* [Blog](https://www.paloaltonetworks.com.au/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com.au/blog/corporate/) * [CSO Perspective](https://www.paloaltonetworks.com.au/blog/category/cso-perspective/) * Cyber3 Conference: Action... # Cyber3 Conference: Actionable Takeaways for Global Thought Leaders [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2016%2F12%2Fcso-cyber3-conference-actionable-takeaways-global-thought-leaders%2F) [](https://twitter.com/share?text=Cyber3+Conference%3A+Actionable+Takeaways+for+Global+Thought+Leaders&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2016%2F12%2Fcso-cyber3-conference-actionable-takeaways-global-thought-leaders%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2016%2F12%2Fcso-cyber3-conference-actionable-takeaways-global-thought-leaders%2F&title=Cyber3+Conference%3A+Actionable+Takeaways+for+Global+Thought+Leaders&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com.au/blog/2016/12/cso-cyber3-conference-actionable-takeaways-global-thought-leaders/&ts=markdown) \[\](mailto:?subject=Cyber3 Conference: Actionable Takeaways for Global Thought Leaders) Link copied By [Mihoko Matsubara](https://www.paloaltonetworks.com/blog/author/mihoko-matsubara/?ts=markdown "Posts by Mihoko Matsubara") Dec 05, 2016 6 minutes [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [Cyber3](https://www.paloaltonetworks.com/blog/tag/cyber3/?ts=markdown) [information sharing](https://www.paloaltonetworks.com/blog/tag/information-sharing/?ts=markdown) [Japan](https://www.paloaltonetworks.com/blog/tag/japan/?ts=markdown) *(This blog post is [also available in Japanese](https://www.paloaltonetworks.jp/company/in-the-news/2016/cyber3_conference_jp.html).)* Palo Alto Networks recently participated in [the second Cyber3 (Cyber Connect, Cyber Security, and Cyber Crime) Conference](http://www.npr-event.jp/cyber3/en/) , which was held in Tokyo in late November and included official support from the Japanese government. The conference brought over 300 thought leaders from all over the world to discuss cybersecurity challenges and share best practices. The conference showcased the strong leadership of the Japanese government to provide a thought-provoking and multi-stakeholder platform that allows leaders in academia, business, and government to network with each other, build trust, and discuss innovations such as artificial intelligence and connected cars and cyberthreat intelligence in an open and frank manner. Japanese Chief Cabinet Secretary Yoshihide Suga was on hand for closing remarks, which underscored the government's interest in the gathering. This is a watershed moment for Japan. While Europe and the United States have regular cybersecurity conferences addressing both technical and strategic audiences, such as DefCon and NATO Conference on Cyber Conflict, Japan has not had such a high-level, cybersecurity-focused conference, due to the lack of interest in cybersecurity until [the first Cyber3 Conference was held in Okinawa in early November 2015](http://www8.cao.go.jp/okinawa/3/cyber3/summary_en_20160107.pdf). The atmosphere changed drastically after September 2013, when Tokyo was chosen to host the Summer Olympic and Paralympic Games 2020. The clear deadline and mission to make the games successful sparked the Japanese to craft cybersecurity policies, invest more in cybersecurity human resources development, and move forward the public-private partnerships for information sharing and global collaboration. That is why some of the Cyber3 speakers were surprised to find out during the two-day conference how passionate the Japanese are about ensuring security for Tokyo 2020 and promoting cyberthreat information sharing. The Japanese government hosted the [G7 Ise-Shima Summit](http://www.mofa.go.jp/files/000160266.pdf) in May 2016 and included [cybersecurity as a standalone topic for the first time in G7 discussions](https://www.paloaltonetworks.com/blog/2016/05/cso-in-2016-g7-makes-cybersecurity-a-priority-and-paves-the-way-for-track-1-5-multi-stakeholder-discussions/). The two consecutive Cyber3 Conferences and G7 Ise-Shima Summit's cybersecurity documents prove the Japanese government's firm determination to play a leading role in cybersecurity policymaking, thought leadership discussions and global cooperation. Palo Alto Networks representatives participated in this important conference as a sponsor and as speakers and shared insights regarding automated cyberattack prevention, cyberthreat information sharing, and business risk management. [Rick Howard](https://www.paloaltonetworks.com/blog/author/rick/), Chief Security Officer at Palo Alto Networks, was on the "Threat Intelligence, Information Sharing" panel and pointed out that cyberthreat information sharing has not previously worked well because security vendors monetize and compete on their information. However, cyberattacks are increasing and becoming more complicated. To improve cyber defense overall to protect users, security vendors have to pursue a collective defense. That's why Palo Alto Networks, Fortinet, Symantec, and McAfee launched the [Cyber Threat Alliance (CTA)](http://cyberthreatalliance.org/members.html) two years ago -- an example of vendors that compete directly in the market but, when it comes to shared threat intelligence, have agreed to work together for the greater good of protecting individuals, businesses and governments. U.S. [President Barack Obama referred to CTA](https://www.whitehouse.gov/the-press-office/2015/02/13/remarks-president-cybersecurity-and-consumer-protection-summit) as a successful example of information sharing during the White House Cybersecurity Summit at Stanford University in February 2015. [](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/12/Cyber_3_2.png) [![cyber\_3\_2](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/12/Cyber_3_2.png)](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/12/Cyber_3_2.png) [Ryan Gillis](https://www.paloaltonetworks.com/blog/author/ryan-gillis/), Vice President of Cybersecurity Strategy and Global Policy at Palo Alto Networks, moderated the "Human Resources Development" panel. First, Yasuhiko Taniwaki, Director-General of the Global ICT Strategy Bureau, Japanese Ministry of Internal Affairs and Communications, stated that the Japanese government included cybersecurity human resources development in its Cybersecurity Strategy in 2015, as Japan faces a shortage of cybersecurity talent. In July 2014, [the Japanese Information-Technology Promotion Agency](https://www.ipa.go.jp/security/fy23/reports/jinzai/) found that Japan has 230,000 cybersecurity professionals, and that 140,000 of them need further training; it also found that there is a shortfall of 22,000 professionals. Taniwaki encouraged academia, the government, and industries to work together to tackle the manpower challenge and pointed out that people who can bridge business leadership and IT engineers are in dire need. The Japanese government plans to create a human resources development plan by March 2017. [](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/12/Cyber_3_3.png) [![cyber\_3\_3](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/12/Cyber_3_3.png)](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/12/Cyber_3_3.png) I appeared on a panel titled "Current and Future World, Government, and Organizations Changed by Cyber." I reiterated the importance of a multi-stakeholder approach, which is the philosophy of Cyber3. Since the damage caused by cyberattacks is not necessarily constrained within a certain sector, a traditional stovepipe approach to combating them no longer works. We must overcome silos and work together beyond the border of organizations, sectors and nations. Several countries in the world are facing political dynamics and administration changes. Cybersecurity, however, is a bi-partisan issue and opportunity -- a business and consumer enabler, not just a cost center. We should take advantage of the convenience brought by ICT and ensure security. Cybersecurity is everybody's problem -- individual, company, government, or university. At the same time, cybersecurity enriches our lives and I hope Tokyo 2020 changes our mindset under the tight deadline and creates a positive prototype of multi-stakeholder efforts to increase resiliency. [](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/12/Cyber_3_4.png) [![cyber\_3\_4](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/12/Cyber_3_4.png)](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/12/Cyber_3_4.png) Noboru Nakatani, Executive Director of Interpol Global Complex for Innovation, pointed out a stark contrast between Japanese and non-Japanese perspectives on cybersecurity. The Japanese tend to frame breaches as information leaks and blame the insufficient cyber defense on the victim organizations. On the other hand, Americans and Europeans tend to frame breaches as hacks and often focus on how to prevent future successful cyberattacks by attackers. The trend is reflected in how the media reports cyber incidents. Situational awareness supported by full visibility and cyberthreat information would help shift such a mindset. During the Day 2 luncheon, Rumi Horio, Security Consultant, Palo Alto Networks K.K., cited an anecdote of several blind men who touched different parts of an elephant and thought it was a fan, rope or something else. Japanese organizations are inclined to count the number of cyberattacks rather than seek methods to reduce the attack surface and prevent attackers from achieving their goals by cyberattacks. She argued that it is time to take a proactive approach rather than being reactive to damages. [](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/12/Cyber_3_5.png) [![cyber\_3\_5](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/12/Cyber_3_5.png)](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/12/Cyber_3_5.png) Cyber3 was an insightful cybersecurity conference for mutual learning and finding new ways of partnering and collaborating to take actions based on lessons learned together. Palo Alto Networks appreciates the opportunity to have been able to [sponsor and participate in the conference in 2016 and 2015](https://www.paloaltonetworks.com/blog/2015/11/a-view-into-the-cyber3-conference-crafting-security-in-a-less-secure-world/). We look forward to continuing to work with the Japanese government and global thought leaders. [](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/12/Cyber_3_6.png) [![cyber\_3\_6](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/12/Cyber_3_6.png)](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/12/Cyber_3_6.png) *** ** * ** *** ## Related Blogs ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [#### Japan's New Cybersecurity Strategies Have the Right Priorities in Mind](https://www.paloaltonetworks.com.au/blog/2017/11/cso-japans-new-cybersecurity-strategies-right-priorities-mind/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [#### Cybersecurity and Human Factors: Why Cybersecurity Is a Human Issue Rather Than a Technical Problem](https://www.paloaltonetworks.com.au/blog/2017/11/cso-cybersecurity-human-factors-cybersecurity-human-issue-rather-technical-problem/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [#### Highlighting Japan-India Cybersecurity Cooperation in the "Confluence of the Two Seas"](https://www.paloaltonetworks.com.au/blog/2017/09/cso-highlighting-japan-india-cybersecurity-cooperation-confluence-two-seas/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown) [#### Palo Alto Networks Day Japan 2017: Evolving Cybersecurity Efforts to Increase Trust in the Digital Age and Prevent Cyberattacks](https://www.paloaltonetworks.com.au/blog/2017/09/cso-palo-alto-networks-day-japan-2017-evolving-cybersecurity-efforts-increase-trust-digital-age-prevent-cyberattacks/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [#### Japan's Cybersecurity Capacity-Building Support for ASEAN -- Shifting From What to Do to How to Do It](https://www.paloaltonetworks.com.au/blog/2017/07/cso-japans-cybersecurity-capacity-building-support-asean-shifting/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [#### A Seat at the Table: How Countries Like Japan Can Be More Visible in Cybersecurity Discussions](https://www.paloaltonetworks.com.au/blog/2017/06/cso-a-seat-at-the-table-how-countries-like-japan-can-be-more-visible-in-cybersecurity-discussions/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com.au/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language