HOME > Activities of four ISOG-J Working Groups

Activities of four ISOG-J Working Groups

ISOG-J Working Groups

[WG1] Security Operation Guideline Working Group


WG leader

Sen UENO, Tricorder Co. Ltd.

Deliverables We make the penetration test guide for users, and the criteria for penetration test service.
Theme We make the penetration test guide what it is intended to select the best of penetration test for user. We consider indicate of the level of security engineer. The purpose is to improve the security service quality.

[WG2] Security Operation Technology Working Group

We are going to encourage the interaction among the security operation engineers.

WG leader

Hiroshi KAWAGUCHI, Kawaguchi Sekkei, Inc.

Deliverables Latest technologies Report, etc. (ISOG-J members only)
Theme Research of the latest technology trends and exploration of the appropriate security operation technologies,
Facilitation of the intercommunication of engineers.

[WG3] Security Operation-related Laws Research Working Group

We are going to give clear explanations for the laws and systems related to the SOC-business with the provider’s point of view.

[WG4] Security Operation Recognition and Propagation Working Group

We are going to act for the improvement of the recognition of the security operations through the events and publicity works.

WG leader

Shinji Abe, GMO Cybersecurity by Ierae, Inc.

Deliverables Event activities, Publicity materials. (such as brochure)
Theme Activities for the propagation and enlightenment to improve the recognition of the need for security operations.

[WG5] Utilization of Information Working Group

We are going to utilize cyber security information for members from any other groups.

WG leader

(TBD)

Deliverables (TBD)
Theme We are going to utilize cyber security information for members from any other groups.

[WG6] Security Operations Chaos Working Group

We are going to research and discuss to resolve issues for security operations.

WG leader

Shigenori TAKEI, NTT TechnoCross Corp.

Deliverables Research report and presentation in seminars.
Theme Now, security operations are required many capabilities and many services. So, each engineer and service providers have many common issues for own services. We are going to research and discuss these issues.