235 results
Advanced search
Daisuke Oda
1-24
/Total: 235 results

Article etc.
"Recent Trends in Improving Internal Audits and Tips for Preparation - Based on the 2024 Monitoring Report"
Publication:Kinyu Homu Jijo No.2249, 2250

Article etc.
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (5) Unauthorized Account Log-ins"
Publication:Business Houmu Vol.25 No.1

Article etc.
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (4) Phishing Scams and Unlawful Cash Transfers"
Publication:Business Houmu Vol.25 No.1

Article etc.
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (3) Information Divulgence by Internal Wrongdoing"
Publication:Business Houmu Vol.25 No.1

Article etc.
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (2) Information Divulgence by Contractors”
Publication:Business Houmu Vol.25 No.1

Article etc.
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (1) Ransomware Attacks”
Publication:Business Houmu Vol.25 No.1

Article etc.
"Future Principles-Based and Rules-Based Policies Based on the JFSA Strategic Priorities"
Publication:Kinyu Homu Jijo
No.2220
No.2220

Article etc.
"Reviewing and Handling Legal Issues When Using Cloud Services – Focusing on Issues under the Act on the Protection of Personal Information"
Publication:Kinyu Homu Jijo
No.2214
No.2214