Japan Society of Security Management (JSSM)
Department for Foreign Contacts
< NATIONAL CONVENTION >
ŸThe 24th National Convention ([Program] and [Presentation
Overview of the English Sessions] are provided below.)
[Conference at a Glance]
Date: 9:55-19:50, June 26th,
2010 Saturday
Venue:
Conference Argument:
gRisks and Security of the Network Societyh
Keynote Speech: Prof. Hideki Imai (Professor
in
Special Lecture: Mr.
Takejiro Sueyoshi (Special
Advisor for UNEP Finance Initiative)
English Sessions:
In addition to 6 sessions
scheduled, we had 1 ad hoc discussion on "
More than 20 people
attended each session and total number of the participants was Total
participants 184.
Thank you very much.
[Reception after convention]
Six Speakers
[Program]
930 - |
Reception
Desk Open (Front of |
||||
9:55 - 10:00 |
Message from Conference Chairman: Prof. Tadashi Ozone iClass
Room10301 on 3F in Building 10j |
||||
10:00 - 10:10 |
JSSM Chairmanfs Remarks: Prof. Ryoichi Sasaki (10301) |
||||
10:10 – 11:10 |
Keynote
Speech: Prof. Hideki Imai wî•ñŠÂ‹«‚Ìi“W‚ƈÆ‹Zp‚Ì¡Œãx (10301) |
||||
|
ƒZƒbƒVƒ‡ƒ“‚f Ž©—R˜_‘è |
ƒZƒbƒVƒ‡ƒ“‚d English
Session |
|||
11:20 - 11:55 |
‚f‚P i‚P‚O‚R‚O‚Qj |
‚f‚Q i‚P‚O‚R‚O‚Rj |
‚f‚R i‚P‚O‚R‚O‚Sj |
‚f‚S i‚P‚O‚R‚P‚Tj |
‚d‚P i‚P‚O‚R‚P‚Sj |
11:55 - 12:50 |
Lunchi55min.j @@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@iSHIDAX on 4F in
Build. 10ACabin on 5F Build. 9j@@ |
Board meeting (10305) |
|||
12:50 - 13:30 |
General Assembly (10301) |
||||
|
ƒZƒbƒVƒ‡ƒ“‚` ƒR[ƒ|ƒŒ[ƒgEƒKƒoƒiƒ“ƒX |
ƒZƒbƒVƒ‡ƒ“‚a æ’[‹Zp |
ƒZƒbƒVƒ‡ƒ“‚b ŠÂ‹«ƒ}ƒlƒWƒƒ“ƒg |
ƒZƒbƒVƒ‡ƒ“‚c Šë‹@ŠÇ— |
ƒZƒbƒVƒ‡ƒ“‚d English
Session |
13:40 - 14:15 |
‚`‚P i‚P‚O‚R‚O‚Qj |
‚a‚P i‚P‚O‚R‚O‚Rj |
‚b‚P i‚P‚O‚R‚O‚Sj |
‚c‚P i‚P‚O‚R‚P‚Tj |
‚d‚Q i‚P‚O‚R‚P‚Sj |
14:20 - 14:55 |
‚`‚Q i‚P‚O‚R‚O‚Qj |
‚a‚Q i‚P‚O‚R‚O‚Rj |
‚b‚Q i‚P‚O‚R‚O‚Sj |
‚c‚Q i‚P‚O‚R‚P‚Tj |
‚d‚R i‚P‚O‚R‚P‚Sj |
|
ƒZƒbƒVƒ‡ƒ“‚e ‚h‚sƒŠƒXƒN |
ƒZƒbƒVƒ‡ƒ“‚g ŒÂlî•ñ‚Ì•ÛŒì |
ƒZƒbƒVƒ‡ƒ“‚h ‚h‚s“§ |
ƒZƒbƒVƒ‡ƒ“‚i ƒZƒLƒ…ƒŠƒeƒB–@§ |
ƒZƒbƒVƒ‡ƒ“‚d English
Session |
15:50 - 15:35 |
‚e‚P i‚P‚O‚R‚O‚Qj |
‚g‚P i‚P‚O‚R‚O‚Rj |
‚h‚P i‚P‚O‚R‚O‚Sj |
‚i‚P i‚P‚O‚R‚P‚Tj |
‚d‚S i‚P‚O‚R‚P‚Sj |
15:40 - 16:15 |
‚e‚Q i‚P‚O‚R‚O‚Qj |
‚g‚Q i‚P‚O‚R‚O‚Rj |
‚h‚Q i‚P‚O‚R‚O‚Sj |
‚i‚Q i‚P‚O‚R‚P‚Tj |
‚d‚T i‚P‚O‚R‚P‚Sj |
|
ƒZƒbƒVƒ‡ƒ“‚j ŠÖ¼Žx•” |
ƒZƒbƒVƒ‡ƒ“‚f Ž©—R˜_‘è |
ƒZƒbƒVƒ‡ƒ“‚d English
Session |
||
16:20 - 16:55 |
‚j‚P i‚P‚O‚R‚O‚Qj |
‚f‚T i‚P‚O‚R‚O‚Rj |
|
|
‚d‚U i‚P‚O‚R‚P‚Sj |
17:00 – 18:00 |
Special lecture: Takejiro
Sueyoshi w‰·’g‰»‚ª‚à‚½‚ç‚·V‚µ‚¢‘Û‹£‘ˆx (10301) |
||||
18:00 - 19:50 |
Buffet PartyiCabin on 5F in Building 9j |
[ Presentation number, Name & profile of Presenters, Title & abstract of
Presentation of the English track]
E-1 |
Name |
Suchinthi Fernando |
|
Company |
|
Position |
Management and
Information Systems Science, |
|
Bio |
Suchinthi Fernando is currently a Master's student at Nagaoka University of Technology, majoring in Management
and Information Systems Engineering. |
|
Presentation
title |
Human-related
Problems in Information Security in Cross-cultural Environments, Suvashis DAS and Tatsuo ASAI |
|
Abstract |
This paper discusses the potential
problems due to cultural differences, which foreign companies may face in A survey was conducted in |
The
presenter for E-2 has been changed from Mr. Bardak to
Mr.Shinoda.
They have
worked together to conduct the research.
E-2 |
Name |
Yosh Shinoda |
|
Company |
Intelligent
Systems Lab, SECOM |
Position |
Group Leader |
|
Bio |
Yosh is currently the group leader of Service Robot
Group at SECOM Intelligent Systems Laboratory in |
|
Presentation
title |
Using Automatic
Scheduling in Facilitating Emergency Disaster Response |
|
Abstract |
This talk will
introduce the nurse scheduling problem, explaining how using a computer
system can speed up a typical scheduling scenario at a hospital where complex
preferences and attributes of the staff, needs of the hospital and rules and
regulations can make manual scheduling very time consuming and difficult. We
will then map the techniques used in building nurse schedules quickly to
scheduling of staff (rescue workers, volunteers, etc.) after a disaster. During disaster
relief efforts number and skills of available workers can vary quickly.
Effective and quick assignment of these workers and volunteers can save lives
as well as freeing up organizers from having to spend their time with just
producing schedules. |
E-2 |
Name |
Dr. Ulas Bardak |
|
Company |
Intelligent
Systems Lab, SECOM |
Position |
Research
engineer |
|
Bio |
Ulas is currently working as a researcher at SECOM
Intelligent Systems Laboratory in |
|
Presentation
title |
Using Automatic
Scheduling in Facilitating Emergency Disaster Response |
|
Abstract |
This talk will
introduce the nurse scheduling problem, explaining how using a computer
system can speed up a typical scheduling scenario at a hospital where complex
preferences and attributes of the staff, needs of the hospital and rules and
regulations can make manual scheduling very time consuming and difficult. We
will then map the techniques used in building nurse schedules quickly to
scheduling of staff (rescue workers, volunteers, etc.) after a disaster. During disaster
relief efforts number and skills of available workers can vary quickly. While
the skills and proficiencies of "official workers" (fire fighting
personnel, medics, etc.) may be known ahead of time, the same cannot be said
about the volunteers who may join the rescue efforts. A doctor who may happen
to be in the vicinity can prove to be invaluable if he or she can be
effectively assigned to a task fitting his or her specialty. Doing them
manually is a difficult task since one would have to remember where the
current shortages are, take into account the doctor's abilities and
preferences and if required, juggle assignment of others in order to open up
a position where this doctor can be most useful. These tasks are much easier
for a computer to do given the right infrastructure to operate on. Effective and quick assignment of
these workers and volunteers can save lives as well as freeing up organizers
from having to spend their time with just producing schedules.We
will finally make the case for how using such a system can help in mitigating
the effects of a disaster in a country like Japan. |
E-3 |
Name |
Dr. Sven Wohlgemuth |
|
Company |
National
Institute of |
Position |
Visiting
Researcher (Postdoctoral Scholar) |
|
Bio |
Since April
2009, Dr. Wohlgemuth is a visiting researcher
(postdoctoral scholar of the German Academic Exchange Service - DAAD) at the
National Institute of Informatics, From 2006 until
2008, Dr. Wohlgemuth has been the founding
coordinator of the working group gPrivacy in Business Processesh of the
Network of Excellence gFuture of Identity in the Information Society (FIDIS)h
funded within the 6th Framework Programme of the
European Commission. From 2001 until 2006, he has been the coordinator of the
German research priority programme gSecurity in the
Information and Communication Technologyh funded by the German Researc@Foundation@(DFG). Dr. Wohlgemuth
was a member of the ISSI 2009, SICHERHEIT 2008 and ETRICS 2006 conferences
organizing committee. In 2009, he has got the Gerd Griesser Award 2009 for the article gOn Privacy in
Medical Services with the Electronic Health Recordh. In 2003, the |
|
Presentation
title |
Privacy and the
Disclosure of Personal Data to Third Parties |
|
Abstract |
Cloud computing
will succeed the Mainframe and Client-Server computing paradigm. The main
difference of cloud computing to the previous paradigm is that individuals
and enterprises make use of services out of the cloud via a web browser and
they share the cloudfs computing power and data storage. Disclosure of the
usersf data to the software service providers of the cloud raises privacy
risks. Currently, users cannot enforce agreed-upon privacy policies. In this
article, we propose a privacy system for ex post enforcement of privacy
policies. Our proposal is to observe disclosures of personal data to third
parties by using data provenance and digital watermarking. |
E-4 |
Name |
Naoko Okawa |
|
Company |
Adjudication
Division, Secretariat, Board of Audit of |
Position |
Adjudication
Officer / IT Auditor |
|
Bio |
Naoko is
currently working as an adjudication officer and IT Auditor of Supreme Audit
Institution (SAI) of She received
her Bachelorfs degree in Law in |
|
Presentation
title |
IT Security
Management in Central Government@-from SAI-Japan Audit Report in 2006- |
|
Abstract |
This session
will introduce the Audit report on IT security of Central Government. This
report was a part of the Special Audit Report on gAudit results concerning
computers systems at ministriesh@requested by the Diet in 2006. SAI-Japan
found data security control systems were not adequate based on the audit of
IT security management, such as server room entry control, back-up data
storage check, network security control, user authorization policy, etc. in
25 ministries or agencies at that time. Nowadays, all the ministries have CIO
and a section in charge of supporting CIO, and the situation is improved.
Some update will be followed in the session. |
E-5 |
Name |
Michael Deeming |
|
Company |
Protiviti Japan Co. Ltd. |
Position |
Senior Manager |
|
Bio |
Michael Deeming
is currently a Senior Manager in the IT Audit Practice of Protiviti
Michael has
experience in leading a wide variety of system assessments, controls
evaluations and implementations, planning and executing systems testing, and
lifecycle documentation. Michael
also has experience in consulting assignments including systems development,
independent verification and validation of systems data, detailed systems process
and financial mapping, as both project manager and auditor. He received his
undergraduate B.S. Business and Economics from |
|
Presentation
title |
The Importance
of Integrating IT Audit to Promote Development of Secure Systems |
|
Abstract |
This discussion
will draw on Michael's experiences to present an overview of the importance
of IT Audit involvement during planning and development of a new system to
promote data security and integrity. He will review activities in the
following areas: E
Project management (establishing the PMO, define
the combination of organization, skills, processes, software, and technology
that aligns your current and future needs with your@business@objectives);@ E
Security risks within the project life cycle
(planning, requirements analysis, system design and development practices,
test plans and methodologies, change control and data conversion,
implementation and rollout).@ Michael will
integrate case study examples of lessons learned as well as samples of
findings that he has seen in some of his engagements.@This approach
of integrating audit with project management and development activities
intends to support more effective system development and security. Through
the application of knowledge, skills, tools, and techniques to project
activities a company can meet or exceed stakeholder expectations by balancing
demands between project scope, schedule, resources, cost, quality and desired
results. |
E-6 |
Name |
Darren
Griffiths |
|
Company |
PricewaterhouseCoopers
Aarata |
Position |
US Principal on
secodment to |
|
Bio |
Darren is a
member of the System & Process Assurance group where he leads the IT
controls testing for many of the external audits of PwCfs global clients in |
|
Presentation title
|
Key Factors in
Considering IT Security for a SOX Audit of Internal Controls |
|
Abstract |
This talk will
provide a high level discussion of how IT security is considered during the
course of a SOX audit of the internal controls of an organizationfs financial
statements. We will consider the current economic climate on ensuring an
efficient approach to scoping and testing IT security controls and how this
is tied to a risk-based approach to ensure only key controls are considered
in scope. We will also look at where we have come from and how our focus on
IT security controls has evolved over the last several years, including in
response to regulatory changes |