サイバーセキュリティにおける脅威動向とJPCERT/CCの取り組み

講演概要:
IoT技術の広がりとともに、インターネットに接続されたソフトウェア製品はますます増加しており、近年においてはこれらの製品の脆弱性を突いた攻撃が初期侵入経路として利用されるケースが相次いでいる。本セッションでは、近年におけるサイバーセキュリティの脅威動向や課題について説明しながら、直近の事案対応なども含むJPCERT/CCの取り組みについて紹介する。

講演者:

Mitsutaka HORI 堀  充孝 / Mitsutaka HORI
一般社団法人JPCERTコーディネーションセンター(JPCERT/CC)
早期警戒グループ 脅威情報アナリスト

堀氏は、製造業の社内SEやベンチャー企業でのシステム開発などを経て、2017年9月、JPCERTコーディネーションセンター制御システムセキュリティ対策グループに着任。主に制御システムセキュリティに関する脅威情報や脆弱性情報などの収集・分析、情報発信業務などに従事。2024年1月から、早期警戒グループにおいて早期警戒情報や注意喚起などの情報発信業務に従事。また講演等、普及啓発活動にも取り組んでいる。

[English]
Trends in Cyber Security Threats and JPCERT/CC Approaches

Abstract:  With expanding IoT technologies, more and more software products are connected to the internet, and in recent years, attacks that exploit vulnerabilities in these products have been increasingly being used as initial pathways for intrusion. In this session, we will discuss recent cyber security threat trends and challenges, which will also introduce the efforts of JPCERT/CC, including its response to the most recent cases.

Biography:  Mr. Mitsutaka Hori was appointed to the Control System Security Response Group of the JPCERT Coordination Center in September 2017, after working as an in-house SE for a manufacturing company and system development for a venture company. Since January 2024, he has been serving as a member of the Early Warning Group, where he is responsible for delivering information such as early warning information and alerts. He is also involved in public awareness activities such as speaking engagements.

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More