092\u5e0c\u671b\u3055\u308c\u308b\u5834\u5408\u306f\u3001\u304a\u554f\u5408\u305b\u30da\u30fc\u30b8\u3088\u308a\u3001CSA\u30b8\u30e3\u30d1\u30f3\u307e\u3067\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044\u3002<\/span><\/strong><\/li>\n<li><strong><span style=\"color: #ff0000;\">\u672c\u8cc7\u6599\u306b\u95a2\u3059\u308b\u4e00\u5207\u306e\u8457\u4f5c\u6a29\u306f\u3001\u7b46\u8005\u304a\u3088\u3073\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u306b\u5e30\u5c5e\u3057\u307e\u3059\u3002<\/span><\/strong><\/li>\n<\/ul>\n<h2>\u8cc7\u6599<\/h2>\n<ol>\n<li><a href=\"http:\/\/www.cloudsecurityalliance.jp\/newsite\/wp-content\/uploads\/2015\/06\/CSA-Seminor-2015-06-29-SDP.pdf\" target=\"_blank\">SDP\u3000\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30fc\u30fb\u30c7\u30a3\u30d5\u30a1\u30a4\u30f3\u30c9\u30fb\u30da\u30ea\u30e1\u30fc\u30bf\u30fc (Software Defined Perimeter)<\/a><\/li>\n<li><a href=\"http:\/\/www.cloudsecurityalliance.jp\/newsite\/wp-content\/uploads\/2015\/06\/CSA-Seminor-2015-06-29-DBIR.pdf\" target=\"_blank\">\u30d9\u30e9\u30a4\u30be\u30f3\u30002015\u5e74\u5ea6 \u30c7\u30fc\u30bf\u6f0f\u6d29\/\u4fb5\u5bb3\u8abf\u67fb\u5831\u544a\u66f8<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u7b2c13\u56de\u52c9\u5f37\u4f1a\u300cCSA Summit 2015&#038;a <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=925\" title=\"\u7b2c13\u56de\u52c9\u5f37\u4f1a\u8cc7\u6599\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":444,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-925","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=925"}],"version-history":[{"count":0,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/925\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/444"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}