{"id":186,"date":"2024-07-16T23:46:01","date_gmt":"2024-07-16T14:46:01","guid":{"rendered":"https:\/\/cydef2024.cydef.net\/?page_id=186"},"modified":"2026-05-07T10:47:33","modified_gmt":"2026-05-07T01:47:33","slug":"program","status":"publish","type":"page","link":"https:\/\/2025.cydef.net\/en\/program\/","title":{"rendered":"Program"},"content":{"rendered":"<div class=\"program\">\n<style>\n        .program-grid {\n            border-collapse: collapse;\n            width: 100%;\n            margin-bottom: 2em;\n            font-size: 0.9em;\n        }<\/p>\n<p>        .program-grid th,\n        .program-grid td {\n            border: 1px solid #ccc !important;\n            padding: 8px;\n            vertical-align: top;\n            text-align: left;\n        }<\/p>\n<p>        .program-grid thead th {\n            background-color: #08132a;\n            color: #fff;\n            text-align: center;\n            vertical-align: middle;\n            border: 1px solid #ccc !important;\n        }<\/p>\n<p>        .program-grid tbody td {\n            background-color: #08132a;\n            color: #fff;\n            border: 1px solid #ccc !important;\n        }<\/p>\n<p>        .program-grid .program-names th {\n            font-size: 0.8em;\n            vertical-align: top;\n            text-align: left;\n            background-color: #08132a;\n            font-weight: normal;\n            line-height: 1.5;\n            border: 1px solid #ccc !important;\n        }<\/p>\n<p>        .program-grid .checkmark {\n            text-align: center;\n            vertical-align: middle;\n            border: 1px solid #ccc !important;\n        }<\/p>\n<p>        .btn {\n            display: inline-block;\n            padding: 15px 30px;\n            background-color: #7b2496;\n            color: #fff;\n            text-align: center;\n            text-decoration: none;\n            border-radius: 8px;\n            font-size: 1.2em;\n            font-weight: bold;\n            position: relative;\n            transition: background-color 0.3s ease;\n            min-width: 250px;\n        }<\/p>\n<p>        .btn:hover {\n            background-color: #9234b0;\n        }<\/p>\n<p>        .btn::after {\n            content: '\\203A';\n            font-family: Arial, sans-serif;\n            font-size: 1.5em;\n            margin-left: 10px;\n            vertical-align: middle;\n            display: inline-block;\n            transform: scale(1.2, 2.0);\n        }\n#download-btn,\n#download-btn.btn {\n    display: inline-block !important;\n    padding: 15px 30px !important;\n    background-color: #7b2496 !important;\n    color: #fff !important;\n    text-align: center !important;\n    text-decoration: none !important;\n    border-radius: 8px !important;\n    font-size: 1.2em !important;\n    font-weight: bold !important;\n    position: relative !important;\n    transition: background-color 0.3s ease !important;\n    min-width: 250px !important;\n}<\/p>\n<p>#download-btn:hover {\n    background-color: #9234b0 !important;\n}<\/p>\n<p>#download-btn::after {\n    content: '\\203A' !important;\n    font-family: Arial, sans-serif !important;\n    font-size: 1.5em !important;\n    margin-left: 10px !important;\n    vertical-align: middle !important;\n    display: inline-block !important;\n    transform: scale(1.2, 2.0) !important;\n}<\/p>\n<\/style>\n<div style=\"text-align: center; margin-top: 2.0em; margin-bottom: 4.0em;\">\n    <a id=\"download-btn\" class=\"btn\" href=\"https:\/\/2025.cydef.net\/wp-content\/uploads\/2025\/12\/CCC-CYDEF2025-\u300c\u30d5\u309c\u30ed\u30af\u309b\u30e9\u30e0\u914d\u5e03\uff08\u82f1\u8a9e\u7248\uff09\uff13\u300d-25.12.08.pdf\" target=\"_blank\" rel=\"noopener\">Program download<\/a>\n<\/div>\n<p><strong>The relationship between the registration types and the programs accessible to each category is as follows.<\/strong><\/p>\n<table class=\"program-grid\">\n<thead>\n<tr>\n<th rowspan=\"4\">Registration Types<\/th>\n<th rowspan=\"4\">Program etc.<\/th>\n<th colspan=\"3\">Admission Zone\uff08Closed Area\uff09<\/th>\n<th colspan=\"4\">Non Admission Zone\uff08Open Area\uff09<\/th>\n<th colspan=\"1\" rowspan=\"3\">On-demand (Streaming Access)<\/th>\n<\/tr>\n<tr>\n<th colspan=\"3\">Room A<\/th>\n<th colspan=\"3\">Room B<\/th>\n<th colspan=\"1\">Room C<\/th>\n<\/tr>\n<tr>\n<th>Keynote Speech<\/th>\n<th>Lunch<\/th>\n<th>Panel Discussion<\/th>\n<th>Table Top Exercise<\/th>\n<th>Poster Presentation<\/th>\n<th>Exhibition by Embassies, Government Agencies, Universities, and Companies<\/th>\n<th>Cyber \u200b\u200btechnology and cutting-edge research introductions<\/th>\n<\/tr>\n<tr class=\"program-names\">\n<th style=\"text-align: center;\">Session 1-A-1 (Japan)<br \/>\nSession 1-A-3 (Europe)<br \/>\nSession 2-A-1 (US)<br \/>\nSession 2-A-1 (Indo Pacific)<\/th>\n<th style=\"text-align: center;\">Lunch Time<\/th>\n<th style=\"text-align: center;\">Session 1-A-2 (ACD)<br \/>\nSession 1-A-4 (CIP)<br \/>\nSession 2-A-2 (SEW)<br \/>\nSession 2-A-4 (EDT)<br \/>\nSession 2-A-5 (EDU)<\/th>\n<th style=\"text-align: center;\">TTX-1<br \/>\nTTX-2<br \/>\nTTX-3<\/th>\n<th style=\"text-align: center;\">Poster Session 1<br \/>\nPoster Session 2<br \/>\nPoster Session 3<br \/>\nPoster Session 4<\/th>\n<th style=\"text-align: center;\">always<\/th>\n<th style=\"text-align: center;\">\n<div>Session 1-C-2<\/div>\n<div>Session 1-C-4<\/div>\n<div>Session 1-C-5<\/div>\n<div>\n<div>Session 2-C-2<\/div>\n<div>Session 2-C-4<\/div>\n<div>Session 2-C-5<\/div>\n<\/div>\n<\/th>\n<th style=\"text-align: center;\">Only programs held in the closed area are accessible.<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"vertical-align: middle;\" rowspan=\"2\">On-site (On-Site Venue) Registration<\/td>\n<td>Admission Zone\uff08Closed Area\uff09<\/td>\n<td class=\"checkmark\" style=\"text-align: center;\">\u2713<\/td>\n<td class=\"checkmark\" style=\"text-align: center;\">\u2713<\/td>\n<td class=\"checkmark\" style=\"text-align: center;\">\u2713<\/td>\n<td class=\"checkmark\" style=\"text-align: center;\">\u2713<\/td>\n<td class=\"checkmark\" style=\"text-align: center;\">\u2713<\/td>\n<td class=\"checkmark\" style=\"text-align: center;\">\u2713<\/td>\n<td class=\"checkmark\" style=\"text-align: center;\">\u2713<\/td>\n<td class=\"checkmark\" style=\"text-align: center;\">\u2713<\/td>\n<\/tr>\n<tr>\n<td>Non Admission Zone\uff08Open Area\uff09<\/td>\n<td class=\"checkmark\" style=\"text-align: center;\">\u2713<\/td>\n<td class=\"checkmark\"><\/td>\n<td class=\"checkmark\"><\/td>\n<td class=\"checkmark\" style=\"text-align: center;\">\u2713<\/td>\n<td class=\"checkmark\" style=\"text-align: center;\">\u2713<\/td>\n<td class=\"checkmark\" style=\"text-align: center;\">\u2713<\/td>\n<td class=\"checkmark\" style=\"text-align: center;\">\u2713<\/td>\n<td class=\"checkmark\"><\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle;\" colspan=\"2\">On-demand (Streaming Access) Registration<\/td>\n<td style=\"text-align: center;\">\u2713<\/td>\n<td class=\"checkmark\" style=\"text-align: center;\"><\/td>\n<td class=\"checkmark\" style=\"text-align: center;\">\u2713<\/td>\n<td class=\"checkmark\" style=\"text-align: center;\"><\/td>\n<td class=\"checkmark\"><\/td>\n<td class=\"checkmark\"><\/td>\n<td class=\"checkmark\"><\/td>\n<td class=\"checkmark\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>&nbsp;<\/p>\n<div class=\"program\">\n<h2 id=\"day_1\">Tuesday, December 9 Day 1<\/h2>\n<table style=\"height: 309px;\" width=\"629\">\n<tbody>\n<tr>\n<th>9:00<br class=\"sp-hide\" \/>\uff5e10:15<\/th>\n<td class=\"event\">Session 1-A-1\u3000Opening Ceremony, Greetings, and Keynote Speech<\/td>\n<td>\n<div class=\"speaker2\">\n<p>Opening Address<\/p>\n<\/div>\n<p>RAdm.(ret.) SASAKI Takahiro, Executive Committee Chair (Japan)<\/p>\n<div class=\"speaker2\">Opening Address<\/div>\n<p>Hon. MIYAZAKI Masahisa, State Minister of Defense<br \/>\nHon. MATSUMOTO Hisashi\uff0cMinister for Digital Transformation<\/p>\n<div class=\"speaker2\">Keynote Speech<\/div>\n<p><strong>Cybersecurity: Current Landscape and Future Challenges<br \/>\n(Tentative Title)<\/strong><br \/>\nMr. IIDA Yoichi (Japan): National Cyber Director<\/p>\n<p><strong>Active Public-Private Partnership<\/strong><br \/>\nMr. YOKOHAMA Shinichi (Japan): CEO, NTT Security Holdings<\/td>\n<\/tr>\n<tr>\n<th>10:35<br class=\"sp-hide\" \/>\uff5e12:05<\/th>\n<td class=\"event\">Session 1-A-2<\/td>\n<td><strong>Active Cyber Defense: \u201cActive Cyber Defense (ACD): Public-Private Cooperation and the Strategic Role of the Military\u201d<\/strong><\/p>\n<p>With Japan\u2019s formal decision to implement Active Cyber Defense (ACD), the nation\u2019s cyber response framework has entered a new phase.<br \/>\nEnsuring its effectiveness requires a well-defined division of responsibilities and a coordinated framework between the public and private sectors.<br \/>\nIn particular, the military is expected to engage from a national security perspective\u2014technologically, institutionally, and operationally.<br \/>\nThis session will explore effective models of public-private collaboration, with a focus on the role of the military in the implementation of ACD.<\/p>\n<div class=\"speaker2\">\u3010Moderator\u3011<\/div>\n<p>LTC.(res) HASHIMOTO Go (Japan):\u00a0The Organization for Cyber Defense Innovation<\/p>\n<div class=\"speaker2\">\u3010Panelists\u3011<\/div>\n<div>Mr. Jiro Minier (Germany): Deutsche Cyber-Sicherheitsorganisation<\/div>\n<div>Dr. Bernard Siman (Belgium): Egmont Royal Institute of International Relations<\/div>\n<div>Mr. David Song-Pehamberger (Austria): Hybrid COE<\/div>\n<div><span style=\"font-family: inherit; font-size: inherit;\">Ms. Inga \u017dukauskien\u0117 (Lithuania): National Cyber Security Centre of Lithuania<\/span><\/div>\n<\/td>\n<\/tr>\n<tr>\n<th>13:00<br class=\"sp-hide\" \/>\uff5e14:30<\/th>\n<td class=\"event\">Session 1-A-3<\/td>\n<td>\n<div class=\"speaker2\">Keynote Speech<\/div>\n<p><strong>The Transformation Vector: A Driver for Crisis Management Evolution<\/strong><br \/>\nCol Kostadin Lazarov (Bulgaria):\u00a0 NATO Crisis Management &amp; Disaster Response COE<\/p>\n<p><strong>Cybersecurity Department<\/strong><br \/>\nMr. Pawel Dziuba (Poland):\u00a0 Cybersecurity Department, Ministry of National Defence of the Republic of Poland<\/p>\n<p><strong>Countering the threat from state actors through Active Cyber Defense<\/strong><br \/>\nMr. Conrad Prince (UK): Former Cyber Security Ambassador, BAE Systems Senior Adviser<\/td>\n<\/tr>\n<tr>\n<th>15:00<br class=\"sp-hide\" \/>\uff5e16:30<\/th>\n<td class=\"event\">Session 1-A-4<\/td>\n<td><strong>Critical Infrastructure Protection: \u201dEnsuring the Protection and Resilience of Critical Infrastructure\u201d<\/strong><\/p>\n<p>Critical infrastructure spans a variety of sectors, including information and communications, finance, transportation, and energy. Organizations operating within these sectors often face a difficult dilemma: even when there is a suspected malware-related incident, the potential impact of shutting down systems is so significant that immediate investigation and response may not be feasible.<br \/>\nFurthermore, when the domestic supply chain is insufficient to meet all needs, there is often no choice but to rely on foreign-made products in critical infrastructure, introducing additional security risks.<br \/>\nThis session will explore how we should approach the protection of critical infrastructure and what measures are essential to ensure its resilience and security.<\/p>\n<div class=\"speaker2\">\u3010Moderator\u3011<\/div>\n<p>Ms. Nathalie Gratzer (Switzerland): CCDCOE<\/p>\n<div class=\"speaker2\">\u3010Panelists\u3011<\/div>\n<div>Dr. Csaba Krasznay (Hungary):\u00a0Ludovika University of Public Service<\/div>\n<div>Dr. Krzysztof \u0141ysek (Poland):\u00a0Military Communication Institute<\/div>\n<div>Ms. Marlen Rein (Estonia): NATO Energy Security COE<\/div>\n<div>Mr. Christopher Michael Spirito (USA):\u00a0Department of Energy, Idaho National Laboratory<\/div>\n<\/td>\n<\/tr>\n<tr>\n<th>17:00<br class=\"sp-hide\" \/>\uff5e18:30<\/th>\n<td class=\"event\">Session 1-A-5<\/td>\n<td><strong>Cognitive Warfare: \u201cDefense in Narratives\u201d<\/strong><\/p>\n<p>The role of narratives in security has grown rapidly in recent years. This shift stems from changes in the information environment and the ways people interact with and interpret information. Narratives are difficult to separate from political and cultural contexts; however, when addressed as a cyber-related issue, it is essential to first examine the technical and engineering aspects involved.<br \/>\nThis session will explore practical approaches to safeguarding the security value of narratives, particularly in relation to political and cultural activities.<\/p>\n<div class=\"speaker2\">\u3010Moderator\u3011<\/div>\n<p>Dr. FUJII Akihiro (Japan): Chair of the Organization for Cyber Defense Innovation<\/p>\n<div class=\"speaker2\">\u3010Panelists\u3011<\/div>\n<div>Dr. Gundars Bergmanis-Kor\u0101ts (Latvia): NATO StratCom COE<\/div>\n<div>Dr.\/LTC Jason Brown (USA):\u00a0Army Cyber Institute<\/div>\n<div>Dr. Didier Danet (France):\u00a0GEODE Center, Paris 8 University<\/div>\n<div>Dr. Yisuo Tzeng (Taiwan):\u00a0Institute for National Defense and Security Research<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"program\">\n<h2 id=\"day_2\">Wednesday, December 10 (Day 2)<\/h2>\n<table style=\"height: 309px;\" width=\"629\">\n<tbody>\n<tr>\n<th>9:00<br class=\"sp-hide\" \/>\uff5e10:05<\/th>\n<td class=\"event\">Session 2-A-1\u3000Opening Ceremony, and Keynote Speech<\/td>\n<td>\n<div class=\"speaker2\">\n<p>Opening Address<\/p>\n<\/div>\n<p>RAdm.(ret.) SASAKI Takahiro, Executive Committee Chair (Japan)<\/p>\n<div class=\"speaker2\">Keynote Speech<\/div>\n<p><strong>New Priorities for Cybersecurity and Effective National Defense<\/strong><br \/>\nDr. James Lewis (US): Senior Advisor, CSIS<\/p>\n<p><strong>Does \u201cit\u201d matter? When? Context of national security<\/strong><br \/>\nMr. CHIDA Nobuya (Japan): Google Cloud Japan G.K.<\/td>\n<\/tr>\n<tr>\n<th>10:25<br class=\"sp-hide\" \/>\uff5e11:55<\/th>\n<td class=\"event\">Session 2-A-2<\/td>\n<td><strong>Space &amp; Electromagnetic Warfare; \u201cReimagining Space as the Next Theater of Operations\u201d<\/strong><\/p>\n<p>In recent years, the importance of security in the space domain has been increasingly recognized. Many systems that support critical infrastructure rely on signals from Global Navigation Satellite Systems (GNSS), which are vulnerable to threats from adversarial &#8220;killer satellites.&#8221; Additionally, long-range drones used in conflicts such as the war in Ukraine have relied on GNSS-based navigation, and there have been cases where spoofed GNSS signals have disrupted the operation of civilian aircraft.<br \/>\nFurthermore, some foreign governments are preparing to use commercial communication satellites as backups in the event of submarine cable outages during emergencies. However, the use of such privately owned satellites raises concerns for national security\u2014particularly when access can be influenced by the decisions of a single major shareholder.<br \/>\nIn the earth observation industry, Russia claimed that the use of commercial satellites by combatant nations constitutes indirect participation in military conflicts. Dual-use or &#8220;quasi-civilian&#8221; infrastructure could be a legitimate target for retaliation.<br \/>\nAs the security of space and the electromagnetic spectrum becomes an increasingly critical issue, this session will explore what measures are needed and how best to approach security in these emerging domains.<\/p>\n<div class=\"speaker2\">\u3010Moderator\u3011<\/div>\n<p>Dr. Nanae Baldauff (Japan): NATO Defense College<\/p>\n<div class=\"speaker2\">\u3010Panelists\u3011<\/div>\n<p>Mr. Stuart Frizell (UK): BAE Systems Digital Intelligence<br \/>\nCOL. ISHII Hiroyuki (Japan):\u00a0Commander, Space Operations Group, Japan Air Self Defense Force<br \/>\nCDR.Lahmaidi Karim (France): Ambassade de France au Japon<\/td>\n<\/tr>\n<tr>\n<th>13:00<br class=\"sp-hide\" \/>\uff5e14:30<\/th>\n<td class=\"event\">Session 2-A-3<\/td>\n<td>\n<div class=\"speaker2\">Keynote Speech<\/div>\n<p><strong>The Current State and Challenges of Cyber Defense (Working Title)<\/strong><br \/>\nAVM. Amorn Chomchoey Thai (Thailand): Secretary General National Cyber Security Agency <\/p>\n<p><strong>Beyond Compliance: Taiwan\u2018sAttempt to turn CMMC Adoption into Strategic Supply Chain Resilience<\/strong><br \/>\nDr. Hsi-ju Huang (Taiwan): Institute for National Defense and Security Research<\/p>\n<p><strong>R&#038;D on Cyber Resilience for Critical Infrastructure Systems<\/strong><br \/>\nDr. KAWAGUCHI Nobutaka (Japan): Hitachi Co.ltd.\n<\/td>\n<\/tr>\n<tr>\n<th>15:00<br class=\"sp-hide\" \/>\uff5e16:30<\/th>\n<td class=\"event\">Session 2-A-4<\/td>\n<td><strong>Emerging Disruptive Technology: \u201cCybersecurity in the Quantum Era\u201d<\/strong><\/p>\n<p>The risk of quantum computers breaking encryption will not wait 20 years for the practical quantum computers. The potential for harvest attacks to emerge as a genuine threat is a pressing concern that demands urgent attention. Post Quantum Cryptography (PQC) has been intensively studied for years, but there remain challenges to be addressed. Quantum key distribution networks (QKDN), including satellite quantum communication, will offer a solution for secure global-scale information infrastructure. The social deployment of QKDN allows us to simultaneously guarantee long-term security and low-latency communication.\u00a0 Coexistence of QKDN and PQC will facilitate the development of systems that leverage the strengths of both technologies. This session will discuss practical approaches to building a secure information infrastructure for the quantum era that integrates QKDN and PQC.<\/p>\n<div class=\"speaker2\">\u3010Moderator\u3011<\/div>\n<p>Dr. TOMITA Akihisa (Japan): Quantum ICT Collaboration Center, National Institute of Information and Communications Technology (NICT)<\/p>\n<div class=\"speaker2\">\u3010Panelists\u3011<\/div>\n<div>Dr. Manuel Erhard (Austria): Quantum Technology Laboratories<\/div>\n<div><span class=\"speakers_prefix\">Dr.\u00a0<\/span>KIM Jaewan (South Korea): Korea Research Institute of Standards and Science<\/div>\n<div>Mr. HANAI Katsuyuki (Japan): Toshiba Digital Solutions Corp.<\/div>\n<div>Dr. SASAKI Toshihiko (Japan): Quantinuum K.K.<\/div>\n<div><\/div>\n<\/td>\n<\/tr>\n<tr>\n<th>17:00<br class=\"sp-hide\" \/>\uff5e18:30<\/th>\n<td class=\"event\">Session 2-A-5<\/td>\n<td><strong>Education: \u201cCyber Education Through the Lens of National Security\u201d<\/strong><\/p>\n<p>Cyber threats encompass not only technical attacks but also cognitive and psychological manipulation.<br \/>\nIn particular, influence operations conducted via social media by authoritarian regimes pose a serious challenge to the foundations of democratic societies.<br \/>\nThis session explores how cyber education can contribute to safeguarding citizens against such threats through targeted educational initiatives and strategic awareness programs.<\/p>\n<div class=\"speaker2\">\u3010Moderator\u3011<\/div>\n<p>Dr. KUWANA Eiji (Japan): President, Institute for Information Security<\/p>\n<div class=\"speaker2\">\u3010Panelists\u3011<\/div>\n<div>Mr. Eugenio Benincasa (Italy):\u00a0Center for Security Studies at ETH Zurich<\/div>\n<div>Commanadant Robert Gallagher (Ireland): NATO CCDCOE<\/div>\n<div>Navy Captain (OF5) Vasco Prates (Portugal): Director, Portuguese Cyberdefence School<\/div>\n<\/td>\n<\/tr>\n<tr>\n<th>18:30<br class=\"sp-hide\" \/>\uff5e<\/th>\n<td class=\"event\">Room A<\/p>\n<p>Closing Ceremony<\/td>\n<td>\n<div class=\"speaker2\">\n<p>Closing Remarks<\/p>\n<\/div>\n<p>RAdm.(ret.) SASAKI Takahiro, Executive Committee Chair (Japan)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div style=\"text-align: center; margin-top: 2.0em; margin-bottom: 4.0em;\">\n    <a id=\"download-btn\" class=\"btn\" href=\"https:\/\/2025.cydef.net\/wp-content\/uploads\/2026\/05\/CCC-CYDEF2025-White-Paper-26.01.12.pdf\" target=\"_blank\" rel=\"noopener\">Whitepaper Download<\/a>\n<\/div>\n<div class=\"program\"><\/div>\n<\/div>\n<div id=\"rikaichan-window\" lang=\"ja\" style=\"all: revert !important;\"><\/div>\n<div style=\"all: initial !important;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Program download The relationship between the registration types and the programs accessible to each category is as follows. Registration Types Program etc. Admission Zone\uff08Closed Area\uff09 Non Admission Zone\uff08Open Area\uff09 On-demand (Streaming Access) Room A Room B Room C Keynote Speech Lunch Panel Discussion Table Top Exercise Poster Presentation Exhibition by Embassies, Government Agencies, Universities, and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_locale":"en_US","_original_post":"https:\/\/2025.cydef.net\/?page_id=34","footnotes":""},"class_list":["post-186","page","type-page","status-publish","hentry","en-US"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Program - CYDEF2025 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/2025.cydef.net\/en\/program\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Program - CYDEF2025 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation\" \/>\n<meta property=\"og:description\" content=\"Program download The relationship between the registration types and the programs accessible to each category is as follows. Registration Types Program etc. Admission Zone\uff08Closed Area\uff09 Non Admission Zone\uff08Open Area\uff09 On-demand (Streaming Access) Room A Room B Room C Keynote Speech Lunch Panel Discussion Table Top Exercise Poster Presentation Exhibition by Embassies, Government Agencies, Universities, and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/2025.cydef.net\/en\/program\/\" \/>\n<meta property=\"og:site_name\" content=\"CYDEF2025 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-07T01:47:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/2025.cydef.net\/wp-content\/uploads\/2025\/09\/2025_favicon.png\" \/>\n\t<meta property=\"og:image:width\" content=\"525\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@cydef_official_\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"37 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/2025.cydef.net\/en\/program\/\",\"url\":\"https:\/\/2025.cydef.net\/en\/program\/\",\"name\":\"Program - CYDEF2025 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation\",\"isPartOf\":{\"@id\":\"https:\/\/2025.cydef.net\/#website\"},\"datePublished\":\"2024-07-16T14:46:01+00:00\",\"dateModified\":\"2026-05-07T01:47:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/2025.cydef.net\/en\/program\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/2025.cydef.net\/en\/program\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/2025.cydef.net\/en\/program\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u30db\u30fc\u30e0\",\"item\":\"https:\/\/2025.cydef.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/2025.cydef.net\/#website\",\"url\":\"https:\/\/2025.cydef.net\/\",\"name\":\"CYDEF2025 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation\",\"description\":\"CYDEF2025\uff1a\u30e1\u30a4\u30f3\u30c6\u30fc\u30de\u300cThe Next Frontier: Turning Crisis into Opportunity\u300d\u30012025\u5e7412\u67089\u65e5\uff08\u706b\uff09\uff5e10\u65e5\uff08\u6c34\uff09\u90fd\u5185\u3067\u958b\u50ac\u3002\u4e16\u754c\u898f\u6a21\u3067\u5897\u5927\u3059\u308b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30b9\u30af\u3078\u306e\u5bfe\u51e6\u3092\u76ee\u7684\u3068\u3057\u3001\u56fd\u969b\u7684\u306a\u9023\u643a\u3001\u5171\u901a\u8a8d\u8b58\u306e\u5f62\u6210\u3092\u76ee\u6307\u3057\u3001\u6280\u8853\u7684\u306a\u691c\u8a0e\u3001\u5b66\u8853\u7684\u306a\u5e45\u5e83\u3044\u8b70\u8ad6\u304c\u884c\u308f\u308c\u308b\u3002\u4e16\u754c\u5404\u56fd\u3088\u308a\u95a3\u50da\u3001\u5c02\u9580\u5bb6\u3001\u7814\u7a76\u8005\u3001\u95a2\u4fc2\u5404\u8005\u304c\u96c6\u307e\u308a\u307e\u3059\u3002\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/2025.cydef.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Program - CYDEF2025 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/2025.cydef.net\/en\/program\/","og_locale":"en_US","og_type":"article","og_title":"Program - CYDEF2025 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation","og_description":"Program download The relationship between the registration types and the programs accessible to each category is as follows. Registration Types Program etc. Admission Zone\uff08Closed Area\uff09 Non Admission Zone\uff08Open Area\uff09 On-demand (Streaming Access) Room A Room B Room C Keynote Speech Lunch Panel Discussion Table Top Exercise Poster Presentation Exhibition by Embassies, Government Agencies, Universities, and [&hellip;]","og_url":"https:\/\/2025.cydef.net\/en\/program\/","og_site_name":"CYDEF2025 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation","article_modified_time":"2026-05-07T01:47:33+00:00","og_image":[{"width":525,"height":525,"url":"https:\/\/2025.cydef.net\/wp-content\/uploads\/2025\/09\/2025_favicon.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@cydef_official_","twitter_misc":{"Est. reading time":"37 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/2025.cydef.net\/en\/program\/","url":"https:\/\/2025.cydef.net\/en\/program\/","name":"Program - CYDEF2025 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation","isPartOf":{"@id":"https:\/\/2025.cydef.net\/#website"},"datePublished":"2024-07-16T14:46:01+00:00","dateModified":"2026-05-07T01:47:33+00:00","breadcrumb":{"@id":"https:\/\/2025.cydef.net\/en\/program\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/2025.cydef.net\/en\/program\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/2025.cydef.net\/en\/program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u30db\u30fc\u30e0","item":"https:\/\/2025.cydef.net\/"},{"@type":"ListItem","position":2,"name":"Program"}]},{"@type":"WebSite","@id":"https:\/\/2025.cydef.net\/#website","url":"https:\/\/2025.cydef.net\/","name":"CYDEF2025 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation","description":"CYDEF2025\uff1a\u30e1\u30a4\u30f3\u30c6\u30fc\u30de\u300cThe Next Frontier: Turning Crisis into Opportunity\u300d\u30012025\u5e7412\u67089\u65e5\uff08\u706b\uff09\uff5e10\u65e5\uff08\u6c34\uff09\u90fd\u5185\u3067\u958b\u50ac\u3002\u4e16\u754c\u898f\u6a21\u3067\u5897\u5927\u3059\u308b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30b9\u30af\u3078\u306e\u5bfe\u51e6\u3092\u76ee\u7684\u3068\u3057\u3001\u56fd\u969b\u7684\u306a\u9023\u643a\u3001\u5171\u901a\u8a8d\u8b58\u306e\u5f62\u6210\u3092\u76ee\u6307\u3057\u3001\u6280\u8853\u7684\u306a\u691c\u8a0e\u3001\u5b66\u8853\u7684\u306a\u5e45\u5e83\u3044\u8b70\u8ad6\u304c\u884c\u308f\u308c\u308b\u3002\u4e16\u754c\u5404\u56fd\u3088\u308a\u95a3\u50da\u3001\u5c02\u9580\u5bb6\u3001\u7814\u7a76\u8005\u3001\u95a2\u4fc2\u5404\u8005\u304c\u96c6\u307e\u308a\u307e\u3059\u3002","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/2025.cydef.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/2025.cydef.net\/wp-json\/wp\/v2\/pages\/186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/2025.cydef.net\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/2025.cydef.net\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/2025.cydef.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/2025.cydef.net\/wp-json\/wp\/v2\/comments?post=186"}],"version-history":[{"count":96,"href":"https:\/\/2025.cydef.net\/wp-json\/wp\/v2\/pages\/186\/revisions"}],"predecessor-version":[{"id":2456,"href":"https:\/\/2025.cydef.net\/wp-json\/wp\/v2\/pages\/186\/revisions\/2456"}],"wp:attachment":[{"href":"https:\/\/2025.cydef.net\/wp-json\/wp\/v2\/media?parent=186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}