BEGIN:VCALENDAR
CALSCALE:GREGORIAN
VERSION:2.0
PRODID:-//Events Calendar//iCal4j 1.0//EN
BEGIN:VTIMEZONE
TZID:Asia/Jerusalem
LAST-MODIFIED:20260306T231828Z
TZURL:https://www.tzurl.org/zoneinfo/Asia/Jerusalem
X-LIC-LOCATION:Asia/Jerusalem
X-PROLEPTIC-TZNAME:LMT
BEGIN:STANDARD
TZNAME:JMT
TZOFFSETFROM:+022054
TZOFFSETTO:+022040
DTSTART:18800101T000000
END:STANDARD
BEGIN:STANDARD
TZNAME:IST
TZOFFSETFROM:+022040
TZOFFSETTO:+0200
DTSTART:19180101T000000
END:STANDARD
BEGIN:DAYLIGHT
TZNAME:IDT
TZOFFSETFROM:+0200
TZOFFSETTO:+0300
DTSTART:19400601T020000
RDATE:19401117T020000
RDATE:19490501T020000
RDATE:19500416T020000
RDATE:19510401T020000
RDATE:19520420T020000
RDATE:19530412T020000
RDATE:19540613T020000
RDATE:19550612T020000
RDATE:19560603T020000
RDATE:19570428T020000
RDATE:19740707T000000
RDATE:19750420T000000
RDATE:19800803T000000
RDATE:19840506T000000
RDATE:19850414T000000
RDATE:19860518T000000
RDATE:19870415T000000
RDATE:19880410T000000
RDATE:19890430T000000
RDATE:19900325T000000
RDATE:19910324T000000
RDATE:19920329T000000
RDATE:19930402T000000
RDATE:19940401T000000
RDATE:19950331T000000
RDATE:19960315T000000
RDATE:19970321T000000
RDATE:19980320T000000
RDATE:19990402T020000
RDATE:20000414T020000
RDATE:20010409T010000
RDATE:20020329T010000
RDATE:20030328T010000
RDATE:20040407T010000
END:DAYLIGHT
BEGIN:STANDARD
TZNAME:IST
TZOFFSETFROM:+0300
TZOFFSETTO:+0200
DTSTART:19401001T030000
RDATE:19500915T030000
RDATE:19511111T030000
RDATE:19521019T030000
RDATE:19530913T030000
RDATE:19540912T030000
RDATE:19550911T030000
RDATE:19560930T030000
RDATE:19570922T030000
RDATE:19741013T000000
RDATE:19750831T000000
RDATE:19800914T010000
RDATE:19840826T010000
RDATE:19850901T000000
RDATE:19860907T000000
RDATE:19870913T000000
RDATE:19880904T000000
RDATE:19890903T000000
RDATE:19900826T000000
RDATE:19910901T000000
RDATE:19920906T000000
RDATE:19930905T000000
RDATE:19940828T000000
RDATE:19950903T000000
RDATE:19960916T000000
RDATE:19970914T000000
RDATE:19980906T000000
RDATE:19990903T020000
RDATE:20001006T010000
RDATE:20010924T010000
RDATE:20021007T010000
RDATE:20031003T010000
RDATE:20040922T010000
RDATE:20051009T020000
RDATE:20061001T020000
RDATE:20070916T020000
RDATE:20081005T020000
RDATE:20090927T020000
RDATE:20100912T020000
RDATE:20111002T020000
RDATE:20120923T020000
END:STANDARD
BEGIN:STANDARD
TZNAME:IST
TZOFFSETFROM:+0300
TZOFFSETTO:+0200
DTSTART:19421101T030000
RRULE:FREQ=YEARLY;UNTIL=19461101T000000Z
END:STANDARD
BEGIN:DAYLIGHT
TZNAME:IDT
TZOFFSETFROM:+0200
TZOFFSETTO:+0300
DTSTART:19430401T020000
RRULE:FREQ=YEARLY;UNTIL=19440401T000000Z
END:DAYLIGHT
BEGIN:DAYLIGHT
TZNAME:IDT
TZOFFSETFROM:+0200
TZOFFSETTO:+0300
DTSTART:19450416T020000
RRULE:FREQ=YEARLY;UNTIL=19460416T000000Z
END:DAYLIGHT
BEGIN:DAYLIGHT
TZNAME:IDDT
TZOFFSETFROM:+0200
TZOFFSETTO:+0400
DTSTART:19480523T020000
END:DAYLIGHT
BEGIN:DAYLIGHT
TZNAME:IDT
TZOFFSETFROM:+0400
TZOFFSETTO:+0300
DTSTART:19480901T040000
END:DAYLIGHT
BEGIN:STANDARD
TZNAME:IST
TZOFFSETFROM:+0300
TZOFFSETTO:+0200
DTSTART:19481101T030000
RRULE:FREQ=YEARLY;UNTIL=19491101T000000Z
END:STANDARD
BEGIN:DAYLIGHT
TZNAME:IDT
TZOFFSETFROM:+0200
TZOFFSETTO:+0300
DTSTART:20050401T020000
RRULE:FREQ=YEARLY;UNTIL=20120330T000000Z;BYYEARDAY=-275,-276,-277,-278,-279
 ,-280,-281;BYDAY=FR
END:DAYLIGHT
BEGIN:DAYLIGHT
TZNAME:IDT
TZOFFSETFROM:+0200
TZOFFSETTO:+0300
DTSTART:20130329T020000
RRULE:FREQ=YEARLY;BYMONTH=3;BYMONTHDAY=23,24,25,26,27,28,29;BYDAY=FR
END:DAYLIGHT
BEGIN:STANDARD
TZNAME:IST
TZOFFSETFROM:+0300
TZOFFSETTO:+0200
DTSTART:20131027T020000
RRULE:FREQ=YEARLY;BYMONTH=10;BYDAY=-1SU
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20260509T211050Z
DTSTART;TZID=Asia/Jerusalem:20260519T180000
DTEND;TZID=Asia/Jerusalem:20260519T190000
SUMMARY:AI Security Masters E8 -  Claude Mythos: New Era in Cyber Security
LAST-MODIFIED:20260509T211050Z
LOCATION:
TZID:Asia/Jerusalem
UID:message-1239
DESCRIPTION:Click the link below to go to the event page:\nhttps://communit
 y.checkpoint.com/t5/CheckMates-Events/AI-Security-Masters-E8-Claude-Mythos
 -New-Era-in-Cyber-Security/ec-p/276407#M1239\n\nWhat happens when AI moves
  from assistant to autonomous security operator? The Claude Mythos model r
 epresents a new class of AI-driven capability\, where large language model
 s evolve beyond chat and into active participants in cybersecurity workflo
 ws. With expanded context windows\, advanced reasoning\, and increasing au
 tonomy\, models like Claude are beginning to reshape how security teams un
 cover threats\, analyze vulnerabilities\, and respond at scale.  In this w
 ebinar\, we’ll explore how the Claude Mythos approach pushes the boundarie
 s of what AI can do in cybersecurity\, from accelerating the discovery of 
 previously unknown vulnerabilities to enabling more adaptive\, self-direct
 ed defense strategies. But with this power comes new questions: How far ca
 n autonomy go? Where should humans stay in control? And what risks emerge 
 when AI operates with greater independence? Join us for a forward-looking 
 discussion on how AI is transitioning from a tool to a collaborator\, and 
 what that means for the future of cyber defense. Register Now    May 19th\
 , 5PM CET | 11 AM EST
X-ALT-DESC;FMTTYPE=text/html:<P>Click the link below to go to the event pag
 e:</P><BR><A href="https://community.checkpoint.com/t5/CheckMates-Events/A
 I-Security-Masters-E8-Claude-Mythos-New-Era-in-Cyber-Security/ec-p/276407#
 M1239">https://community.checkpoint.com/t5/CheckMates-Events/AI-Security-M
 asters-E8-Claude-Mythos-New-Era-in-Cyber-Security/ec-p/276407#M1239</A><BR
 ><BR><P><SPAN>What happens when AI moves from assistant to autonomous secu
 rity operator?</SPAN></P>\n<P><SPAN> The Claude Mythos model represents a 
 new class of AI-driven capability\, where large language models evolve bey
 ond chat and into active participants in cybersecurity workflows. With exp
 anded context windows\, advanced reasoning\, and increasing autonomy\, mod
 els like Claude are beginning to reshape how security teams uncover threat
 s\, analyze vulnerabilities\, and respond at scale. </SPAN></P>\n<P><SPAN>
 In this webinar\, we’ll explore how the Claude Mythos approach pushes the 
 boundaries of what AI can do in cybersecurity\, from accelerating the disc
 overy of previously unknown vulnerabilities to enabling more adaptive\, se
 lf-directed defense strategies. But with this power comes new questions: H
 ow far can autonomy go? </SPAN><SPAN>Where should humans stay in control? 
 And what risks emerge when AI operates with greater independence?</SPAN></
 P>\n<P><SPAN> Join us for a forward-looking discussion on how AI is transi
 tioning from a tool to a collaborator\, and what that means for the future
  of cyber defense.</SPAN></P>\n<H2 class="lia-align-center" id="toc-hId-16
 51228394" style="text-align: center\;"><A href="https://checkpoint.zoom.us
 /webinar/register/6017778142539/WN_f9rYfBbSSvGPEdWIJwkcYQ" target="_self" 
 rel="nofollow noopener noreferrer"><SPAN>Register Now&nbsp\;</SPAN></A></H
 2>\n<P>&nbsp\;</P>\n<H3 class="lia-align-center" id="toc-hId--1097442072" 
 style="text-align: center\;"><SPAN>May 19th\, 5PM CET | 11 AM EST</SPAN></
 H3>
END:VEVENT
END:VCALENDAR
