Loading…
Attending this event?
October 30, 2024
Learn More and Register to Attend

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for SOSS Community Day Japan 2024 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

Please note: This schedule is automatically displayed in Japan Standard time (JST/UTC+9). To see the schedule in your preferred timezone, please select from the drop-down located at the bottom of the menu to the right.

The schedule is subject to change.
Breakout Sessions clear filter
arrow_back View All Dates
Wednesday, October 30
 

09:25 JST

Forging the Future of a More Secure AI - How CoSAI Intends to Help - Jeffrey Borek & Moriyoshi Ohara, IBM
Wednesday October 30, 2024 09:25 - 09:45 JST
As artificial intelligence becomes increasingly integral to various industries, ensuring its security is becoming paramount. The Coalition for Secure AI (CoSAI), led by Anthropic, Cisco, Google, IBM, Intel, Microsoft, NVIDIA, OpenAI, PayPal and others are coming together to collaborate on guidelines, best practices and ultimately robust security standards for AI systems. We will discuss the coalition's three critical workstreams: Supply Chain Security for AI Systems, Preparing Defenders for a Changing Cybersecurity Landscape, and AI Security & Risk Governance. Attendees will gain insights into how CoSAI is committed to working with the OpenSSF, LF AI & Data, and other communities to foster collaboration, innovation, and education across the AI cybersecurity realm. Join us to discover how CoSAI's collaborative approach is paving the way for proactive self-regulation in this rapidly evolving "new" industry, and how you can help.
Speakers
avatar for Moriyoshi Ohara

Moriyoshi Ohara

Distinguished Engineer, IBM
avatar for Jeffrey Borek

Jeffrey Borek

WW Program Director, Open Tech & Supply Chain Security, IBM
Working to build a scalable and consistent supply chain security platform, while continuing to lead the consumption compliance Open Source Program Office (OSPO), including policy, execution and guidance. Working with IBM Government & Regulatory Affairs, Software, Systems, Cloud, Consulting... Read More →
Wednesday October 30, 2024 09:25 - 09:45 JST
Main Hall

09:50 JST

Is This Thing on? Blue Team Tips for Scorecard - Raghav Kaul, Google
Wednesday October 30, 2024 09:50 - 10:10 JST
OpenSSF Scorecard and Allstar are tools for automatically scanning source code repositories for security misconfigurations. Scorecard looks at a GitHub or GitLab project’s source code, CI workflows, and repository settings and provides an actionable list of findings for a maintainer to improve their project’s security practices. Allstar is a way to run security analysis at scale, and automatically remediate issues. This talk will focus on one specific use case that blue teams face: how can Scorecard be used to secure first party repos? Is there a way to integrate Scorecard into an actual development process so that it doesn’t just detect an issue, but prevents it from being introduced into the supply chain? There are two aspects to this answer: infrastructure and policy. We’ll look at how probes enable the creation of granular policies, data pipelines for gathering results from probe runs, and techniques for shifting Scorecard scans left with pre-commit GitHub Actions.
Speakers
avatar for Raghav Kaul

Raghav Kaul

None, Google
Raghav is is a Security Engineer working for Google's Open Source Security Team. He is a maintainer of OpenSSF Scorecard and a contributor to OpenSSF Allstar.
Wednesday October 30, 2024 09:50 - 10:10 JST
Main Hall

10:15 JST

Future Use of SCAP and SBOM for Software Supply Chain Security - Yumi Tomita & Atsuya Misaki, Cybertrust Japan Co., Ltd. & Masaki Ishiguro, Mitsubishi Research Institute, Inc.
Wednesday October 30, 2024 10:15 - 10:35 JST
In recent years, supply chain security is strongly required as a mechanism to objectively and rationally ensure security concerning organizations, systems, products, services, and data with respect to trading partners and other stakeholders. Modern software development has become more complex due to the proliferation of multiple suppliers, vendors, and open source software (OSS), and this has increased the possibility of vulnerabilities being introduced by suppliers and the risk of attacks exploiting the supply chain in the software supply chain. This is the reason why the software supply chain is becoming more and more complex. Therefore, it is important to understand and manage security risks throughout the software supply chain. The presentation will compare SCAP, which has been used for a long time, and SBOM (Software Bill of Materials), which has been attracting attention in recent years, as a method for supply chain security, explaining the features of each, and discussing the possibilities of utilizing the tools in the future.
Speakers
avatar for Masaki Ishiguro

Masaki Ishiguro

Chief Manager and Mission Leader at Cybersecurity Strategy Group, Mitsubishi Research Institute, Inc.
Masaki Ishiguro, Ph.D., is a Chief Manager and Mission Leader at Cybersecurity Strategy Group, Mitsubishi Research Institute, Inc.His areas of expertise include Cybersecurity Technologies, Government policies, Risk Management, Cybersecurity Economics, Digital Engineering.He has completed... Read More →
avatar for Atsuya Misaki

Atsuya Misaki

Product Manager, Cybertrust Japan Co., Ltd.
Atsuya Misaki is a Product Manager in Cybertrust Japan. He works in product development related to SBOM and vulnerability management
avatar for Yumi Tomita

Yumi Tomita

Marketer, Cybertrust Japan Co., Ltd.
Yumi Tomita is a Marketer in Cybertrust Japan. She works to utilize SBOM for vulnerability management. She is a member of the OpenChain Project Japan Working Group.
Wednesday October 30, 2024 10:15 - 10:35 JST
Main Hall

11:00 JST

Linux Distributor’s Role for Supply Chain Security - Muuhh Ikeda & Takanori Suzuki, Cybertrust Japan Co., Ltd.
Wednesday October 30, 2024 11:00 - 11:15 JST
Linux distributions provide users with great convenience by centralized access to multiple independent OSS into a single location. This has been an essential function that OSS can be popularized and rule the world. The nature of distributions that provide convenience to users by consolidating multiple means of access can be expected to play an important role in OSS supply chain security enhancement. For example, SBOM, provenance, and vulnerability information can be provided with trust. Currently, however, it is difficult to provide a unified means of providing these in a convenient manner while guaranteeing their authenticity and integrity. In this session, the speaker will share the current issues as a developer of multiple Linux distributions and will propose the role that distributions and distributors should play in the enhancement of supply chain security. Then he will propose necessary mechanisms to achieve it and discuss them with the attendees.
Speakers
avatar for Takanori Suzuki

Takanori Suzuki

Chief Open Source Officer, Expert Software Engineer, Cybertrust Japan Co., Ltd.
Takanori Suzuki is leading OSPO as a Chief Open Source Officer (COSO) and also a Linux OSS Developer. He also worked on LINUX distro development, PKI system, open source monitoring software, MIRACLE ZBX and had a presentation about a mruby extension for it at the Ruby World Confe... Read More →
avatar for Munehiro Ikeda

Munehiro Ikeda

Lead Architect, Cybertrust Japan Co., Ltd.
Muuhh IKEDA has been an OSS lover and believer since his first compiling by gcc in the 90s. He got involved in the Linux kernel development mainly for embedded and IoT usecases. He is working at Cybertrust Japan as a Lead Architect for IoT products and services, and a member of OSPO... Read More →
Wednesday October 30, 2024 11:00 - 11:15 JST
Main Hall

11:20 JST

Migrating Operating System Toward Post-Quantum Cryptography - Daiki Ueno, Red Hat
Wednesday October 30, 2024 11:20 - 11:35 JST
In the area of computer security, we are on the cusp of the post-quantum era: cryptanalytically-relevant quantum computers (CRQC) pose a threat to public-key algorithms used today in network protocols and data formats. To address this concern, NIST has standardized a set of quantum-resistant algorithms, while NSA has announced the guidance for migrating national security systems to quantum resistant algorithms targeting 2035. In the open source community, we at the Fedora project are exploring adoption of those algorithms to set the ground for protecting our current and future users. In this session, we will present our strategy and the status of the effort.

Topics to be covered:
  1. Key exchange and digital signature: threat models and priorities
  2. State of the art algorithms and cryptanalysis
  3. Avoiding implementation divergences across the operating system: consolidating the implementation to liboqs, a project part of the Post-Quantum Cryptography Alliance
  4. Safely integrating non-finalized algorithms in a backward compatible manner
  5. Example integration in TLS, IPsec, and verifiable data storage
Speakers
avatar for Daiki Ueno

Daiki Ueno

Principal Software Engineer, Red Hat
Daiki Ueno is a software engineer at Red Hat, where he works on RHEL security, focusing on cryptography. Daiki is an upstream maintainer of GnuTLS and p11-kit, as well as a contributor to various open source projects, not limited to security topics.
Wednesday October 30, 2024 11:20 - 11:35 JST
Main Hall

11:40 JST

Continuous Security with ArgoCD and Kubescape - Anubhav Gupta, Akuity
Wednesday October 30, 2024 11:40 - 11:50 JST
In the cloud-native landscape, the integration of security into the CI/CD pipeline is not just a best practice—it's a necessity. ArgoCD has emerged as the leading GitOps controller for Kubernetes, automating deployments with precision. However, ensuring that every deployment is secure requires more than just automated workflows; it demands continuous security checks before, during, and after the deployment process. This talk will demonstrate how the combination of ArgoCD and Kubescape, a powerful open-source Kubernetes security tool, delivers a comprehensive security solution for Kubernetes deployments. We will walk through setting up an end-to-end workflow that integrates security checks into every stage of the deployment process. Attendees will learn how to implement security gates that assess vulnerabilities in container images and Kubernetes configurations before any changes are committed and receive real-time alerts if vulnerabilities are detected in production. By the end of this talk, participants will be equipped to enhance their GitOps workflows with robust security practices, making their Kubernetes deployments more resilient and secure.
Speakers
avatar for Anubhav Gupta

Anubhav Gupta

Software Engineer, Akuity
Anubhav works as a Software Engineer at Akuity. He is a graduated Summer 2023 batch LFX Mentee with the CNCF, where he worked on the Kubescape project. He is an active contributor to various CNCF projects including Kubescape and Copa. Anubhav has previously spoken at the Open Source... Read More →
Wednesday October 30, 2024 11:40 - 11:50 JST
Main Hall

11:55 JST

Let’s Join CNCF TAG Security APAC! - Yoshiyuki Tabata, Hitachi, Ltd.
Wednesday October 30, 2024 11:55 - 12:00 JST
The CNCF Security Technical Advisory Group (TAG Security) is a group of cloud-native security experts and anyone interested in cloud-native security, and we can come together to work on various issues in different security areas. We do this in various ways, including through white papers we produce as resources for the community, presentations on new security projects including CNCF projects, and security assessments we provide to CNCF projects and many other initiatives. Previously, TAG Security meetings were only held in the US and EMEA time zones for a long time. This made it difficult for security friends in the APAC time zone to contribute to TAG Security, but we have now managed to hold meetings in the APAC time zone starting in August of this year! In this presentation, Yoshiyuki Tabata, facilitator for TAG Security APAC, will provide an overview of TAG Security and its latest trends. Let's make TAG Security APAC even more exciting together!
Speakers
avatar for Yoshiyuki Tabata

Yoshiyuki Tabata

Senior OSS Consultant, Hitachi
Yoshiyuki Tabata is a Senior OSS Consultant at Hitachi, Ltd, responsible for IAM and API-related solutions. As an authentication and authorization expert, he has provided numerous consultations, for example, designing and building API/SSO systems in various fields such as finance... Read More →
Wednesday October 30, 2024 11:55 - 12:00 JST
Main Hall

12:05 JST

Rapid Handling of Vulnerabilities in the Supply Chain with SBOM and VEX - Akihiko Takahashi, Fujitsu Limited
Wednesday October 30, 2024 12:05 - 12:15 JST
Fujitsu supports SPDX evolution and the movement to an international standard that provides a common SBOM basis for software exploitation for companies throughout the supply chain. We have long provided multilateral support for SPDX, especially thorough activities in Yocto and SPDX-Lite. From 2016, we have been joining maintainers of meta-spdxscanner, enabling SPDX functionality for the Yocto Project. Also, we are the top contributors of patch submissions to the Yocto Project. In recent years, increasing interest in cybersecurity has led to the need to quickly determine whether a product is vulnerable or not. In the supply chain, vulnerability information can be handled in combination with SBOM and VEX. An SBOM should be generated for each build, and a VEX should be generated for each vulnerability detection. It is necessary to manage them separately because their life cycles are different. In addition, there is a problem in the accuracy of the vulnerability, and there are some measures to solve it. In this presentation, we describe the advantages and challenges of creating VEX in Yocto as a use case.
Speakers
avatar for Akihiko Takahashi

Akihiko Takahashi

Fujitsu
I am an Embedded Linux Developer. I joined Fujitsu Corporation in 2013. My primary role involves developing an in-house distribution for embedded systems.I have experience in IVI (In-Vehicle Infotainment) system development, DevOps, and infrastructure environment development. Currently... Read More →
Wednesday October 30, 2024 12:05 - 12:15 JST
Main Hall

13:45 JST

Navigating the Quantum Readiness Journey: Open-Source Cryptography, PKI and Signing Tools - Tony Chen, Keyfactor
Wednesday October 30, 2024 13:45 - 14:05 JST
With the arrival of the new Post Quantum Cryptography (PQC) NIST standards, we look at the current state. Cryptography and crypto agility are cornerstones of cybersecurity and are essential for everyone. With this presentation, we want to empower every engineer and security expert with hands-on insights into quantum-resistant cryptography to help them navigate the quantum readiness journey. We will explore PQC aspects for use cases in IoT, container, and software supply chain security, as well as initiatives based on standards such as those involving FIPS and IEFT. Additionally, we will discuss the advancements in PQC within the Open-Source products available from bouncycastle.org, ejbca.org, and signserver.org. Security is a collective effort; community collaboration is vital for high-quality, interoperable cryptographic solutions.
Speakers
avatar for Tony Chen

Tony Chen

Solution Engineer, Keyfactor
Meet Tony Chen, the cybersecurity wizard with over 8 years of PKI magic up his sleeve! As an Asia-Pacific and Japan Solution Engineer at Keyfactor, he’s the go-to guy for all things secure. With a Master’s in Cybersecurity from the National University of Singapore and a CISSP... Read More →
Wednesday October 30, 2024 13:45 - 14:05 JST
Main Hall

14:10 JST

How Application Security Will Change with the Rise of AI - Riotaro Okada, Asterisk Research, Inc
Wednesday October 30, 2024 14:10 - 14:25 JST
DevOps, CI/CD, and rapid improvement cycles have improved code maintenance and quality. Yet, application security remains vulnerable and underdeveloped. Drawing on my experience with the OWASP community in Japan and some OWASP Projects like the OWASP LLM Top 10 Risks project, I will share some concepts of beneficial and risky practices throughout DevOps.
Speakers
avatar for Riotaro Okada

Riotaro Okada

executive, Asterisk Research, Inc
A Japanese security researcherAn OWASP Japan chapter lead (since 2011)An OWASP contributor with projects (since 200x)Executive director / xSIRT advisor at Asterisk ResearchMBA, CISA, CSAhttps://www.linkedin.com/in/riotaro
Wednesday October 30, 2024 14:10 - 14:25 JST
Main Hall

14:30 JST

Learnings from Teaching Students Who Are Willing to Be Cyber Security Expert. - Masato Matsuoka, Black Duck Software G.K.
Wednesday October 30, 2024 14:30 - 14:40 JST
I have been chosen a lecturer of IoT cyber security for Security Camp, and I taught them IoT system risk analysis from outside of the systems, and software levels which system internal risks identifying with SBOM. Many of them are very good cyber security learner, but there are some findings from the series of lecture. They are knowing about risks of software in general, but they have not much experiences yet then it's always discussing about basic things after all. e.g. Their knowledge and experiences are very limited then identify the risks of the OSS components by evaluating Software BOMs is quite challenging. I don't give you any guidance, ideas or so, but I will share my experiences with students.
Speakers
avatar for ANI Matsuoka

ANI Matsuoka

Sr. Technical Marketing Manager, Black Duck Software G.K.
Graduated from the Department of Electrical Engineering, Nagaoka Technical High School, Niigata Prefecture. Former software developer and cyclist including embedded. After mainly experiencing control systems and embedded software development, he was involved in embedded development... Read More →
Wednesday October 30, 2024 14:30 - 14:40 JST
Main Hall

14:45 JST

Developers Meet Security: Lessons Learnt - Marta Rybczynska, Ygreky
Wednesday October 30, 2024 14:45 - 15:00 JST
Security training for developers has become more and more popular. However, do they bring the desired effect? In this talk, Marta will summarize the experience of communicating and training developers on security topics. She will share lessons learned and suggestions on topics like addressing previous bad experiences in communication between developers and security people, the existence of silos, developers being overwhelmed by methodologies and tools, lack of time and resources for security and quality work, and more. This session will be a call for a discussion on how to better explain security to people who are not security experts and do not want to be.
Speakers
avatar for Marta Rybczynska

Marta Rybczynska

Founder, Ygreky
Marta Rybczynska has a network security background, with 20 years of experience in Open Source. She has worked with embedded operating systems like Linux and various real-time OSes, and with system libraries and frameworks up to user interfaces. She has been involved in various Open... Read More →
Wednesday October 30, 2024 14:45 - 15:00 JST
Main Hall

15:05 JST

Head First Reporting of Linux Kernel CVEs: Practical Use of the Kernel Fuzzer - Yunseong Kim, Ericsson LG
Wednesday October 30, 2024 15:05 - 15:25 JST
This session will delve into the practical experience of discovering and reporting Linux kernel vulnerabilities using the powerful kernel fuzzer, e.g. syzkaller. We will walk through the step-by-step process of conducting fuzzing tests, identifying potential vulnerabilities, and ultimately submitting them to the Linux kernel Security community. Beyond the technical aspects of vulnerability discovery, we'll also discuss the broader implications of this work on the open source ecosystem. By sharing insights into the benefits of using kernel fuzzers, we aim to encourage more developers to contribute to the security of Linux and other open source projects. Topics will include: Introduction to syzkaller and Real-world case studies: Practical examples of vulnerabilities discovered using syzkaller The vulnerability reporting process: practices for submitting vulnerabilities to the Linux kernel Security community with PoC
Speakers
avatar for Yunseong Kim

Yunseong Kim

Open Source Contributor, Ericsson LG
"perf In Action" on DebConf24 https://debconf24.debconf.org/talks/43-perf-in-action-real-world-applications/Finding vulnerability on IBM Z architecture memory subsystem in the Linux KernelCVE-2024-41021: https://lore.kernel.org/linux-cve-announce/2024072929-CVE-2024-41021-f857@gr... Read More →
Wednesday October 30, 2024 15:05 - 15:25 JST
Main Hall

15:45 JST

TTX Session - Speakers To Be Announced
Wednesday October 30, 2024 15:45 - 17:00 JST
Wednesday October 30, 2024 15:45 - 17:00 JST
Main Hall
 
  • Filter By Venue
  • Filter By Type
  • Content Experience Level
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -