{"id":3722,"date":"2022-07-26T02:53:07","date_gmt":"2022-07-26T02:53:07","guid":{"rendered":"https:\/\/isic-japan.org\/?post_type=event&#038;p=3722"},"modified":"2022-08-01T07:25:02","modified_gmt":"2022-08-01T07:25:02","slug":"the-industrial-security-dilemma","status":"publish","type":"event","link":"https:\/\/isic-japan.org\/jp\/event\/the-industrial-security-dilemma\/","title":{"rendered":"\u7523\u696d\u754c\u304c\u62b1\u3048\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30b8\u30ec\u30f3\u30de"},"content":{"rendered":"<p>\u6a5f\u5bc6\u60c5\u5831\u306e\u4fdd\u8b77\u306f\u30d1\u30fc\u30c8\u30ca\u30fc\u56fd\u306e\u9593\u3067\u9632\u885b\u88c5\u5099\u3084\u6280\u8853\u306e\u56fd\u969b\u5354\u529b\u3092\u9032\u3081\u308b\u4e0a\u3067\u6700\u5927\u306e\u96e3\u70b9\u3067\u3059\u3002<br><br>\u305d\u306e\u3088\u3046\u306a\u56fd\u969b\u5354\u529b\u306b\u304a\u3051\u308b\u61f8\u5ff5\u4e8b\u9805\u306f\u3001\u7279\u5b9a\u306e\u30d7\u30ed\u30b0\u30e9\u30e0\u4e0a\u306e\u6a5f\u5fae\u6280\u8853\u306e\u4fdd\u8b77\u304b\u3089\u3001\u56fd\u5bb6\u5b89\u5168\u4fdd\u969c\u306e\u5168\u5206\u91ce\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u6a5f\u5bc6\u60c5\u5831\u306e\u5171\u6709\u307e\u3067\u5e83\u7bc4\u306b\u53ca\u3073\u307e\u3059\u3002 \u73fe\u5728\u307e\u3067\u3001\u591a\u304f\u306e\u56fd\u3005\u304c\u4e3b\u306bNATO\u56fd\u9593\u3067\u306e\u8abf\u6574\u306b\u6e96\u62e0\u3057\u305f\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u624b\u9806\u3092\u901a\u3057\u3066\u5354\u529b\u3092\u7d9a\u3051\u3066\u304d\u307e\u3057\u305f\u3002<br><br>\u65e5\u672c\u304c\u4ed6\u306e\u540c\u76df\u56fd\u3068\u3088\u308a\u7dca\u5bc6\u306a\u5354\u529b\u3092\u9032\u3081\u3066\u3044\u308b\u4e2d\u3001\u6f5c\u5728\u7684\u306a\u30d1\u30fc\u30c8\u30ca\u30fc\u56fd\u3068\u306e\u60c5\u5831\u7ba1\u7406\u306e\u624b\u7d9a\u304d\u306e\u9055\u3044\u306b\u7126\u70b9\u304c\u5f53\u3066\u3089\u308c\u3066\u3044\u307e\u3059\u3002<br><br>\u65e5\u672c\u653f\u5e9c\u306f\u73fe\u5728\u30012013\u5e74\u306b\u63a1\u629e\u3055\u308c\u305f\u7279\u5b9a\u79d8\u5bc6\u4fdd\u8b77\u6cd5\u306e\u57f7\u884c\u306b\u5411\u3051\u3001\u5fc5\u8981\u306a\u898f\u5236\u3068\u624b\u7d9a\u304d\u306e\u57fa\u76e4\u306e\u69cb\u7bc9\u3092\u9032\u3081\u3066\u3044\u307e\u3059\u3002\u3057\u304b\u3057\u3001\u5404\u7701\u5e81\u306b\u4eba\u54e1\u3068\u65bd\u8a2d\u306e\u30af\u30ea\u30a2\u30e9\u30f3\u30b9\u3092\u5b9f\u65bd\u3059\u308b\u305f\u3081\u306e\u500b\u5225\u306e\u8cac\u4efb\u304c\u8ab2\u3055\u308c\u308b\u4e2d\u3001\u4ed6\u56fd\u3067\u898b\u3089\u308c\u308b\u3088\u3046\u306a\u6a19\u6e96\u5316\u3055\u308c\u305f\u653f\u5e9c\u30b7\u30b9\u30c6\u30e0\u306f\u672a\u3060\u5b58\u5728\u3057\u3066\u3044\u307e\u305b\u3093\u3002<br><br>\u4eca\u56de\u306e\u30a6\u30a7\u30d3\u30ca\u30fc\u306f\u3001\u653f\u5e9c\u3001\u7523\u696d\u754c\u3001\u304a\u3088\u3073\u5b66\u8853\u5206\u91ce\u306e\u5c02\u9580\u5bb6\u304b\u3089\u306e\u610f\u898b\u3092\u901a\u3057\u3066\u3001\u60c5\u5831\u304a\u3088\u3073\u7523\u696d\u306e\u5b89\u5168\u4fdd\u969c\u306b\u95a2\u3059\u308b\u3055\u307e\u3056\u307e\u306a\u554f\u984c\u3092\u53d6\u308a\u4e0a\u3052\u3001\u5e74\u672b\u306b\u4e88\u5b9a\u3055\u308c\u3066\u3044\u308b\u65b0\u3057\u3044\u56fd\u5bb6\u5b89\u5168\u4fdd\u969c\u6226\u7565\u306e\u80cc\u666f\u60c5\u5831\u3092\u63d0\u4f9b\u3057\u307e\u3059\u3002<\/p>","protected":false},"excerpt":{"rendered":"<p>Protection of classified\/sensitive information is the greatest challenge facing increased cooperation with international partners on defense equipment and technology interests. Concerns range from protection of sensitive technologies on specific programs to broader sharing of classified\/sensitive information affecting all areas of national security. Many countries have successfully worked together for years with information security procedures that have been standardized, primarily on NATO coordination. As Japan begins to work more closely with these countries the differences in its procedures and those of potential partner countries have come into sharper focus. Building a foundation of regulations and procedures needed to implement the Secrets Protection Act adopted by Japan in 2013 remains a work [&hellip;]<\/p>","protected":false},"author":1,"featured_media":3813,"menu_order":5,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.9.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Industrial Security Dilemma - ISIC Japan - International Security Industry Council<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/isic-japan.org\/jp\/event\/the-industrial-security-dilemma\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Industrial Security Dilemma - ISIC Japan - International Security Industry Council\" \/>\n<meta property=\"og:description\" content=\"Protection of classified\/sensitive information is the greatest challenge facing increased cooperation with international partners on defense equipment and technology interests. Concerns range from protection of sensitive technologies on specific programs to broader sharing of classified\/sensitive information affecting all areas of national security. Many countries have successfully worked together for years with information security procedures that have been standardized, primarily on NATO coordination. As Japan begins to work more closely with these countries the differences in its procedures and those of potential partner countries have come into sharper focus. Building a foundation of regulations and procedures needed to implement the Secrets Protection Act adopted by Japan in 2013 remains a work [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/isic-japan.org\/jp\/event\/the-industrial-security-dilemma\/\" \/>\n<meta property=\"og:site_name\" content=\"ISIC Japan - International Security Industry Council\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-01T07:25:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/isic-japan.org\/wp-content\/uploads\/2021\/07\/access-banking-biometric-business-business-woman-code-concept-connection-credit-card-criminal-cyber_t20_nLErmK.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1178\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/isic-japan.org\/event\/the-industrial-security-dilemma\/\",\"url\":\"https:\/\/isic-japan.org\/event\/the-industrial-security-dilemma\/\",\"name\":\"The Industrial Security Dilemma - ISIC Japan - International Security Industry Council\",\"isPartOf\":{\"@id\":\"https:\/\/isic-japan.org\/#website\"},\"datePublished\":\"2022-07-26T02:53:07+00:00\",\"dateModified\":\"2022-08-01T07:25:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/isic-japan.org\/event\/the-industrial-security-dilemma\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/isic-japan.org\/event\/the-industrial-security-dilemma\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/isic-japan.org\/event\/the-industrial-security-dilemma\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/isic-japan.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Events\",\"item\":\"https:\/\/isic-japan.org\/events\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Industrial Security Dilemma\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/isic-japan.org\/#website\",\"url\":\"https:\/\/isic-japan.org\/\",\"name\":\"ISIC Japan - International Security Industry Council\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/isic-japan.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/isic-japan.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/isic-japan.org\/#organization\",\"name\":\"ISIC Japan - International Security Industry Council\",\"url\":\"https:\/\/isic-japan.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/isic-japan.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/isic-japan.org\/wp-content\/uploads\/2023\/06\/Website-Logo-sm.png\",\"contentUrl\":\"https:\/\/isic-japan.org\/wp-content\/uploads\/2023\/06\/Website-Logo-sm.png\",\"width\":220,\"height\":52,\"caption\":\"ISIC Japan - International Security Industry Council\"},\"image\":{\"@id\":\"https:\/\/isic-japan.org\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Industrial Security Dilemma - ISIC Japan - International Security Industry Council","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/isic-japan.org\/jp\/event\/the-industrial-security-dilemma\/","og_locale":"ja_JP","og_type":"article","og_title":"The Industrial Security Dilemma - ISIC Japan - International Security Industry Council","og_description":"Protection of classified\/sensitive information is the greatest challenge facing increased cooperation with international partners on defense equipment and technology interests. Concerns range from protection of sensitive technologies on specific programs to broader sharing of classified\/sensitive information affecting all areas of national security. Many countries have successfully worked together for years with information security procedures that have been standardized, primarily on NATO coordination. As Japan begins to work more closely with these countries the differences in its procedures and those of potential partner countries have come into sharper focus. Building a foundation of regulations and procedures needed to implement the Secrets Protection Act adopted by Japan in 2013 remains a work [&hellip;]","og_url":"https:\/\/isic-japan.org\/jp\/event\/the-industrial-security-dilemma\/","og_site_name":"ISIC Japan - International Security Industry Council","article_modified_time":"2022-08-01T07:25:02+00:00","og_image":[{"width":1920,"height":1178,"url":"https:\/\/isic-japan.org\/wp-content\/uploads\/2021\/07\/access-banking-biometric-business-business-woman-code-concept-connection-credit-card-criminal-cyber_t20_nLErmK.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"1\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/isic-japan.org\/event\/the-industrial-security-dilemma\/","url":"https:\/\/isic-japan.org\/event\/the-industrial-security-dilemma\/","name":"The Industrial Security Dilemma - ISIC Japan - International Security Industry Council","isPartOf":{"@id":"https:\/\/isic-japan.org\/#website"},"datePublished":"2022-07-26T02:53:07+00:00","dateModified":"2022-08-01T07:25:02+00:00","breadcrumb":{"@id":"https:\/\/isic-japan.org\/event\/the-industrial-security-dilemma\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/isic-japan.org\/event\/the-industrial-security-dilemma\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/isic-japan.org\/event\/the-industrial-security-dilemma\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/isic-japan.org\/"},{"@type":"ListItem","position":2,"name":"Events","item":"https:\/\/isic-japan.org\/events\/"},{"@type":"ListItem","position":3,"name":"The Industrial Security Dilemma"}]},{"@type":"WebSite","@id":"https:\/\/isic-japan.org\/#website","url":"https:\/\/isic-japan.org\/","name":"ISIC Japan - International Security Industry Council","description":"","publisher":{"@id":"https:\/\/isic-japan.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/isic-japan.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/isic-japan.org\/#organization","name":"ISIC Japan - International Security Industry Council","url":"https:\/\/isic-japan.org\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/isic-japan.org\/#\/schema\/logo\/image\/","url":"https:\/\/isic-japan.org\/wp-content\/uploads\/2023\/06\/Website-Logo-sm.png","contentUrl":"https:\/\/isic-japan.org\/wp-content\/uploads\/2023\/06\/Website-Logo-sm.png","width":220,"height":52,"caption":"ISIC Japan - International Security Industry Council"},"image":{"@id":"https:\/\/isic-japan.org\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/isic-japan.org\/jp\/wp-json\/wp\/v2\/event\/3722"}],"collection":[{"href":"https:\/\/isic-japan.org\/jp\/wp-json\/wp\/v2\/event"}],"about":[{"href":"https:\/\/isic-japan.org\/jp\/wp-json\/wp\/v2\/types\/event"}],"author":[{"embeddable":true,"href":"https:\/\/isic-japan.org\/jp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isic-japan.org\/jp\/wp-json\/wp\/v2\/comments?post=3722"}],"version-history":[{"count":0,"href":"https:\/\/isic-japan.org\/jp\/wp-json\/wp\/v2\/event\/3722\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/isic-japan.org\/jp\/wp-json\/wp\/v2\/media\/3813"}],"wp:attachment":[{"href":"https:\/\/isic-japan.org\/jp\/wp-json\/wp\/v2\/media?parent=3722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}