{"id":682,"date":"2021-09-21T14:49:11","date_gmt":"2021-09-21T05:49:11","guid":{"rendered":"https:\/\/ik1-131-72255.vs.sakura.ne.jp\/?page_id=682"},"modified":"2021-10-04T14:00:04","modified_gmt":"2021-10-04T05:00:04","slug":"agenda_04apr18","status":"publish","type":"page","link":"https:\/\/cydef.net\/en\/events\/cydef2018\/agenda_04apr18\/","title":{"rendered":"CYDEF 2018 Agenda 04APR18"},"content":{"rendered":"\n<h1 class=\"has-text-align-center wp-block-heading\">CYDEF 2018 Agenda 04APR18<\/h1>\n\n\n\n<figure class=\"wp-block-table is-style-table-type02\"><table><thead><tr><th>Track<\/th><th>Speakers<\/th><th>Title<\/th><\/tr><\/thead><tbody><tr><td>KNS<\/td><td>Fujii, T.<\/td><td> \u201cCybersecurity Policies for Defense Industries in Future\u201d<\/td><\/tr><tr><td>KNS<\/td><td>Liflander<\/td><td>&#8220;New Domain, Old Challenges &#8211; NATO meeting the challenge of cyberspace\u201d<\/td><\/tr><tr><td>KNS<\/td><td>Gaycken<\/td><td>\u201cStrategic Cyberdefense\u201d<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table is-style-table-type02\"><table><thead><tr><th>Track 11<\/th><th>Pollicy<\/th><th>How to build a Cyber Eco System<\/th><\/tr><\/thead><tbody><tr><td>Tr.11: L1<\/td><td>Murai<\/td><td> \u201cAdvanced roles of Cyber Security in society with AI and IoT\u201d<\/td><\/tr><tr><td>Tr.11: L2<\/td><td>Hathaway<\/td><td> \u201cBuilding Interdepartmental Working Groups and Cooperation\u201c<\/td><\/tr><tr><td>Tr.11: L3<\/td><td>Yahiro<\/td><td>\u201cDynamic Change in business innovation ecosystem\u201d<\/td><\/tr><tr><td>Tr.11: L4<\/td><td>Rohozinski<\/td><td>\u201cOpportunity in Risk\u201d<\/td><\/tr><tr><td>Tr.11: L5<\/td><td>Taniwaki<\/td><td>\u201cIoT Security Policy in Japan\u201d<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table is-style-table-type02\"><table><thead><tr><th>Track 11<\/th><th>Pollicy<\/th><th>Panel Discussion<\/th><\/tr><\/thead><tbody><tr><td>Tr.11: PM<\/td><td>Demchak<\/td><td>\u201cAvoiding Cyber Vassaldom: Cyber Operational Resilience Alliance\u201d<\/td><\/tr><tr><td>Tr.11: PP<\/td><td>Hathaway<\/td><td>No Slide<\/td><\/tr><tr><td>Tr.11: PP<\/td><td>Rohozinski<\/td><td>No Slide<\/td><\/tr><tr><td>Tr.11: PP<\/td><td>Taniwaki<\/td><td>No Slide<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table is-style-table-type02\"><table><thead><tr><th>Track 12<\/th><th>Technology<\/th><th>Building Technical Strategies and Capabilities<\/th><\/tr><\/thead><tbody><tr><td>Tr.12: L1<\/td><td>Rohozinski<\/td><td>&#8220;Cyber Tsunami: Risk Management-Effective Steps to Cyber Defense&#8221;<\/td><\/tr><tr><td>Tr.12: L2<\/td><td>Goto<\/td><td>SIP program &#8220;Cyber-Security for Critical Infrastructures&#8221;<\/td><\/tr><tr><td>Tr.12: L3<\/td><td>Gaycken<\/td><td>\u201cAdvanced Technologies for Cyberdefense\u201d<\/td><\/tr><tr><td>Tr.12: L4<\/td><td>Yasuda<\/td><td>\u201dCyber Security in IoT Era\u201d<\/td><\/tr><tr><td>Tr.12: L5<\/td><td>Aitel<\/td><td>\u201cWhich Hacking Capabilities are Useful for Cyberdefense and How to Build Them\u201d<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table is-style-table-type02\"><table><thead><tr><th>Track 12<\/th><th>Technology<\/th><th> Panel Discussion<\/th><\/tr><\/thead><tbody><tr><td>Tr.12: PM<\/td><td>Ito<\/td><td>\u201cAdvanced Cyber Defense Capability\u201d<\/td><\/tr><tr><td>Tr.12: PP<\/td><td>Yasuda<\/td><td>No Slide<\/td><\/tr><tr><td>Tr.12: PP<\/td><td>Gaycken<\/td><td>No Slide<\/td><\/tr><tr><td>Tr.12: PP<\/td><td>Aitel<\/td><td>No Slide<\/td><\/tr><\/tbody><\/table><figcaption>Abbreviations: Key Note Speech(KNS), Track(Tr.), Lecture(L), Panel discussion Moderator(PM), Panel discussion Panelist(PP), Group discussion Moderator(GM), Group discussion Discussant(GD)<\/figcaption><\/figure>\n\n\n\n<p>Note:1. Titles omitted.<br>2. Many panelists already lectured before discussion.<br>Presentations of discussants were under control of moderators.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CYDEF 2018 Agenda 04APR18 Track Speakers Title KNS Fujii, T. \u201cCybersecurity Policies for Defense Industries in Future\u201d KNS Liflander &#8220;New Domain, Old Challenges &#8211; NATO meeting the challenge of cyberspace\u201d KNS Gaycken \u201cStrategic Cyberdefense\u201d Track 11 Pollicy How to build a Cyber Eco System Tr.11: L1 Murai \u201cAdvanced roles of Cyber Security in society with &#8230;<\/p>\n","protected":false},"author":3,"featured_media":149,"parent":651,"menu_order":8,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_locale":"en_US","_original_post":"https:\/\/ik1-131-72255.vs.sakura.ne.jp\/?page_id=213","footnotes":""},"class_list":["post-682","page","type-page","status-publish","has-post-thumbnail","hentry","en-US"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/pages\/682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/comments?post=682"}],"version-history":[{"count":6,"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/pages\/682\/revisions"}],"predecessor-version":[{"id":928,"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/pages\/682\/revisions\/928"}],"up":[{"embeddable":true,"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/pages\/651"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/media\/149"}],"wp:attachment":[{"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/media?parent=682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}