TenguCon 2024

Organizers: JICSS / Keio Univ. CCRC / TenguSec
Date: Nov.13, 2024
Venue: Roppongi, Tokyo Japan

1. Overview

This year’s inaugural TenguCon, held on November 13th, 2024, brought together a diverse array of members in the cybersecurity community. It hosted 110 participants, including 68 general attendees, 26 affiliated members, and 16 esteemed speakers. The event integrated technical expertise with critical policy discourse, highlighting three main tracks: InfoSec Community, Policy & Cybersecurity, and specialized Villages dedicated to car hacking, malware analysis, and physical security awareness.

2. Keynotes and Sessions

Opening Keynote: U.S.-Japan Cybersecurity Cooperation
Daniel C. McCandless, Counselor for Environment, Science, Technology, and Health at the U.S. Embassy in Tokyo delivered the opening keynote address. He addressed predicaments that the United States and Japan face in cybersecurity and emphasized the strategic importance of fostering collaboration between technical experts and policymakers. Key themes included critical infrastructure vulnerabilities and threats posed by state-sponsored actors, exemplified by groups such as Lockbit. Counselor McCandless highlighted opportunities for joint initiatives with Japan and other partners, including the annual U.S.-Japan-EU Industrial Control Systems (ICS) Cybersecurity Week and collaborative efforts between DHS/CISA and JP-CERT/NISC. 

Lunch Session: Evolving Compute Paradigms and National Security
Law and policy experts focused in the lunch session on the intersection of emerging computational technologies and their implications for national and economic security. Discussions explored the evolution of edge to cloud hybrid environments and the challenges of integrating modern security frameworks with legacy systems. The session also examined the evolving balance between compliance-driven and operational security requirements and strategies to enhance security effectiveness in distributed systems.

Central to the dialogue were issues surrounding identity and data management. The speakers elaborated on the distribution of responsibility in identity verification, the need to minimize redundant sensitive data collection, and the pivotal role of government in offering authoritative identity services. Furthermore, the session emphasized the growing importance of protecting critical infrastructure, drawing lessons from automotive security and examining European approaches to digital identity and trust.

Presentations and Discussion Highlights
The conference hosted a series of distinguished speakers who shared their expertise on cutting-edge topics. Highlights included Hari Hursti’s analysis of protecting critical infrastructure in the AI era, YTCracker’s exploration of wireless security challenges, and Billy Wong’s in-depth examination of Chinese cyber threats. In addition, the agenda featured sessions on automotive security, container security, and privacy advocacy, ensuring a comprehensive overview of contemporary cybersecurity challenges.

InfoSec Community Track Presentations

  • Wireless world domination
  • You can’t detect me if you don’t know I exist
  • falco – Container intrusion detection system
  • Abusing intended feature and bypassing facial recognition
  • Steganography in the wild
  • Phishing and social engineering: Unveiling the dark tactics of cyber deception
  • Exploring Chrome 
  • DNSForge – responding with force
  • How I built a personal brand to build trust and influence at scale
  • Unmasking Chinese stealthy threats- lessons learned from Ivanti Zero-Days
  • Evolving compute paradigms and national security
  • My journey in Google bug bounty
  • Automated media fuzzing for autoplay in car information systems

Policy & Cybersecurity Track Presentations

  • Protecting Critical Infrastructure in the Age of AI
  • Data Privacy Advocacy 101 – How to Fight for Your Law
  • You are an Ethical Hacker.  What next?
  • The Looming Ocean: The Singularity and Cyber

Specialized Villages Features
The villages featured four concurrent specialized areas:

  1. Car hacking village: Focused on automotive security challenges and OTA update security
  2. Malware village: Examining current threats and analysis techniques
  3. Physical security awareness: Practical demonstrations and training
  4. Most creatively named DTF in history


3. Technical Highlights

Automotive Security

  • Advanced testing methodologies for vehicle infotainment systems
  • Security architectures for ADAS systems
  • OTA update security frameworks
  • Integration of ISO 21434 standards
  • Supply chain security considerations

Mobile and Operating System Security

  • Android security research methodologies
  • Bug bounty program insights
  • Reverse engineering techniques
  • Mobile OS vulnerability analysis
  • Tool development for security research

Infrastructure Security

  • Container security implementation strategies
  • Cloud-edge hybrid environment security
  • Critical infrastructure protection frameworks
  • IoT security architecture
  • Identity and access management in distributed systems

Emerging Threats

  • Advanced persistent threat analysis
  • Zero-day vulnerability research
  • Social engineering evolution
  • Wireless security challenges
  • AI-related security implications

4. Next Steps

TenguCon 2024 adds a pivotal platform for advancing cybersecurity discourse in Japan. By integrating technical expertise, policy considerations, and practical implementation strategies, the event emphasized the necessity of international collaboration to confront evolving cyber threats and safeguard critical infrastructure. The success of this inaugural conference lays a robust foundation for future engagements in the cybersecurity domain. 

JICSS will continue to work with TenguSec as well as CCRC of Keio University and other cybersecurity focused organizations to bring together experts from industry, academia, and government to generate practical policy solutions and build consensus for action on cybersecurity.

Share the Post:

Related Posts

Login

Please log in below.

Privacy Policy

The Japan Institute for CyberSpace Studies (hereinafter referred to as "JICSS") has established the following privacy policy (hereinafter referred to as "the Policy") regarding the handling of personal information of users in the services provided on this website (hereinafter referred to as "the Services").

Article 1 (Personal Information)
“Personal information” refers to "personal information" as defined in the Act on the Protection of Personal Information, and includes information about living individuals that can be used to identify specific individuals by name, date of birth, address, telephone number, contact information, and other descriptions, as well as data related to appearance, fingerprints, voiceprints, and health insurance card insurer numbers.

Article 2 (Method of Collecting Personal Information)
When you submit an inquiry form, JICSS will obtain your name and e-mail address.

Article 3 (Purpose of Collection and Use of Personal Information)
The purposes for which JICSS collect and use personal information are as follows

To provide and operate our services
To respond to inquiries from users (including identification)
To send e-mail notifications of new features, updates, campaigns, etc. of the service the user is using, as well as information on other services provided by the Company.
To contact you as necessary for maintenance, important notices, etc.
To identify users who violate the Terms of Use or who attempt to use the service for illegal or unjust purposes, and to refuse their use of the service.
To allow users to view, change, or delete their own registration information, or to view the status of their use of the service.
To bill users for paid services.
For purposes incidental to the above purposes of use

Article 4 (Change of Purpose of Use)
JICSS shall change the purpose of use of personal information only when it is reasonably recognized that the purpose of use is related to the purpose of use before the change.
In the event of a change, JICSS shall notify the User of the changed purpose or publicly announce it on this website in a manner prescribed by JICSS.

Article 5 (Provision of Personal Information to Third Parties)
Except in the following cases, JICSS will not provide personal information to a third party without the prior consent of the user. However, this excludes cases permitted under the Personal Information Protection Law and other laws and regulations.
When it is necessary for the protection of the life, body, or property of an individual and it is difficult to obtain the consent of the individual.
When the provision of personal information is especially necessary for improving public health or promoting the sound growth of children, and it is difficult to obtain the consent of the individual concerned.
When it is necessary to cooperate with a national agency, a local government, or an individual or entity entrusted by either a national agency or local government to execute affairs prescribed by law, and obtaining the consent of the individual is likely to impede the execution of such affairs.
When we have notified or announced the following matters in advance, and when we have notified the Personal Information Protection Committee
The purpose of use includes provision to a third party
Data items to be provided to the third party
Means or method of provision to third parties
Cessation of provision of personal information to third parties at the request of the individual
The method of accepting the request of the person in question
Notwithstanding the provisions of the preceding paragraph, in the following cases, the party to which the relevant information is provided shall not fall under the category of a third party.
(i) When we outsource all or part of the handling of personal information within the scope necessary for the achievement of the purpose of use
When personal information is provided as a result of the succession of business due to a merger or other reasons
When personal information is used jointly with a specific person, and the Company notifies the person in advance or makes the information readily accessible to the person in advance to that effect, the items of personal information jointly used, the scope of joint use, the purpose of use by the person using the information, and the name of the person responsible for managing the personal information Article 6 (Disclosure of Personal Information)

Article 6 (Disclosure of Personal Information)
When requested to disclose personal information by the person in question, JICSS will disclose such information to the person without delay. However, if JICSS decides not to disclose the personal information, it will notify the individual to that effect without delay. A fee of 1,000 yen will be charged for each case of disclosure of personal information.
When there is a risk of harm to the life, body, property, or other rights or interests of the person concerned or a third party
If there is a risk of significant hindrance to the proper conduct of our business
If it violates any other laws or regulations.
Notwithstanding the preceding paragraph, in principle, JICSS will not disclose information other than personal information, such as historical information and characteristic information.

Article 7 (Correction and Deletion of Personal Information)
If the User's personal information held by JICSS is incorrect, the User may request JICSS to correct, add, or delete (hereinafter referred to as "correct, etc.") his/her personal information in accordance with procedures determined by JICSS.
If we deem it necessary to respond to the request from the user as described in the preceding paragraph, we will make the correction, etc. to the relevant personal information without delay.
In the event that JICSS makes corrections, etc. based on the preceding paragraph, or decides not to make such corrections, etc., JICSS will notify the User of such decision without delay.

Article 8 (Suspension of Use of Personal Information)
When we receive a request from a user to stop using or delete (hereinafter referred to as "stop using, etc.") his/her personal information on the grounds that it has been handled beyond the scope of the purpose of use or that it has been obtained by wrongful means, we will conduct the necessary investigation without delay.
If, based on the results of the investigation described in the preceding paragraph, we determine that it is necessary to comply with the request, we will suspend the use of the relevant personal information without delay.
When JICSS suspends the use of personal information in accordance with the preceding paragraph or decides not to suspend the use of personal information, JICSS will notify the user of this decision without delay.
Notwithstanding the preceding two paragraphs, in cases where the suspension of use involves a large amount of cost or it is otherwise difficult to suspend the use of personal information, and alternative measures can be taken to protect the rights and interests of the user, these alternative measures shall be taken.

Article 9 (Changes to Privacy Policy)
The contents of this Privacy Policy may be changed without notice to the User, except as otherwise provided by law or other regulations.
Unless otherwise specified by the Company, the revised Privacy Policy shall take effect from the time it is posted on the Website.

Article 10 (Contact for Inquiries)
Inquiries regarding this policy should be directed to the following contact


E-mail: info@jicss.org

Commercial Disclosure

Legal Name The Japan Institute for CyberSpace Studies (JICSS), also registered as 一般社団法人 サイバー空間総合研究所.

Representative Our operations are led by our Director, Terutaka Kawabata.

Address Our headquarters are located at the Ginza Main Office: 4F Ginza KR II Bldg, 2-15-2 Ginza, Chuo-ku, Tokyo 104-0061, Japan.

Contact Information For inquiries, please contact us via email at info@jicss.org or by phone at +81 3 6281 5152. Our telephone support is generally available during standard business hours (10:00–17:00 JST), excluding weekends and public holidays.

Pricing and Additional Fees Service prices and membership dues are clearly displayed on the respective registration or checkout pages. There are no additional hidden fees for digital services; however, any bank transfer fees or internet connection costs remain the responsibility of the customer.

Payment Methods and Timing We accept payments via Credit Card (processed through Stripe) and Bank Transfer. Credit card payments are processed immediately at the time of purchase. For bank transfers, payment is required within 7 days of the order.

Delivery of Services Digital memberships and access to research materials are provisioned immediately upon successful completion of the payment process.

Cancellations and Refunds Due to the nature of digital content and immediate access to membership benefits, we generally do not offer refunds once a transaction is completed. You may cancel your membership at any time to prevent future billing through your account settings, but previous payments are non-refundable.