- Publication year : 2025
1~4 item / All 4 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
Before making an inquiry
Download PDF1~4 item / All 4 items

The operation of Box free accounts is often chosen due to on-site circumstances such as "specifications from clients," "urgent file sharing," and "budget or approval hurdles for paid licenses." However, such "somehow managed operations" can pose significant security risks for companies. For example, cases of unexpected troubles or compliance violations can arise from issues like leaving accounts of former employees unattended, lack of administrators, or the whereabouts of content being unknown. This seminar will explain the risks and countermeasures of operating Box free accounts, focusing on the following four points: - Reasons why Box free accounts are chosen on-site and common concerns - Structural issues of free tenants and information leakage risks that companies tend to overlook - Dangers posed by unmanageable account management, content management, and audit logs - Security enhancement through switching to paid tenants and smooth transition steps We will introduce the challenges and risks associated with the operation of Box free accounts, as well as specific methods for safe operation, in a practical manner. If you are a company representative considering measures against information leakage or a review of Box operations, please join us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The use of cloud services and the promotion of digital transformation (DX) are making IT environments increasingly complex. Along with this, managing privileged IDs not only carries risks of human error and operational oversights but also presents challenges such as increased operational burdens. Therefore, it is essential to create a system that can be managed efficiently and securely without relying on manual processes. In this seminar, we will clearly explain the key points for ensuring reliable operations while minimizing the burden of privileged ID management. Additionally, we will introduce the main features and specific usage methods of the privileged ID management tool "SecureCube Access Check," incorporating demonstrations and case studies. This seminar will provide valuable insights for those struggling with the selection and implementation of privileged ID management tools. We encourage you to participate.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The adoption of AWS in companies is progressing rapidly. However, many companies may not be able to keep up with the security measures for the ever-increasing AWS services. Security measures for corporate cloud usage are a very important issue not only for the information systems department but also from a management perspective. This time, experts from the Nomura Research Institute Group will explain security governance and measures related to the use of AWS. <Session 1> Practical Guide to Strengthening Security Controls for Public Cloud in Organizations - Learning from Cases in Finance to Manufacturing - Speaker: Hiroki Mochida, NRI Secure Technologies <Session 2> Effective Monitoring and Response Points for Security Log Monitoring in Public Cloud Speaker: Hiroyuki Ohyagi, NRI Secure Technologies <Session 3> The Role of CCoE and AWS Utilization Cases Speaker: Keita Nishiuchi, NRI Netcom <Session 4> Techniques for Accelerating In-House Development Using laC Speaker: Tetsuya Koshikawa, NRI Netcom [Target Audience] - Those responsible for managing AWS accounts - Those considering measures for AWS security governance
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In this seminar, we will explain the ideal state of a CIAM (Customer Identity and Access Management) foundation in the DX (Digital Transformation) era and the specific methods for its realization, based on case studies and trends regarding customer ID integration to form a "platform that accelerates DX." *This webinar is a re-broadcast of a seminar held on September 26, 2024 (Thursday). <Session 1> Customer ID Integration to Accelerate DX - Creating Added Value by Aligning with Customers' Lifestyles Speaker: Shigetatsu Kashiwai, Deloitte Tohmatsu Cyber LLC <Session 2> How to Smoothly Advance CIAM Implementation - Beneficial Approaches to Customer ID-Specific Challenges Speaker: Kanae Oda, NRI Secure Technologies [Target Audience] - Individuals responsible for or involved in businesses that offer digital services, e-commerce services, etc., to customers.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration