<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CPX 360 2022 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/142109#M25236</link>
    <description>&lt;P&gt;We do not make Dorit’s roadmap presentation available for later viewing.&lt;BR /&gt;If you have specific roadmap questions it’s best to reach out to your local Check Point representative.&lt;/P&gt;</description>
    <pubDate>Mon, 21 Feb 2022 22:00:28 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2022-02-21T22:00:28Z</dc:date>
    <item>
      <title>CPX 360 2022</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/138585#M24678</link>
      <description>&lt;H1 class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="image2022-2-1_15-4-24.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15192i3425EA628174BDCF/image-size/large?v=v2&amp;amp;px=999" role="button" title="image2022-2-1_15-4-24.jpg" alt="image2022-2-1_15-4-24.jpg" /&gt;&lt;/span&gt;&lt;/H1&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;For exclusive access to the slides and videos from each presentation, please log into your Check Point CheckMates account&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;&lt;STRONG style="font-size: 14px; font-family: inherit;"&gt;**If you are not a member yet, its easy (and free) to join, &lt;A href="https://accounts.checkpoint.com/#/signup" target="_blank" rel="noopener"&gt;click here&lt;/A&gt;**&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;IFRAME src="https://www.youtube.com/embed/fqmQzOmhKyI?autoplay=1&amp;amp;mute=1" width="999" height="562" frameborder="0" allowfullscreen="allowfullscreen" title="YouTube video player" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture"&gt;&lt;/IFRAME&gt;&lt;/P&gt;
&lt;DIV class="lia-align-center" style="color: #6d6e71; background: #e6e6e6; margin: 0px auto;"&gt;&lt;BR /&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR style="background-color: #000000;"&gt;
&lt;TH class="lia-align-center" style="width: 100%; background-color: #ffffff;" colspan="2" width="50%" height="26px"&gt;&lt;FONT size="4" color="#FF0000"&gt;Keynotes and Breakout Sessions&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="50%" height="25px"&gt;&lt;A href="#CyberTalkKeyNotes" target="_self"&gt;Cyber Talk Keynotes&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="50%" height="25px"&gt;&lt;A href="#SecureTheCloud" target="_self"&gt;Secure The Cloud&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%" height="25px"&gt;&lt;A href="#SecureTheNetwork" target="_self"&gt;Secure The Hybrid Data Center&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="50%" height="25px"&gt;&lt;A href="#SecureUsersAndAccess" target="_self"&gt;Zero Trust Security for the Remote Workforce&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%" height="25px"&gt;&lt;A href="#SecurityAutomationOrchestration" target="_self"&gt;Security Automation SOC and XDR&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="50%" height="25px"&gt;&lt;A href="#HackersExposed" target="_self"&gt;cp&amp;lt;r&amp;gt; - The Latest Check Point Research&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%" height="47px"&gt;&lt;A href="#CloudSecurityBestPracticesWorkshops" target="_self"&gt;Cloud Security Best Practices Workshops&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="50%" height="47px"&gt;&lt;A href="#SASEBestPracticesWorkshops" target="_self"&gt;Secure Remote Access (SASE) Best Practices Workshops&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%" height="25px"&gt;&lt;A href="#CommunityUseCases" target="_self"&gt;CheckMates Case Studies and Use-Cases&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="50%" height="25px"&gt;&lt;A href="#PartnersTrack" target="_self"&gt;Partners Track&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD height="25px"&gt;&lt;A href="#ExecutiveTrack" target="_blank" rel="noopener"&gt;Executive Track&lt;/A&gt;&lt;/TD&gt;
&lt;TD height="25px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;H2 id="CyberTalkKeynotes" style="color: #e45785;"&gt;Cyber Talk Keynotes&lt;/H2&gt;
&lt;TABLE border="1" width="934px"&gt;
&lt;THEAD&gt;
&lt;TR class="tablesorter-headerRow" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px;" role="row"&gt;
&lt;TD width="186.594px" height="23px" scope="col" class="confluenceTh tablesorter-header sortableHeader tablesorter-headerUnSorted" style="height: 23px; width: 20%;" data-column="0" aria-disabled="false" aria-controls="TBL1572508475011" aria-sort="none" aria-label="Topic: No sort applied, activate to apply an ascending sort"&gt;
&lt;DIV class="tablesorter-header-inner"&gt;Topic&amp;nbsp;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="186.594px" height="23px" style="width: 20%; height: 23px;"&gt;Speaker&lt;/TD&gt;
&lt;TD width="186.594px" height="23px" style="width: 20%; height: 23px;"&gt;Content&lt;/TD&gt;
&lt;TD width="373.219px" height="23px" style="width: 40%;"&gt;Description&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="533px" style="width: 15%;"&gt;Founder &amp;amp; CEO Gil Shwed Keynote&lt;/TD&gt;
&lt;TD width="186.594px" height="533px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Gil Shwed&lt;/STRONG&gt;&lt;BR /&gt;Founder and CEO&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Dr. Dorit Dor&lt;/STRONG&gt;&lt;BR /&gt;Chief Product Officer&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Amit Krig&lt;/STRONG&gt;&lt;BR /&gt;SVP Software&lt;BR /&gt;Nvidia&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Moti Sagey&lt;/STRONG&gt;&lt;BR /&gt;Chief Evangelist, VP Strategic Marketing&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Aviv Abramovich&lt;/STRONG&gt;&lt;BR /&gt;Head of Product Management&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Itai Greenberg&lt;BR /&gt;&lt;/STRONG&gt;VP Product Management&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.594px" height="533px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/559/2/2022%20CPX%20Keynote%20-%20In%20and%20Out%20V10%20Jan%2011.pdf" target="_self"&gt;Presentation - Gil&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://tiny.cc/mindgap" target="_self"&gt;Presentation - Moti&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/559/3/New%20Products%20Announcements%20-%20Itai%20Greenberg.pdf" target="_self"&gt;Presentation - Itai&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Founder-amp-CEO-Gil-Shwed-Keynote/m-p/139717#M559" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="533px" style="width: 15%;"&gt;
&lt;P&gt;For over 25 years Check Point have pioneered cyber security and introduced technological innovation to allow better experiences in a safer world. 2022 is no different.&lt;/P&gt;
&lt;P&gt;While the new world becomes more digitally connected, it also creates challenges like cyber threats becoming sophisticated and criminals launching attacks that cause colossal damage.&lt;/P&gt;
&lt;P&gt;In this session, Gil will present why, in this new world, its imperative to have the best security, become cyber heroes, and adopt a secure, consolidated, and preventive approach to cyber security with Check Point Infinity.&lt;/P&gt;
&lt;P&gt;This session will also feature how Check Point and Nvidia are redefining data center and network security performance, as well as announcement of new exciting innovations in 2022.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="194px" style="width: 15%;"&gt;What Does It Take To Be The Best?&lt;/TD&gt;
&lt;TD width="186.594px" height="194px" style="width: 15%;"&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Usain Bolt&lt;BR /&gt;&lt;/STRONG&gt;8 Time Olympic Champion and Worlds Fastest Man&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Gil Shwed&lt;BR /&gt;&lt;/STRONG&gt;Founder &amp;amp; CEO&lt;BR /&gt;Check Point&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.594px" height="194px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/What-Does-It-Take-To-Be-The-Best/td-p/140132/jump-to/first-unread-message" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="194px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;What can IT leaders learn from the most gifted sprinter of all time? Join Usain Bolt in an exclusive interview event to discuss how top-performance and speed can be the mere difference between winning and losing. Securing your organization’s network and dominating your rivals in an Olympic race both come down to one key factor: moving at light speed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="253px"&gt;Customer Story: Is Vendor Consolidation a Genuine Cyber Strategy or is it Just Hype&lt;/TD&gt;
&lt;TD width="186.594px" height="253px" style="width: 15%;"&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Sharat Sinha&lt;/STRONG&gt;&lt;BR /&gt;Vice President and General Manager APAC and Japan&lt;BR /&gt;Check Point&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;Suman Mukhopadhyay&lt;BR /&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;FONT color="#000000"&gt;AVP &amp;amp; Senior Director - Technology Management&lt;/FONT&gt;&lt;FONT color="#000000"&gt;&lt;BR /&gt;EdgeVerve Systems&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.594px" height="253px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Customer-Story-Is-Vendor-Consolidation-a-Genuine-Cyber-Strategy/m-p/140159#M561" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="253px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Hear first hand from customers their use cases to secure their everything. In this session Sharat Sinha, General Manager APAC &amp;amp; Suman Mukhopadhyay, AVP &amp;amp; Senior Director – Technology Management, EdgeVerve Systems will discuss the question "Is vendor consolidation a genuine cyber strategy or is it just hype?"&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="187px" style="width: 15%;"&gt;"Evolved Security in the Real World": How State Bank of India Secures with Maestro&lt;/TD&gt;
&lt;TD width="186.594px" height="187px" style="width: 15%;"&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Amol Pai&lt;BR /&gt;&lt;/STRONG&gt;CTO&lt;BR /&gt;State Bank of India&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Gary Gardiner&lt;BR /&gt;&lt;/STRONG&gt;Head of Security Engineering APAC&lt;BR /&gt;Check Point&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.594px" height="187px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/quot-Evolved-Security-in-the-Real-World-quot-How-State-Bank-of/m-p/140160#M152" target="_self"&gt;View YouTube Video&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="187px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Hear first hand from customers their use cases to secure their everything. This session will focus on How Infosys secures 150,000 remote workers and how State Bank of India secures with Maestro.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="209px" style="width: 15%;"&gt;Customer Stories: Securing the Everywhere and Anything Employee: CISO's secrets for Zero Incidents&lt;/TD&gt;
&lt;TD width="186.594px" height="209px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;David Ulloa&lt;/STRONG&gt;&lt;BR /&gt;CISO&lt;BR /&gt;IMC&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Brian Linder&lt;/STRONG&gt;&lt;BR /&gt;Head of Worldwide Evangelists Office of the CTO&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.594px" height="209px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Customer-Stories-Securing-the-Everywhere-and-Anything-Employee/m-p/139616" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="209px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;How consolidation assists CISOs in securing the supply chain.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="216px" style="width: 15%;"&gt;Hacking Like a White Hat Witch&lt;/TD&gt;
&lt;TD width="186.594px" height="216px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Maya Horowitz&lt;/STRONG&gt;&lt;BR /&gt;VP Research&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.594px" height="216px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Hacking-Like-a-White-Hat-Witch/m-p/139617#M73" target="_self"&gt;View YouTube Video&amp;nbsp;&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="216px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;“We’ve all got both light and dark inside us. What matters is the part we choose to act on...that’s who we really are” – J.K. Rowling, Harry Potter and the Order of the Phoenix. Threat actors and security researchers both have the cyber power, and it is our choice to use it to protect rather than attack. In this session, we will go through some of the most magical cyber attacks Check Point Research exposed in 2021.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="187px" style="width: 15%;"&gt;A Conversation with George Takei&lt;/TD&gt;
&lt;TD width="186.594px" height="187px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;George Takei&lt;BR /&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;FONT color="#000000"&gt;Actor, Social Justice Activist and Social Media Mega-Power&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;Peter Alexander&lt;BR /&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;FONT color="#000000"&gt;Chief Marketing Officer&lt;/FONT&gt;&lt;FONT color="#000000"&gt;&lt;BR /&gt;Check Point&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.594px" height="187px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/A-Conversation-with-George-Takei/m-p/139619#M75" target="_self"&gt;View YouTube Video&amp;nbsp;&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="187px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Join Check Point for an inspired session with Mr. George Takei, one of this generation’s most celebrated social media luminaries. Mr. Takei will join us at CPX 360 2022 for a lively and broad-ranging conversation. You won’t want to miss this captivating talk.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="363px" style="width: 15%;"&gt;Lessons From the "Biggest Work From Home Experiment"&lt;/TD&gt;
&lt;TD width="186.594px" height="363px" style="width: 15%;"&gt;&lt;STRONG&gt;Dan Wiley&lt;BR /&gt;&lt;/STRONG&gt;Head of Threat Management and Chief Security Advisor&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="186.594px" height="363px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Lessons-From-the-quot-Biggest-Work-From-Home-Experiment-quot/m-p/139620#M76" target="_self"&gt;View YouTube Video&amp;nbsp;&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="363px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Threats just keep getting more targeted, aggressive, stealthy, and damaging to companies throughout the world. Everyone’s security operations team is stretched to the limits ensuring the enterprise continues to operate. But what do you do when you have no more resources to defend, respond and ensure your protections are working as expected? You need a new approach to dealing with these threats.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Check Point’s MDR service supported by the Check Point Incident Response Team provides a single solution to monitor, respond, hunt, and this protection ensures you have the support of the industry’s most elite cyber defenders 24x7x365 globally.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="583px" style="width: 15%;"&gt;Inside Your Crypto Wallet&lt;/TD&gt;
&lt;TD width="186.594px" height="583px" style="width: 15%;"&gt;&lt;STRONG&gt;Oded Vanunu&lt;/STRONG&gt;&lt;BR /&gt;Head of Products Vulnerability Research&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="186.594px" height="583px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Inside-Your-Crypto-Wallet/m-p/139621#M77" target="_self"&gt;View YouTube Video&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="583px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Blockchain revolution introduces a near fool-proof level of verification to the age of the internet. This is due to the unique way blockchain stores data where each new block of data connects to all the blocks in a cryptographic method that is impossible to tamper with. The revolution continued with new innovations to trade in digital currencies and assets. Trillions of dollars have been traded in the blockchain emerging economy.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;The decentralized nature of blockchain transactions introduces both its greatest strength and most significant threat. There is no governing entity that can reverse a crypto transaction once it has been recorded on the chain. Hence this fuels cybercrime and malicious actors as a prime target to get access to users’ private key or crypto account. In the session, I’ll introduce crypto platforms' security challenges and examine the gap today. I’ll share how hackers exploit the gap and reveal the methods they use. I’ll expose a real story we uncovered on how hackers hijacked crypto wallets on OpenSea, which is the largest digital collectible marketplace, a peer-to-peer marketplace for crypto collectibles and non-fungible tokens (aka NFT).&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="268px" style="width: 15%;"&gt;Why Our Security Problems are Getting Worse and What We Should Do About It?&lt;/TD&gt;
&lt;TD width="186.594px" height="268px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Gary Gardiner&lt;/STRONG&gt;&lt;BR /&gt;Head of Security APAC&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Jeff Schwartz &lt;/STRONG&gt;&lt;BR /&gt;Vice President North America Engineering&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.594px" height="268px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/606/1/Gary%20Gardiner.pdf" target="_self"&gt;Presentation - APAC&lt;/A&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Why-Our-Security-Problems-are-Getting-Worse-and-What-We-Should/m-p/140343#M606" target="_self"&gt;View YouTube Video - APAC&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/613/1/CPX2022_problems1_newlogo.pdf" target="_self"&gt;Presentation - Americas&lt;/A&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Why-Our-Security-Problems-are-Getting-Worse-and-What-We-Should/td-p/139622" target="_self"&gt;View YouTube Video - Americas&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/610/1/CPX_2022_PS_v2.pdf" target="_self"&gt;Presentation - EMEA&lt;/A&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Why-Our-Security-Problems-are-Getting-Worse-and-What-We-Should/m-p/139718#M93" target="_self"&gt;View YouTube Video - EMEA&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="268px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Despite significant year-over-year growth in security spending and increases in overall security awareness, it seems that our problems are getting worse: ransomware, phishing, supply chain attacks, cloud compromises. At the same time, most security teams are overwhelmed with the rate of changes and volume of events to manage. In this session, you’ll learn how Zero Trust approaches, combined with better security intelligence and tools, can help you deliver better outcomes for our user communities.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="216px" style="width: 15%;"&gt;CISO Secrets with Tiktok Global CSO, Roland Cloutier&lt;/TD&gt;
&lt;TD width="186.594px" height="216px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Roland Cloutier&lt;/STRONG&gt;&lt;BR /&gt;Global CSO&lt;BR /&gt;TikTok&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Grant Asplund&lt;/STRONG&gt;&lt;BR /&gt;Growth Technologies Evangelist&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.594px" height="216px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/CISO-Secrets-with-Tiktok-Global-CSO-Roland-Cloutier/m-p/139623#M611" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="216px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;In this episode of CISO Secrets, our guest is the Global Chief Security Officer for one of the biggest social networks worldwide. TikTok is the single most downloaded app with nearly 3 billion downloads. In September 2021 the company reported reaching 1 billion users. With thousands of employees working from all around the world, find out what keeps Roland Cloutier up at night. Global CSO, TikTok.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="282px" style="width: 15%;"&gt;Protecting Office 365 &amp;amp; Teams the Right Way: JetBlue Case Study&lt;/TD&gt;
&lt;TD width="186.594px" height="282px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Gil Friedrich&lt;/STRONG&gt;&lt;BR /&gt;VP Email Security&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Tim Rohrbaugh&lt;/STRONG&gt;&lt;BR /&gt;CISO&lt;BR /&gt;JetBlue&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.594px" height="282px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Protecting-Office-365-amp-Teams-the-Right-Way-JetBlue-Case-Study/m-p/139624#M80" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="282px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Email security has changed. Instead of on-prem servers and outdated rules, it's now about artificial intelligence, machine learning and keeping users and data safe. Join this session to see Harmony Email &amp;amp; Collaboration, our industry-leading solution that prevents phishing emails from reaching the inbox. We will discuss the importance of AI and ML for email security, how collaboration apps are the next significant vector, and why you need to pair powerful email security with robust threat intelligence to guard against all manner of attacks.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="106px" style="width: 15%;"&gt;How Cloud Posture Management Accelerated the Journey to the cloud: ViuTV&lt;/TD&gt;
&lt;TD width="186.594px" height="106px" style="width: 15%;"&gt;&lt;STRONG&gt;Roger Lau&lt;/STRONG&gt;&lt;BR /&gt;Technical Head Digital&lt;BR /&gt;ViuTV&lt;/TD&gt;
&lt;TD width="186.594px" height="106px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/How-Cloud-Posture-Management-Accelerated-the-Journey-to-the/m-p/140165#M153" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="106px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Hear first hand from customer use cases on how to secure everything, this session will focus on how cloud posture management accelerated the Journey to the cloud.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="253px" style="width: 15%;"&gt;How Canaccord &amp;amp; Sallie Mae Secured Their Cloud&lt;/TD&gt;
&lt;TD width="186.594px" height="253px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Greg Drazenovic&lt;/STRONG&gt;&lt;BR /&gt;VP IT Infrastructure and Security&lt;BR /&gt;Canaccord Genuity Corporation&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Andrew Smith&lt;/STRONG&gt;&lt;BR /&gt;Manager of Cybersecurity Operations&lt;BR /&gt;Sallie Mae&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.594px" height="253px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/How-Canaccord-amp-Sallie-Mae-Secured-Their-Cloud/m-p/139626/highlight/true#M639" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="253px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Hear first hand use cases from customers on how they secure their everything: This session will focus on how Canaccord &amp;amp; Sallie Mae secured their cloud.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="128px" style="width: 15%;"&gt;How Fresenius Secured Their Cloud&lt;/TD&gt;
&lt;TD width="186.594px" height="128px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Markus Zack &lt;BR /&gt;&lt;/STRONG&gt;Director Cloud Enterprise Architecture&lt;BR /&gt;Fresenius Digital Technology&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.594px" height="128px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/How-Fresenius-Secured-Their-Cloud/m-p/140331#M157" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="128px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Hear first hand use cases from customers on how they secure their everything: this session will focus on how Fresenius secured their cloud.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="370px" style="width: 15%;"&gt;Learning from the Cloud Secure Deployments with AWS&lt;/TD&gt;
&lt;TD width="186.594px" height="370px" style="width: 15%;"&gt;&lt;STRONG&gt;Merritt Baer&lt;/STRONG&gt;&lt;BR /&gt;Principal, AWS Office of the CISO&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;TJ Gonen&lt;/STRONG&gt;&lt;BR /&gt;Head of Cloud and Telco&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="186.594px" height="370px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Learning-from-the-Cloud-Secure-Deployments-with-AWS/m-p/140166#M615" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="370px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Cloud migration, posture management, web application deployments, the list goes on. More and more customer are migrating and deploying valuable workloads in the cloud. How are they ensuring the transition is foolproof and secure? How are they protecting their assets, their permissions, and ensuring policies are in place across their cloud environments. Join Head of Cloud Strategy, TJ Gonen as he speed dates through the top cloud deployments in a two-part session. Hear the perspective of cloud providers, customers, and technology vendors as they tackle the top use cases perplexing organizations of all sizes and verticals. Learn best practice strategies and tips from industry experts to help you navigate your next cloud project securely.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="370px" style="width: 15%;"&gt;Learning from the Cloud Secure Deployments with Microsoft&lt;/TD&gt;
&lt;TD width="186.594px" height="370px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;David Totten &lt;/STRONG&gt;&lt;BR /&gt;CTO Partners&lt;BR /&gt;Microsoft&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;TJ Gonen&lt;/STRONG&gt; &lt;BR /&gt;Head of Cloud and Telco, Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="186.594px" height="370px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Learning-from-the-Cloud-Secure-Deployments-with-Microsoft/m-p/140167#M155" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="370px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Cloud migration, posture management, web application deployments, the list goes on. More and more customer are migrating and deploying valuable workloads in the cloud. How are they ensuring the transition is foolproof and secure? How are they protecting their assets, their permissions, and ensuring policies are in place across their cloud environments. Join Head of Cloud Strategy, TJ Gonen as he speed dates through the top cloud deployments in a two-part session. Hear the perspective of cloud providers, customers, and technology vendors as they tackle the top use cases perplexing organizations of all sizes and verticals. Learn best practice strategies and tips from industry experts to help you navigate your next cloud project securely.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="186.594px" height="180px" style="width: 15%;"&gt;&lt;SPAN&gt;Customer Awards&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="186.594px" height="180px" style="width: 15%;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="186.594px" height="180px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Customer-Awards-CPX-360-2022/m-p/139618#M74" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="373.219px" height="180px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Join us to celebrate innovation, awarding top customers and their outstanding case studies in Cloud, Network, Endpoint and Infinity the most secured architecture.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;DIV class="table-wrap"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H2 id="SecureTheCloud" style="color: #e45785;"&gt;Secure The Cloud&lt;/H2&gt;
&lt;TABLE style="width: 100%;" border="1" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR style="color: #ffffff; border: 1px solid #c1c7d0; padding: 5px 10px 4px; background-color: #e45785;"&gt;
&lt;TD width="20%" height="22px" style="width: 20%;"&gt;&lt;FONT color="#FFFFFF"&gt;Topic&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="20%" height="22px" style="width: 20%;"&gt;&lt;FONT color="#FFFFFF"&gt;Speaker&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="20%" height="22px" style="width: 20%;"&gt;&lt;FONT color="#FFFFFF"&gt;Content&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="40%" height="22px" style="width: 40%;"&gt;&lt;FONT color="#FFFFFF"&gt;Description&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="20%" height="270px"&gt;&lt;SPAN&gt;Developer First Security&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="20%" height="270px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Yuval Shchory&lt;BR /&gt;&lt;/STRONG&gt;Head of Product Management Cloud Security&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="20%" height="270px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/566/1/Developer-first%20security.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Developer-First-Security/m-p/139744#M100" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" height="270px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;CNAPP, CSPM, CWS, WTH! So many acronyms, with new ones emerging every day. It is nearly impossible for practitioners to keep up with the latest tech, let alone the abbreviations. Let Head of Product Management Cloud Strategy, Yuval Shchory demystify the latest cloud technology available today. Learn about the newest innovations in the tech stack. Dive deep into the capabilities that each one offers and how they interact with your overall cloud architecture. Understand what CIEM stands for and if it is pronounced SEEM or KIM. Walk away confident in your knowledge of all of these capabilities and how they can benefit your overall cloud security profile.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%" height="270px"&gt;Cloud Network Security as a Service for Operational Efficiency, Everywhere&lt;/TD&gt;
&lt;TD width="20%" height="270px"&gt;
&lt;P&gt;&lt;STRONG&gt;Hezi Bahry&lt;/STRONG&gt;&lt;BR /&gt;Product Manager Cloud&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Oded Gonda&lt;/STRONG&gt;&lt;BR /&gt;VP Technology &amp;amp; Innovation&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="20%" height="270px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/584/1/FWaaS%20-%20CPX_2022%20v9%20Template%20(002)%20No%20Borders%20_%20Hezi%20Bahry.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Cloud-Network-Security-as-a-Service-for-Operational-Efficiency/m-p/139745#M101" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" height="270px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Cloud network security is a crucial foundational layer to protect cloud assets, where organizations should deploy virtual security gateways to provide zero-trust advanced threat prevention, traffic inspection, and micro-segmentation. Check Point recently announced CloudGuard Firewall as a Service for AWS, extending the benefits of cloud-native network security to more organizations looking to protect their infrastructure with improved operational efficiency and without the need for upfront investment and resources for configuration and maintenance. Join this session to hear about this exciting new cloud-native service, which ensures easy adoption, usage and operations, ensuring the agility required by organizations to compete in today’s economy while remaining protected with industry-leading micro-segmentation and advanced threat prevention.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%" height="354px"&gt;The Future of Cloud Posture Management&lt;/TD&gt;
&lt;TD width="20%" height="354px"&gt;&lt;STRONG&gt;Yuval Shchory&lt;/STRONG&gt;
&lt;P&gt;Head of Product Management Cloud Security&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Grant Asplund&lt;/STRONG&gt;&lt;BR /&gt;Growth Technologies Evangelist&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="20%" height="354px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/585/1/CPX360_2022%20Future%20of%20Posture%20Grant%20Shchory%20FINAL%20AS-PRESENTED.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/The-Future-of-Cloud-Posture-Management/m-p/139732#M95" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" height="354px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;It’s nearly impossible to discuss just about any type of computing today without including cloud. Digital transformation is accelerating cloud-delivered “business frontends,” both for end-customers and supply-chain partner’s and our adversaries are simultaneously mobilizing. That’s why it’s no surprise, today the number of cloud breaches has surpassed on-premise. Old-school tools will fail in these new digitally transformed environments. We must transition to a new set of capabilities to ensure absolute compliance with what we have in the cloud and what is “soon-to-be-in-the-cloud.” This talk will discuss why the future of compliance is not just a technology improvement and will focus on how additional attention needs to be given to Zero Trust from an operational, permission perspective. We will also cover how Machine Learning and AI will help us shift from resolving yet another security issue to more effectively reducing risk, and how we can begin to more effectively bind security into the organizational transitions most IT organizations go through, empowering Devs and DevOps to take an active part in securing the cloud lifecycle across the software development continuum.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%" height="270px"&gt;Security Best Practices for AWS&lt;/TD&gt;
&lt;TD width="20%" height="270px"&gt;&lt;STRONG&gt;Sameer Vasanthapuram&lt;/STRONG&gt;&lt;BR /&gt;Principal Solutions Architect Security&lt;BR /&gt;AWS&lt;/TD&gt;
&lt;TD width="20%" height="270px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/605/1/CPX-AWS-2022.cleaned.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Security-Best-Practices-for-AWS/m-p/139733#M96" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" height="270px" style="width: 15%;"&gt;
&lt;DIV class="modal-container event-list-item-modal__container"&gt;
&lt;DIV class="bootbox modal fade event-list-item-modal in" tabindex="-1" aria-hidden="false"&gt;
&lt;DIV class="modal-body event-list-item-modal__body"&gt;
&lt;DIV class="event-list-item-modal__content-wrapper"&gt;
&lt;DIV class="event-list-item-modal__info"&gt;
&lt;DIV class="event-list-item-modal__description grayscale-2-eventplatform"&gt;In this presentation, Amazon Web Services (AWS), the world’s most comprehensive and broadly adopted cloud platform, will discuss the advantages of Cloud and use cases that power customers infrastructure, make them more agile and lower costs. You will learn about the Shared Security Responsibility Model and what areas AWS provides security of the Cloud and what customers are responsible for in the cloud and where partners, such as Check Point can drive additional value-add to solve these customer challenges.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%" height="206px"&gt;Secure the Cloud: Microsoft&lt;/TD&gt;
&lt;TD width="20%" height="206px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Denver KcKelheer&lt;/STRONG&gt;&lt;BR /&gt;Global (GPS) Sr. ISV Partner Development - Security&lt;BR /&gt;Microsoft&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="20%" height="206px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/617/1/CPX%20Check%20Point%20Microsoft_v1.3.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Secure-the-Cloud-Microsoft/m-p/139747/highlight/true#M617" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" height="206px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Check Point and Microsoft have bridged a partnership focused on best of breed security and cloud. There have been major investments in improving customer experience and the journey from on prem to the cloud and options around security the hybrid security scenario. We look forward to bringing you with us on the journey to securing the cloud.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%" height="304px" style="width: 15%;"&gt;
&lt;P&gt;Finding the Needle in the Cloud-Trail Haystack&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="20%" height="304px"&gt;&lt;STRONG&gt;Eyal Zaidman&lt;/STRONG&gt;&lt;BR /&gt;Cloud Product Manager&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="20%" height="304px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/624/1/Eyal%20Zaidman%20-%20CPX.pptx_KM.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Finding-the-Needle-in-the-Cloud-Trail-Haystack/m-p/139737/highlight/true#M624" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" height="304px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;In a world where cloud is driving your business, traditional Posture Management solutions alone fail to provide the visibility you need to understand whether or not your assets are secure. SIEM and cloud service provider solutions provide you with a lot of data. However, without context, AI, and threat hunting capabilities, you are left to your own devices trying to sift through piles of information. Join this session to learn how CloudGuard Intelligence shines a spotlight on the needle, automatically analyzing Account Activity and Network Logs to provide clear knowledge on who did what in your cloud and whether they should have. Better security, faster remediation, and automatic response are at your fingertips, providing you with the insights you must have in this dynamic, evolving cloud world.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%" height="291px"&gt;Log4j- Case Study: Automating Cloud Application &amp;amp; API Security&lt;/TD&gt;
&lt;TD width="20%" height="291px"&gt;&lt;STRONG&gt;Yaffa Finkelstein&lt;/STRONG&gt;&lt;BR /&gt;Product Marketing Manager&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="20%" height="291px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/630/1/AppSec%20-%20Yaffa%20Finkelstin.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Log4j-Case-Study-Automating-Cloud-Application-amp-API-Security/m-p/139738/highlight/true#M630" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" height="291px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;When we think about application security, the 90’s answer was always the web application firewall (WAF). Traditional WAF technologies are not fit for purpose in the cloud era, but with DevOps moving faster than ever, robust, dependable application security has never been so critical. Savvy cybercriminals are exploiting the gap between security teams and DevOps. In this session, we will take a look at why your application security strategy needs to include more than just a WAF. We’ll take a look at what contextual AI means, how it powers precise prevention, and how government organizations, banks and retailers are using CloudGuard AppSec to protect their cloud applications as their workloads depend on it.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%" height="270px" style="width: 15%;"&gt;Strategies for Reducing the Cost of a Data Breach&lt;/TD&gt;
&lt;TD width="20%" height="270px"&gt;
&lt;P&gt;&lt;STRONG&gt;Ashwin Ram&lt;/STRONG&gt;&lt;BR /&gt;Cyber Security Evangelist&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="20%" height="270px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/640/1/CPX360_2022_Ashwin%20Ram_Key%20Insights%20for%20Reducing%20the%20Cost%20of%20a%20Data%20Breach_v4.pdf" target="_self"&gt;Presentation&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Strategies-for-Reducing-the-Cost-of-a-Data-Breach/m-p/139739#M640" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" height="270px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;In this talk, Ashwin Ram from the office of the CTO at Check Point will share key insights from various independent studies and the Check Point Incident Response Team, on how to reduce the cost of a data breach. He will cover the big-ticket items and security oversights that must receive the highest priority in any cyber resilience strategy. This session will include pre and post-breach strategies crucial to reducing the cost of a data breach.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="SecureUsersAndAccess" style="color: #e45785;"&gt;Zero Trust Security for the Remote Workforce&lt;/H2&gt;
&lt;TABLE style="width: 100%;" border="1" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR style="color: #ffffff; border: 1px solid #c1c7d0; padding: 5px 10px 4px; background-color: #e45785;"&gt;
&lt;TD width="20%" style="width: 20%;"&gt;&lt;FONT color="#FFFFFF"&gt;Topic&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="20%" style="width: 20%;"&gt;&lt;FONT color="#FFFFFF"&gt;Speaker&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="20%" style="width: 20%;"&gt;&lt;FONT color="#FFFFFF"&gt;Content&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="40%" style="width: 40%;"&gt;&lt;FONT color="#FFFFFF"&gt;Description&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="20%"&gt;&lt;SPAN&gt;Writing the Next Chapter in Remote Workforce Security&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="20%"&gt;&lt;STRONG&gt;Dana Katz&lt;/STRONG&gt;&lt;BR /&gt;Head of Product Marketing Threat Prevention&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="20%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/567/1/CPX_2022_Harmony%20ppt_Dana%20Katz.pdf" target="_self"&gt;Presentation&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Writing-the-Next-Chapter-in-Remote-Workforce-Security/m-p/139754#M103" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Almost two years into the pandemic, the world is still predominantly working remotely. With users working anywhere and using their mobile phones and laptops to access corporate applications, and with cyber attacks increasing by 40% in the past year alone, your attack surface has never been wider. Check Point Harmony delivers the highest level of security for remote users in a single solution that is easy to use, manage and buy. In this session, we will present the new capabilities of the Harmony suite products, how they help you better secure your remote workforce, and discuss the roadmap for the coming year.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%"&gt;&lt;SPAN&gt;Demystifying Gen V Attacks: Ransomware, Nation State and Supply Chain&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="20%"&gt;
&lt;P&gt;&lt;STRONG&gt;Rafi Kretchmer&lt;/STRONG&gt;&lt;BR /&gt;VP Product Marketing, Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="20%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/586/1/CPX%202022%20-%20%20ransomware%20nation%20state%20and%20supply%20chainrafi%20Kretchmer%20V3.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Demystifying-Gen-V-Attacks-Ransomware-Nation-State-and-Supply/m-p/139756#M104" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Occurring over the US Independence Day weekend, the attack on IT management software firm, Kaseya, combined two of 2021’s most notorious cyber attack trends—supply chain attacks and ransomware. At least 1,000 businesses are said to have been affected by the attack, with victims identified in at least 17 countries. In May 2021, a major US fuel company fell victim to a ransomware attack which led to its entire fuel distribution pipeline being shut down while it investigated the problem, causing shortages across the East Coast of the United States and influencing oil prices globally. It wasn’t that long ago that ransomware didn’t even exist. How did we get to this point? And is there any way to stop this most popular trend in cybercrime before it’s too late? This session will address these phenomena and describe how organizations can remain protected against this growing global trend.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%"&gt;&lt;SPAN&gt;Ransomware Protection With Harmony Mobile and Endpoint&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="20%"&gt;
&lt;P&gt;&lt;STRONG&gt;Dedi Shindler&lt;/STRONG&gt;&lt;BR /&gt;Head of Inbound Product Management Cyber Security&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Yuval Raban&lt;/STRONG&gt;&lt;BR /&gt;Director Mobile Security&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="20%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/587/1/CPX360_2022_Yuval%26Dedi.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Ransomware-Protection-With-Harmony-Mobile-and-Endpoint/m-p/139904#M131" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;It only takes one edge machine infection to potentially bring down the entire network. Harmony Endpoint and Harmony Mobile will protect the organization from Ransomware infections, by implementing the best security for the machines and behavioral protection from unwanted lateral movement.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%"&gt;&lt;SPAN&gt;SASE: Achieving Zero Trust Security with Harmony Connect + Browse&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="20%"&gt;&lt;STRONG&gt;Eytan Segal&lt;/STRONG&gt;&lt;BR /&gt;Head of Product Management SaaS Security&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="20%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/604/1/CPX360_2022%20Harmony%20Connect_Eytan%20Segal%20%20v4.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/SASE-Achieving-Zero-Trust-Security-with-Harmony-Connect-Browse/m-p/139757#M105" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Check Point Harmony delivers the highest level of security for remote users in a single solution that is easy to use, manage and buy. In this session, we will present the new capabilities of the Harmony connect and browse products, how they help you better secure your remote workforce, and discuss the roadmap for the coming year.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%"&gt;Reinventing Email Security&lt;/TD&gt;
&lt;TD width="20%"&gt;&lt;STRONG&gt;Gil Friedrich&lt;/STRONG&gt;&lt;BR /&gt;VP Email Security&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="20%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/618/1/Why%20Avanan%20-%20Gil%20Friedrich.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Reinventing-Email-Security/m-p/139758/highlight/true#M618" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Avanan, Check Point’s recent acquisition and the fastest growing email security vendor, has been leading a revolution in how email security is implemented. As enterprises moved their email server to cloud-based solutions, mainly Microsoft 365 and Gmail, a new API-based approach is being adopted by more and more customers, replacing the traditional secure email gateways. Learn from Avanan’s CEO how this novel approach for cloud-email security works, the advantages it provides over the legacy solutions, and Avanan’s role in this revolution.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%"&gt;Aryaka, High-Performance SASE for the Hybrid Workforce&lt;/TD&gt;
&lt;TD width="20%"&gt;&lt;STRONG&gt;Hugo Vliegen&lt;/STRONG&gt;&lt;BR /&gt;SVP- Product Management&lt;BR /&gt;Aryaka&lt;/TD&gt;
&lt;TD width="20%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;Presentation&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Aryaka-High-Performance-SASE-for-the-Hybrid-Workforce/m-p/139906/highlight/true#M625" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;The pandemic has accelerated the need to shift from legacy network and security models to modern, cloud-first deployments based on SD-WAN and SASE architectures. Remote workers need the ability to work from anywhere with the ability to connect to any workload irrespective of its nature and location. Delivering Security from the Cloud is an obvious element of any SASE based solution. Convergence of Security-as-a-Service with high-performance Networking-as-a-Service is equally essential for delivering a delightful experience for the hybrid workforce. Current solutions are too fragmented and brittle, and therefore hampering innovation. This session will discuss how the rules of the game have changed! It will cover ground on an innovative architectural and business model, that allows you to play the game on your terms with simplicity, reduced risk, and amazing flexibility.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%"&gt;&lt;SPAN&gt;CISO Games&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="20%"&gt;&lt;STRONG&gt;Jony Fischbein&lt;/STRONG&gt;&lt;BR /&gt;Chief Information Security Officer&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="20%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/631/1/CPX360_2022_CISO%20Squid%20Game%20-%20Jony%20Fischbein.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/CISO-Games/m-p/139759/highlight/true#M631" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Join this exciting session to learn all about Check Point's own security best practices in SOC (Security Automation &amp;amp; Orchestration). Check Point’s CISO will share real-world stories and use cases on the day-to-day security operations.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%"&gt;Remote Workforce Cyber Resiliency Best Practices&lt;/TD&gt;
&lt;TD width="20%"&gt;&lt;STRONG&gt;Artur Sher&lt;/STRONG&gt;&lt;BR /&gt;PS Regional Manager&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="20%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/641/1/CRT_Cybersecurity_Resilience_Test_v2.0%20-%20Artur%20Sher.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Remote-Workforce-Cyber-Resiliency-Best-Practices/m-p/139761#M641" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" style="width: 15%;"&gt;
&lt;P&gt;Every year we see more and more cyber-attacks, and the best way to understand how your organization is exposed, is to conduct a real life attack simulation and check the resilience of your cyber defenses, either in your perimeter, internal network or web/mobile applications&lt;/P&gt;
&lt;P&gt;Join us to hear about our new CRT (Cyber Resilience Team) which includes the best white-hat ethical hackers in the industry, to see how can we help you protect your organization in a proactive manner.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;H2 style="color: #e45785;"&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2 id="SecureTheNetwork" style="color: #e45785;"&gt;Secure The Hybrid Data Center&lt;/H2&gt;
&lt;TABLE style="width: 100%;" border="1" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px;" role="row"&gt;
&lt;TD width="9.186295503211992%" style="width: 20%;"&gt;Topic&lt;/TD&gt;
&lt;TD width="30.813704496788006%" style="width: 20%;"&gt;Speaker&lt;/TD&gt;
&lt;TD width="20%" style="width: 20%;"&gt;Content&lt;/TD&gt;
&lt;TD width="40%" style="width: 40%;"&gt;Description&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR role="row"&gt;
&lt;TD width="9.186295503211992%" style="width: 15%;"&gt;Introduction to Quantum Lightspeed - The World's Fastest Firewall&lt;/TD&gt;
&lt;TD width="30.813704496788006%"&gt;
&lt;P&gt;&lt;STRONG&gt;Russ Schafer&lt;/STRONG&gt;&lt;BR /&gt;Head of Product Marketing Security Platforms&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Aviv Abramovich&lt;/STRONG&gt;&lt;BR /&gt;Head of Product Management&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="20%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/568/1/12_23_Quantum%20Lightspeed%20-%20Russel%20Schafer.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Introduction-to-Quantum-Lightspeed-The-World-s-Fastest-Firewall/m-p/139860#M109" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Enterprises need network security that performs at the speed of business to securely transfer hundreds of terabytes of data in minutes, provide low latency for high frequency financial transactions, while also scaling security on-demand to support hyper-growth businesses like online commerce. Learn how Check Point and Nvidia partnered to redefine cyber security price performance by creating the industry’s fastest firewall solution with up to 3 Tbps of throughput. Secure 400 TB file transfers that used to take hours can now be done in minutes. Financial institutions can now securely process millions of high-frequency trades with microsecond latency. We will review real customer use cases across industries, including how they benefited from a tenfold increase in firewall security performance.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="9.186295503211992%" style="width: 15%;"&gt;&lt;SPAN&gt;Securing your Datacenter with Check Point Quantum and Maestro&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="30.813704496788006%"&gt;
&lt;P&gt;&lt;STRONG&gt;Yaron Weiler&lt;/STRONG&gt;&lt;BR /&gt;Product Manager Security Services&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Derek Middlemiss&lt;/STRONG&gt;&lt;BR /&gt;Head of Security Solutions Engineering EMEA&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="20%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/588/1/CPX360_2022%20Quantum-Maestro%20-%20Yaron%20and%20Derek.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Securing-your-Datacenter-with-Check-Point-Quantum-and-Maestro/m-p/139867#M110" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Do you think that hyper scalable solutions are only for large enterprises and the big banks? In these uncertain and dynamic times, everyone needs the flexibility and security of an elastic solution. Whether you are a small business, medium enterprise, or large corporation – the Maestro solution works for all! Join us to look at some real-world cases where hyper scalable solutions have been innovatively deployed to fix issues with organizations of all sizes, from the very large to the very small.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="9.186295503211992%" style="width: 15%;"&gt;Scaling Threat Prevention - R81.x Use Cases&lt;/TD&gt;
&lt;TD width="30.813704496788006%"&gt;
&lt;P&gt;&lt;STRONG&gt;Peter Elmer&lt;/STRONG&gt;&lt;BR /&gt;Principle Security Expert&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Guy Israeli&lt;/STRONG&gt;&lt;BR /&gt;Product Manager&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="20%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/589/1/CPX360_2022_R81_CyberSecurity-GuyIsraeli_PeterElmer.pdf" target="_self"&gt;Presentation&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Scaling-Threat-Prevention-R81-x-Use-Cases/m-p/139868#M111" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Multi-vector Gen V cyber-attacks combined with digital transformation, cloud transition and the shift to remote work have made the work of security teams more challenging than ever. Teams are required to implement hybrid-cloud models, users expect to connect from anywhere, more devices are on your network, and threats are evolving in sophistication. The R81 platform provides the best security out of the box, using a single console to manage your security posture. Join this session to review how R81 revolutionizes enterprises security management, hear real customer stories, and get a preview of powerful new features upcoming in R81.20.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="9.186295503211992%" style="width: 15%;"&gt;
&lt;P&gt;IoT Security: Making it Simple and Effective for Anyone&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="30.813704496788006%" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Eyal Manor&lt;/STRONG&gt;&lt;BR /&gt;Head of Security Product Management&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Daniel Cohen-Sason&lt;/STRONG&gt;&lt;BR /&gt;Group Manager&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="20%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/603/1/CPX%202022%20-%20IOT%20Protect%20-%20Eyal%20Manor-%20v1.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/IoT-Security-Making-it-Simple-and-Effective-for-Anyone/m-p/139869#M112" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Within your organization there are a huge number of unmanaged IoT devices connected to the network, and each increases the attack surface. A recent study identified more than 1.5B IOT related attacks from January through June 2021. Join this session to learn about:&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-unlink="true"&gt;How to start discovering all IoT devices in less than 5 minutes&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;How to move to “protect mode” through Autonomous Zero-trust policies for IoT devices.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="9.186295503211992%" style="width: 15%;"&gt;
&lt;P&gt;Micro Segmentation &amp;amp; Modern Day Zero Trust with Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="30.813704496788006%"&gt;&lt;STRONG&gt;Mark Ostrowski&lt;/STRONG&gt;&lt;BR /&gt;Head of Engineering US East&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="20%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/569/1/CPX360_2022_ModernDay_ZT_Ostrowski_Final_Public.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Micro-Segmentation-amp-Modern-Day-Zero-Trust-with-Check-Point/m-p/139912/highlight/true#M569" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Today, Check Point reports that globally, there are 40% more attacks weekly on organizations in 2021 compared to 2020. The Zero Trust architecture, now over 20 years in the making, must evolve to support modern-day challenges. In the past 24 months, underlined by the shift of employees working remotely and cloud workloads accelerating in adoption, new ZTA use cases have emerged. This presentation will discuss how ZTA has evolved and introduce modern-day use cases and how Check Point can solve these cyber security challenges.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="9.186295503211992%" style="width: 15%;"&gt;Performance Best Practices Simplified&lt;/TD&gt;
&lt;TD width="30.813704496788006%"&gt;&lt;STRONG&gt;Valeri Loukine&lt;BR /&gt;&lt;/STRONG&gt;Cyber Security Evangelist, Community Lead&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="20%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/626/1/CPX360_2022_Performance%20Optimization%20Simplified%20-%20Valeri%20Loukine.pdf" target="_self"&gt;Presentation&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Performance-Best-Practices-Simplified/m-p/139870/highlight/true#M626" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;In the dynamic world of constantly changing throughput requirements and rapidly evolving cyber security threat, performance is a moving target. In this session, we discuss performance related challenges and ways to resolve them, including the latest innovations such as Dynamic Workflows and Hyperscale solutions.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="9.186295503211992%" style="width: 15%;"&gt;Managed Service Providers Road to Provide SMB Security Effectively and Efficiently&lt;/TD&gt;
&lt;TD width="30.813704496788006%"&gt;
&lt;P&gt;&lt;STRONG&gt;Avi Grabinsky&lt;/STRONG&gt;&lt;BR /&gt;Product Manager&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Shahar Divon&lt;/STRONG&gt;&lt;BR /&gt;Head of Global SMB Sales&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="20%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/632/1/SMB%20Security%20for%20Managed%20Service%20Providers_Avi%20Grabinsky%20and%20Shahar%20Divon.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Managed-Service-Providers-Road-to-Provide-SMB-Security/m-p/139913/highlight/true#M632" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" style="width: 15%;"&gt;
&lt;P&gt;Small and medium businesses are no longer a low-priority target for threat actors. The commoditization of cyber-attacks by cyber criminals who offer malware-as-a-service makes SMBs a profitable target.&lt;/P&gt;
&lt;P&gt;Furthermore, supply chain attacks targeting MSPs can affect thousands of SMBs, e.g., the Kaseya attack.&lt;/P&gt;
&lt;P&gt;As a result, MSPs are faced with a challenge: the need to provide strong and advanced security to their SMB customers while, at the same time, being short on resources.&lt;/P&gt;
&lt;P&gt;Join this session to learn how MSPs can effectively deploy Check Point security for SMBs.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="9.186295503211992%" style="width: 15%;"&gt;Sneak Preview: Quantum SD-WAN Best Security and SD-WAN Combined&lt;/TD&gt;
&lt;TD width="30.813704496788006%"&gt;
&lt;P&gt;&lt;STRONG&gt;Ad Attias&lt;/STRONG&gt;&lt;BR /&gt;Product Manager&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Justin Sowder&lt;/STRONG&gt;&lt;BR /&gt;Solution Architect&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="20%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/642/1/Quantum%20SD-WAN%20Ad%20Attias%20and%20Justin%20Sowder.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt; &lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Sneak-Preview-Quantum-SD-WAN-Best-Security-and-SD-WAN-Combined/m-p/139695#M642" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="40%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Instant Networking Optimization with Quantum SD-WAN, available in all Quantum Security Gateways! Improve network speed and reliability for site to site and internet connectivity -- all with a few clicks of a button. Improve WAN performance across different types of links (MPLS, wireless, broadband) to increase productivity, cut costs, and lower administration overheads. Learn how to leverage your existing Quantum deployment for advanced SD-WAN, improve connectivity, and secure your branch with an All-In-One solution.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="SecurityAutomationOrchestration" style="color: #e45785;"&gt;Security Automation SOC and XDR&lt;/H2&gt;
&lt;TABLE style="width: 100%;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px;" role="row"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Topic&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Speaker&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Content&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Description&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR role="row"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P&gt;Micro Segmentation &amp;amp; Modern Day Zero Trust with Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%"&gt;&lt;STRONG&gt;Mark Ostrowski&lt;/STRONG&gt;&lt;BR /&gt;Head of Engineering US East&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/569/1/CPX360_2022_ModernDay_ZT_Ostrowski_Final_Public.pdf" target="_self"&gt;Presentation&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Micro-Segmentation-amp-Modern-Day-Zero-Trust-with-Check-Point/m-p/139912#M133" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Today, Check Point reports that globally, there are 40% more attacks weekly on organizations in 2021 compared to 2020. The Zero Trust architecture, now over 20 years in the making, must evolve to support modern-day challenges. In the past 24 months, underlined by the shift of employees working remotely and cloud workloads accelerating in adoption, new ZTA use cases have emerged. This presentation will discuss how ZTA has evolved and introduce modern-day use cases and how Check Point can solve these cyber security challenges.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;CISO Games&lt;/TD&gt;
&lt;TD width="15%"&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Jony Fischbein&lt;BR /&gt;&lt;/STRONG&gt;Chief Information Security Officer&lt;BR /&gt;Check Point&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/631/1/CPX360_2022_CISO%20Squid%20Game%20-%20Jony%20Fischbein.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/CISO-Games/m-p/139759#M631" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Join this exciting session to learn all about Check Point's own security best practices in SOC (Security Automation &amp;amp; Orchestration). Check&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Point’s CISO will share real-world stories and use cases on the day-to-day security operations.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P&gt;Log4j Case Study: ThreatCloud - the AI Brain Behind the Best Security&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%"&gt;&lt;STRONG&gt;Yaniv Shechtman&lt;/STRONG&gt;&lt;BR /&gt;Head of Product Management Threat Prevention&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/590/1/CPX%202022%20_ThreatCloud%20presentation_Yaniv%20Shechtman%20v1.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Log4j-Case-Study-ThreatCloud-the-AI-Brain-Behind-the-Best/m-p/139873#M116" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;This session is all about ThreatCloud, the brain behind Check Point Power. In 2021 the threat landscape showed a significant increase in sophisticated attack vectors such as ransomware, phishing, supply-chain, SW vulnerabilities exploits, and others. In this session, we will cover some examples of these vectors and explain how you can stay ahead of the attackers and their ever-evolving tactics by using ThreatCloud and the power of AI.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Realizing the Infinity Architecture with the Infinity Portal&lt;/TD&gt;
&lt;TD width="15%"&gt;
&lt;P&gt;&lt;STRONG&gt;Tomer Noy&lt;/STRONG&gt;&lt;BR /&gt;Director Management Products&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/602/1/CPX%202022%20-%20Realizing%20the%20Infinity%20Architecture%20with%20the%20Infinity%20Portal%20_Tomer%20Noy-%20v11.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Realizing-the-Infinity-Architecture-with-the-Infinity-Portal/m-p/139874#M117" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;An effective security solution needs to be easy to configure and deploy. It should prevent attacks from multiple attack angles. A great security solution will also leverage data from multiple sources and learn over time how to protect you better. Join this session to hear about the Infinity Architecture and how it will help you build a great security solution for your organization! We will briefly review the vision of Infinity Architecture and we’ll dive into the Infinity Portal to illustrate how it can help you implement multiple security capabilities. We will also see what makes 2022 exciting, which new features are coming up, and how you can prepare your environment to adopt these new technologies.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Infinity MDR: Sleep Tight We Got You Covered&lt;/TD&gt;
&lt;TD width="15%"&gt;&lt;STRONG&gt;Dan Wiley&lt;/STRONG&gt;&lt;BR /&gt;Head of Threat Management and Chief Security Advisor&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/619/1/MDR%20Customer%20PPT%20Dec%2013_Partner%20Day.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Infinity-MDR-Sleep-Tight-We-Got-You-Covered/m-p/140126/highlight/true#M619" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Desperate about chasing endless logs? Check Point MDR SecOps – Let us operationalize the impossible. Introducing Infinity MDR – Check Point’s Managed Detection and Response service. A complete SecOps as-a-service, provided 24/7/365 by Check Point’s top analysts, researchers, and Incident Response team. Join this session to learn about:&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-unlink="true"&gt;Infinity MDR services, key benefits, and differentiation&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;Real-life stories from customers already using the service.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Infinity XDR: Empowering SOC to Do More&lt;/TD&gt;
&lt;TD width="15%"&gt;
&lt;P&gt;&lt;STRONG&gt;Eyal Manor&lt;/STRONG&gt;&lt;BR /&gt;Head of Security Product Management&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Tsur Tidhar&lt;/STRONG&gt;&lt;BR /&gt;Product Incubation Manager&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/627/1/Infinity%20XDR%20%20Eyal%20Manor%20and%20Tsur.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Infinity-XDR-Empowering-SOC-to-Do-More/m-p/139875/highlight/true#M627" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;The classic SOC model is failing to meet today’s challenges as analysts are overwhelmed by the complexity of solutions, amount of alerts and resource shortages. Join this session to learn:&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-unlink="true"&gt;How to automatically uncover more threats across network, endpoint, email, mobile, and cloud using ML and behavior analysis&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;How to effectively investigate an incident and respond to mitigate an attack.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;DNS: What Happens When an Outdated and Commonly Used Protocol Meets New Cyber Threats?&lt;/TD&gt;
&lt;TD width="15%"&gt;&lt;STRONG&gt;Amir Helinger&lt;/STRONG&gt;&lt;BR /&gt;Product Manager Threat Prevention&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/633/1/dns%20security-%20Amir%20Helinger%201.6.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/DNS-What-Happens-When-an-Outdated-and-Commonly-Used-Protocol/m-p/139876/highlight/true#M633" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;DNS protocol is one of the vital building blocks of the internet, yet, since its introduction back in the 80’s, it hasn’t been updated significantly. No wonder cybercriminals use DNS as a tool for their malware and attack campaigns, as recently seen in the SolarWinds attack. In this session, we introduce our new capabilities and prevention through Machine Learning and AI, to protect against modern threats in the DNS protocol.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="15%"&gt;Security Automation in R81&lt;/TD&gt;
&lt;TD width="15%"&gt;
&lt;P&gt;&lt;STRONG&gt;Khalid Al-Shawwaf&lt;/STRONG&gt;&lt;BR /&gt;Solution Architect Check Point Evangelist&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/643/1/CPX360_2022_Automation%20-%20Khalid%20Al%20Shawaaf.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Security-Automation-in-R81/m-p/139877#M643" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P&gt;55,661,779 attacks are seen on average by Check Point's extensive network of security solutions alone each day. In 2021, cyberattacks increased globally by an average of 23%. Defending organizations from cybercriminals is an ever-changing cat and mouse game. Our security teams are overwhelmed and manual investigations hinder effective responses. Security Automation is the key to practical prevention.&lt;/P&gt;
&lt;P&gt;Join this session to learn how to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Quickly respond to the most severe attacks with automated triage and single-click remediation&lt;/LI&gt;
&lt;LI&gt;Reduce TCO with a single, centrally managed SOC platform; avoid stitching and puzzling information from multiple point solutions&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="HackersExposed" style="color: #e45785;"&gt;cp&amp;lt;r&amp;gt; - The Latest Check Point Research&lt;/H2&gt;
&lt;TABLE style="width: 100%;" border="1" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px;"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Topic&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Speaker&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Content&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Description&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="15%" style="width: 15%;"&gt;&lt;SPAN&gt;Smishing Botnets Going Viral in Iran&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="15%"&gt;&lt;STRONG&gt;Shmuel Cohen&lt;/STRONG&gt;&lt;BR /&gt;Security Researcher&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/570/1/CPX360_2022_Shmuel_Cohen_%20(2).pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Smishing-Botnets-Going-Viral-in-Iran/m-p/139879#M121" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;In the last few months, multiple Iranian media and social networks have published warnings about ongoing SMS phishing campaigns impersonating Iranian government services. What is noteworthy about these campaigns is the sheer scale of the attack. An unprecedented number of victims have shared similar stories in the comment sections of news outlets and social networks about how their bank accounts were emptied. This session will describe technical details about how these campaigns are constructed, their business model, and how they became so successful despite utilizing unsophisticated tools.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="15%" style="width: 15%;"&gt;&lt;SPAN&gt;The Cyber Threat Landscape – 2021 Highlights&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="15%"&gt;&lt;STRONG&gt;Omer Dembinsky&lt;/STRONG&gt; &lt;BR /&gt;Group Manager Data Research&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/591/1/CPX360_2022_Threat_Landscape-Omer%20Dembinsky.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/The-Cyber-Threat-Landscape-2021-Highlights/m-p/139880#M122" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;In this track, we show data derived from ThreatCloud, presenting general trends along 2021 in terms of global statistics of attacks, number&lt;BR /&gt;of organizations that are hit per week, and industries most attacked.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="15%" style="width: 15%;"&gt;&lt;SPAN&gt;Formbook: From A Simple Keylogger to a Top Prevalent Cross Platform Malware&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="15%"&gt;
&lt;P&gt;&lt;STRONG&gt;Alexey Bukhteyev&lt;/STRONG&gt; &lt;BR /&gt;Reverse Engineer Products - R&amp;amp;D&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Raman Ladutska&lt;/STRONG&gt; &lt;BR /&gt;Reverse Engineer Products - R&amp;amp;D&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Holding-Area/Formbook-From-A-Simple-Keylogger-to-a-Top-Prevalent-Cross/m-p/139881/thread-id/123?attachment-id=6512" target="_self"&gt;Presentation&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/592/1/Top%20prevalent%20malware%20migrates%20to%20macRaman%20and%20Alexey.pdf" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P&gt;Formbook, one of the most prevalent data stealers, is now sold in the underground forum under a new name, XLoader, and has new capabilities that enable it to operate in macOS.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="15%" style="width: 15%;"&gt;&lt;SPAN&gt;When Old Friends Meet Again: Why Emotet Chose Trickbot for Rebirth&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="15%"&gt;
&lt;P&gt;&lt;STRONG&gt;Raman Ladutska&lt;/STRONG&gt;&lt;BR /&gt;Reverse Engineer Products - R&amp;amp;D&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Alexander Chailytko&lt;/STRONG&gt;&lt;BR /&gt;Cyber Security Research &amp;amp; Innovation Manager&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/601/1/Raman%20and%20Alexander_upd.pdf" target="_self"&gt;Presentation&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/When-Old-Friends-Meet-Again-Why-Emotet-Chose-Trickbot-for/m-p/139882#M124" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Check Point Research (CPR) warns of potential ransomware attacks, as it sees samples of Emotet fast-spreading via Trickbot. Since Emotet’s takedown by law enforcement, CPR estimates 140,000 victims of Trickbot, across 149 countries in only 10 months. New Emotet samples spreading through Trickbot were discovered by CPR on November 15, 2021. Emotet is a strong indicator of future ransomware attacks, as the malware provides ransomware gangs a backdoor into compromised machines.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Looking for Vulnerabilities in MediaTek Audio DSP&lt;/TD&gt;
&lt;TD width="15%"&gt;
&lt;P&gt;&lt;STRONG&gt;Slava Makkaveev&lt;/STRONG&gt;&lt;BR /&gt;Security Researcher&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/620/1/Slava%20Makveev_dsp.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Looking-for-Vulnerabilities-in-MediaTek-Audio-DSP/m-p/139883/highlight/true#M620" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Taiwan’s MediaTek has been the global smartphone chip leader since Q3 2020. MediaTek SoCs are embedded in approximately 37% of all smartphones and IoT devices in the world, including high-end phones from Xiaomi, Oppo, Realme, Vivo and more. Modern MediaTek SoCs, including the latest Dimensity series, contain a special audio DSP to improve media performance and reduce CPU usage. In this study, we reverse-engineered the MediaTek audio DSP firmware and the proprietary Android API that is responsible for communication with the audio processor. We discovered several vulnerabilities in the DSP RTOS and Android HAL that are accessible from the Android user space. The issues we found could be used by an attacker for local privilege. escalation, listening for user conversations and hiding malicious code.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Indra: Cyber-Attack as a Disruption Factor to Society&lt;/TD&gt;
&lt;TD width="15%"&gt;
&lt;P&gt;&lt;STRONG&gt;Itay Cohen&lt;/STRONG&gt;&lt;BR /&gt;Head of Research&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Alexandra Gofman&lt;/STRONG&gt;&lt;BR /&gt;Team Leader Threat Intelligence Analysis&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/628/1/Indra_Itay%20and%20Alexandra.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Indra-Cyber-Attack-as-a-Disruption-Factor-to-Society/m-p/139936/highlight/true#M628" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;We present an analysis of a successful politically motivated attack on Iranian infrastructure that is suspected to be carried out by a non-state sponsored actor. This specific attack happened to be directed at Iran, but it could as easily have occurred in New York or Berlin. We’ll look at some of the technical details and expose the actor behind the attack, thereby linking it to several other politically motivated attacks from earlier years.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;A Supply-Chain Breach: Taking Over an Atlassian Account&lt;/TD&gt;
&lt;TD width="15%"&gt;
&lt;P&gt;&lt;STRONG&gt;Yaara Shriki&lt;/STRONG&gt;&lt;BR /&gt;Security Expert&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Roman Zaikin&lt;/STRONG&gt;&lt;BR /&gt;Security Expert&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/633/1/dns%20security-%20Amir%20Helinger%201.6.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/A-Supply-Chain-Breach-Taking-Over-an-Atlassian-Account/m-p/139884/highlight/true#M634" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Check Point Research (CPR) finds security flaws in Atlassian, a platform used by 180,000 customers worldwide to engineer software and manage projects. With just one click, an attacker could have used the flaws to gain access to the Atlassian Jira bug system, and get sensitive information such as security issues on Atlassian cloud, Bitbucket, and on-premise products.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Delta Variant Fuels Black Market for Fake Vaccination&lt;/TD&gt;
&lt;TD width="15%"&gt;
&lt;P&gt;&lt;STRONG&gt;Liad Mizrachi&lt;/STRONG&gt;&lt;BR /&gt;Security Expert&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Tal Eisner&lt;/STRONG&gt;&lt;BR /&gt;Threat Intelligence &amp;amp; Research Marketing Lead&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/644/1/CPX360_2022_Pandemic%20Liad%20Tal.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Delta-Variant-Fuels-Black-Market-for-Fake-Vaccination/m-p/139940#M644" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Since March, Check Point Research (CPR) noticed a 257% jump in the number of sellers using Telegram to advertise fake vaccination cards to those “who do not want to take the vaccine” as pressure to take the vaccine rises with the rapidly spreading Delta variant. For as low as $100, anyone can pay with cryptocurrency to purchase fake CDC, NHS, and EU Digital COVID certificates.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="CloudSecurityBestPracticesWorkshops" style="color: #e45785;"&gt;Cloud Security Best Practices Workshops&lt;/H2&gt;
&lt;TABLE style="width: 100%;" border="1" width="60%"&gt;
&lt;THEAD&gt;
&lt;TR class="tablesorter-headerRow" style="background-color: #e45785; color: #ffffff;" role="row"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Topic&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Speaker&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Content&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;Description&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR role="row"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;&lt;SPAN&gt;Shifting Security Left&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="15%"&gt;&lt;STRONG&gt;Rolando Panez&lt;BR /&gt;&lt;/STRONG&gt;Global Cloud Technologies Engineering Manager&lt;BR /&gt;Check Point&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/571/1/Rolando-SHIFTLEFT.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Shifting-Security-Left/m-p/139941/highlight/true#M137" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;As DevSecOps or SecDevOps continues to evolve, it’s important to understand every team’s requirements. Software Engineers need to write code efficiently yet securely. Devops Engineers need to integrate security scanning tools easily and effectively. Security Engineers need to analyze security alerts and respond quickly. Learn how CloudGuard ShiftLeft can help you secure your development process.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;MYTHBUSTERS of Cloud Native Security&lt;/TD&gt;
&lt;TD width="15%"&gt;
&lt;P&gt;&lt;STRONG&gt;Micki Boland&lt;/STRONG&gt;&lt;BR /&gt;Cloud Security Architect and Cyber Security Evangelist&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/594/1/CloudNativeMYTHBUSTERS_Micki%20Boland.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/MYTHBUSTERS-of-Cloud-Native-Security/m-p/139885#M127" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;The premise that security will slow you down in native cloud, add overhead to dev resources, and development cycles IS A MYTH.&lt;/P&gt;
&lt;P data-unlink="true"&gt;THE TRUTH: Building security as code into your native cloud leverages on-demand at scale security automation via API and infrastructure as code (IaC). It provides security end to end, before and during deployment of cloud infrastructure, including Kubernetes, containers, and serverless functions. Emphasis should be on ensuring least permissive principles, building security in cloud workloads during the development cycle, enabling protection in runtime, and utilizing threat intelligence. Learn to make DevSecOps the mission of your organization as a speed of business enabler, way of reducing risk, increasing agility and innovation, streamlining your software development lifecycle, and reducing costly and dangerous production fixes. We will show you how. Don’t buy into the myth. Cloud-native security can help you achieve all your goals.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;“The Ever Evolving Cloud Security Blueprint”: Lessons, Tips &amp;amp; Best Practices Learned While Deploying Cloud Solutions&lt;/TD&gt;
&lt;TD width="15%"&gt;
&lt;P&gt;&lt;STRONG&gt;Gustavo Coronel&lt;/STRONG&gt;&lt;BR /&gt;Cloud Security Architect&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/593/1/GustavoCoronel_Evolving_Blueprint.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/The-Ever-Evolving-Cloud-Security-Blueprint/m-p/139942/highlight/true#M621" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P&gt;Join Cloud Architect Gus Coronel as he talks about lessons learned while deploying cloud solutions over the years and discusses tips and tricks that extend the functionality of cloud security deployments. This workshop will cover real-world problems and how they were solved, as well as a number of reference architecture examples that incorporate some of the latest cloud provider advances.&lt;/P&gt;
&lt;P&gt;Likely Samples:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Creating Trusted and Untrusted Zones using a Single Internal Load Balancer in Azure&lt;/LI&gt;
&lt;LI&gt;Lessons Integrating CloudGuard with the Azure Route Server&lt;/LI&gt;
&lt;LI&gt;Using the CME and configuration scripts to automate highly customized deployments in the cloud&lt;/LI&gt;
&lt;LI&gt;Internal and External/DMZ TGW designs in AWS (with a CloudGuard Security VPC in the middle)&lt;/LI&gt;
&lt;LI&gt;Mixing Ingress Routing and centralized Security VPCs in AWS for a “Best of Both Worlds” deployment.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="15%" style="width: 15%;"&gt;&lt;SPAN&gt;NSA/CISA Kubernetes Hardening Guidance&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Yonatan Philip&lt;/STRONG&gt;&lt;BR /&gt;Product Manager CloudGuard Containers&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/635/1/NSA%20Kubernetes%20Hardening%20Guide-Yonatan%20Phillip.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/NSA-CISA-Kubernetes-Hardening-Guidance/m-p/139886/highlight/true#M635" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="15%" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;In today's world, Kubernetes is rapidly becoming the norm and taking center stage in many organizations. In tandem with this rapid adoption, the number of threats and attacked that Kubernetes administrators need to contend with is growing just as quickly. Recognizing this fact, the NSA recently released a Kubernetes Hardening Guide. Join us in this session to review the NSA’s recommendations and how CloudGuard’s Workload Protection can help you harden your clusters.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="SASEBestPracticesWorkshops" style="color: #e45785;"&gt;Secure Remote Access (SASE) Best Practices Workshops&lt;/H2&gt;
&lt;TABLE border="1"&gt;
&lt;THEAD&gt;
&lt;TR style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px;"&gt;
&lt;TD style="width: 15%;"&gt;Topic&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;Speaker&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;Content&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;Description&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR role="row"&gt;
&lt;TD style="width: 15%;"&gt;Harmony Connect: Secure Internet Access&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Humza Ismaiel&lt;/STRONG&gt;&lt;BR /&gt;SASE Architect&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Jacob Lee&lt;/STRONG&gt;&lt;BR /&gt;Head of Harmony Sales Americas&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/595/1/Harmony%20Connect-%20Secure%20Internet%20Access.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Harmony-Connect-Secure-Internet-Access/m-p/139947#M139" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Learn best practices to protect employees and data as your organization adopts a hybrid workforce in 2022. Gain an in-depth overview of Harmony Connect, Check Point’s SASE platform to enable advanced URL filtering, SSL inspection, granular application control and DLP to deliver the highest standards of security and productivity for your modern workforce.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD style="width: 15%;"&gt;Gone in 60 Seconds: Not My Data, But The Ransomware&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Rich Comber&lt;/STRONG&gt;&lt;BR /&gt;Head of Threat Prevention Engineering Americas&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Christian Sandberg&lt;/STRONG&gt;&lt;BR /&gt;Head of Beyond the Perimeter Security Experts&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/596/1/CPX2022_Zero_60_Rich%20Comber%20and%20Christian%20Sandberg.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Gone-in-60-Seconds-Not-My-Data-But-The-Ransomware/m-p/139887#M129" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Let's not talk about recovering from ransomware, but rather how to avoid an incident. In this session, we will discuss best practices for multi-layered defense against being compromised.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD style="width: 15%;"&gt;Harmony Connect Corporate Access: ZTNA &amp;amp; SASE&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Noa Zilberman&lt;BR /&gt;&lt;/STRONG&gt;Product Manager&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/622/1/CPX360_2022-ZTNA%20and%20corporate%20access%20Noa%20Zilberman.pdf" target="_self"&gt;Presentation&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Harmony-Connect-Corporate-Access-ZTNA-amp-SASE/m-p/139888/highlight/true#M622" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Trust issues are a real thing when it comes to connecting users to your internal organizational resources, and for a good reason. Most organizations are still struggling with outdated technology to catch up with threats that are becoming increasingly dangerous. Join us to learn how to implement Check Point’s cloud-based ZTNA (Zero Trust Network Access) model in less than 10 minutes, all while maintaining a superb user experience for anyone, anywhere, through any device.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD style="width: 15%;"&gt;Deep Dive Into the Future of Email Security&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Jonathan Gold Shalev&lt;/STRONG&gt;&lt;BR /&gt;Head of Product Management Email Security&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Chris Isbrecht&lt;/STRONG&gt;&lt;BR /&gt;Head of Security Engineering Email Security&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;Presentation&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Deep-Dive-Into-the-Future-of-Email-Security/m-p/139948/highlight/true#M636" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Avanan, Check Point’s recent acquisition and the fastest growing email security vendor, has been leading a revolution in how email security is implemented. As enterprises moved their email server to cloud-based solutions, mainly Microsoft 365 and Gmail, a new API-based approach is being adopted by more and more customers, replacing the traditional secure email gateways. Learn from Avanan’s CEO how this novel approach for cloud-email security works, the advantages it provides over legacy solutions, and Avanan’s role in this revolution.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="CommunityUseCases" style="color: #e45785;"&gt;CheckMates Community Use-Cases&lt;/H2&gt;
&lt;TABLE border="1"&gt;
&lt;THEAD&gt;
&lt;TR style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px;"&gt;
&lt;TD style="width: 15%;"&gt;Topic&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;Speaker&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;Content&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;Description&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR role="row"&gt;
&lt;TD style="width: 15%;"&gt;Stability and Speed in the Age of the Hybrid Cloud&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Michael Ibarra&lt;/STRONG&gt;&lt;BR /&gt;Senior Architect&lt;BR /&gt;Listrak&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/572/1/Check%20Point%20CPX%202022%20-%20Listrak%20Presentation-FINAL.cleaned.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Stability-and-Speed-in-the-Age-of-the-Hybrid-Cloud/m-p/139698#M84" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Listrak Inc, one of the world’s marketing leaders in cross-channel orchestration, predictive analytics ,and customer insight solutions, experienced a YoY throughput and load increase of 80% after their holiday season. Their aging 23900 platform needed replaced, but by what? And how? With only a few months until the holidays, they made a leap of faith in adopting Maestro—and saw performance, stability, and scalability that exceeded all expectations. This is their story.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD style="width: 15%;"&gt;Max Gander: The Hidden World of Log Generation and Log Suppression at Check Point&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;&lt;STRONG&gt;Tim Hall&lt;BR /&gt;&lt;/STRONG&gt;CTO&lt;BR /&gt;Shadow Peak Inc.&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/597/1/CPX_MaxGander_TimHall_FINAL2.cleaned.pdf" target="_self"&gt;Presentation&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Max-Gander-The-Hidden-World-of-Log-Generation-and-Log/m-p/139699#M85" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;One of the most important roles of a Check Point firewall administrator is working with Check Point logs every day diagnosing and solving issues, but you may be missing the whole picture! This hard-hitting technical presentation will reveal little-known log settings, how those logs are consolidated, and even suppression of some logs that may surprise you. An important presentation for anyone that works with Check Point logs!&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;Best Practices: Maestro HyperScale Solution&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Danny Jung&lt;/STRONG&gt;&lt;BR /&gt;CTO&lt;BR /&gt;Enterprise Security Center&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/598/1/CPX%202022%20-%20Maestro%20-%20CheckMates%20Track.pdf" target="_self"&gt;Presentation&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Best-Practices-Maestro-HyperScale-Solution/m-p/139700#M86" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;This presentation will introduce you to Check Point Maestro. You will learn about its innovative concept, how easy it scales in just minutes, supported topologies and best practices from real life scenarios. Even more you'll learn about included tools and lot's of other smart advantages your admins will love to use. Enjoy!&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;Check Point “dynamic” Object Types &amp;amp; Typical Use Cases&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Kaspars Zibarts&lt;/STRONG&gt;&lt;BR /&gt;Principal Engineer&lt;BR /&gt;Scania&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/600/1/CPX2022%20-%20Kaspars.pdf" target="_self"&gt;Presentation&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Check-Point-dynamic-Object-Types-amp-Typical-Use-Cases/m-p/139701#M87" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P title=""&gt;There’s always been a challenge with changing IPs and networks in our rulebases, how to keep yourself on front foot and minimize manual work. While we often use standard host and network type objects, there are others that are quite useful.&lt;/P&gt;
&lt;P title=""&gt;Kaspars Zibarts shows other object types that are often forgotten or overlooked and but very useful in order to minimize administration effort and improve security.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 15%;"&gt;“Skyline”: Monitoring the Operational Health of Check Point Devices&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Arik Ovtracht&lt;BR /&gt;&lt;/STRONG&gt;Team Leader R&amp;amp;D&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/599/2/Skyline%20presentation.pdf" target="_self"&gt;Presentation&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Skyline-Monitoring-the-Operational-Health-of-Check-Point-Devices/m-p/139702#M88" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Introducing a new way to monitor your Check Point devices’ operational health from a single location. We are working on an exciting new capability, which will allow you to monitor every aspect of your devices’ operational health – like CPU, memory, traffic and many many more security-related parameters – in short intervals and using modern technologies and 3rd party tools (such as Prometheus and Grafana).&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD style="width: 15%;"&gt;Blackops on Devops: Why Hackers are Targeting Developers and What You Can Do About It&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Micki Boland&lt;BR /&gt;&lt;/STRONG&gt;Cyber Security Evangelist&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/623/1/CheckPoint_BlackOpsonDevOps_TechTalksAnalystSeries_v1_7OCT2021_MLB.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Blackops-on-Devops-Why-Hackers-are-Targeting-Developers-and-What/m-p/139703/highlight/true#M623" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Developers and DevOps is integral part of software development lifecycle and hackers want into the software supply chain. Hackers want in and you are likely under covert operations, reconnaissance, surveillance and intelligence gathering by hackers as we speak.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD style="width: 15%;"&gt;How Optix SMB MSSP is Seizing Security opportunity with Check Point&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Trevor Rowley&lt;/STRONG&gt;&lt;BR /&gt;Managing Director&lt;BR /&gt;Optix&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Oshi Nidam&lt;/STRONG&gt;&lt;BR /&gt;Partner Enablement Manager&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/How-Optix-SMB-MSSP-is-Seizing-Security-opportunity-with-Check/m-p/139723/highlight/true#M629" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;An interview with a two-decade Check Point partner to explore the value of being a managed service provider of Check Point.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD style="width: 15%;"&gt;In-House Developed WEB Application Leveraging R8x API for Multi-customer Monitoring&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Eli Faskha&lt;/STRONG&gt;&lt;BR /&gt;CEO&lt;BR /&gt;Soluciones Seguras&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Randol Chen&lt;/STRONG&gt;&lt;BR /&gt;Security Architect&lt;BR /&gt;Soluciones Seguras&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/637/1/SSMS%20-%20CPX2022%20v1.cleaned.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/In-House-Developed-WEB-Application-Leveraging-R8x-API-for-Multi/m-p/139706/highlight/true#M637" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;The availability and optimal operation of our customers security gateways and servers is very important, as well as quick assistance in the event of an incident. That’s why we have developed a WEB application to take advantage of the R8x API and maintain proactive monitoring towards our customers devices. The system is designed for service providers with multiple Check Point customers. This session will take a closer look at this project and how it leverages the R80 API to gain insights and a quick way to connect to customer management.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD style="width: 15%;"&gt;Celebrating 30 Years of the Smartphone&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Zahier Madhar&lt;/STRONG&gt;&lt;BR /&gt;Cyber Security Evangelist&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/645/1/CPX_Checkmates_zahier.pdf" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp; &lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Celebrating-30-Years-of-the-Smartphone/m-p/139707#M645" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Today, we can't imagine a world without a smartphone. This session reflects on the 30th anniversary of the smartphone, which brought us a new way of communication. The smartphone also introduced new challenges with a new attack vector. During this presentation we'll take a moment to evaluate this new attack vector and how to address it.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="ExecutiveTrack" style="color: #e45785;"&gt;Executive Track&lt;/H2&gt;
&lt;TABLE border="1"&gt;
&lt;THEAD&gt;
&lt;TR style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px;"&gt;
&lt;TD width="233.25px" height="25px" style="width: 15%;"&gt;Topic&lt;/TD&gt;
&lt;TD width="233.25px" height="25px" style="width: 15%;"&gt;Speaker&lt;/TD&gt;
&lt;TD width="233.25px" height="25px" style="width: 15%;"&gt;Content&lt;/TD&gt;
&lt;TD width="233.25px" height="25px" style="width: 15%;"&gt;Description&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR role="row"&gt;
&lt;TD width="233.25px" height="297px" style="width: 15%;"&gt;CISO Executive Talks with Mel Migrino, Group CISO, Meralco&lt;/TD&gt;
&lt;TD width="233.25px" height="297px" style="width: 15%;"&gt;
&lt;P&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;Mel Migrino&lt;/STRONG&gt;&lt;BR /&gt;Vice President and Group Chief Information Security Officer&lt;BR /&gt;Manila Electric Company&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" height="297px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/CISO-Executive-Talks-with-Mel-Migrino-Group-CISO-Meralco/m-p/139949#M141" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" height="297px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Mel Migrino, Vice President and Group Chief Information Security Officer for Meralco (Manila Electric Company) being interviewed live by Ashwin Ram, Check Point evangelist and C-Level professional.&lt;/P&gt;
&lt;P data-unlink="true"&gt;Meralco is the largest private sector electric distribution utility company in the Philippines.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="233.25px" height="414px" style="width: 15%;"&gt;CISO Executive Talks with Lucius Lobo, CISO, Tech Mahindra&lt;/TD&gt;
&lt;TD width="233.25px" height="414px" style="width: 15%;"&gt;&lt;STRONG&gt;Lucius Lobo&lt;/STRONG&gt;&lt;BR /&gt;Chief Information Security Officer&lt;BR /&gt;Tech Mahindra&lt;/TD&gt;
&lt;TD width="233.25px" height="414px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/CISO-Executive-Talks-with-Lucius-Lobo-CISO-Tech-Mahindra/m-p/139964#M144" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" height="414px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Lucius Lobo, Chief Information Security Officer for Tech Mahindra being interviewed live by Ashwin Ram, Check Point evangelist and C-Level professional.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Tech Mahindra is one of the fastest-growing brands and amongst the top 15 IT service providers globally. Tech Mahindra has consistently emerged as a leader in sustainability and is recognized amongst the ‘2021 Global 100 Most sustainable corporations in the World’ by Corporate Knights.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="233.25px" height="209px" style="width: 15%;"&gt;
&lt;P&gt;Fireside Chat with David Ulloa, Chief Information Security Officer for IMC Companies&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" height="209px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;David Ulloa&lt;/STRONG&gt;&lt;BR /&gt;Chief Information Security Officer&lt;BR /&gt;IMC Companies&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Brian Linder&lt;/STRONG&gt;&lt;BR /&gt;Head of Worldwide Evangelists Office of the CTO&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" height="209px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/Fireside-Chat-with-David-Ulloa-Chief-Information-Security/m-p/139965#M145" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" height="209px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;This session will focus on how consolidation assists CISO's in securing the supply chain.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="233.25px" height="568px" style="width: 15%;"&gt;CISO Executive Talks with Babitha B P, CISO, Catholic Syrian Bank&lt;/TD&gt;
&lt;TD width="233.25px" height="568px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Babitha B P&lt;/STRONG&gt;&lt;BR /&gt;Chief Information Security Officer&lt;BR /&gt;Catholic Syrian Bank&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" height="568px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/CISO-Executive-Talks-with-Babitha-B-P-CISO-Catholic-Syrian-Bank/m-p/139952#M143" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" height="568px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Babitha B P, Chief Information Security Officer for Catholic Syrian Bank (CSB) being interviewed live by Ashwin Ram, Check Point evangelist and C-Level professional.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;CSB is a full service bank established in 1920 and headquartered in Thrissur, Kerala. CSB has over 263 branches in Kerala covering not just the district headquarters and large towns but also semi-urban and rural centres. Thanks to its unique origin and history, CSB is considered a household banking brand in Kerala. CSB offers Retail, Wholesale and SME Banking services through its footprint of over 516 branches across the country serving over 1 million customers.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="233.25px" height="590px" style="width: 15%;"&gt;CISO Executive Talks with Gary Landau, Managing Principal Global Security Services, Unisys&lt;/TD&gt;
&lt;TD width="233.25px" height="590px" style="width: 15%;"&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Gary Landau&lt;BR /&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;FONT color="#000000"&gt;Managing Principal Global Security Services&lt;BR /&gt;Unisys&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Cindi Carter&lt;BR /&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;FONT color="#000000"&gt;Field CISO West&lt;BR /&gt;Check Point&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" height="590px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/CISO-Executive-Talks-with-Gary-Landau-Managing-Principal-Global/m-p/139951#M142" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" height="590px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Gary Landau, Managing Principal for Global Security Services at Unisys, will be interviewed by Cindi Carter, Check Point’s Field Chief Information Security Officer and seasoned security professional. They will be discussing Continuous Compliance in the Cloud (from an MSSP perspective). Unisys is a global information technology company that builds high-performance, security-centric solutions for the most demanding businesses and governments on Earth. Unisys offerings include security software and services; digital transformation and workplace services; industry applications and services; and innovative software operating environments for high-intensity enterprise computing.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="233.25px" height="408px" style="width: 15%;"&gt;CISO Roundtable: We will all be hacked. The only difference is our level of preparedness and what our response will be.&lt;/TD&gt;
&lt;TD width="233.25px" height="408px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Pete Nicolleti&lt;/STRONG&gt;&lt;BR /&gt;Field CISO East&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Craig Overton&lt;/STRONG&gt;&lt;BR /&gt;Vice President IT &amp;amp; Facilities&lt;BR /&gt;Bell and Howell&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;John Christly&lt;/STRONG&gt;&lt;BR /&gt;VP CISO&lt;BR /&gt;Core Business Solutions&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Michael Trofi&lt;/STRONG&gt;&lt;BR /&gt;CISO&lt;BR /&gt;Trofi Security and United States Holocaust Memorial Museum&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" height="408px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/CISO-Roundtable-We-will-all-be-hacked/m-p/140127#M147" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" height="408px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;A rich and engaging dialogue between seasoned cybersecurity professionals from a diverse range of industries. We will all be hacked. The only difference is our level of preparedness and what our response will be.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="233.25px" height="452px" style="width: 15%;"&gt;CISO Roundtable: Secure from the Start - Preparing for what is next, not what was last&lt;/TD&gt;
&lt;TD width="233.25px" height="452px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Cindi Carter&lt;/STRONG&gt;&lt;BR /&gt;Field CISO West&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Michael Poczobut&lt;/STRONG&gt;&lt;BR /&gt;CISO&lt;BR /&gt;Blue Cross &amp;amp; Blue Shield of Vermont&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Jeff Stark&lt;/STRONG&gt;&lt;BR /&gt;CISO&lt;BR /&gt;Fasken&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Clint Lawson&lt;/STRONG&gt;&lt;BR /&gt;CISO&lt;BR /&gt;MidFirst Bank&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Gary Johnson&lt;/STRONG&gt;&lt;BR /&gt;Senior Director Security &amp;amp; Infrastructure&lt;BR /&gt;Evergy&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" height="452px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/CISO-Roundtable-Secure-from-the-Start-Preparing-for-what-is-next/m-p/140129#M149" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" height="452px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Join us for a lively and insightful dialogue between seasoned cybersecurity professionals from a diverse range of industries, moderated by Check Point’s Field CISO Cindi Carter. Our title is: “Secure from the Start: Preparing for what is next, not what was last.” Are you ready?&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 15%;"&gt;CISO Executive Talks with Martyn Booth, CISO, Euromoney Institutional Investor&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Martyn Booth&lt;BR /&gt;&lt;/STRONG&gt;Group Chief Information Security Officer&lt;BR /&gt;Euromoney Institutional Investor&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/CISO-Executive-Talks-with-Martyn-Booth-CISO-Euromoney/m-p/140220#M580" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;SPAN&gt;Martyn Booth, Group Chief Information Security Officer for Euromoney Institutional Investor being interviewed live by Peter Sandkuijl, Check Point VP, EMEA Engineering and security evangelist. Euromoney Institutional Investor PLC is an international business information group listed on the stock exchange and is a member of the FTSE 250 share index. Euromoney’s group of businesses covers asset management, price discovery, data and market intelligence. Euromoney has revenues of around £400m, a market cap of about £1.2bn and approximately 2500 employees.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="233.25px" height="47px" style="width: 15%;"&gt;CISO Roundtable: Surviving the Inevitable Cyber Attack&lt;/TD&gt;
&lt;TD width="233.25px" height="47px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Deryck Mitchelson&lt;/STRONG&gt;&lt;BR /&gt;Field CISO&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Scott Barnett&lt;/STRONG&gt;&lt;BR /&gt;Director of National Security Operations Centre&lt;BR /&gt;NHS Scotland&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Kostas Papachristofis&lt;/STRONG&gt;&lt;BR /&gt;CISO&lt;BR /&gt;Olympia Group (Greece)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Gioacchino Buscemi&lt;/STRONG&gt;&lt;BR /&gt;Security Accreditation and Risk Manager&lt;BR /&gt;ESA European Space Agency (Italy)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Roee Laufer&lt;/STRONG&gt;&lt;BR /&gt;CISO&lt;BR /&gt;Israel Airports Authority&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" height="47px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/CISO-Roundtable-Surviving-the-Inevitable-Cyber-Attack/m-p/140128#M148" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" height="47px" style="width: 15%;"&gt;
&lt;P&gt;A rich and engaging dialogue between seasoned cybersecurity professionals from a diverse range of industries.&lt;/P&gt;
&lt;P&gt;We will all be hacked. The only difference is our level of preparedness and what our response will be.&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 15%;"&gt;CISO Executive Talks with Mr Libisi Maphanga, CIO, Electoral Commission of South Africa&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Libisi Maphanga &lt;BR /&gt;&lt;/STRONG&gt;Chief Information Officer, Electoral Commission of South Africa&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/CISO-Executive-Talks-with-Mr-Libisi-Maphanga-CIO-Electoral/m-p/140224#M582" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;SPAN&gt;Mr Libisi Maphanga is the Chief Information Officer for the Electoral Commission of South Africa and he will be interviewed live by Christine Schoenig, Check Point’s Central Europe Regional Director of Security Engineering and security evangelist. The Electoral Commission's strategic objectives are to implement and promote effective electoral processes that will facilitate the participation of political parties and candidates in the management and delivery of free and fair elections.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 15%;"&gt;&lt;SPAN&gt;CISO Executive Talks with Sotiris Tripolitsiotis, CIO, Pancreta Bank, Greece&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Sotiris Tripolitsiotis&lt;BR /&gt;&lt;/STRONG&gt;Chief Information and Technology Officer&lt;BR /&gt;Pancreta Bank&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Member-Exclusive-Content/CISO-Executive-Talks-with-Sotiris-Tripolitsiotis-CIO-Pancreta/m-p/140226#M583" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;Sotiris Tripolitsiotis is the Chief Information and Technology Officer for Pancreta Bank and he will be interviewed live by Deryck Mitchelson, Check Point’s Field Chief Information Security Officer. Pancreta Bank was established in 1993. Today, it is the largest cooperative organization in Greece with more than 85,000 active members and 450 employees. It has a network of 52 branches all over Greece, most of them in the island of Crete.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="PartnersTrack" style="color: #e45785;"&gt;Partners Track (Only Available to Partners)&lt;/H2&gt;
&lt;TABLE border="1"&gt;
&lt;THEAD&gt;
&lt;TR style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px;"&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;Topic&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;Speaker&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;Content&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;Description&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;Chief Customer Officer &amp;amp; CEO Interview- 2022 Strategy &amp;amp; Vision&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Gil Shwed&lt;/STRONG&gt; &lt;BR /&gt;Founder &amp;amp; CEO&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Dan Yerushalmi &lt;/STRONG&gt;&lt;BR /&gt;Chief Customer Officer&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&lt;A href="https://community.checkpoint.com/t5/Archive/CEO-Interview-2022-Strategy-amp-Vision/m-p/139633#M434" target="_self"&gt;&amp;nbsp;View YouTube Video - Gil&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Archive/Chief-Customer-Officer-2022-Strategy-amp-Vision/m-p/139634#M435" target="_self"&gt;View YouTube Video - Dan&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Check Point CEO, Gil Shwed &amp;amp; CCO, Dan Yerushalmi, discuss Check Point's 2022 strategy and vision of Check Point with a focus on our&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;four pillars: Best Security, Customer Experience, Customer Reach &amp;amp; Agility&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;Partnering for Success &amp;amp; Celebrating Excellence!&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Frank Rauch &lt;BR /&gt;&lt;/STRONG&gt;Head of WW Channel Sales&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Archive/Partnering-for-Success-amp-Celebrating-Excellence/m-p/139627#M430" target="_self"&gt;View YouTube Video&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Frank Rauch will discuss Check Point's partner program and best practices for channel and vendor collaboration.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;Marketing the Best Security&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Peter Alexander &lt;BR /&gt;&lt;/STRONG&gt;Chief Marketing Officer&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Archive/Marketing-the-Best-Security/m-p/139628#M431" target="_self"&gt;View YouTube Video&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;A New Year, New Opportunities: The world is adapting to Covid, economic growth, decreasing unemployment, supply chain easing, while the Cyber Security industry continues to grow. Peter Alexander, Check Point's CMO, will demonstrate how this creates an amazing opportunity for us to market our best security approach with relentless marketing strategies in 2022: focused story and messaging, awareness, engagement &amp;amp; enablement.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;Mind the Gap: Why Best Security Matters&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Moti Sagey &lt;BR /&gt;&lt;/STRONG&gt;Chief Evangelist VP Strategic Marketing&lt;BR /&gt;Check Point&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://tiny.cc/mindgap" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Archive/Mind-the-Gap-Why-Best-Security-Matters/m-p/139630#M432" target="_self"&gt;View YouTube Video&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P&gt;&lt;SPAN&gt;History tells us there comes a time when almost every new innovative service starts to lose ground to a “good enough” competitor. Like with TV’s, medication, smartphones, etc.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;With the huge growth of attacks and breaches in the past year such as: Log4J, SolarWinds, Kaseya / Revil, Colonial Pipeline, to name a few, we see a pattern: Organizations that invested only in “good enough” security products lost the cyber battle.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;It’s apparent that “good enough” or "second best" though fitting for smartphones or cars, could spell trouble as this mindset creeps into the cyber security industry.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now more than ever, in this “New World” -- more digitized than ever before -- the single greatest cyber threat to organizations today is the “good enough” standard that’s being sold by key players in the cyber security industry.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;“Good enough” mindset will get you breached. In order to overcome this mindset, businesses need to MIND THE GAP between good enough solutions and the BEST SECURITY solutions by asking the hard questions and evaluating their cyber security strategy.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This will be the focus of Moti's session: what makes a security solution the best , and what does BEST stand for according to our customers?&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P class="event-list-item__name"&gt;Celebrating Excellence: Partner Awards&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/Celebrating-Excellence-Partner-Awards-APAC/m-p/140387#M933" target="_self"&gt;View YouTube Video - APAC&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Archive/Celebrating-Excellence-Partner-Awards-Americas/m-p/139632#M433" target="_self"&gt;View YouTube Video - Americas&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/Celebrating-Excellence-Partner-Awards-EMEA/m-p/140386#M932" target="_self"&gt;View YouTube Video - EMEA&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;In this session we will recognize and celebrate our top partners' achievements for 2021.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR role="row"&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;Why Check Point: For Partners&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Frank Rauch&lt;/STRONG&gt; &lt;BR /&gt;Head of WW Channel Sales&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/Partnering-for-Success-amp-Celebrating-Excellence/td-p/139627?attachment-id=6536" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/Why-Check-Point-For-Partners/m-p/139956#M926" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P&gt;Frank Rauch will reveal what’s “in it” for partners selling Check Point: our main differentiators that drive partner profitability &amp;amp; customer success.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;How to Make Money Selling Check Point&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Simon Fidler&lt;/STRONG&gt; &lt;BR /&gt;Team Leader Sales Operations&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/How-to-Make-Money-Selling-Check-Point/m-p/139954/thread-id/437?attachment-id=6537" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/How-to-Make-Money-Selling-Check-Point/m-p/139954#M437" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;Simon Fidler will cover the program rewards areas that include co-op, MDF, and rebate programs.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 15%;"&gt;FY22 APAC Channel Strategy &amp;amp; Priorities&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Pankaj Narayan &lt;BR /&gt;&lt;/STRONG&gt;Head of Channels APAC&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/FY22-APAC-Channel-Strategy-amp-Priorities/m-p/139963/thread-id/443?attachment-id=6538" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/FY22-APAC-Channel-Strategy-amp-Priorities/m-p/139963#M443" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 15%;"&gt;
&lt;P&gt;In this session Pankaj Narayan will cover how the we anticipate working hand-in-hand with our partners to meet some of the strategic&lt;BR /&gt;sales priorities outlined for APAC by Sharat Sinha.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;Americas Channel Strategy for 2022&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Nisha Holt&lt;/STRONG&gt; &lt;BR /&gt;Head of Americas Channel Sales&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/Americas-Channel-Strategy-for-2022/m-p/139953/thread-id/436?attachment-id=6539" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/Americas-Channel-Strategy-for-2022/m-p/139953#M436" target="_self"&gt;View YouTube Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P&gt;Head of Channels, Nisha Holt, will provide an overview of the Americas channel strategy and focus for FY22.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;H5 class="event-list-item__name"&gt;How to Cross-Sell/Up-Sell Your Install Base&lt;/H5&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Frank Rauch &lt;BR /&gt;&lt;/STRONG&gt;Head of WW Channel Sales&lt;BR /&gt;Check Point&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/How-to-Cross-Sell-Up-Sell-Your-Install-Base/m-p/139958/thread-id/439?attachment-id=6540" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/How-to-Cross-Sell-Up-Sell-Your-Install-Base/m-p/139958#M439" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Frank Rauch will demonstrate effective sales strategies to target and win additional business from existing customers.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;How to Create Demand for Security Solutions&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Lauren Ventura &lt;BR /&gt;&lt;/STRONG&gt;Head of Global Channel Marketing&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/How-to-Create-Demand-for-Security-Solutions/m-p/139959/thread-id/440?attachment-id=6541" target="_self"&gt;Presentation&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/How-to-Create-Demand-for-Security-Solutions/m-p/139959#M440" target="_self"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Lauren Ventura will show how Check Point marketing is making it easier for partners to get leads, while lowering the cost of sales.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;Building Technical and Sales Capacity&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Tony Sabaj &lt;BR /&gt;&lt;/STRONG&gt;Head of North American Channel&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Mark Hitchins&lt;BR /&gt;&lt;/STRONG&gt;Head of SE Channels Engineering EMEA&lt;BR /&gt;Check Point&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/Building-Technical-and-Sales-Capacity-Americas/m-p/139960/thread-id/441?attachment-id=6542" target="_self"&gt;Presentation - Americas&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/Building-Technical-and-Sales-Capacity-EMEA/td-p/139961?attachment-id=6543" target="_self"&gt;Presentation - EMEA&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/Building-Technical-and-Sales-Capacity-Americas/m-p/139960#M441" target="_self"&gt;View YouTube Video - Americas&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="youtube.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4377iD8F1D0E8DDEEB9F1/image-size/small?v=v2&amp;amp;px=200" role="button" title="youtube.png" alt="youtube.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Partner-Community/Building-Technical-and-Sales-Capacity-EMEA/m-p/139961#M442" target="_self"&gt;View YouTube Video - EMEA&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="233.25px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;The Head of Partner Engineering will provide the latest methods and best practices for partners to accelerate deployments – for pre and post sales.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Thu, 10 Mar 2022 00:26:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/138585#M24678</guid>
      <dc:creator>Moti</dc:creator>
      <dc:date>2022-03-10T00:26:30Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 360 2022</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/138590#M24679</link>
      <description>&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jan 2022 09:21:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/138590#M24679</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2022-01-17T09:21:16Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 360 2022</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/138591#M24680</link>
      <description>&lt;P&gt;Drumrolls&lt;span class="lia-unicode-emoji" title=":drum:"&gt;🥁&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":drum:"&gt;🥁&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":drum:"&gt;🥁&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jan 2022 09:23:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/138591#M24680</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-01-17T09:23:26Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 360 2022</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/138621#M24681</link>
      <description>&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jan 2022 12:17:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/138621#M24681</guid>
      <dc:creator>toby</dc:creator>
      <dc:date>2022-01-17T12:17:17Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 360 2022</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/140024#M24856</link>
      <description>&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Jan 2022 19:08:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/140024#M24856</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2022-01-31T19:08:33Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 360 2022</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/140137#M24859</link>
      <description>&lt;P&gt;Or sooner &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2022 04:43:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/140137#M24859</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-02-02T04:43:37Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 360 2022</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/140241#M24862</link>
      <description>&lt;P&gt;It's live streaming&amp;nbsp;8)&lt;/img&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2022 14:20:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/140241#M24862</guid>
      <dc:creator>Jones</dc:creator>
      <dc:date>2022-02-02T14:20:03Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 360 2022</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/140390#M24885</link>
      <description>&lt;P&gt;I've updated the post with almost all the CPX content.&lt;BR /&gt;If any of the links don't work, let us know.&lt;BR /&gt;A handful of items are missing and we'll do our best to update accordingly.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Feb 2022 12:55:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/140390#M24885</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-02-03T12:55:33Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 360 2022</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/140393#M24887</link>
      <description>&lt;P&gt;Awesome Dameon, thank you very much&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":flexed_biceps:"&gt;💪&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Feb 2022 13:31:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/140393#M24887</guid>
      <dc:creator>Jones</dc:creator>
      <dc:date>2022-02-03T13:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 360 2022</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/140424#M24892</link>
      <description>&lt;P&gt;Am missing the best presenter&amp;nbsp;&lt;SPAN&gt;Avi Rembaum, you guys need to give him a few sessions for the next event.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Feb 2022 18:03:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/140424#M24892</guid>
      <dc:creator>Magnus-Holmberg</dc:creator>
      <dc:date>2022-02-03T18:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 360 2022</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/140481#M24894</link>
      <description>&lt;P&gt;Avi was actually presenting on the first day, which is for partners only, not exactly public, and hence is not published here.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Feb 2022 10:20:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/140481#M24894</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-02-04T10:20:57Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 360 2022</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/140483#M24895</link>
      <description>&lt;P&gt;Missed the first day &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Magnus&lt;/P&gt;</description>
      <pubDate>Fri, 04 Feb 2022 10:24:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/140483#M24895</guid>
      <dc:creator>Magnus-Holmberg</dc:creator>
      <dc:date>2022-02-04T10:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 360 2022</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/142087#M25233</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This year I was at a Client promoting Check Point Harmony during Dr. Dorit Dor's&amp;nbsp;&lt;SPAN&gt;live session&lt;/SPAN&gt;&lt;SPAN&gt;. The next day I tried to access the content, but it was missing. Seems to be missing here as well. I get that it may have "forward looking statements" and Check Point legal is probably blocking access, but is there any way that a Partner may get access to the session?&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Feb 2022 16:55:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/142087#M25233</guid>
      <dc:creator>AEsteves</dc:creator>
      <dc:date>2022-02-21T16:55:13Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 360 2022</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/142109#M25236</link>
      <description>&lt;P&gt;We do not make Dorit’s roadmap presentation available for later viewing.&lt;BR /&gt;If you have specific roadmap questions it’s best to reach out to your local Check Point representative.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Feb 2022 22:00:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/142109#M25236</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-02-21T22:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 360 2022</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/142134#M25240</link>
      <description>&lt;P&gt;As a matter of policy, we do not share Dorit's presentation publicly. If you have any specific requests, send me an email to &lt;A href="mailto:vloukine@checkpoint.com" target="_blank"&gt;vloukine@checkpoint.com&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks for your understanding,&lt;BR /&gt;Val&lt;/P&gt;</description>
      <pubDate>Tue, 22 Feb 2022 07:58:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-360-2022/m-p/142134#M25240</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-02-22T07:58:30Z</dc:date>
    </item>
  </channel>
</rss>

