CPX 2017 Slides

Document created by Niran Turgeman Employee on Jun 19, 2017Last modified by Moti Sagey on Jun 26, 2017
Version 24Show Document
  • View in full screen mode

CPX 2017 content is now available online!

 

Learn more about the Future of Cyber Security and Check Point Infinity from Check Point founder and CEO Gil Shwed and other Check Point experts. Explore the power of the Cloud & Mobile, understand advanced threats and how to block them, and master efficient security management techniques. For exclusive access to full slide decks from each presentation, please log into your Check Point CheckMates account.

Cyber Talks

TopicSpeakerContentAbstract
Welcome to the Future of Cyber SecurityGil Shwed
Founder and CEO
Check Point Software Technologies

Presentation

View YouTube Video

We are all living in a connected world which is affecting every aspect of our lives.

In the past couple of years, we have been discussing implications of a  technology and digital-driven world (i.e.) cloud, mobile, advanced threats.

Today, we are seeing some of our worst predictions shaping into real life.

So why are businesses not protecting themselves and instead keep making excuses? 

In today’s world, business need security that meet their business needs.

Gil Shwed's discussion defines the pillars of security that businesses should adopt, based on their actual business needs.

Gil Shwed & Marius Nacht Interview @ 2017 CPX Milan

Gil Shwed
Founder and CEO
Check Point Software Technologies

Marius Nacht

Co-Founder and Chairman

View YouTube Gil Shwed & Marius Nacht Interview @ 2017 CPX Milan
Cyber Security in the Era of Exponential TechnologyAmnon Bar-Lev
President
Check Point Software Technologies

Presentation

View YouTube Video

We are in an extraordinary time in human history. Thanks to innovative and disruptive technologies we live longer, healthier and more educated than ever before. While technologies such as cloud computing, mobile and Internet of Things open up new opportunities, they are, in many cases, the biggest barriers for adoption due to cyber security concerns. How do you innovate, inspire and compete while remaining secure? In his inspiring session, Amnon Bar-Lev shares the Check Point vision on how organizations can keep focus on innovating while being secured with a security architecture that is one step ahead.
Seeing is Believing: Hacking the SmartphoneMichael Shaulov
Head of Product Management and Product Marketing, Mobile
Check Point Software Technologies

Presentation

View YouTube Video

Join this exciting live demo to see first-hand how easy it is to hack any smartphone today. In this session Michael Shaulov will demonstrate live hacking of a smartphone, the risks and possible mitigations for the new Achilles heel of enterprises today and tomorrow.
Surviving the Ransomware PlagueOrli Gan
Head of Products, Threat Prevention
Check Point Software Technologies

Presentation

View YouTube Video

Ransomware reached epidemic proportions in 2016. Organizations of all sizes and sectors fell victim to malware that locked down, encrypted – and in some cases threatened to destroy – critical systems and data. How would you avoid becoming tomorrow’s headline? How can businesses continue to operate without disruption despite this looming threat? Learn how Check Point Anti-Ransomware technology protects against every type of ransomware attack, ensuring continuous access to your data
Check Point Latest AnnouncementsGabi Reish
VP, Product Management and Product Marketing
Check Point Software Technologies

Presentation

View YouTube Video

Check Point Infinity announcement
Choosing the Right Security ArchitectureMoti Sagey
Head of Strategic Marketing & Intelligence
Check Point Software Technologies

Presentation

View YouTube Video

When it comes to choosing the right security architecture & security vendor, what does it take to win your trust?  In this session Moti Sagey will cover three key pillars the security solution must possess to win in a highly competitive environment:  Uncompromised Security, Everywhere Architecture and Operational Efficiency. Moti will share pragmatic tips to unveil the true efficacy of the solution with zero marketing "fluffy claims".
Shedding Light on the Dark WebAvi Rembaum 
Vice President, Security Solutions
Neatsun Ziv 
VP, Threat Prevention
Check Point Software Technologies

Presentation

View YouTube Video

The dark web is quickly evolving into a marketplace of information and tools that the hackers and adversaries use to breach company networks. The question we face as an industry is how to leverage an awareness of information for sale in the dark web to improve corporate security architectures. This session showcase real examples of data in the dark web and suggest pragmatic tips to mitigate future attacks.
What To Do When It Happens to You - Check Point Incident ResponseDaniel Wiley
Head of Incident Response
Check Point Software Technologies

Presentation

View YouTube Video

Based on real world experiences of helping customers, this candid discussion will focus on ensuring that your organization is prepared when a breach occurs in your network.  The discussion will provide real world examples of what works and what does not work and provides a framework on how to center your organizations security strategy to face any incident head on. 
IoT Hacking - LiveOded Vanunu
Head of Products Vulnerability Research
Check Point Software Technologies

Presentation

Ready or not, the Internet of things (IoT) is here. No longer a buzz word, it continues to grow at an unprecedented pace for years to come and is expected to reach over 25 billion connected devices by 2020. Most IoT devices, apps, and infrastructure were developed without security in mind and have already been exploited on major hacking campaigns in the past two years & will continue to be the main targets for hackers. Are organizations ready to protect themselves? What are the key vulnerable points? In this session Oded Vanunu enters into the Hacker mind to exploit IoT devices. Oded will also share insights on possible mitigations for these threats
Life Inside the CloudBrian Linder
Datacenter Sales Manager, Eastern US
Check Point Software Technologies

 

View YouTube Video

The era of cloud is upon us; firms of all sizes and in all walks of life are looking to leverage the agility and elasticity of cloud.  But cloud carries a totally new and unique set of security challenges. In this informative and entertaining session, you will take away five key tenants of cloud security, along with an accompanying set of recommendations on best practices securing hybrid cloud deployments. Brian Linder will share a healthy dose of a real-life experience with an actual Check Point customer use case securing their complex hybrid cloud deployment.
Safe Journey to the CloudItai Greenberg
Head of Cloud Security
Check Point Software Technologies

Presentation

View YouTube Video

The era of cloud is upon us; firms of all sizes and in all walks of life are looking to leverage the agility and elasticity of cloud.  But cloud carries a totally new and unique set of security challenges. In this session, you will take away five key tenants of cloud security, along with an accompanying set of recommendations on best practices securing hybrid cloud deployments.
External Speakers
Moving to the Public Cloud, Securely - FireChat with AWS & AzureAmazon AWS , Microsoft AzureView YouTube Video

More than 70% of  the organizations are committed to a cloud strategy in 2017.

Businesses are moving their applications to the Cloud to gain more agility and efficiencies.

At the same time, Cloud security remains their  top concern.

Customers are looking for solution to secure their data and applications from modern threat targeting their shared, connected and agile cloud environment.

Join us for a fireside chat with top leaders from AWS, Azure and learn about their perspectives and recommendations for security best practices in the cloud.

How We Blocked a Targeted AttackDr. Matthias Rosche
Senior Vice President, Solution Sales & Consulting
Deutsche Telekom Group

Presentation

A story of a real incident in which Deutsche Telekom was able to detect and prevent a specific cyber-attack. Describing the kill chain in laymen terms, how the attack was mitigated and the lessons learned.
We Make Jeans; How Hard Can That Be?Steve Zalewski
Chief Security Architect
Levi Strauss & Co.

Presentation

View YouTube Video

This talk will present some of the business challenges, learnings and roadmaps from a security perspective to protect the global Levi Brand
Keeping it SimpleLuke Beeson
Vice President of Security
British Telecom

Presentation

Presenting key guidance and directions related to the main needs of security architecture for 2017; how it must follow the business needs - and first and foremost - be simple and efficient to operate.
The Evolving Role of the CISO in a Post Breach OrganizationJoey Smith
CISO
Schnuck Markets

Presentation

View YouTube Video

In this session CISO Joey Smith will discuss understanding the importance of compliance and security and how they are very different.  Additionally he will review many of the personal leanings that he has gained from his experience as a CISO responsible for maturing an Information Security program.
Simple Security Is Your Best BetPatrick Woods
CISO
Missouri State Highway Patrol

Presentation

View YouTube Video

This thought-provoking session will challenge current models in cyber security management and architecture that suggest that complex problems demand complex solutions. Instead, it is a simplified approach, keeping users and senior leadership engaged while leveraging key partnerships that will prepare organizations to combat the cyber threats of today and tomorrow
CISO... What's Next?Geremy Benkirane
Chief Information Security Officer
Exane SA

Presentation

When managing and controlling information systems and data risks leads to the data controlling the business.

Future of Cyber Security

TopicSpeakerContent
Don't Fear the Cloud: Secure It

Erez Berkner

Check Point Software Technologies

Presentation
Understanding Advanced Threats and How to Prevent Them

Nathan Shuchami

Check Point Software Technologies

Presentation
GDPR - Jump-Start Your Compliance Today!Gabi Reish
Check Point Software Technologies
Presentation

Vertical Sessions

TopicSpeakerContent
Protecting Industrial Control Systems

Noam Green

Mati Epstein

Presentation
Best Practices for Securing the Retail SectorGabi Reish
Check Point Software Technologies
Presentation
Telcos and ISPs: The Next Generation of Security ServicesYoav Shay DanielyPresentation

Meet the Experts

TopicSpeakerContent
How Organizations Can Gain Infrastructure Efficiency by Automating Their Network OperationsRafi Zvi
CEO and Co-Founder
BackBox
sponsor sessions
How to Become a Firewall Automation NinjaRuvi Kitov
CEO and Co-Founder
Tufin
sponsor sessions
How Hackers Think - Dissecting Malware Operations

Maya Horowitz

Check Point Software Technologies

Presentation
WannaCry Under the Microscope

Yaniv Balmas

Maya Horowitz

Check Point Software Technologies

Presentation
How to Build the Rule-Base of the Future

Amnon Perlmutter

Check Point Software Technologies

Presentation
Unleashing the Power of the Cloud

Erez Berkner

Check Point Software Technologies

Presentation
Scalable Security Platforms - Done the Right Way

Benny Shlesinger

Derek Middlemiss

Presentation
Automation & Orchestration Deep DiveMarco Garcia
Ryan Darst
Check Point Software Technologies
Presentation
Leveraging White & Black Hat Cyber Intelligence to Stay One Step Ahead

Maya Horowitz

Oded Vanunu

Check Point Software Technologies

Presentation
Advanced Gateway Configuration and Management

Tomer Noy

Check Point Software Technologies

Presentation
Analyzing and Preventing Attacks from the Network to the Endpoint

Lior Arzi

Check Point Software Technologies

Presentation

Understanding and Blocking Advanced Mobile Attacks

 

Note: Due to large file size the slide deck is split

Micha Burd

Ohad Bobrov

Check Point Software Technologies

Presentation

Tech Rooms

TopicSpeakerContent
99.9 Effectiveness with IPS + NSS

Roman Kunicher

Smadar Paradise

Presentation

Video (WMV) - Click to Download

Performance - Acceleration Cards Presentation
Automation and Orchestration Presentation
Upgrade and Migrations to R80.10 YouTube Video
   

Pre-Conference

TopicSpeakerContent
Hands-On Security Management and GatewayJim ÖqvistPresentation
Securing CloudsJavier HijasPresentation
Orchestration and Automation

Ryan Darst

Marco Garcia

Presentation

 

12 people found this helpful

Attachments

    Outcomes