Welcome to the ICA

Established in 1970, the ICA (International Computer Association) has grown into one of Japan’s largest, most influential organizations covering Information Technology and Business in Japan. The ICA provides a forum for information exchange, networking, and identification of business expansion opportunities with many of the key movers and shakers in Japan. Read more about the ICA

[Feb 27th 2018] "Japan Labor Shortage; Is it for real? How will it play out?"


Speaker:  Grant Habgood
Managing Director, SThree PLC Japan Operations

The job market for foreign nationals follows a cycle that sees Japanese conglomerates switching their priority between hiring foreign and domestic

In some sectors, such as Hi Tech start-ups, there are employment opportunities for foreign nationals who don’t possess strong Japanese language skills, the opposite could be said for other sectors in the market that are prioritizing on Japanese language skills, potentially forgoing the chance to secure the experience and skills of professionals who do not have the Japanese skills.

[Dec. 7th, 2017] ICA Japan End of Year Bonenkai


The ICA invites you to join our Bonenkai event to be held at Hobgoblin Shibuya. This will be an excellent opportunity to catch up with old friends, meet new people and network with peers in related industries, or simply to put names to faces as we head to the end of the year.

Be sure to bring your colleagues and friends to join the party.

Open to all, RSVP required.

[Nov 1st 2017] "Rise of Ransomware is Stopping Businesses. How can your organization Stay Resilient?"


Speaker:  Brent Reichow
Co-founder & CEO, Blueshift Data Protection

For years extortion has been a successful way for criminals to coerce money from victims. Extortion still exists but recently criminals have found a much more efficient way to extract the money - ransomware. Ransomware by definition is a form of malware that stops or limits access to systems, either by locking the screen or by locking your files. This is typically done with an encryption algorithm known only to the criminal. Money is demanded and until it’s paid the victim cannot use or gain access to their data.

Presentation Downloads

Leave a Comment