Copyright © 1996-2022 JPCERT/CC All Rights Reserved.
Details
TeamT5
Leon Chang is a cyber threat analyst in the Cyber Threat Intelligence team at TeamT5, his major areas of research include APT campaign tracking, malware analysis. He has participated in information security diagnosis services for government and financial institutions and research on vulnerabilities in IoT devices in the past.
Itochu Corporation
Yusuke Niwa is a Security Analyst at ITCCERT. At Itochu, he is engaged in ensuring cyber security for the corporation and its group companies, as well as research and analysis of threat trends including email spam, APT, and cybercrime. He was also engaged in security monitoring at his previous job at a security vendor. He presented at JSAC2020 and 2021.
Kaspersky
Suguru Ishimaru joined Kaspersky as a Japanese researcher in 2008. He was responsible for collection and analysis of threat information and samples in cyberspace, including malware, spams, and phishing sites. He later joined Kaspersky Lab's Global Research and Analysis Team as a malware researcher and has been engaged in researching the latest threat trends including worldwide APT attacks.
NTT Security Japan
Ryuichi Tanabe is an SOC analyst at NTT Security Japan Corporation and mainly engaged in alert response and malware analysis in EDR. He used to work as a web programmer and changed his job to SOC engineer in 2012. Since then, he has been specializing in SOC-related work. He has spoken at VB, SAS, and CODE BLUE.
NTT Security Japan
Yuta Sawabe is an SOC analyst at NTT Security Japan Corporation and mainly engaged in log analysis and malware analysis. He used to research on malicious domain names. He was awarded the 2019 Information Processing Society of Japan JIP Special Paper Award.
Trend Micro Inc.
Hiroaki Hara is a Staff Threat Researcher at Trend Micro, engaged in malware analysis, incident response, and threat research. He is also a member of Allsafe, a technical doujin circle, and has written books including "Practical Guide to Reverse Engineering Tool Ghidra."
Recruit Co.
Yuji Ino joined Recruit Technologies in 2016. As a member of Recruit CSIRT, he leads security incident response in Recruit. In April 2021, he launched the Cybercrime Countermeasures Group, specializing in analysis and investigation of fraudulent card use and spoofed logins for the purpose of cybercrime countermeasures. CISSP, GCIH, GCTI, GNFA.
Internet Initiative Japan Inc.
Minoru Kobayashi joined IIJ in May 2014 after working for a domestic security startup and a major domestic SI subsidiary company. He has been engaging in incident response and digital forensics as well as helping his fellow employees to improve their technical capabilities. He was a lecturer at the Security Camp National Conference (2017-2019), BlackHat USA Briefings (2018), and a speaker at FIRST TC and JSAC (2018/2020).
NTT Security Japan
Rintaro Koike collects and analyses threat information and conducts malware analysis at NTT Security Japan. He is also a researcher at Team @nao_sec on Twitter. He has presented at JSAC, VB, SCS, and other conferences. A cat lover.
NTT Security Japan
Hajime Takai has been providing alert monitoring for security devices and malware analysis as a SOC analyst in NTT Security Japan. He has presented at JSAC and VB before. He likes playing Mahjong.
NTT Security Japan
Nobuyuki Amakasu has been engaging in log and malware analysis as a SOC analyst at NTT Security Japan since 2018. Before that he was a SE in charge of system development.
LAC Co., Ltd.
Ryosuke Tsuji is a JSOC security analyst at LAC Co., Ltd. He is engaged in real-time security monitoring and incident analysis as well as giving lectures at LAC Security Academy and educational institutions.
LAC Co., Ltd.
Naoaki Nishibe is a JSOC security analyst at LAC Co., Ltd. He was in charge of real-time security monitoring and incident analysis. Now he is engaged in verifying vulnerabilities, making custom signature, giving lectures at educational institutions and publishing reports on detection trends provided by JSOC. He has presented at JSAC 2019.
NTT Social Informatics Laboratories
Tomoaki Tani belongs to the Social Theory Research Project at NTT Social Information Laboratories. He is mainly engaged in research on malware analysis and vulnerability analysis technologies. He previously worked at JPCERT/CC, where he was involved in malware analysis and incident response. He has spoken at Virus Bulletin, CODEBLUE, BotConf, BsidesLV, BlackHat USA Arsenal, etc.
JPCERT/CC
Kota Kino has been in his current position since 2019, after working for a domestic IT vendor to support the implementation of email security products. He is currently engaged in analysis of various incidents in Japan, including responses to targeted attacks. He has spoken at CODE BLUE, Botconf, etc.
JPCERT/CC
Ken Sajo used to be engaged in security monitoring at a financial company, and he is currently engaged in incident response, malware analysis, and threat information analysis. Apart from his mission at JPCERT/CC, he also analyzes and shares informaton on email spams. He is also a JSAC 2020 speaker and JSAC 2021 best speaker.
SecureWorks Japan
As a member of the Counter Threat Unit, a research team at Secureworks, You Nakatsuru conducts research on the latest cyber attacks and is involved in incident response and analysis of related malware.
SecureWorks Japan
At a security vendor, Kiyotaka Tamada was engaged in device investigation, malware analysis, and forensic analysis as a part of the incident response service for companies and government agencies. He has been in his current position since July 2018, and he is engaged in malware analysis and forensic analysis, as well as collecting and analyzing threat information of cyber attacks mainly in Japan.
MACNICA, Inc.
Hajime Yanagishita is a member of the Security Research Center. After involved in software development and support, he worked to assist customers in incident response using EDR products. Currently, he is engaged in malware analysis, threat information analysis, and breach investigation services.
Cyber Defense Institute Inc.
Shota Nakajima conducts malware analysis, incident response as well as collecting and analyzing threat information at Cyber Defense Institute Inc. He has presented at JSAC, HITCON, AVAR, CPRCon, Black Hat EUROPE Arsenal and CODE BLUE BlueBox. He has also led some workshops at Security Camp and JSAC.
Trend Micro Inc.
Kohei Kawabata has been engaged in analysis of malware used in cybercrime and APT as well as vulnerability research at Trend Micro Inc. He presented at RSA Conference Asia Pacific & Japan and private conferences overseas before. He was a lecturer at the Security Camp 2021.