IDC Cybersecurity Forum 2025, Japan
Overview
With the enactment and promulgation of the “Active Cyber Defense” Act in May 2025, corporate security measures are being called for to shift from traditional “passive” security to “active” responses. With the increasing use of digital transformation and generative AI, a “proactive” approach is now required to detect the signs of cyberattacks and respond before damage occurs. In particular, to address the increasing sophistication of attacks leveraging AI and the increasing complexity of data governance, it is essential for management and IT departments to make decisions and take action together.
At this event, IDC analysts and industry leaders will share their latest insights and case studies on the legal background of active cyber defense, the responses required of companies, risk visualization using AI, and security strategies compatible with digital transformation. We will clarify the key points that corporate IT departments need to know now and support the creation of a sustainable security system.
Event details
Date: Tuesday, November 11, 2025 [Invitation-only, lunch included]
Venue: Tokyo Conference Center, Shinagawa, 5th Floor Main Hall
Organizer: IDC Japan
Media Partner: CIO Japan
Target audience: Security departments, IT/DX decision makers, executives, corporate planning
departments, general affairs departments, business departments, etc.
Capacity: 275
Agenda
IDC Cybersecurity Forum 2025, Japan
One Day Event
Registration begins, welcome drink, exhibition tour
Opening Speech
村橋 俊介
代表取締役社長, IDC Japan 株式会社
Lecture 1: IDC Japan “Security measures in the age of AI vs. AI and strategies that companies should pursue”
Generative AI is also being used greedily by cyber attackers, and is believed to contribute to the productivity and success rate of attacks. Despite the expansion of the domestic security market and the implementation of countermeasures, damage continues to increase without any sign of stopping, and companies are expected to strengthen their operations by actively utilizing generative AI. In this presentation, we will consider the state of security measures in the age of generative AI, along with corporate strategies.
赤間 健一
Research Manager, Infrastructure & Devices, IDC Japan 株式会社
Lecture 2: MOTEX “Are you dealing with business partners okay? – METI’s evaluation system and practical measures”
Introducing tools alone is not enough. With the current situation requiring security audits from business partners and compliance with the Ministry of Economy, Trade and Industry’s “Security Measures Evaluation System,” it is also important to establish and comply with security rules. We will introduce practical measures that can be implemented immediately in preparation for the evaluation system.
津田 禎史 氏
東日本営業部 部長, エムオーテックス株式会社
Lecture 3: Arctic Wolf Japan “Operational Security in the Age of AI: The Importance of Continuous Detection and Response”
AI-based security significantly improves defense capabilities, but security does not end with the implementation of the product. Actual threats occur 24 hours a day, 365 days a year, and a rapid response after detection minimizes damage to a company. In this presentation, we will explain the importance of “operational security,” which combines improved detection accuracy using AI with a rapid response system by a specialized team, and propose a sustainable form of defense necessary for companies in the AI era.
七海 高明 氏
シニアセールスエンジニア, アークティックウルフジャパン合同会社
Networking time (drinks will be provided in the foyer), exhibition viewing
Lecture 4: Itochu Techno-Solutions “The Future of AI for Security and Current Threats Protected by Security for AI”
“AI for Security” and “Security for AI” are terms we’ve been hearing a lot lately. Regarding “AI for Security,” we will introduce an example of our efforts to utilize AI at our SOC and explain the outlook for the future of AI in the security field. Meanwhile, in response to threats that are often overlooked as AI usage rapidly advances, we will explain the most recent risks and the need for countermeasures from the perspective of “Security for AI.”
竹田 暁彦 氏
セキュリティビジネス推進部 ビジネス推進課, 伊藤忠テクノソリューションズ株式会社
Lecture 5: Macnica “New common sense for security risk countermeasures! Managing externally exposed assets with ASM and preventing internal fraud with browsers”
The top 10 information security threats can be broadly divided into countermeasures against external threats and countermeasures against internal fraud. In this session, we will introduce countermeasures against external threats using Attack Surface Management (ASM) and countermeasures against internal fraud using browsers. In the section on countermeasures against external threats, we will introduce countermeasures that enable management of externally exposed assets through visualization of externally exposed assets, including those at overseas bases, and risk assessment from an attacker’s perspective using ASM. In addition, in the section on countermeasures against internal fraud, we will introduce countermeasures that start from the browser, which can improve convenience for employees and managers without limiting the scope of implementation, including the use of AI.
榎本 将太 氏
ネットワークスカンパニーセキュリティソリューション営業統括部プロダクト第3営業部第2課, 株式会社マクニカ
前田 優太 氏
ネットワークスカンパニーセキュリティサービス事業部営業部第2課, 株式会社マクニカ
Lunch (boxed lunch will be provided), networking time (drinks will be provided in the foyer), exhibition viewing
Lecture 6: IDC Japan “The impact of increasing geopolitical risks and the need for AI security on the security services market”
Rising geopolitical risks are having a major impact on the field of cybersecurity, as evidenced by the government’s enactment of the Economic Security Promotion Act and active cyber defense initiatives. Turning to the technology side, the expansion of AI use by companies is raising new security risks, such as attacks on AI using prompt injection. This presentation will examine the impact of geopolitical risks and the expansion of AI use on the security services market.
山下 頼行
Research Manager, Network & Security, IDC Japan 株式会社
Lecture 7: F5 Networks Japan “The Accelerating Evolution and Complexity of AI Environments: What are the ‘Must-Haves’ for Networking and Security?”
The speed at which AI evolves continues to exceed our imagination. Often, a new way to utilize AI is conceived and then, a few months later, it’s already outdated. One of the essentials for reaping the benefits of AI is “speed.” Speed here doesn’t mean performance, but rather an environment where ideas can be implemented as soon as they’re conceived. Read Teaming and Guardrail monitor and protect LLM, while NaaS allows all agents to connect securely and simply. In this session, we’ll introduce an example of building such an environment and explain specific approaches, allowing you to keep up with the advances in AI and reap the benefits.
小峰 洋一 氏
AI/MSP Sales Specialist, F5ネットワークスジャパン合同会社
Lecture 8: HP Japan “Preparing for AI, Quantum, and Geopolitical Risks: New Common Sense for Endpoint Security”
The rapid spread of AI, the emergence of quantum computers, and unstable international situations are all factors that make the environment surrounding modern society difficult to predict. From a security perspective, new methods, new technologies, and new attackers are creating numerous security threats every year, and the limits of traditional detection-based defenses are beginning to become apparent. In this presentation, we will introduce next-generation endpoint security solutions to address these rapidly changing threats, including the world’s first hardware device equipped with quantum-resistant firmware and an anti-malware solution that does not rely on detection but instead utilizes in-device isolation technology.
澤田 亮太 氏
日本HPエバンジェリスト エンタープライズ営業統括 技術本部 プリセールスエンジニア部, 株式会社日本HP
Networking time (drinks will be provided in the foyer), exhibition viewing
Lecture 9: National Institute of Information and Communications Technology “Active Cyber Defense and Changing Corporate Awareness – The Meaning of ‘Active Defense’ in the AI Era”
The government has submitted a bill on active cyber defense, marking a new stage in cybersecurity. This represents a major step forward for Japan’s cyber defense and an opportunity for companies to change their mindset. The impact of this bill will extend beyond critical infrastructure operators to related companies and general businesses. The term “active defense” is originally a military term, referring to the idea of achieving defensive objectives through offensive means. This concept is also prevalent in Japanese history, as seen in the Toyotomi-Tokugawa War and the Siege of Osaka, where the idea of proactive defense was seen as luring the enemy in and then striking them down. Modern companies should not just passively defend themselves, but should instead adopt a proactive approach to corporate cyber defense. This may be the first step toward active corporate cyber defense.
伊東 寛 氏
主席研究員, 国立研究開発法人情報通信研究機構
Networking time (drinks will be provided in the foyer), exhibition viewing
Closing
村橋 俊介
Event Sessions
Tuesday, November 11 2025 9:45 am | Location:
Opening Speech
赤間 健一
Event Sessions
Tuesday, November 11 2025 9:50 am | Location:
Lecture 1: IDC Japan “Security measures in the age of AI vs. AI and strategies that companies should pursue”
Generative AI is also being used greedily by cyber attackers, and is believed to contribute to the productivity and success rate of attacks. Despite the expansion of the domestic security market and the implementation of countermeasures, damage continues to increase without any sign of stopping, and companies are expected to strengthen their operations by actively utilizing generative AI. In this presentation, we will consider the state of security measures in the age of generative AI, along with corporate strategies.
津田 禎史 氏
Event Sessions
Tuesday, November 11 2025 10:10 am | Location:
Lecture 2: MOTEX “Are you dealing with business partners okay? – METI’s evaluation system and practical measures”
Introducing tools alone is not enough. With the current situation requiring security audits from business partners and compliance with the Ministry of Economy, Trade and Industry’s “Security Measures Evaluation System,” it is also important to establish and comply with security rules. We will introduce practical measures that can be implemented immediately in preparation for the evaluation system.
七海 高明 氏
Event Sessions
Tuesday, November 11 2025 10:25 am | Location:
Lecture 3: Arctic Wolf Japan “Operational Security in the Age of AI: The Importance of Continuous Detection and Response”
AI-based security significantly improves defense capabilities, but security does not end with the implementation of the product. Actual threats occur 24 hours a day, 365 days a year, and a rapid response after detection minimizes damage to a company. In this presentation, we will explain the importance of “operational security,” which combines improved detection accuracy using AI with a rapid response system by a specialized team, and propose a sustainable form of defense necessary for companies in the AI era.
竹田 暁彦 氏
Event Sessions
Tuesday, November 11 2025 11:00 am | Location:
Lecture 4: Itochu Techno-Solutions “The Future of AI for Security and Current Threats Protected by Security for AI”
“AI for Security” and “Security for AI” are terms we’ve been hearing a lot lately. Regarding “AI for Security,” we will introduce an example of our efforts to utilize AI at our SOC and explain the outlook for the future of AI in the security field. Meanwhile, in response to threats that are often overlooked as AI usage rapidly advances, we will explain the most recent risks and the need for countermeasures from the perspective of “Security for AI.”
榎本 将太 氏
Event Sessions
Tuesday, November 11 2025 11:30 am | Location:
Lecture 5: Macnica “New common sense for security risk countermeasures! Managing externally exposed assets with ASM and preventing internal fraud with browsers”
The top 10 information security threats can be broadly divided into countermeasures against external threats and countermeasures against internal fraud. In this session, we will introduce countermeasures against external threats using Attack Surface Management (ASM) and countermeasures against internal fraud using browsers. In the section on countermeasures against external threats, we will introduce countermeasures that enable management of externally exposed assets through visualization of externally exposed assets, including those at overseas bases, and risk assessment from an attacker’s perspective using ASM. In addition, in the section on countermeasures against internal fraud, we will introduce countermeasures that start from the browser, which can improve convenience for employees and managers without limiting the scope of implementation, including the use of AI.
前田 優太 氏
Event Sessions
Tuesday, November 11 2025 11:30 am | Location:
Lecture 5: Macnica “New common sense for security risk countermeasures! Managing externally exposed assets with ASM and preventing internal fraud with browsers”
The top 10 information security threats can be broadly divided into countermeasures against external threats and countermeasures against internal fraud. In this session, we will introduce countermeasures against external threats using Attack Surface Management (ASM) and countermeasures against internal fraud using browsers. In the section on countermeasures against external threats, we will introduce countermeasures that enable management of externally exposed assets through visualization of externally exposed assets, including those at overseas bases, and risk assessment from an attacker’s perspective using ASM. In addition, in the section on countermeasures against internal fraud, we will introduce countermeasures that start from the browser, which can improve convenience for employees and managers without limiting the scope of implementation, including the use of AI.
山下 頼行
Event Sessions
Tuesday, November 11 2025 1:00 pm | Location:
Lecture 6: IDC Japan “The impact of increasing geopolitical risks and the need for AI security on the security services market”
Rising geopolitical risks are having a major impact on the field of cybersecurity, as evidenced by the government’s enactment of the Economic Security Promotion Act and active cyber defense initiatives. Turning to the technology side, the expansion of AI use by companies is raising new security risks, such as attacks on AI using prompt injection. This presentation will examine the impact of geopolitical risks and the expansion of AI use on the security services market.
小峰 洋一 氏
Event Sessions
Tuesday, November 11 2025 1:20 pm | Location:
Lecture 7: F5 Networks Japan “The Accelerating Evolution and Complexity of AI Environments: What are the ‘Must-Haves’ for Networking and Security?”
The speed at which AI evolves continues to exceed our imagination. Often, a new way to utilize AI is conceived and then, a few months later, it’s already outdated. One of the essentials for reaping the benefits of AI is “speed.” Speed here doesn’t mean performance, but rather an environment where ideas can be implemented as soon as they’re conceived. Read Teaming and Guardrail monitor and protect LLM, while NaaS allows all agents to connect securely and simply. In this session, we’ll introduce an example of building such an environment and explain specific approaches, allowing you to keep up with the advances in AI and reap the benefits.
澤田 亮太 氏
Event Sessions
Tuesday, November 11 2025 1:35 pm | Location:
Lecture 8: HP Japan “Preparing for AI, Quantum, and Geopolitical Risks: New Common Sense for Endpoint Security”
The rapid spread of AI, the emergence of quantum computers, and unstable international situations are all factors that make the environment surrounding modern society difficult to predict. From a security perspective, new methods, new technologies, and new attackers are creating numerous security threats every year, and the limits of traditional detection-based defenses are beginning to become apparent. In this presentation, we will introduce next-generation endpoint security solutions to address these rapidly changing threats, including the world’s first hardware device equipped with quantum-resistant firmware and an anti-malware solution that does not rely on detection but instead utilizes in-device isolation technology.
伊東 寛 氏
Event Sessions
Tuesday, November 11 2025 2:15 pm | Location:
Lecture 9: National Institute of Information and Communications Technology “Active Cyber Defense and Changing Corporate Awareness – The Meaning of ‘Active Defense’ in the AI Era”
The government has submitted a bill on active cyber defense, marking a new stage in cybersecurity. This represents a major step forward for Japan’s cyber defense and an opportunity for companies to change their mindset. The impact of this bill will extend beyond critical infrastructure operators to related companies and general businesses. The term “active defense” is originally a military term, referring to the idea of achieving defensive objectives through offensive means. This concept is also prevalent in Japanese history, as seen in the Toyotomi-Tokugawa War and the Siege of Osaka, where the idea of proactive defense was seen as luring the enemy in and then striking them down. Modern companies should not just passively defend themselves, but should instead adopt a proactive approach to corporate cyber defense. This may be the first step toward active corporate cyber defense.
Partners
Platinum Partner
株式会社マクニカ
Macnica is a service and solutions company that handles the latest technologies in a comprehensive manner, with semiconductors and cybersecurity at its core. “Island,” which we will introduce today, is an enterprise browser that improves productivity and security. With security at its core, the browser is positioned as a corporate workspace, creating a digital workplace that maintains and improves productivity. “Macnica ASM” is an ASM that boasts a high market share in Japan. Macnica’s unique expertise is brought together to thoroughly uncover vulnerable publicly available assets. It achieves comprehensive and highly accurate asset discovery, identifies high-risk assets, and minimizes operational burden. Please stop by our booth.
伊藤忠テクノソリューションズ株式会社
ITOCHU Techno-Solutions Corporation (CTC) is a comprehensive IT services company that serves as a partner to its customers. From consulting to design, development and construction, and operation and maintenance support, we provide solutions that combine cloud services and products based on cutting-edge technology, contributing to customers’ digital transformation (DX) and solving social issues.
Gold Partner
アークティックウルフジャパン合同会社
Arctic Wolf® acquired Cylance, a pioneer in AI-based endpoint security, to deliver simple and efficient endpoint security and the advanced security customers demand. Aurora Endpoint Security, available as a standalone solution or as a 24/7 managed EDR (M-EDR), harnesses the power of AI/ML to protect organizations from costly data breaches. Arctic Wolf also offers the Arctic Wolf Security Operations Cloud and Arctic Wolf Incident Response Services to help customers strengthen their security.
Silver Partner
エムオーテックス株式会社
LANSCOPE is a cybersecurity product and service that helps customers solve their cybersecurity challenges through endpoint IT asset management, information leak prevention, virus protection, and comprehensive diagnostics and consulting.
F5ネットワークスジャパン合同会社
F5 Networks is a multi-cloud application services and security company using AI to power a better digital world. We optimize and secure any app and API, whether it resides on-premises, in the cloud, or at the edge, to deliver exceptional, secure digital experiences to our customers and keep pace with emerging threats.
株式会社日本HP
HP Japan is a company that continues to transform itself to realize innovative technology and a sustainable society. In the security field, the company develops and researches proprietary security technologies to counter ever-evolving cyberattacks and sophisticated ransomware attacks, and has been working with industry organizations since the early 2000s to promote secure computing. In 2019, the company acquired Bromium, founded by Ian Pratt, the founder of the Xen project. By adding unique software such as HP Sure Click Enterprise, which utilizes the virtualization technology of Xen development members, the company offers detection-independent security solutions based on hardware-level defense and zero-trust design.
Bronze Partner
株式会社サイバーセキュリティクラウド
With a vision of “creating a safe and secure cyberspace for people all over the world,” we are a Japanese security manufacturer that provides vulnerability information collection and management tools and fully managed security services for cloud environments, centered on web application security services that utilize the world’s leading cyber threat intelligence. As one of the global cybersecurity companies, we will contribute to solving social issues related to cybersecurity and providing added value to society.
Venue
Tokyo Conference Center Shinagawa
5th Floor Main Hall
1-9-36 Konan, Minato-ku, Tokyo 108-0075
Area Shinagawa