Copyright © 1996-2021 JPCERT/CC All Rights Reserved.
NTT Security Japan
Rintaro Koike collects and analyses threat information and conducts malware analysis at NTT Security Japan. He is also a researcher at Team @nao_sec on Twitter. He has presented at JSAC, VB, and other conferences before, and this is his fourth time speaking at JSAC.
NTT Security Japan
Changing his career from software developer to security professional, Hajime Takai monitors alerts of security devices and analyses malware as a SOC analyst. He has presented at JSAC, VB, and other conferences before.
Josh has been a member of Team Cymru’s threat intelligence team for the past 3.5 years, seeking to further the company’s mission of making the Internet a more secure and safe space. Prior to Team Cymru, he spent time working with BAE Systems, as well as 8 years in UK law enforcement.
Manabu works as an engineer in a company in Japan and also he researches some cyber threats topics, mainly focusing on OSINT, in his free time. He made presentations in several security conferences such as HITCON, JSAC, OBTS and Botconf.
Fredrik is a software engineer and entrepreneur with industry experience in DFIR, Automation, Pentesting and Open Source tool creation and collaboration. He started out in an MSSP environment, learning the secrets of the blue team, before quickly moving to a FinTech company to secure their assets from within. With this knowledge he set out on a mission to put all his knowledge to good use by building Shuffle. He's currently residing in Japan, integrating into the culture through language, travel and startups. Get in touch @frikkylikeme
JPCERT Coordination Center
Ken Sajo previously worked at a SOC in a financial company. Currently at JPCERT/CC, he is working on incident response, malware analysis and threat information analysis. He shares information and conducts analysis as @bomccss (Twitter) at a special interest group to collect and analyze email samples distributed in malspam campaigns. He also gave a talk at JSAC2020.
Cyber Defense Institute Inc.,
Shuhei Sasada is an analyst at Cyber Defense Institute Inc., engaging in forensics and incident response as well as gathering and analyzing threat information. He experienced security products installation and malware research at his previous job in a security company in Japan. He has been developing technical environment to observe malspam campaigns, analyzing and sharing information based on the data he collected.
LAC Co., Ltd.
Since 2015, Takuma Matsumoto has experienced network forensics, development of SIEM log monitoring service, log analysis, creating alerts, development of an integrated analysis system, and other projects at LAC. He is currently engaged with collection and analysis of threat information and malware analysis.
NEC Solution Innovators, Ltd.
Since 2014, Shotaro Hamamoto has experienced malware and log analysis at NEC Solution Innovators and its partner firm. He currently collects and analyses threat information and supports CSIRT operations.
Yusuke Niwa became a cyber security analyst at ITCCERT after experiencing security monitoring and analysis at a financial enterprise and a security vendor. He ensures cyber security of Itochu Corporation and its subsidiaries and affiliates. He was a speaker at JSAC 2020.
Secure Brain Corporation
Ryo Tamura experienced infrastructure engineering and CSIRT operation in his early career, and since 2018, he has been a SOC analyst at Secure Brain.
Macnica Networks Corp.
Takeshi Teshigawara has worked in sales and customer support for network products and security products for network and endpoint since he entered Macnica Networks Corp. in 2008. Since 2019, he has been conducting research on security threats including BEC and the latest security solutions at security service division , as well as providing supports and giving lectures and speeches regarding all aspects of customer security.
Macnica Networks Corp.
Kenzo Masamoto has experience with various network products, cryptographic products, WAF, IDS/IPS, etc. and is currently involved in the investigation and analysis of security incidents. He has been engaging in incident investigation and response for APT and BEC, research on trends in security technologies in foreign countries, and incident response in Macnica Networks Corp. He also works as a cyber security advisor for government agencies and a researcher at The Sasakawa Peace Foundation.
National Institute of Information and Communications Technology
Takashi Matsumoto is a member of the Analysis Team at NICT Cybersecurity Laboratory, mainly engaged in collecting and analysing malware samples as well as log analysis and forensics.
Chris Long is a Senior Security Engineer at Netflix who has been specializing in Detection Engineering for the last decade and is the creator of DetectionLab. Although he's primarily focused on detection, he is an OSCP and OSCE certification holder and does his best to stay up to date with offensive security tooling and techniques. He is passionate about enabling defensive security practitioners to build more effective and robust countermeasures to protect against well known attack vectors.
Cyber Defense Institute Inc.
Shota Nakajima conducts malware analysis, incident response as well as collecting and analyzing threat information at Cyber Defense Institute Inc. He has presented at JSAC, HITCON CMT, AVAR, CPRCon, Black Hat EUROPE Arsenal and CodeBlue BlueBox before. He is a producer of Allsafe, a technical community.
Trend Micro Inc.
Hiroaki Hara is engaged in malware analysis, incident response, threat research, and red teaming at Trend Micro Inc. He is also responsible for art direction at Allsafe.
Takahiro Haruyama is a Sr. Threat Researcher on the VMware Carbon Black Threat Analysis Unit (TAU), with over ten years of extensive experience and knowledge in malware analysis and digital forensics. He previously worked on reverse-engineering cyber espionage malware with Symantec's threat intelligence team. He has spoken at several famous conferences including Virus Bulletin, REcon, HITB, SANS DFIR Summit, BlackHat Briefings USA/Europe/Asia.
Macnica Networks Corp
Hajime Yanagishita started his career in software development and then supported incident response for customers by using EDR tools. Now he is in Security Research Center at Macnica Networks and engaged in malware analysis, threat information analysis and research of intrusion.
Charles is the chief analyst of TeamT5. He leads the analyst team in TeamT5 for threat intelligence research. He has been studying cyber-attacks and campaign tracking for more than 10 years. His research interests include vulnerability research, reverse engineering and APT attacks. He often published researches and gives training courses in security conferences.
Suguru Ishimaru has had experience in collecting and analyzing threat information and samples including malware, spam and phishing in cyberspace since he entered Kaspersky Lab Japan as a researcher in 2008. After that, he joined Global Research and Analysis Team at Kaspersky Lab as Malware Researcher and now conducts research of the latest threat trends including APT at a global level.
Motohiko Sato is ITCCERT Senior Cyber Security Researcher at ITOCHU Corporation, Associate Professor at National University Corporation Chiba University, Cybersecurity Advisor at Ministry of Education, Culture, Sports, Science and Technology (MEXT), Expert Advisor at JPCERT/CC, and Special Researcher at JASA. He is engaged in all cyber security domains of CSIRT and its practices in ITOCHU Corporation. He enjoys DNS sinkholing specifically for APT analysis.
Shui is a cyber threat Analyst working for TeamT5. Holding a master’s degree from Johns Hopkins SAIS, she has a keen eye for international affairs. She mainly works on Cyber Espionage campaign tracking and involves in the underground market research.
Leon Chang is a cyber threat analyst in the Cyber Threat Intelligence team at TeamT5, His major areas of research include APT campaign tracking, malware analysis. he has participated in information security diagnosis services for government and financial institutions and research on vulnerabilities in IoT devices in the past.
Internet Initiative Japan Inc
Takeki Kodera is engaged in creating rules for incident detection as well as collecting and analyzing threat information as a member of IIJ SOC. He is also writing periodical monitoring reports on a blog “wizSafe Security Signal.”