<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: #CPX360 Slides 2019 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38439#M8166</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your are really fast. Thank you for it. I can enjoy sessions which I missed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 28 Feb 2019 08:50:19 GMT</pubDate>
    <dc:creator>Petr_Hantak</dc:creator>
    <dc:date>2019-02-28T08:50:19Z</dc:date>
    <item>
      <title>#CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38429#M8156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV style="color: #6d6e71; background: #e6e6e6; margin: 0px auto;"&gt;&lt;DIV style="color: #6d6e71; background: #e6e6e6; margin: 0px auto;"&gt;&lt;P style="padding: 0px; text-align: center;"&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV style="color: #6d6e71; background: #e6e6e6; margin: 0px auto;"&gt;&lt;DIV style="color: #6d6e71; background: #e6e6e6; margin: 0px auto;"&gt;&lt;P style="padding: 0px; text-align: center;"&gt;&lt;IMG __jive_id="79391" alt="" class="image-3 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/79391_CM-Top-Header.png" /&gt;&lt;/P&gt;&lt;P style="padding: 0px; text-align: center;"&gt;&lt;SPAN style="font-size: 13px;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding: 0px; text-align: center;"&gt;&lt;IMG __jive_id="79374" alt="" class="image-2 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/79374_output_uyBgiz.gif" /&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;H1 style="text-align: center;"&gt;&lt;SPAN style="color: #ff0000; font-size: 22px;"&gt;For exclusive access to the slides and videos from each presentation, please log into your Check Point CheckMates account&lt;/SPAN&gt;&lt;/H1&gt;&lt;P style="text-align: center;"&gt;&lt;SPAN style="color: #000000; font-size: 13px;"&gt;&lt;STRONG&gt;**If you are not a member yet, its easy (and free) to join, &lt;A href="https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/createProfile.psml"&gt;click here&lt;/A&gt;**&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;H2 style="color: #e45785; background-color: #ffffff; border-bottom-color: #ffffff; font-weight: normal; font-size: 20px; margin: 10px 0px 0px;"&gt;Cyber Talk Keynotes&lt;/H2&gt;&lt;DIV class="" style="background-color: #ffffff; margin: 10px 0px 0px;"&gt;&lt;TABLE id="TBL1551040361604" style="border-bottom-width: thin; border-bottom-style: solid; border-bottom-color: #6d6e71; font-size: 0.9em; width: 1340px;"&gt;&lt;TBODY style="border: inherit solid inherit;"&gt;&lt;TR style="height: 23px;"&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 152px; height: 23px;" title="null"&gt;Topic&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 170px; height: 23px;" title="null"&gt;Speaker&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 175px; height: 23px;"&gt;Content&lt;/TH&gt;&lt;TH colspan="1" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 788px; height: 23px;"&gt;Abstract&lt;/TH&gt;&lt;/TR&gt;&lt;TR style="height: 115px;"&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 152px; height: 115px;"&gt;Gil Shwed Keynote - Cyber Security for 2020&lt;/TD&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 170px; height: 115px;"&gt;&lt;STRONG&gt;Gil Shwed&lt;/STRONG&gt;&lt;BR /&gt;Founder and CEO&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 175px; height: 115px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3573" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/10992"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 115px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;2018 brought new challenges for our industry and new accomplishments for&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Check&lt;SPAN&gt;&amp;nbsp;P&lt;/SPAN&gt;oint. While there has been great progress, the need for better security with scalability and manageability will inevitably lead to consolidated solutions which can provide seamless prevention.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="" style="background: url(&amp;quot;;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding: 0px;"&gt;Check Point Infinity is the leading such solution. Gil will discuss his vision for Infinity, and how the architecture will provide cloud-based services to address Gen I through VI attacks.&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 138px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 138px;"&gt;A Cyber Security Gut Check: Good Is Not Good Enough&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 138px;"&gt;&lt;STRONG&gt;Avi Rembaum&lt;/STRONG&gt;, VP, Security Solutions&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 138px;"&gt;&lt;DIV class=""&gt;&lt;SPAN class="" style="color: #222222; text-decoration: none;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3656"&gt;Presentation&lt;/A&gt;&lt;/SPAN&gt; &lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/10996"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 138px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;This session will dissect the gap between attack and prevention generations and showing a financial view. We spend $120 Billion on security technology and services and lose $600 Billion.&amp;nbsp; The impact of GDPR and the alignment of risk management to security: application of traditional financial risk management methods on IT security.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="" style="background: url(&amp;quot;;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding: 0px;"&gt;IT security professionals will need to learn how to show the benefit of their investment and how to reduce spend and increase risk reduction. This leads to the importance of strategies toward consolidation and embracing the move to security through automation.&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 69px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 69px;"&gt;How Do We Protect Our Own Cloud Infrastructure?&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 69px;"&gt;&lt;STRONG&gt;Sharon Schusheim&lt;/STRONG&gt;, VP, Information Systems&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 69px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3660" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/10997"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 69px;"&gt;&lt;P style="padding: 0px;"&gt;Check Point CIO shares on stage challenges and pragmatic approaches in securing public cloud infrastructures at Check Point to answer different departments requirements for agility, quick delivery of compute power and operating the big data lake called ThreatCloud to address Check Point Customers security needs&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 125px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 125px;"&gt;Hackers Exposed - Gen VI Threats Under the Microscope&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 125px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Yaniv Balmas&lt;/STRONG&gt;, Head of Security Research&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Oded Vanunu&lt;/STRONG&gt;, Head of Products Vulnerability Research&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 125px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3659"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/10998"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 125px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 69px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 69px;"&gt;Hacking Like a Disney Villain&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 69px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Maya Horowitz&lt;/STRONG&gt;, Director, Threat Intelligence &amp;amp; Research&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 69px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3575" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/10999"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 69px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;The session will illustrate different types of cyber-attacks through the vicious activities done by notorious Disney villains, with examples of attacks discovered by Check Point researchers throughout the year.&lt;/P&gt;&lt;P style="padding: 0px;"&gt;See how Ursula asked Ariel for ransom, how Cruella de Vil recruited a botnet of Dalmatians and more.&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 115px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 115px;"&gt;AI Innovations in Cyber Security&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 115px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Neatsun Ziv&lt;/STRONG&gt;, VP, Threat Prevention&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Eddie Doyle&lt;/STRONG&gt;, Cyber Security Evangelist&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 115px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3658" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="padding: 0px;"&gt;&lt;/P&gt;&lt;P style="padding: 0px;"&gt;&lt;A href="https://www.youtube.com/watch?v=giTVDDoPGRA&amp;amp;feature=youtu.be" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://community.checkpoint.com/videos/11000"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 115px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Algorithms are being used to choose who lives &amp;amp; who dies. Computers are being programmed to make ethical decisions that impact every facet of our lives.&lt;/P&gt;&lt;P style="padding: 0px;"&gt;Based on the ethics of cyber-criminals, Check Point has made another&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;gigantic&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;leap forward by teaching our gateways to use algorithms to detect the DNA of Malware &amp;amp; in an industry-first breakthrough that will provide the best threat prevention in the world!&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 115px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 115px;"&gt;Age of Things - Gen VI Security&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 115px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Itai Greenberg&lt;/STRONG&gt;, VP, Product Management&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Oded Gonda&lt;/STRONG&gt;, VP, Technology &amp;amp; Innovation&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 115px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3662" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="padding: 0px;"&gt;&lt;/P&gt;&lt;P style="padding: 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/11001"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 115px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;The number of digital connected assets that needs to be secure is growing exponentially. In addition to endpoint, servers&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;networks, organizations are facing the challenge to secure cloud applications, containers as well as IoT and Mobile devices of&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;different&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;kind, that utilize a plethora of operating systems, software frameworks and technologies from many vendors.&lt;/P&gt;&lt;P style="padding: 0px;"&gt;Ensuring secure design, hardening, compliance&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;enforcement for such a diversity of assets&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;challenging. It is time to re-think how security should be done, delivered and consumed - we call it Infinity GenVI Security.&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 204px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 204px;"&gt;Cloudy with a Chance of a Breach&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 204px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;John Bloomer&lt;/STRONG&gt;, Security Engineering Manager, Midwest Area&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Gary Gardiner&lt;/STRONG&gt;, Head of Security Engineering, AMA&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Peter &lt;SPAN style="font-size: 11.0pt;"&gt;Sandkuijl&lt;/SPAN&gt;&lt;/STRONG&gt;, Head of Security Solutions, Engineering, Europe&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 204px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3665" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P style="padding: 0px;"&gt;&lt;/P&gt;&lt;P style="padding: 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/11002"&gt;Video&amp;nbsp;(John Bloomer)&lt;/A&gt;&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=rmvy7I-EDsM&amp;amp;feature=youtu.be" style="color: #222222; text-decoration: none;"&gt;&lt;BR /&gt;&lt;/A&gt;&lt;A href="https://community.checkpoint.com/videos/11003"&gt;Video (Peter Sandkuijl)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 204px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;BR /&gt;It’s often said that “The Cloud” is just someone else’s computer. Unfortunately, many businesses treat it that&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;way,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and assume that whoever owns it is securing it as well. We have seen several cases where that approach has not worked out well.&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class=""&gt;&lt;SPAN class="" style="background: url(&amp;quot;;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding: 0px;"&gt;In this&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;session&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;we will examine a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;couple&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;cases where disrespecting the shared responsibility model have resulted in significant&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;disclosures,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and high costs. We will also examine what you can do to prevent them.&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 181px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 181px;"&gt;The Cyber Risk Paradox&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 181px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Tony Jarvis&lt;/STRONG&gt;, Threat Prevention Architect, AMA&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Jeff Schwartz&lt;/STRONG&gt;, VP, US Engineering&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Thierry Karsenti&lt;/STRONG&gt;, VP, SE &amp;amp; New Technology Unit, Europe&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 181px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3576"&gt;Presentation&lt;/A&gt;&lt;A href="https://wiki.checkpoint.com/confluence/download/attachments/309300221/2_CheckPoint%20Keynote%202MS___4.pptx?version=1&amp;amp;modificationDate=1550049808000&amp;amp;api=v2" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3572"&gt;Presentation&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding: 0px;"&gt;&lt;A href="https://www.youtube.com/watch?v=xtbHMg5IiFI&amp;amp;feature=youtu.be" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://community.checkpoint.com/videos/11004"&gt;Video (Jeff Schwartz)&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/videos/11005"&gt;Video (Thierry Karsenti)&lt;/A&gt;&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=xtbHMg5IiFI&amp;amp;feature=youtu.be" style="color: #222222; text-decoration: none;"&gt;&lt;BR /&gt;&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 181px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Technology’s primary purpose is to enhance the human experience: optimizing performance, increasing efficiency, solving problems more quickly. At the same time, “winter is coming”, the next cyber-pearl harbor is on the horizon.&lt;/P&gt;&lt;P style="padding: 0px;"&gt;These conflicting hard trends demonstrate a clear and present challenge for organizations.&amp;nbsp; Inching us closer to instability, we have some that have accepted “breach fatigue” while at the same time there is pressure for greater regulation (GDPR and California’s Consumer Privacy Act). If we accept the idea that regulatory compliance is the lowest common denominator for true security control, how can organizations truly reduce risk while enhancing the human experience?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 138px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 138px;"&gt;CloudGuard Dome9 and Check Point's CloudGuard Family&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 138px;"&gt;&lt;STRONG&gt;Zohar Alon&lt;/STRONG&gt;, Head of Cloud Product Line&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 138px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3651"&gt;Presentation&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding: 0px;"&gt;&lt;/P&gt;&lt;P style="padding: 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/11006"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 138px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Using the cloud is the new norm and this is how we secure it. In this&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;session&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;we will showcase the new member of Check Point’s CloudGuard family, Dome9 and will reveal several of the early integrations coming up.&lt;/P&gt;&lt;P style="padding: 0px;"&gt;We will share with the audience the benefits of the CloudGuard Dome9 platform and cover several exciting use cases for the technology and show in real time how we prevent AWS account takeover.&lt;BR /&gt;In&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;addition&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;we will present how the members of the CloudGuard family integrate and give the audience a glimpse into the upcoming members of this expanding family.&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 138px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 138px;"&gt;Incident Response Cloudy War Stories&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 138px;"&gt;&lt;STRONG&gt;Dan Wiley&lt;/STRONG&gt;, Head of Incident Response&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 138px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3661"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/11008"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 138px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Lessons are repeated until they are learned.&amp;nbsp; Over the course of&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;2018&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;the Check Point Incident Response Team has handled over 800 cases.&amp;nbsp;&lt;/P&gt;&lt;P style="padding: 0px;"&gt;We will share with the audience the benefits of the CloudGuard Dome9 platform and cover several exciting use cases for the technology and show in real time how we prevent AWS account takeover.&lt;BR /&gt;In&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;addition&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;we will present how the members of the CloudGuard family integrate and give the audience a glimpse into the upcoming members of this expanding family.&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 138px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 138px;"&gt;IoT and Nano Security Unraveled&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 138px;"&gt;&lt;STRONG&gt;Yariv Fishman&lt;/STRONG&gt;, Head of Product Management, Cloud Security&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 138px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3578" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/11007"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 138px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;“The internet of things’ is all around us: in your office coffee machine, its building elevators, light system, and even around your city in traffic lights, surveillance cameras and more.&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class=""&gt;&lt;SPAN class="" style="background: url(&amp;quot;;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding: 0px;"&gt;While the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;ever increasing&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;connectivity makes our on-and-off work lives easier, it also broadens attack surfaces, making it inevitably easier for hackers to target us as businesses.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;Join us to hear of the next major cyber battleground, learn how Nano agents will come to the rescue, and where they can serve Medical, Industrial and other market verticals”&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 115px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 115px;"&gt;&lt;P style="padding: 0px;"&gt;Predicting&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;the Unpredictable: A Look into 2019 Cyber Threat Landscape&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 115px;"&gt;&lt;STRONG&gt;Orli Gan&lt;/STRONG&gt;&lt;SPAN style="color: #808080;"&gt;, Head of Product Management and Product Marketing, Threat Prevention&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 115px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3580"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/11009"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 115px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;The pace of change in the cyber world makes predictions almost impossible to make. Can we truly prepare for what’s next? Probably not entirely, but there is a lot we can learn from our ongoing research of current cyber threats.&lt;/P&gt;&lt;P style="padding: 0px;"&gt;In this&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;talk&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;we will take you on a journey through the current trends in the cyber threat landscape and show how they may well help shape the next generation of attacks. A deeper perspective into the motivation, means&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;opportunities fueling cyber attacks and how the latest technologies of cloud, mobile, IoT, blockchain and AI are leveraged for malicious gain.&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 69px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 69px;"&gt;20x20 Cyber Innovation Winner - Cyber Story Axonius&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 69px;"&gt;&lt;STRONG&gt;Nathan Burke&lt;/STRONG&gt;, Chief Marketing Officer, Axonius&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 69px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3663" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/11011"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 69px;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 23px;"&gt;&lt;TH colspan="4" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 1285px; height: 23px;"&gt;External Speakers&lt;/TH&gt;&lt;/TR&gt;&lt;TR style="height: 46px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 46px;"&gt;Alibaba Keynote&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 46px;"&gt;&lt;STRONG&gt;Kenny Tan&lt;/STRONG&gt;, GM, Alibaba Cloud&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 46px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3653" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11085"&gt;Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 46px;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 56px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 56px;"&gt;Microsoft Azure Keynote&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 56px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;SPAN style="color: #808080;"&gt;&lt;STRONG&gt;Jonathan Trull&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #808080;"&gt;, GM Cyber Security, Group Microsoft&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 56px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3574"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11012" style="color: #222222; text-decoration: none;"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 56px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 69px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 69px;"&gt;Forrester Keynote - Generations of Cyber Threats and Solutions&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 69px;"&gt;&lt;STRONG&gt;Josh Zelonis&lt;/STRONG&gt;, Senior Analyst,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Forrster&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 69px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3579"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11013"&gt;&lt;SPAN&gt;Video&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 69px;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 56px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 56px;"&gt;&lt;DIV class=""&gt;Use Case - Securing the Broncos with Infinity&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 56px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Russ Trainor&lt;/STRONG&gt;, CISO Denver Broncos&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 56px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3652"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11014" style="color: #222222; text-decoration: none;"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 56px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 92px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 92px;"&gt;Automating Security Orchestration &amp;amp; Recovery with Check Point &amp;amp; BackBox&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 92px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Ted Czarnecki&lt;/STRONG&gt;, Pfizer&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Rafi Zvi&lt;/STRONG&gt;, CTO&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Co-Founder, BackBox&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 92px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3664" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11015" style="color: #222222; text-decoration: none;"&gt;Video&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 92px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 115px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 115px;"&gt;Cybercrime &amp;amp; the geo-political Impact&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 115px;"&gt;&lt;STRONG&gt;Eward&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Driehuis&lt;/STRONG&gt;, Chief Research Officer, SecureLink&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 115px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11016" style="color: #222222; text-decoration: none;"&gt;Video&amp;nbsp;&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 115px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Not so long ago, our goal in infosec was to prevent attacks. Today, we can only make ourselves a more difficult&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;target,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and ready ourselves for events slipping through.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Eward&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Driehuis, SecureLink’s research chief, outlines the lessons he’s learned from analyzing a quarter of a million events bypassing defenses in 2018.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 56px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 56px;"&gt;A Hacker's mind Exposed&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 56px;"&gt;&lt;STRONG&gt;Freaky Clown&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 56px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11017" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN&gt;Video&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 56px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;FC (FreakyClown) will deliver a fascinating keynote at CPX Americas and Europe about the inner workings of the hacker’s mind.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 69px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 152px; height: 69px;"&gt;CISO Point of View&amp;nbsp;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 170px; height: 69px;"&gt;&lt;STRONG&gt;Joe Bennett&lt;/STRONG&gt;, CISO Hertz&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 175px; height: 69px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3657" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="padding: 0px;"&gt;&lt;/P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11018" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN&gt;Video&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 788px; height: 69px;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;H2 style="color: #e45785; background-color: #ffffff; border-bottom-color: #ffffff; font-weight: normal; font-size: 20px; margin: 10px 0px 0px;"&gt;&lt;BR /&gt;Securing Your Cloud&lt;/H2&gt;&lt;DIV class="" style="background-color: #ffffff; margin: 10px 0px 0px;"&gt;&lt;TABLE id="TBL1551040361605" style="border-bottom-width: thin; border-bottom-style: solid; border-bottom-color: #6d6e71; font-size: 0.9em; width: 1341px;"&gt;&lt;THEAD class="" style="border: inherit solid inherit;"&gt;&lt;TR class="" style="border: inherit solid inherit;"&gt;&lt;TH scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 205px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Topic&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;TH scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 154px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Speaker&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;TH scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 134px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Content&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;TH colspan="1" scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 792px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Abstract&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY style="border: inherit solid inherit;"&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 205px;"&gt;Kick-*aas Cloud Security: Architecting Robust Security and Compliance Across Your *-as-a- Service&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Footprint&amp;nbsp;&lt;/TD&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 154px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Zohar Alon&lt;/STRONG&gt;, &lt;SPAN&gt;Head&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of Cloud Product Line&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;STRONG&gt;David Gubiani&lt;/STRONG&gt;, SE Manager&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 134px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3678"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11019" style="color: #222222; text-decoration: none;"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 792px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Modern enterprises rely on a variety of IaaS, PaaS and SaaS solutions to meet the growing IT needs of their organizations. How do you establish and maintain consistent security and governance across a sprawling&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;footprint.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;How do you get visibility and control of your security posture across your dynamic cloud environments?&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 205px;"&gt;&lt;P style="padding: 0px;"&gt;Securing SaaS Applications – The Pragmatic Approach&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 154px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Asaf Henig&lt;/STRONG&gt;, Product Manager&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Mark&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Ostrowsky&lt;/STRONG&gt;, Regional&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Director&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Security Engineering, Eastern&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Noa Katz&lt;/STRONG&gt;, Product Marketing Manager&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 134px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3715" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11020" style="color: #222222; text-decoration: none;"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 792px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Cloud Access Security Broker (CASB) solutions have evolved in the last few years from&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;providing mainly&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;visibility, i.e. presenting data about used SaaS applications, to detecting and preventing data breaches caused by exploiting SaaS vulnerabilities. &amp;nbsp;However, though many CASB vendors are following this transition, most, if not all, are simplifying the task at hand and provide the same protection paradigms to all SaaS applications as if they have exactly the same attack surface.&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 205px;"&gt;Who’s Responsible for Your Cloud Security? – Lessons Learned&amp;nbsp;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 154px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Ran Nahmias&lt;/STRONG&gt;, Head of Cloud Security&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Richard Cove&lt;/STRONG&gt;, SE, Data Center Expert&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 134px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3714"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11022" style="color: #222222; text-decoration: none;"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 792px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Everyone is transitioning to the Clouds. Not so many years ago, security teams within organizations were battling the rouge addition of new operating systems into the data center; the multi-OS practice was considered a security risk many CISOs did want to allow in their data centers.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 205px;"&gt;Lift &amp;amp; Shift vs Cloud Native&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 154px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Yariv Fishman&lt;/STRONG&gt;, Head of Product Manager, Cloud Security&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Peter &lt;SPAN style="font-size: 11.0pt;"&gt;Sandkuijl&lt;/SPAN&gt;&lt;/STRONG&gt;, Head of Security Solutions, Engineering, Europe&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 134px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3705" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11023" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN&gt;Video&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 792px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;“For some, moving to the cloud is a journey. It starts with moving their own data center workloads to the cloud and evolves as they get familiar with its native capabilities. For others, the journey starts natively in the cloud.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 205px;"&gt;AWS Architecture Blueprint&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 154px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Gustavo Coronel&lt;/STRONG&gt;, Cloud Security Architect&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Sameer Vasanghapuram&lt;/STRONG&gt;, Cloud Architect AWS&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Javier Hijas&lt;/STRONG&gt;, Cloud Security Team Leader&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Amit Schnitzer&lt;/STRONG&gt;, Cloud Security Architect&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 134px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3682"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/11027"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 792px;"&gt;&lt;P style="padding: 0px;"&gt;“This session will elaborate on how the latest Check Point CloudGuard security solutions for AWS are a perfect match for implementing the best practices recommended by AWS to protect cloud infrastructures”&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 205px;"&gt;Docker &amp;amp; Containers: How to Contain It Securely&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 154px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Amir Kaushansky&lt;/STRONG&gt;, Product Manager&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Roy Feintuch&lt;/STRONG&gt;, Chief Technologist, Cloud&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 134px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3675" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11024" style="color: #222222; text-decoration: none;"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 792px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Raise your hand if you too, constantly hear about ‘Containers’. Not yet, wait for the session. ‘Containers’ are the IT word of cloud IT, and often rise in contexts&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;like:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Docker, Kubernetes, Open Shift, etc.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 205px;"&gt;SEE SPOT SECURE - Continuous Cloud Compliance and Security Simplified with Dome9&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 154px;"&gt;&lt;STRONG&gt;Grant Asplund&lt;/STRONG&gt;, Cloud Evangelist&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 134px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A href="https://wiki.checkpoint.com/confluence/download/attachments/309300221/GRA-CPX360%202019-FINAL.pptx?version=1&amp;amp;modificationDate=1550040904000&amp;amp;api=v2" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3702"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="padding: 0px;"&gt;&lt;/P&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11025" style="color: #222222; text-decoration: none;"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 792px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;In this&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;session&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;you will learn why Gartner says, “Through 2022, at least 95% of cloud security failures will be the customer’s fault.”&amp;nbsp;&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 205px;"&gt;DevOps and Security - Friends or Foes?&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 154px;"&gt;&lt;STRONG&gt;Reuven Harrison&lt;/STRONG&gt;, CTO&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Co-Founder, Tufin&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 134px;"&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 792px;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;P style="background-color: #ffffff; margin: 10px 0px 0px;"&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;H2 style="color: #e45785; background-color: #ffffff; border-bottom-color: #ffffff; font-weight: normal; font-size: 20px; margin: 10px 0px 0px;"&gt;Cyber Security Innovations&lt;/H2&gt;&lt;DIV class="" style="background-color: #ffffff; margin: 10px 0px 0px;"&gt;&lt;TABLE id="TBL1551040361606" style="border-bottom-width: thin; border-bottom-style: solid; border-bottom-color: #6d6e71; font-size: 0.9em; width: 1344px;"&gt;&lt;THEAD class="" style="border: inherit solid inherit;"&gt;&lt;TR class="" style="border: inherit solid inherit;"&gt;&lt;TH scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 231px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Topic&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;TH scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 194px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Speaker&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;TH scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 125px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Content&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;TH colspan="1" scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 735px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Abstract&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY style="border: inherit solid inherit;"&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 231px;"&gt;Cyber Attacks on Industrial Control System (ICS) – Reality!!&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 194px;"&gt;&lt;STRONG&gt;Mati Epstei&lt;/STRONG&gt;&lt;SPAN style="color: #808080;"&gt;&lt;STRONG&gt;n&lt;/STRONG&gt;, Lead Sales Manager, Critical Infrastructure&amp;nbsp;&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 125px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3676" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 735px;"&gt;&lt;DIV class=""&gt;&lt;P class="" style="padding: 0px;"&gt;Cyber-attacks on Industrial Control Systems (ICS) and in particular critical and manufacturing infrastructures are now a reality.&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 231px;"&gt;Preventing Attacks on Mobile Devices&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 194px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Jeremy Kaye&lt;/STRONG&gt;, Head of Mobile Security&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Ran Schwartz&lt;/STRONG&gt;, Product Manager&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Scot Kight&lt;/STRONG&gt;, Regional Expert, Mobility&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;James Alliband&lt;/STRONG&gt;, Mobile Security SE NER&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 125px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3684" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/11028"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 735px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;The mobile threat landscape is ever-changing. As Apple and Google continue to battle each other to win the hearts and minds of users, attackers are lurking in the shadows trying to find new ways to manipulate both the user and the device to gain access to what is not theirs.&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 231px;"&gt;Security at Hyper-Scale &amp;nbsp;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 194px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Michael Greenberg&lt;/STRONG&gt;, Product Marketing&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Manager&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Glen Deskin&lt;/STRONG&gt;, Head of Engineering, Mid-Atlantic&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Derek Middlemiss&lt;/STRONG&gt;, Security Experts, Team Leader&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 125px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3719"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3718" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/11029"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 735px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;As cyber-security threats&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;continues&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to evolve fast and network traffic volumes grow exponentially, we need security platforms that can keep up and scale.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 231px;"&gt;&lt;P style="padding: 0px;"&gt;Humans Are Your Weakest Link. Protecting Against Social Engineering With Infinity&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 194px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Eytan Segal&lt;/STRONG&gt;, Head of Product Management, Threat Prevention&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Eitan Erez&lt;/STRONG&gt;, Head of Threat Prevention&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Rich Comber&lt;/STRONG&gt;, Head of Threat Prevention Engineering, Americas&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Magnus Skold&lt;/STRONG&gt;, Threat Prevention Security Engineering&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 125px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3686" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/11030"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 735px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Are you prepared for the next attack?&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Cyberattacks&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;are more dangerous than ever before, with devastating tools and techniques available to hackers.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 231px;"&gt;Branch Office and SD-WAN Security - Unique Challenges &amp;amp; Effective Approaches&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 194px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Aviv Abramovich&lt;/STRONG&gt;, Head of Security Services, Product Management&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Nils Ujma&lt;/STRONG&gt;, Cloud Security Architect&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 125px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3717" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/11031"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 735px;"&gt;&lt;P style="padding: 0px;"&gt;The world is changing around us, the traditional data centers and MPLS are migrating to cloud and SD-WAN. This session focus on Check Point solutions and partnerships for securing branch office connectivity in the era of SD-WAN through Network Security as a Service (NSaaS) and Network Functions Virtualization (NFV).&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 231px;"&gt;Secure the Virtual Cloud Network Against Advanced Threats with VMware NSX and Check Point&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 194px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Simon Hamilton-Wilkes&lt;/STRONG&gt;, Solution Architect&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Jeremiah Cornelius&lt;/STRONG&gt;, Architect Evangelist, VMware Strategic Technology Alliance&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Scott Sloan&lt;/STRONG&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Director&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Global Technology Partners&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Brad Bock&lt;/STRONG&gt;, Senior Product Marketing Manager VMware&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 125px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 735px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 231px;"&gt;The Final Frontier Beyond Your Perimeter - Protecting Devices, Securing Data&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 194px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Tal Eisner&lt;/STRONG&gt;, Product Marketing Manager&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Brian Gleeson&lt;/STRONG&gt;, Head of Product Marketing&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Christine Schoenig&lt;/STRONG&gt;, Technical Manager&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 125px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3692" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/11032"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 735px;"&gt;Discuss why today’s borderless networks and ad hoc workspaces are a field day for&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;cybercriminals&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and havoc for security professionals. Corporate data on all devices, including smartphones which are really just another endpoint in the architecture- needs to be protected with&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;the highest&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;levels of security&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 231px;"&gt;Threat Hunting with SandBlast NOW&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 194px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Nir Naaman&lt;/STRONG&gt;, Head of Government and Defense Products&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Jerrod Piker&lt;/STRONG&gt;, Regional Expert, Threat Prevention&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Peter Elmer&lt;/STRONG&gt;, Cyber Security Architect&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 125px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3693" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3670" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/11033"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 735px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Would you go bear hunting with a switch? No way! Then why go threat hunting without the proper tools? Join us to learn more about what threat hunting is, and what tools you need to make it effective in your organization.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 231px;"&gt;&lt;SPAN&gt;Transforming Your Endpoints From the Weakest Link to the Strongest Defense&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 194px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Yossi Hasson&lt;/STRONG&gt;, Product Manager&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Lior Arzi&lt;/STRONG&gt;&lt;SPAN&gt;, Director, End Point Cyber Security&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;STRONG&gt;Christian Sandberg&lt;/STRONG&gt;, Head of Threat Prevention Engineering, Europe&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 125px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3697"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/11034"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 735px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;In 2018 employee endpoints were the most targeted asset type in the enterprise, phishing was the #1 method for cyber-attacks and file-less malware was on the rise.&amp;nbsp;&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class=""&gt;&lt;SPAN class="" style="background: url(&amp;quot;;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;P style="background-color: #ffffff; margin: 10px 0px 0px;"&gt;&lt;SPAN style="color: #e45785;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;H2 style="color: #e45785; background-color: #ffffff; border-bottom-color: #ffffff; font-weight: normal; font-size: 20px; margin: 10px 0px 0px;"&gt;Security Automation &amp;amp; Orchestration&lt;/H2&gt;&lt;DIV class="" style="background-color: #ffffff; margin: 10px 0px 0px;"&gt;&lt;TABLE id="TBL1551040361607" style="border-bottom-width: thin; border-bottom-style: solid; border-bottom-color: #6d6e71; font-size: 0.9em; width: 1344px;"&gt;&lt;THEAD class="" style="border: inherit solid inherit;"&gt;&lt;TR class="" style="border: inherit solid inherit;"&gt;&lt;TH scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 235px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Topic&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;TH scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 164px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Speaker&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;TH scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 158px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Content&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;TH colspan="1" scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 728px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Abstract&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY style="border: inherit solid inherit;"&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 235px;"&gt;Automate Everything - The Future of Security Automation&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 164px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Tomer Sole&lt;/STRONG&gt;, Technology Leader&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Ryan Darst&lt;/STRONG&gt;, Manager, Regional Solution Center&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Jim Öqvist&lt;/STRONG&gt;, Security Expert, Europe&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 158px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A href="https://wiki.checkpoint.com/confluence/download/attachments/309300221/CPX2019-Automate-Everything-v22%20%281%29.pptx?version=2&amp;amp;modificationDate=1550415378000&amp;amp;api=v2" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN class=""&gt;&lt;IMG class="" src="https://wiki.checkpoint.com/confluence/download/attachments/143330525/ppt.png?version=1&amp;amp;modificationDate=1440616272000&amp;amp;api=v2" style="border: 0px; margin: 0px 2px;" /&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3695" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11035"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 728px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;In this session, we will show real stories of how our customers successfully use automation to overcome repeating activities and streamline their operations.&amp;nbsp;&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class=""&gt;&lt;SPAN class="" style="background: url(&amp;quot;;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 235px;"&gt;Security for DevOps - No Humans Necessary&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 164px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Donald Wasylyna&lt;/STRONG&gt;, Security Architect&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Marco Garcia&lt;/STRONG&gt;, Director of Engineering, Global SI &amp;amp; MSP&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Derek Middlemiss&lt;/STRONG&gt;, Security Experts, Team Leader&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 158px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A href="https://wiki.checkpoint.com/confluence/download/attachments/309300221/CPX-20190123%20-%20Securing-Devops.pptx?version=1&amp;amp;modificationDate=1550040735000&amp;amp;api=v2" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN class=""&gt;&lt;IMG class="" src="https://wiki.checkpoint.com/confluence/download/attachments/143330525/ppt.png?version=1&amp;amp;modificationDate=1440616272000&amp;amp;api=v2" style="border: 0px; margin: 0px 2px;" /&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3688" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://wiki.checkpoint.com/confluence/download/attachments/309300221/CPX-2019-%20Securing-Devops%20%5BAutosaved%5D.PPTX?version=1&amp;amp;modificationDate=1550408403000&amp;amp;api=v2" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN class=""&gt;&lt;IMG class="" src="https://wiki.checkpoint.com/confluence/download/attachments/143330525/ppt.png?version=1&amp;amp;modificationDate=1440616272000&amp;amp;api=v2" style="border: 0px; margin: 0px 2px;" /&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3687" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11036"&gt;Video&lt;SPAN style="background-color: #ffffff;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 728px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Adding security as part of your development deployments doesn’t have to be a challenge. Security must be adaptable and easy to maintain to keep up with the always changing nature of the cloud.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class=""&gt;&lt;SPAN class="" style="background: url(&amp;quot;;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 235px;"&gt;How to Prevent Attacks Before They Strike&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 164px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Meir Jonathan-Dahan&lt;/STRONG&gt;, Technology Leader&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Elad Goldenberg&lt;/STRONG&gt;, Solution Manager&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 158px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A href="https://wiki.checkpoint.com/confluence/download/attachments/309300221/ThreatGuard-CPX-vegas-v2_Dana.pptx?version=1&amp;amp;modificationDate=1550042468000&amp;amp;api=v2" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN class=""&gt;&lt;IMG class="" src="https://wiki.checkpoint.com/confluence/download/attachments/143330525/ppt.png?version=1&amp;amp;modificationDate=1440616272000&amp;amp;api=v2" style="border: 0px; margin: 0px 2px;" /&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3694" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://community.checkpoint.com/videos/11038"&gt;Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 728px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;SPAN style="color: #808080;"&gt;ThreatGuard&amp;nbsp;is a new service that on ongoing basis checks for threats that organizations are exposed to from attackers’ perspective. Once threats were found, the service remediates them to improve security and avoid cyber events.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 235px;"&gt;API Best Practices with Check Point&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 164px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Tomer Sole&lt;/STRONG&gt;, Technology Leader&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Robbie Elliot&lt;/STRONG&gt;, Regional&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Director &lt;SPAN&gt;of&amp;nbsp;&lt;/SPAN&gt;Engineering&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Jim Öqvist&lt;/STRONG&gt;, Security Expert, Europe&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 158px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3668"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11040"&gt;Video&lt;SPAN style="background-color: #ffffff;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 728px;"&gt;&lt;P style="padding: 0px;"&gt;“a beginner’s guide to automation along with Pro tips and best practices to get you started”.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 235px;"&gt;Cloud Security with Check Point - AWS Session&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 164px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Saroj&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Punyapatthanakul&lt;/STRONG&gt;, Chief Security Architect AWS&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 158px;"&gt;&lt;DIV class=""&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11042"&gt;Video&lt;SPAN style="background-color: #ffffff;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 728px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 235px;"&gt;Finding the Breach in a Haystack - Live Demo&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 164px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Oren Koren&lt;/STRONG&gt;, Technical Product Manager&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 158px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3721"&gt;&lt;SPAN style="color: #000000;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11043"&gt;Video&lt;SPAN style="background-color: #ffffff;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 728px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;amount&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of Cyber attacks are enormous in a single network. Without automatic aggregation of logs into actionable events, the admin/analyst can’t handle the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;amount&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of logs he sees every day. Also, by presenting events in a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;technology&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;language, the admin/analyst can’t understand the impact of this event on his&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;envinroment.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 235px;"&gt;SMB Security - Unique Challenges &amp;amp; Effective Approaches&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 164px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Aviv Abramovich&lt;/STRONG&gt;, Head of Security Services, Product Management&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Sunny Gil&lt;/STRONG&gt;, Security Expert, Europe&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 158px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A href="https://wiki.checkpoint.com/confluence/download/attachments/309300221/smb%20cpx%202019%20v3%20%281%29.pptx?version=1&amp;amp;modificationDate=1549887443000&amp;amp;api=v2" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN class=""&gt;&lt;IMG class="" src="https://wiki.checkpoint.com/confluence/download/attachments/143330525/ppt.png?version=1&amp;amp;modificationDate=1440616272000&amp;amp;api=v2" style="border: 0px; margin: 0px 2px;" /&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3691"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11044"&gt;Video&lt;SPAN style="background-color: #ffffff;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 728px;"&gt;&lt;P style="padding: 0px;"&gt;Small and Medium Business face new challenges and world with&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;an increasing&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;complexity. This session&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;focus&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;on Check Point SMB solutions and our roadmap and focus for 2019-2020.&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 235px;"&gt;Orchestrating Gateway Operations - Best Practices &amp;nbsp;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 164px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Valeri Loukine&lt;/STRONG&gt;, Cyber Security Evangelist&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 158px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A href="https://wiki.checkpoint.com/confluence/download/attachments/309300221/Valeri%20Loukine%20-%20Orchestration%20Best%20Practices%20CPX%202019%20final%20%284%29.PPTX?version=1&amp;amp;modificationDate=1549886973000&amp;amp;api=v2" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN class=""&gt;&lt;IMG class="" src="https://wiki.checkpoint.com/confluence/download/attachments/143330525/ppt.png?version=1&amp;amp;modificationDate=1440616272000&amp;amp;api=v2" style="border: 0px; margin: 0px 2px;" /&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3701" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11045"&gt;Video&lt;SPAN style="background-color: #ffffff;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 728px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Cyber&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;threat is real. Given the growing number of cyber-attacks and security breaches, the need for security becomes more and more important. Security threats are a matter of when it will happen, not if.&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 235px;"&gt;Intelligent Automation for Security Operations&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 164px;"&gt;&lt;STRONG&gt;Rafi Zvi&lt;/STRONG&gt;, CEO BackBox&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 158px;"&gt;&lt;DIV class=""&gt;&lt;A href="https://wiki.checkpoint.com/confluence/download/attachments/309300221/9_RafiunprotectedIntelligent%20Automation%20for%20CheckPoint%20Environment.ppt?version=2&amp;amp;modificationDate=1550407504000&amp;amp;api=v2" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN class=""&gt;&lt;IMG class="" src="https://wiki.checkpoint.com/confluence/download/attachments/143330525/ppt.png?version=1&amp;amp;modificationDate=1440616272000&amp;amp;api=v2" style="border: 0px; margin: 0px 2px;" /&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3664"&gt;Presentation&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 728px;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 235px;"&gt;Secure the Virtual Cloud Network Against Advanced Threats with VMware NSX and Check Point&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 164px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Simon Hamilton-Wilkes&lt;/STRONG&gt;, Solution Architect&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Jeremiah Cornelius&lt;/STRONG&gt;, Architect Evangelist VMware Strategic&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 158px;"&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 728px;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;H2 style="color: #e45785; background-color: #ffffff; border-bottom-color: #ffffff; font-weight: normal; font-size: 20px; margin: 30px 0px 0px;"&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;/SPAN&gt;Hackers Exposed&lt;/H2&gt;&lt;DIV class="" style="background-color: #ffffff; margin: 10px 0px 0px;"&gt;&lt;TABLE id="TBL1551040361608" style="border-bottom-width: thin; border-bottom-style: solid; border-bottom-color: #6d6e71; font-size: 0.9em; width: 1343px;"&gt;&lt;THEAD class="" style="border: inherit solid inherit;"&gt;&lt;TR class="" style="height: 24px;"&gt;&lt;TH scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 204px; height: 24px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Topic&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;TH scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 155px; height: 24px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Speaker&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;TH scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 167px; height: 24px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Content&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;TH colspan="1" scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 759px; height: 24px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Abstract&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY style="border: inherit solid inherit;"&gt;&lt;TR style="height: 83px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 204px; height: 83px;"&gt;CPR - What the Hack?&amp;nbsp;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 155px; height: 83px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Richard Clayton&lt;/STRONG&gt;, Product Manager, Security Research&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 167px; height: 83px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3756"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 759px; height: 83px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;The late Stephen Hawking&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;said&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;“research is the joy of discovering something no-one knew before”. It is this joy of creating new knowledge that drives our expert team of cyber researchers.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 132px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 204px; height: 132px;"&gt;Domestic Kitten Unravelling ISIS Espionage&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 155px; height: 132px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Lotem&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Finkelsteen&lt;/STRONG&gt;, Group Manager&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Aseel Kayal&lt;/STRONG&gt;, Malware Analyst&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 167px; height: 132px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3698" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN style="background-color: #ffffff;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11046"&gt;Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 759px; height: 132px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;In a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;fundamental&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;regime that is constantly wary of anything that might jeopardize its stability and a region that is a hotbed of political conflicts and dissensions, it is not surprising to discover a large-scale espionage campaign that keeps an eye out not only for external threats but also for internal ones.&amp;nbsp;&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 109px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 204px; height: 109px;"&gt;What&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;the Fax?&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 155px; height: 109px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Yaniv Balmas&lt;/STRONG&gt;, Group Manager&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Eyal Itkin&lt;/STRONG&gt;, Security Researcher&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 167px; height: 109px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3654" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11047"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 759px; height: 109px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Unless you've been living under a rock for the past 30 years or so, you probably know what a fax machine is. But who uses such archaic technology today? The answer is almost everyone.&amp;nbsp;&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 109px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 204px; height: 109px;"&gt;Hacking Drones &amp;amp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Speading&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Fake News Via WhatsApp&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 155px; height: 109px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Roman Zaikin&lt;/STRONG&gt;, Security Expert&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 167px; height: 109px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3696" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11048"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 759px; height: 109px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;In this&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;talk&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;we reveal how DJI, the world's largest drone manufacturer, was exposed to an attack that could have allowed attackers access to photos and drone film footage taken by emergency service and critical&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;infrastrcture&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;organizations, amongst others, who are&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;increasinly&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;using drones to carry out their operations.&amp;nbsp;&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class=""&gt;&lt;SPAN class="" style="background: url(&amp;quot;;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 98px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 204px; height: 98px;"&gt;PS I See You: PowerShell and Fileless Attacks Hidden in Your Environments&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 155px; height: 98px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Pasha&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Pal&lt;/STRONG&gt;, Group Manager&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 167px; height: 98px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3712" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11050"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 759px; height: 98px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Fileless attacks entail taking advantage of default Windows tools and using them for malicious activity. PowerShell, in particular, which comes with Windows is a preferred weapon of choice.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 98px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 204px; height: 98px;"&gt;Turning the Enemy Against Himself&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 155px; height: 98px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Raman Ladutska&lt;/STRONG&gt;, Reverse Engineer&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 167px; height: 98px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3722" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11051"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 759px; height: 98px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Function names and strings are pivotal points in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;reverse&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;engineering process. When researchers know what functions are called and what strings are used, it's much easier for them to describe malware logic.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class=""&gt;&lt;SPAN class="" style="background: url(&amp;quot;;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 133px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 204px; height: 133px;"&gt;MeeCukoo - Bypassing Sandboxes&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 155px; height: 133px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Aliaksandr Chailytko&lt;/STRONG&gt;, Reverse Engineer&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 167px; height: 133px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3708" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11052"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 759px; height: 133px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;A few years ago Mac users were confident about their security, because of the very low amount of malware targeting the platform. However, with the growing popularity of Apple&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;products&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;the number of macOS malware and its complexity also grows. While the malware threat landscape for Mac becoming more mature, the need for high-scale automated analysis increases as well.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 119px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 204px; height: 119px;"&gt;Olympic Destroyer - The Games of Malware&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 155px; height: 119px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Michael&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Abramzon&lt;/STRONG&gt;, Team Leader&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 167px; height: 119px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3710" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11053"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 759px; height: 119px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Although the cyber-attack which disrupted the IT infrastructure of the Winter Olympic Games 2018 was short-lived, it nevertheless managed to grab a lot of headlines and remained in the news for weeks.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class=""&gt;&lt;SPAN class="" style="background: url(&amp;quot;;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 131px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 204px; height: 131px;"&gt;The Short Story of Terrifying State of Our Tool Set and What We Can Do to Make It Better&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 155px; height: 131px;"&gt;&lt;STRONG&gt;Maciej Kotowicz&lt;/STRONG&gt;, Kaspersky's GReAT&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 167px; height: 131px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&amp;nbsp;&lt;SPAN style="color: #000000;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3706" style="color: #000000;"&gt;Presentation&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 759px; height: 131px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;We can't really do anything without our tools. For the last decade most reverse engineers&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;where&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;fine with leading solutions, not because they were perfect but because there was no real alternative - sadly a situation that has not changed to this day. This is not because we don't have many tools but because they are sometimes lacking basic features.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 107px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 204px; height: 107px;"&gt;Designing Exploits &amp;amp; Implants For Industrial Control Systems&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 155px; height: 107px;"&gt;&lt;STRONG&gt;Jos Wetzels&lt;/STRONG&gt;, Midnight Blue&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 167px; height: 107px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3689"&gt;Presentation&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 759px; height: 107px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;In 2017 a malware framework dubbed TRITON was discovered targeting a petrochemical plant in Saudi Arabia. TRITON is the most complex publicly known ICS attack framework to date and the first publicly known one to target safety controllers.&amp;nbsp;&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 83px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 204px; height: 83px;"&gt;Game Of Trojans: Dissecting The Russian Underground Cyber Scene&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 155px; height: 83px;"&gt;&lt;STRONG&gt;Chen Erlich&lt;/STRONG&gt;, enSIlo&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 167px; height: 83px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3674" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 759px; height: 83px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;One day, a mysterious open directory flashed across my eyes. It was enchanting and lead me straight into the world of the Khalesi malware, also known as the KPOT campaign. I had unknowingly dived into the rabbit's hole.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 107px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 204px; height: 107px;"&gt;Tracing Ransomware Payments in the Bitcoin Ecosystem&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 155px; height: 107px;"&gt;&lt;STRONG&gt;Masarah Paquet-Clouston&lt;/STRONG&gt;, GoSecure&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 167px; height: 107px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3707" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 759px; height: 107px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Ransomware can prevent a user from accessing a device and its files until a ransom is paid to the attacker, most frequently in Bitcoin. With over 500 known ransomware families, it has become one of the dominant cybercrime threats for law enforcement, security professionals and the public.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 107px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 204px; height: 107px;"&gt;Why Mobile Adware is our Concern?&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 155px; height: 107px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Avigayil Mechtinger&lt;/STRONG&gt;, Cyber Analyst&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Elena Root&lt;/STRONG&gt;, Cyber Analyst&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 167px; height: 107px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3680" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 759px; height: 107px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;In the past two years, Check Point’s mobile malware research team has discovered and published numerous blogs about mobile malware. Among them are the RottenSys, AdultSwine and Judy Malware.&amp;nbsp;&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class=""&gt;&lt;SPAN class="" style="background: url(&amp;quot;;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 107px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 204px; height: 107px;"&gt;Silivaccine - Inside North Korea's Anti-Virus&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 155px; height: 107px;"&gt;&lt;STRONG&gt;Mark Lechtik&lt;/STRONG&gt;, Team Leader&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 167px; height: 107px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3729" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 759px; height: 107px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;SiliVaccine is deployed widely and exclusively in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;DPRK,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and has been continuously in development by dedicated government teams for over fifteen years. When we heard of this strange software, we were immediately driven to investigate it.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 107px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 204px; height: 107px;"&gt;Nexus Zeta&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 155px; height: 107px;"&gt;&lt;STRONG&gt;Adi Ikan&lt;/STRONG&gt;, Team Leader&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 167px; height: 107px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3711" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 759px; height: 107px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;In the last 10 years, the number of connected devices has grown to over twenty billion, and, as the years go by, they get progressively smarter. However, whereas they score high on convenience, the latest discoveries from Check Point Research shows they still have a lot of homework to do to get their security score up to par.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;H2 style="color: #e45785; background-color: #ffffff; border-bottom-color: #ffffff; font-weight: normal; font-size: 20px; margin: 10px 0px 0px;"&gt;&lt;BR /&gt;CheckMates Community Use-Cases&lt;/H2&gt;&lt;DIV class="" style="background-color: #ffffff; margin: 10px 0px 0px;"&gt;&lt;TABLE id="TBL1551040361609" style="border-bottom-width: thin; border-bottom-style: solid; border-bottom-color: #6d6e71; font-size: 0.9em; width: 1340px;"&gt;&lt;THEAD class="" style="border: inherit solid inherit;"&gt;&lt;TR class="" style="border: inherit solid inherit;"&gt;&lt;TH scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 212px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Topic&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;TH scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 149px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Speaker&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;TH scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 169px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Content&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;TH colspan="1" scope="col" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 754px;"&gt;&lt;DIV class="" style="color: #172b4d;"&gt;&lt;SPAN style="color: #ffffff;"&gt;Abstract&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY style="border: inherit solid inherit;"&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Geo Policy - Your Secret Weapon for Increased Security and Gateway Performance&lt;/TD&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;SPAN style="color: #808080;"&gt;&lt;STRONG&gt;Dameon&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: #808080;"&gt;&lt;STRONG&gt;Welch-Abernathy&lt;/STRONG&gt;, Cyber Security&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Evangeslist&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN style="color: #808080;"&gt;&lt;STRONG&gt;Timothy Hall&lt;/STRONG&gt;, Shadow Peak Inc&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3700" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11054"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Geo Policy is a little-known feature that can pay big dividends in terms of firewall performance and security.&amp;nbsp;&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;&lt;P style="padding: 0px;"&gt;Automate Everything - The Future of Security Automation&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Tomer Sole&lt;/STRONG&gt;, Technology Leader&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3695" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11055"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;In this session, we will show real stories of how our customers successfully use automation to overcome repeating activities and streamline their operations.&amp;nbsp;&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Creating a DevSecOps Culture For Your Business&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Aaron McKeown&lt;/STRONG&gt;, Xero&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3667" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11056"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;P style="padding: 0px;"&gt;Learn how the network team at Xero, a global online platform for small businesses, were able to communicate the power of Check Point and Amazon Web Services with the business, aligning the technical solution with the ever-evolving business requirements, communicating value to the business.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Million ways of stealing Cryptocurrencies&amp;nbsp;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Indrajeet Bhuyan&lt;/STRONG&gt;, Techlomedia&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3704" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN&gt;&amp;nbsp;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11057"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;SPAN style="color: #808080;"&gt;Over the last few&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;years&lt;SPAN&gt;,&amp;nbsp;&lt;/SPAN&gt;cryptocurrency&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;have&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;become very popular all over the world. Most of the people are into it as it gives quick profit.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN style="color: #008000;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN style="color: #008000;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;How to Prevent Attacks Before They Strike&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Meir Jonathan-Dahan&lt;/STRONG&gt;, Technology Leader&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Elad Goldenberg&lt;/STRONG&gt;, Solution Manager&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3694" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11058"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;SPAN style="color: #808080;"&gt;ThreatGuard&amp;nbsp;is a new service that on ongoing basis checks for threats that organizations are exposed to from attackers’ perspective. Once threats were found, the service remediates them to improve security and avoid cyber events.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;SPAN style="color: #008000;"&gt;&lt;SPAN style="color: #808080;"&gt;Click to Expand&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="" style="background: url(&amp;quot;;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN style="color: #008000;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN style="color: #008000;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Organized Syndicates, the Defenders Way&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Nicky Fang&lt;/STRONG&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Artic&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Security Oy&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3666" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11059"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Why does it always seems like the adversaries are ahead of&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;organisations&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;defending it? What do attackers, hackers, nation-state sponsors, APT groups etc, have in common? They are highly 'ORGANISED' operatives, extremely focus respective individuals excelling in their own forte. Think ransomware. And yet, the constant security propaganda we hear is always about you and your&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;organisation, defending in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;silo.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Orchestrating Gateway Operations - Best Practices&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Valeri Loukine&lt;/STRONG&gt;, Cyber Security Evangelist&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3701" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11060"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Security System Orchestration has many challenges that are hard to address with classic management and configuration tool.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Cyber Security for Smart Manufacturing and Industry 4.0&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Ramandeep Singh Walia&lt;/STRONG&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;QOS&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Technology&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3683" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11061"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;The launch of the Check Point AAD solution and the expansion of the Applications WiKI support for the OT and IIoT with the existing Virtual Patch support of the Check Point has made the Check Point storyline for Industry4.0, very promising.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Finding the Breach in a Haystack - Live Demo&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Oren Koren&lt;/STRONG&gt;, Technical Product Manager&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN style="color: #808080;"&gt;&lt;SPAN style="color: #808080;"&gt;&lt;STRONG&gt;Kierk&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Sanderlin&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #808080;"&gt;, Head of Engineering, US Central&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3721"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11062"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;amount&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of Cyber attacks are enormous in a single network. Without automatic aggregation of logs into actionable events, the admin/analyst can’t handle the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;amount&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of logs he sees every day. Also, by presenting events in a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;technology&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;language, the admin/analyst can’t understand the impact of this event on his&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;envinroment.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class=""&gt;&lt;SPAN class="" style="background: url(&amp;quot;;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Regain Visibility Of Your Network Traffic&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Michael Poczobut,&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Blue Cross and Blue Shield of Vermont (BCBSVT)&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3709" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;CloudGuard Deployment Scenarios in AWS&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Vladimir Yakovlev&lt;/STRONG&gt;, Higher Intelligence LLC&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3682" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;P style="padding: 0px;"&gt;Presentation&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;will be addressing&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;variety&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of implementations of vSEC in AWS. From a simple&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Single AZ&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and Single VPC to a multi-AZ with multiple peered VPCs. Additionally, it will include a breakdown of the Check Point’s Transit VPC functionality.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;SandBlast Mobile Security -&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Dob't&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Put it On Hold&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Stacy Dunn&lt;/STRONG&gt;, RCB Bank&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3716" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Honeypotting and Sandboxing Beginners Guide&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Eric Crutchlow&lt;/STRONG&gt;, Security Engineer&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3655" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Want to waste&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;an attackers&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;time and help train your security team simultaneously? Learn techniques that will help you gather intel at earlier stages of an attack.&amp;nbsp;&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class=""&gt;&lt;SPAN class="" style="background: url(&amp;quot;;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Enabling Business &amp;amp; IT Operations in the face of Mounting Security Requirements&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Emmanuel D. Bot&lt;/STRONG&gt;, Wiley&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Rain&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;LLP&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3679" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;How to Plan for Incident Response on the Power Grid Without Getting Zapped!&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Tim Otis&lt;/STRONG&gt;, &lt;SPAN style="color: #808080;"&gt;Team&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Leader, Incident Response Operations&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN style="color: #808080;"&gt;&lt;STRONG&gt;Melissa Kjendle&lt;/STRONG&gt;, Connexus Energy&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3703" style="color: #222222; text-decoration: none;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Presentation&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;In this&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;talk&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;we will discuss how CPIRT knowledge of adversarial Tactics Techniques &amp;amp; Procedures is leveraged when preparing for attacks or Penetration Tests, how tabletop drills can be used to effectively communicate&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;a positive&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;security conciseness across all levels of an enterprise, and how CPIRT Compromise Assessments can identify possible areas of improvement.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Buiding&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Your Very Own Check Point "Playground"&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Eric Anderson&lt;/STRONG&gt;, Atlantic Data Security&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3677"&gt;&lt;SPAN style="color: #000000;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Finding the Breach in the Haystack - Live Demo&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Kierk&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Sanderlin&lt;/STRONG&gt;, Head of Engineering, US Central&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;Presentation&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;amount&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of Cyber attacks are enormous in a single network. Without automatic aggregation of logs into actionable events, the admin/analyst can’t handle the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;amount&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of logs he sees every day. Also, by presenting events in a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;technology&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;language, the admin/analyst can’t understand the impact of this event on his&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;envinroment.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;ICS Security Challenges n Smart Grid Environment&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;SPAN style="color: #808080;"&gt;&lt;STRONG&gt;Jordan Krueger&lt;/STRONG&gt;, Xcel Energy&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3672" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;In Smart Grid and regulated environment, the security challenges&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;comes&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;from&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;growing&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;amount of connected devices starting from Gas and Electricity smart meters, Distribution Automation assets up to grid management.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Umbrella Security: How Morton Salt Prevents and Manages Its Threat Landscape&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Caleb Wilson&lt;/STRONG&gt;, Morton Salt&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3673" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Cloud apps (SaaS) helped Neopharm gain business agility and assisted in simplifying our IT operations.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Implementing a National Network for Inter-Government Services&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Eli Faskha&lt;/STRONG&gt;, Soluciones Seguras&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3681" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;In 2012,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Panamanian&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Government launched the RNMS (National Network for Multiple Services). The idea was to have a network to connect almost 100 government entities and offer secure Internet connections to smaller entities as a SaaS.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;VSX Performance Optimization&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Kaspars Zibarts&lt;/STRONG&gt;, Scania&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3730"&gt;Presentation&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;P style="padding: 0px;"&gt;Kaspars Zibarts have been working with VSX since 2006 in rather different deployments and have accumulated&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;useful&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;information. Kaspars will share best practices on leveraging VSX technology to provide scalable and optimized security while keeping maximum performance&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Check Point for a New Security Administrator in a Company. How Check Point Can Help You to Save Money and Show Your Value for Business&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Evgeniy Olkov&lt;/STRONG&gt;, TS Solution&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3690" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;&lt;SPAN style="background-color: #ffffff;"&gt;Threat Modeling Off-The-Shelf Security Products&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Robert Graham&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3699"&gt;Presentation&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;This talk will provide a very brief introduction to threat modeling and show how it can be applied to off-the-shelf security solutions. Only a minority of organizations perform threat modeling and build their solutions with a secure architecture in mind. Even fewer evaluate the security posture of the security solutions they deploy in their environment.&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;CheckMates in 10 Moves&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Shahar Grober&lt;/STRONG&gt;, Grand City Property&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3671" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;While threats are becoming more sophisticated and security solutions becoming more complex, Getting the right information to protect your&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;assets&amp;nbsp; is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;becoming a big challenge to security administrators.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Security Policy Design - The LEGO® Principle&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Danny Jung&lt;/STRONG&gt;, Electronic Service Center&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3720" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Firewall security policies should always be properly designed to ensure a high level of consistency, integrity, readability&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;manageability. Choosing&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;the the right&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;methods and tools for structuring, coloring, naming and configuring objects, rules and sections&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;key to keep the overall firewall security policy healthy,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;trouble shooting&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;times low, working with different firewall administrators towards the same security principles and goals.&amp;nbsp;&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class=""&gt;&lt;SPAN class="" style="background: url(&amp;quot;;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Securing the Mobile Workforce in a Mobile World - How Asystel Protects Enterprises With SandBlast Mobile&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;P style="padding: 0px;"&gt;&lt;STRONG&gt;Maurizio Guardassoni&lt;/STRONG&gt;, Asystel&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Jeremy Kaye&lt;/STRONG&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #808080;"&gt;Head of Mobile Security, Check Point&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3669" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;Asystel, a leading Italian provider of IT managed solutions and innovation, and a long time Check Point partner, will present how we are evolving to a Mobile-centric world, the challenges that enterprises face with the rise of mobile malware, and how SandBlast Mobile helps them and their hundreds of customers to secure organizations from data breaches and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;cyberattacks.&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class=""&gt;&lt;SPAN class="" style="background: url(&amp;quot;;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 212px;"&gt;Data Center Migration - Moving From Appliances to Virtualization&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 149px;"&gt;&lt;STRONG&gt;Shay Rozov&lt;/STRONG&gt;, Ezbob&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 169px;"&gt;&lt;DIV class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3685" style="color: #222222; text-decoration: none;"&gt;Presentation&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 754px;"&gt;&lt;DIV class=""&gt;&lt;P style="padding: 0px;"&gt;&amp;nbsp;Ezbob is running a 24*7 operation at UK data centers. During Q3-2018, Ezbob has migrated all its environments, production and none-production to a new data center.&amp;nbsp;&lt;/P&gt;&lt;P class="" style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;H2 style="color: #e45785; background-color: #ffffff; border-bottom-color: #ffffff; font-weight: normal; font-size: 20px; margin: 10px 0px 0px;"&gt;Sales Kickoff for Check Point Sales Field and Partners (limited access)&lt;/H2&gt;&lt;DIV class="" style="color: #6d6e71; background-color: #ffffff; margin: 10px 0px 0px;"&gt;&lt;TABLE id="TBL1551120618239" style="border-bottom: thin solid #6d6e71; font-size: 0.9em;" width="1344"&gt;&lt;TBODY&gt;&lt;TR style="height: 30px;"&gt;&lt;TH colspan="1" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 401px; height: 30px;"&gt;Partner Day - General Keynote Sessions&lt;/TH&gt;&lt;TH colspan="1" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 401px; height: 30px;"&gt;&lt;/TH&gt;&lt;TH colspan="1" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 401px; height: 30px;"&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;TR style="height: 122px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 407px; height: 122px;"&gt;Partnering for Success!&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 719px; height: 122px;"&gt;&lt;P&gt;&lt;STRONG&gt;Dan Yerushalmi&lt;/STRONG&gt;, Chief Customer Officer&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Frank Rauch&lt;/STRONG&gt;, Head of Worldwide Channel&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 174px; height: 122px;"&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3723"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 69px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 407px; height: 69px;"&gt;Taking the Gloves Off in 2019&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 719px; height: 69px;"&gt;&lt;STRONG&gt;Peter Alexander&lt;/STRONG&gt;, Chief Marketing Officer&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 174px; height: 69px;"&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3733"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11065"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 56px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 407px; height: 56px;"&gt;Partner Awards&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 719px; height: 56px;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 174px; height: 56px;"&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3725"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11066"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 56px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 407px; height: 56px;"&gt;Winning Through Innovation&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 719px; height: 56px;"&gt;&lt;P&gt;&lt;STRONG&gt;Moti Sagey&lt;/STRONG&gt;, Head of Strategic Marketing &amp;amp; Intelligence&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 174px; height: 56px;"&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3734"&gt;Presentation&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11067"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 56px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 407px; height: 56px;"&gt;Leveraging Emerging Products to Over Achieve Your Quota&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 719px; height: 56px;"&gt;&lt;STRONG&gt;Nathan Shuchami&lt;/STRONG&gt;, VP Emerging Products&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 174px; height: 56px;"&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3724"&gt;Presentation&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11071"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 30px;"&gt;&lt;TH colspan="1" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 401px; height: 30px;"&gt;Sales Track&lt;/TH&gt;&lt;TH colspan="1" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 401px; height: 30px;"&gt;&lt;/TH&gt;&lt;TH colspan="1" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 401px; height: 30px;"&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;TR style="height: 56px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 407px; height: 56px;"&gt;Understanding the Infinity Total Protection Value Proposition&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 719px; height: 56px;"&gt;&lt;P&gt;&lt;STRONG&gt;Eran Orzel&lt;/STRONG&gt;, Head Of Strategic Sales and Partnerships&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 174px; height: 56px;"&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11072"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 79px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 407px; height: 79px;"&gt;New Customers - Leveraging Partner Program&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 719px; height: 79px;"&gt;&lt;STRONG&gt;Yifat Bavli&lt;/STRONG&gt;, Sales Enablement Manager &amp;amp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Aviel Katz&lt;/STRONG&gt;, Head of Partner Alliance&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 174px; height: 79px;"&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 56px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 407px; height: 56px;"&gt;Selling Cloud Security - A Customer Centric Approach&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 719px; height: 56px;"&gt;&lt;STRONG&gt;Yariv Fishman&lt;/STRONG&gt;, Head of Product Management, Cloud Security &amp;amp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Zohar Alon&lt;/STRONG&gt;, Head of Cloud Product Line&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 174px; height: 56px;"&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3735"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11073"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 56px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 407px; height: 56px;"&gt;Replicating success with Customer Win Cases&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 719px; height: 56px;"&gt;&lt;P&gt;&lt;STRONG&gt;Amit Sharon&lt;/STRONG&gt;, Head of Customer Community&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Gil&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;Sarig&lt;/STRONG&gt;&lt;SPAN style="color: #7a869a;"&gt;, Market Intelligence Manager&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 174px; height: 56px;"&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3736"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11074"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 30px;"&gt;&lt;TH colspan="1" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 401px; height: 30px;"&gt;SE TRACK&lt;/TH&gt;&lt;TH colspan="1" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 401px; height: 30px;"&gt;&lt;/TH&gt;&lt;TH colspan="1" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px; width: 401px; height: 30px;"&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;TR style="height: 89px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 407px; height: 89px;"&gt;How to Whiteboard the Gen V Story&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 719px; height: 89px;"&gt;&lt;P&gt;&lt;STRONG&gt;Gary Gardiner&lt;/STRONG&gt;, Head of Security Engineering, AMA&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Greg Pepper&lt;/STRONG&gt;, Security Architect&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Peter &lt;SPAN style="font-size: 11.0pt;"&gt;Sandkuijl&lt;/SPAN&gt;&lt;/STRONG&gt;, Head of Security Solutions, Engineering, Europe&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 174px; height: 89px;"&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3737"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11075"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 56px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 407px; height: 56px;"&gt;How to Win EVERY POC!&amp;nbsp;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 719px; height: 56px;"&gt;&lt;P&gt;&lt;STRONG&gt;Asher Harosh&lt;/STRONG&gt;, Manager, POC team &amp;amp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Anatoly Masover&lt;/STRONG&gt;, POC Manager&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Whatcha McCallum&lt;/STRONG&gt;, Manager, Americas Solution Center&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 174px; height: 56px;"&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3738"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11076"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 89px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 407px; height: 89px;"&gt;Maximize the Value of Technical Sales Tools&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 719px; height: 89px;"&gt;&lt;P&gt;&lt;STRONG&gt;Elad Goldenberg&lt;/STRONG&gt;, Solution Manager&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Yael Haker&lt;/STRONG&gt;, Customer Success and Pre-Sales Tools Manager&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Hanan Adika&lt;/STRONG&gt;,&lt;SPAN style="color: #808080;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Director, Global Solution Center&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 174px; height: 89px;"&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3739"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/11077"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 56px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 407px; height: 56px;"&gt;Dive Deep into Competitive Analysis&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 719px; height: 56px;"&gt;&lt;P&gt;&lt;STRONG&gt;Hezi Chen&lt;/STRONG&gt;, Head of Competitive Intelligence&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Mor Manor&lt;/STRONG&gt;, Competitive Intelligence Lead Analyst&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 174px; height: 56px;"&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3740"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2019 09:16:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38429#M8156</guid>
      <dc:creator>Niran</dc:creator>
      <dc:date>2019-02-25T09:16:15Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38430#M8157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow, that was fast....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2019 13:16:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38430#M8157</guid>
      <dc:creator>Martin_Seeger</dc:creator>
      <dc:date>2019-02-25T13:16:09Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38431#M8158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Time to review the presentations. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2019 13:27:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38431#M8158</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2019-02-25T13:27:03Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38432#M8159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;Great&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Thanks a lot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2019 15:53:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38432#M8159</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2019-02-25T15:53:33Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38433#M8160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do not see Kaspars Zibarts slides. Any chance to get them posted?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2019 23:07:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38433#M8160</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-02-25T23:07:20Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38434#M8161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kaspars' slides are posted, but the hyperlink would seem to indicate that they are on the internal Check Point wiki which you and I can't reach from the outside world.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2019 03:22:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38434#M8161</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-02-26T03:22:54Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38435#M8162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;Well done everybody!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2019 06:46:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38435#M8162</guid>
      <dc:creator>Moti</dc:creator>
      <dc:date>2019-02-26T06:46:24Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38436#M8163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's a work in progress, stay tuned &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2019 07:21:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38436#M8163</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-02-26T07:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38437#M8164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Fixed!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2019 08:01:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38437#M8164</guid>
      <dc:creator>Niran</dc:creator>
      <dc:date>2019-02-26T08:01:03Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38438#M8165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;great set, I was so hoping I could attend that CPX but got halted by business ... BAU &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://community.checkpoint.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt;&lt;/P&gt;&lt;P&gt;glad I can at least enjoy this off-line content!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers to all who made it possible!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jerry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2019 15:44:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38438#M8165</guid>
      <dc:creator>Jerry</dc:creator>
      <dc:date>2019-02-26T15:44:06Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38439#M8166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your are really fast. Thank you for it. I can enjoy sessions which I missed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2019 08:50:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38439#M8166</guid>
      <dc:creator>Petr_Hantak</dc:creator>
      <dc:date>2019-02-28T08:50:19Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38440#M8167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Niran, can you fix my last name here as well?&amp;nbsp;&lt;/P&gt;&lt;P&gt;TIA&lt;BR /&gt;&lt;BR /&gt;Peter !!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2019 09:26:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38440#M8167</guid>
      <dc:creator>Peter_Sandkuijl</dc:creator>
      <dc:date>2019-02-28T09:26:29Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38441#M8168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Fixed, sorry&amp;nbsp;for the inconvenience.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2019 10:14:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38441#M8168</guid>
      <dc:creator>Niran</dc:creator>
      <dc:date>2019-02-28T10:14:25Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38442#M8169</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't find the presentation slides "Check Point 2019 Innovations, Roadmap &amp;amp; Vision – Dorit Dor, VP, Products"&lt;/P&gt;&lt;P&gt;Thanks, Sandro&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2019 09:03:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38442#M8169</guid>
      <dc:creator>Sandro_De_Matte</dc:creator>
      <dc:date>2019-03-01T09:03:17Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38443#M8170</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This presentation is not public&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2019 09:13:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38443#M8170</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-03-01T09:13:04Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38444#M8171</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot for your job guys &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2019 10:34:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38444#M8171</guid>
      <dc:creator>Arthur_DENIS1</dc:creator>
      <dc:date>2019-03-01T10:34:25Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38445#M8172</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for all the presentations. That was really fast this time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW CPX360 Vienna was a great event &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2019 11:10:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38445#M8172</guid>
      <dc:creator>Bjoern_Baumann</dc:creator>
      <dc:date>2019-03-01T11:10:42Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38446#M8173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;BR /&gt;This presentation is Capsule protected:&lt;/P&gt;&lt;P&gt;THE_FRONTIER_BEYOND-FEB_12_v21 BG ET.pdf&lt;BR /&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3692"&gt;https://community.checkpoint.com/docs/DOC-3692&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you check ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2019 08:50:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38446#M8173</guid>
      <dc:creator>Arthur_DENIS1</dc:creator>
      <dc:date>2019-03-05T08:50:33Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38447#M8174</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Confirmed.&lt;/P&gt;&lt;P&gt;Will try and get an unprotected version of this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2019 13:40:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38447#M8174</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-05T13:40:06Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2019</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38448#M8175</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's a bummer.&amp;nbsp; Her's was probably the best one of the group.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Mar 2019 12:49:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2019/m-p/38448#M8175</guid>
      <dc:creator>Tommy_Forrest</dc:creator>
      <dc:date>2019-03-07T12:49:45Z</dc:date>
    </item>
  </channel>
</rss>

