<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CPX 2017 Slides in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/CPX-2017-Slides/m-p/38890#M8384</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H2 style="color: #333333; background-color: #ffffff; border-bottom-color: #cccccc; font-size: 20px; margin: 30px 0px 0px;"&gt;&lt;/H2&gt;&lt;H3&gt;&lt;STRONG&gt;CPX 2017 content is now available online!&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;Learn more about the Future of Cyber Security and Check Point Infinity from Check Point founder and CEO Gil Shwed and other Check Point experts. Explore the power of the Cloud &amp;amp; Mobile, understand advanced threats and how to block them, and master efficient security management techniques.&amp;nbsp;For exclusive access to full slide decks from each presentation, please&amp;nbsp;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-1066-getting-started-on-checkmates"&gt;&lt;SPAN style="color: #2989c5;"&gt;log into&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;your Check Point CheckMates account.&lt;/SPAN&gt;&lt;/P&gt;&lt;H2 style="color: #333333; background-color: #ffffff; border-bottom-color: #cccccc; font-size: 20px; margin: 30px 0px 0px;"&gt;Cyber Talks&lt;/H2&gt;&lt;DIV class="" style="color: #333333; background-color: #ffffff; font-size: 14px; margin: 10px 0px 0px;"&gt;&lt;TABLE style="border-bottom: thin solid #6d6e71; font-size: 0.9em; width: 1531px;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; width: 121px;" title="null"&gt;Topic&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; width: 121px;" title="null"&gt;Speaker&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; width: 121px;"&gt;Content&lt;/TH&gt;&lt;TH colspan="1" style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; width: 121px;" title="null"&gt;Abstract&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;&lt;SPAN&gt;Welcome to the Future of Cyber Security&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Gil Shwed&lt;/STRONG&gt;&lt;BR /&gt;Founder and CEO&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2066" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://youtu.be/11UAnUnDozw" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;&lt;P&gt;We are all living in a connected world which is affecting every aspect of our lives.&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;In the past couple of years, we have been discussing implications of a&amp;nbsp; technology and digital-driven world (i.e.) cloud, mobile, advanced threats.&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Today, we are seeing some of our worst predictions shaping into real life.&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;So why are businesses not protecting themselves and instead keep making excuses?&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;In today’s world, business need security that meet their business needs.&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Gil Shwed's discussion defines the pillars of security that businesses should adopt, based on their actual business needs.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;&lt;DIV class=""&gt;Gil Shwed &amp;amp; Marius Nacht Interview @ 2017 CPX Milan&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;P&gt;&lt;STRONG&gt;Gil Shwed&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;Founder and CEO&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Check Point Software Technologies&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Marius Nacht&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Co-Founder and Chairman&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;A href="https://youtu.be/11UAnUnDozw" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube&amp;nbsp;&lt;/A&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;&lt;SPAN&gt;Gil Shwed &amp;amp; Marius Nacht Interview @ 2017 CPX Milan&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;&lt;SPAN&gt;Cyber Security in the Era of Exponential Technology&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Amnon Bar-Lev&lt;/STRONG&gt;&lt;BR /&gt;President&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2057" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://youtu.be/kBnirnGNc-g" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;We are in an extraordinary time in human history. Thanks to innovative and disruptive technologies we live longer, healthier and more educated than ever before. While technologies such as cloud computing, mobile and Internet of Things open up new opportunities, they are, in many cases, the biggest barriers for adoption due to cyber security concerns. How do you innovate, inspire and compete while remaining secure? In his inspiring session, Amnon Bar-Lev shares the Check Point vision on how organizations can keep focus on innovating while being secured with a security architecture that is one step ahead.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Seeing is Believing: Hacking the Smartphone&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Michael Shaulov&lt;/STRONG&gt;&lt;BR /&gt;Head of Product Management and Product Marketing, Mobile&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2050" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/Tn2etDAul98" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;Join this exciting live demo to see first-hand how easy it is to hack any smartphone today. In this session Michael Shaulov will demonstrate live hacking of a smartphone, the risks and possible mitigations for the new Achilles heel of enterprises today and tomorrow.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Surviving the Ransomware Plague&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Orli Gan&lt;/STRONG&gt;&lt;BR /&gt;Head of Products, Threat Prevention&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2088" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/ILWt3GgCcn0" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;Ransomware reached epidemic proportions in 2016. Organizations of all sizes and sectors fell victim to malware that locked down, encrypted – and in some cases threatened to destroy – critical systems and data. How would you avoid becoming tomorrow’s headline? How can businesses continue to operate without disruption despite this looming threat? Learn how Check Point Anti-Ransomware technology protects against every type of ransomware attack, ensuring continuous access to your data&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Check Point Latest Announcements&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Gabi Reish&lt;/STRONG&gt;&lt;BR /&gt;VP, Product Management and Product Marketing&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2095" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/rp0FMcw9DSY" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;Check Point Infinity announcement&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Choosing the Right Security Architecture&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Moti Sagey&lt;/STRONG&gt;&lt;BR /&gt;Head of Strategic Marketing &amp;amp; Intelligence&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2071" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/K-yEjj_Ku-o" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;When it comes to choosing the right security architecture &amp;amp; security vendor, what does it take to win your trust?&amp;nbsp; In this session Moti Sagey will cover three key pillars the security solution must possess to win in a highly competitive environment:&amp;nbsp; Uncompromised Security, Everywhere Architecture and Operational Efficiency. Moti will share pragmatic tips to unveil the true efficacy of the solution with zero marketing "fluffy claims".&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Shedding Light on the Dark Web&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Avi Rembaum&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;Vice President, Security Solutions&lt;BR /&gt;&lt;STRONG&gt;Neatsun Ziv&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;VP, Threat Prevention&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2087" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/8e1KeinR3NU" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;The dark web is quickly evolving into a marketplace of information and tools that the hackers and adversaries use to breach company networks. The question we face as an industry is how to leverage an awareness of information for sale in the dark web to improve corporate security architectures. This session showcase real examples of data in the dark web and suggest pragmatic tips to mitigate future attacks.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;What To Do When It Happens to You - Check Point Incident Response&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Daniel Wiley&lt;/STRONG&gt;&lt;BR /&gt;Head of Incident Response&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2092" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/aKV2H0WD3zo" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;Based on real world experiences of helping customers, this candid discussion will focus on ensuring that your organization is prepared when a breach occurs in your network.&amp;nbsp; The discussion will provide real world examples of what works and what does not work and provides a framework on how to center your organizations security strategy to face any incident head on.&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;IoT Hacking - Live&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Oded Vanunu&lt;/STRONG&gt;&lt;BR /&gt;Head of Products Vulnerability Research&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2076" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;Ready or not, the Internet of things (IoT) is here. No longer a buzz word, it continues to grow at an unprecedented pace for years to come and is expected to reach over 25 billion connected devices by 2020. Most IoT devices, apps, and infrastructure were developed without security in mind and have already been exploited on major hacking campaigns in the past two years &amp;amp; will continue to be the main targets for hackers. Are organizations ready to protect themselves? What are the key vulnerable points? In this session Oded Vanunu enters into the Hacker mind to exploit IoT devices. Oded will also share insights on possible mitigations for these threats&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Life Inside the Cloud&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Brian Linder&lt;/STRONG&gt;&lt;BR /&gt;Datacenter Sales Manager, Eastern US&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/9N-CahQ7fV4" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;The era of cloud is upon us; firms of all sizes and in all walks of life are looking to leverage the agility and elasticity of cloud.&amp;nbsp; But cloud carries a totally new and unique set of security challenges. In this informative and entertaining session, you will take away five key tenants of cloud security, along with an accompanying set of recommendations on best practices securing hybrid cloud deployments. Brian Linder will share a healthy dose of a real-life experience with an actual Check Point customer use case securing their complex hybrid cloud deployment.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Safe Journey to the Cloud&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Itai Greenberg&lt;/STRONG&gt;&lt;BR /&gt;Head of Cloud Security&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2084" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/OAuUQBJtIBo" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;The era of cloud is upon us; firms of all sizes and in all walks of life are looking to leverage the agility and elasticity of cloud.&amp;nbsp; But cloud carries a totally new and unique set of security challenges. In this session, you will take away five key tenants of cloud security, along with an accompanying set of recommendations on best practices securing hybrid cloud deployments.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TH colspan="4" style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; width: 1479px;"&gt;External Speakers&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Moving to the Public Cloud, Securely - FireChat with AWS &amp;amp; Azure&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;Amazon AWS , Microsoft Azure&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;SPAN&gt;View YouTube Video&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;&lt;DIV class=""&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;P&gt;More than 70% of &amp;nbsp;the organizations are committed to a cloud strategy in 2017.&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Businesses are moving their applications to the Cloud to gain more agility and efficiencies.&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;At the same time, Cloud security remains their &amp;nbsp;top concern.&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Customers are looking for solution to secure their data and applications from modern threat targeting their shared, connected and agile cloud environment.&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Join us for a fireside chat with top leaders from AWS, Azure and learn about their perspectives and recommendations for security best practices in the cloud.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;How We Blocked a Targeted Attack&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Dr. Matthias Rosche&lt;/STRONG&gt;&lt;BR /&gt;Senior Vice President, Solution Sales &amp;amp; Consulting&lt;BR /&gt;Deutsche Telekom Group&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2075" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;A story of a real incident in which Deutsche Telekom was able to detect and prevent a specific cyber-attack. Describing the kill chain in laymen terms, how the attack was mitigated and the lessons learned.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;We Make Jeans; How Hard Can That Be?&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Steve Zalewski&lt;/STRONG&gt;&lt;BR /&gt;Chief Security Architect&lt;BR /&gt;Levi Strauss &amp;amp; Co.&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2065" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/kwnOVdX6s8s" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;This talk will present some of the business challenges, learnings and roadmaps from a security perspective to protect the global Levi Brand&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Keeping it Simple&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Luke Beeson&lt;/STRONG&gt;&lt;BR /&gt;Vice President of Security&lt;BR /&gt;British Telecom&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2081" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;Presenting key guidance and directions related to the main needs of security architecture for 2017; how it must follow the business needs - and first and foremost - be simple and efficient to operate.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;The Evolving Role of the CISO in a Post Breach Organization&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Joey Smith&lt;/STRONG&gt;&lt;BR /&gt;CISO&lt;BR /&gt;Schnuck Markets&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2063" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/1Cl7HaMcV50" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;In this session CISO Joey Smith will discuss understanding the importance of compliance and security and how they are very different.&amp;nbsp; Additionally he will review many of the personal leanings that he has gained from his experience as a CISO responsible for maturing an Information Security program.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Simple Security Is Your Best Bet&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Patrick Woods&lt;/STRONG&gt;&lt;BR /&gt;CISO&lt;BR /&gt;Missouri State Highway Patrol&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2061" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/6fNc8SBPfuI" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;This thought-provoking session will challenge current models in cyber security management and architecture that suggest that complex problems demand complex solutions. Instead, it is a simplified approach, keeping users and senior leadership engaged while leveraging key partnerships that will prepare organizations to combat the cyber threats of today and tomorrow&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;CISO... What's Next?&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Geremy Benkirane&lt;/STRONG&gt;&lt;BR /&gt;Chief Information Security Officer&lt;BR /&gt;Exane SA&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2072" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;When managing and controlling information systems and data risks leads to the data controlling the business.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;H2 style="font-weight: normal;"&gt;&lt;/H2&gt;&lt;H2 style="font-weight: normal;"&gt;Future of Cyber Security&lt;/H2&gt;&lt;DIV class="" style="font-weight: normal; font-size: 14px; margin: 10px 0px 0px;"&gt;&lt;TABLE style="border-bottom: thin solid #6d6e71; font-size: 0.9em;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;" title="null"&gt;Topic&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;" title="null"&gt;Speaker&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;" title="null"&gt;Content&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px;"&gt;Don't Fear the Cloud: Secure It&lt;/TD&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px;"&gt;&lt;P style="margin: 0px;"&gt;&lt;STRONG&gt;Erez Berkner&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2058" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;Understanding Advanced Threats and How to Prevent Them&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;P style="margin: 0px;"&gt;&lt;STRONG&gt;Nathan Shuchami&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2089" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;GDPR - Jump-Start Your Compliance Today!&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;STRONG&gt;Gabi Reish&lt;/STRONG&gt;&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2060" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;H2 style="color: #333333; background-color: #ffffff; border-bottom-color: #cccccc; margin: 30px 0px 0px;"&gt;Vertical Sessions&lt;/H2&gt;&lt;DIV class="" style="color: #333333; background-color: #ffffff; font-size: 14px; margin: 10px 0px 0px;"&gt;&lt;TABLE style="border-bottom: thin solid #6d6e71; font-size: 0.9em;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;" title="null"&gt;Topic&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;" title="null"&gt;Speaker&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;" title="null"&gt;Content&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;Protecting Industrial Control Systems&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;P&gt;&lt;STRONG&gt;Noam Green&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Mati Epstein&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2083" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;Best Practices for Securing the Retail Sector&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;STRONG&gt;Gabi Reish&lt;/STRONG&gt;&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2070" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;Telcos and ISPs: The Next Generation of Security Services&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;STRONG&gt;Yoav Shay Daniely&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2062" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;H2 style="color: #333333; background-color: #ffffff; border-bottom-color: #cccccc; font-size: 20px; margin: 30px 0px 0px;"&gt;&lt;/H2&gt;&lt;DIV class="" style="color: #333333; background-color: #ffffff; font-size: 14px; margin: 10px 0px 0px;"&gt;&lt;H2 style="background-color: #ffffff; border-bottom-color: #cccccc; font-size: 20px; margin: 30px 0px 0px;"&gt;Meet the Experts&lt;/H2&gt;&lt;DIV class="" style="background-color: #ffffff; margin: 10px 0px 0px;"&gt;&lt;TABLE style="border-bottom: thin solid #6d6e71; font-size: 0.9em;"&gt;&lt;TBODY&gt;&lt;TR style="height: 21px;"&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; height: 21px;"&gt;Topic&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; height: 21px;"&gt;Speaker&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; height: 21px;"&gt;Content&lt;/TH&gt;&lt;/TR&gt;&lt;TR style="height: 63px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 63px;"&gt;How Organizations Can Gain Infrastructure Efficiency by Automating Their Network Operations&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 63px;"&gt;&lt;STRONG&gt;Rafi Zvi&lt;/STRONG&gt;&lt;BR /&gt;CEO and Co-Founder&lt;BR /&gt;BackBox&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 63px;"&gt;&lt;EM&gt;sponsor sessions&lt;/EM&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 63px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 63px;"&gt;How to Become a Firewall Automation Ninja&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 63px;"&gt;&lt;STRONG&gt;Ruvi Kitov&lt;/STRONG&gt;&lt;BR /&gt;CEO and Co-Founder&lt;BR /&gt;Tufin&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 63px;"&gt;&lt;EM&gt;sponsor sessions&lt;/EM&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 54px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;How Hackers Think - Dissecting Malware Operations&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;P&gt;&lt;STRONG&gt;Maya Horowitz&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2074" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 85px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 85px;"&gt;WannaCry Under the Microscope&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 85px;"&gt;&lt;P&gt;&lt;STRONG&gt;Yaniv Balmas&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&lt;STRONG&gt;Maya Horowitz&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 85px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2064" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 54px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;How to Build the Rule-Base of the Future&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;P&gt;&lt;STRONG&gt;Amnon Perlmutter&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2059" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 54px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;Unleashing the Power of the Cloud&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;P&gt;&lt;STRONG&gt;Erez Berkner&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2091" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 54px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;Scalable Security Platforms - Done the Right Way&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;P&gt;&lt;STRONG&gt;Benny Shlesinger&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Derek Middlemiss&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2085" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 65px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 65px;"&gt;Automation &amp;amp; Orchestration Deep Dive&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 65px;"&gt;&lt;STRONG&gt;Marco Garcia&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Ryan Darst&lt;/STRONG&gt;&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 65px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2069" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 85px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 85px;"&gt;Leveraging White &amp;amp; Black Hat Cyber Intelligence to Stay One Step Ahead&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 85px;"&gt;&lt;P&gt;&lt;STRONG&gt;Maya Horowitz&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Oded Vanunu&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 85px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2077" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 54px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;Advanced Gateway Configuration and Management&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;P&gt;&lt;STRONG&gt;Tomer Noy&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2055" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 54px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;Analyzing and Preventing Attacks from the Network to the Endpoint&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;P&gt;&lt;STRONG&gt;Lior Arzi&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2094" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 89px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 89px;"&gt;&lt;P&gt;Understanding and Blocking Advanced Mobile Attacks&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;EM&gt;Note: Due to large file size the slide deck is split&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 89px;"&gt;&lt;P&gt;&lt;STRONG&gt;Micha Burd&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&lt;STRONG&gt;Ohad Bobrov&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 89px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2090" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;H2 style="background-color: #ffffff; border-bottom-color: #cccccc; font-size: 20px; margin: 30px 0px 0px;"&gt;Tech Rooms&lt;/H2&gt;&lt;DIV class="" style="background-color: #ffffff; margin: 10px 0px 0px;"&gt;&lt;TABLE style="border-bottom: thin solid #6d6e71; font-size: 0.9em;"&gt;&lt;TBODY&gt;&lt;TR style="height: 21px;"&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; height: 21px;" title="null"&gt;Topic&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; height: 21px;"&gt;Speaker&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; height: 21px;"&gt;Content&lt;/TH&gt;&lt;/TR&gt;&lt;TR style="height: 56px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 56px;"&gt;99.9 Effectiveness with IPS + NSS&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 56px;"&gt;&lt;P&gt;&lt;STRONG&gt;Roman Kunicher&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Smadar Paradise&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 56px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2093" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/servlet/JiveServlet/downloadBody/2096-102-1-2610/SKO_IPS_DEMO.wmv"&gt;Video&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(WMV) - Click to Download&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 23px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;Performance - Acceleration Cards&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2082" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 23px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;Automation and Orchestration&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2069" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 23px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;Upgrade and Migrations to R80.10&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;&lt;A href="https://youtu.be/egAIQqMUOPE" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;YouTube Video&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 21px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 21px;"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 21px;"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 21px;"&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;H2 style="background-color: #ffffff; border-bottom-color: #cccccc; font-size: 20px; margin: 30px 0px 0px;"&gt;Pre-Conference&lt;/H2&gt;&lt;DIV class="" style="background-color: #ffffff; margin: 10px 0px 0px;"&gt;&lt;TABLE style="border-bottom: thin solid #6d6e71; font-size: 0.9em;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;"&gt;Topic&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;" title="null"&gt;Speaker&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;"&gt;Content&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;Hands-On Security Management and Gateway&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;STRONG&gt;Jim Öqvist&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2073" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;Securing Clouds&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;STRONG&gt;Javier Hijas&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2086" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;Orchestration and Automation&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;P&gt;&lt;STRONG&gt;Ryan Darst&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Marco Garcia&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2068" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;P style="background-color: #ffffff; margin: 10px 0px 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 19 Jun 2017 13:00:58 GMT</pubDate>
    <dc:creator>Niran</dc:creator>
    <dc:date>2017-06-19T13:00:58Z</dc:date>
    <item>
      <title>CPX 2017 Slides</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-2017-Slides/m-p/38890#M8384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H2 style="color: #333333; background-color: #ffffff; border-bottom-color: #cccccc; font-size: 20px; margin: 30px 0px 0px;"&gt;&lt;/H2&gt;&lt;H3&gt;&lt;STRONG&gt;CPX 2017 content is now available online!&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;Learn more about the Future of Cyber Security and Check Point Infinity from Check Point founder and CEO Gil Shwed and other Check Point experts. Explore the power of the Cloud &amp;amp; Mobile, understand advanced threats and how to block them, and master efficient security management techniques.&amp;nbsp;For exclusive access to full slide decks from each presentation, please&amp;nbsp;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-1066-getting-started-on-checkmates"&gt;&lt;SPAN style="color: #2989c5;"&gt;log into&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;your Check Point CheckMates account.&lt;/SPAN&gt;&lt;/P&gt;&lt;H2 style="color: #333333; background-color: #ffffff; border-bottom-color: #cccccc; font-size: 20px; margin: 30px 0px 0px;"&gt;Cyber Talks&lt;/H2&gt;&lt;DIV class="" style="color: #333333; background-color: #ffffff; font-size: 14px; margin: 10px 0px 0px;"&gt;&lt;TABLE style="border-bottom: thin solid #6d6e71; font-size: 0.9em; width: 1531px;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; width: 121px;" title="null"&gt;Topic&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; width: 121px;" title="null"&gt;Speaker&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; width: 121px;"&gt;Content&lt;/TH&gt;&lt;TH colspan="1" style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; width: 121px;" title="null"&gt;Abstract&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;&lt;SPAN&gt;Welcome to the Future of Cyber Security&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Gil Shwed&lt;/STRONG&gt;&lt;BR /&gt;Founder and CEO&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2066" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://youtu.be/11UAnUnDozw" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;&lt;P&gt;We are all living in a connected world which is affecting every aspect of our lives.&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;In the past couple of years, we have been discussing implications of a&amp;nbsp; technology and digital-driven world (i.e.) cloud, mobile, advanced threats.&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Today, we are seeing some of our worst predictions shaping into real life.&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;So why are businesses not protecting themselves and instead keep making excuses?&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;In today’s world, business need security that meet their business needs.&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Gil Shwed's discussion defines the pillars of security that businesses should adopt, based on their actual business needs.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;&lt;DIV class=""&gt;Gil Shwed &amp;amp; Marius Nacht Interview @ 2017 CPX Milan&lt;/DIV&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;P&gt;&lt;STRONG&gt;Gil Shwed&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;Founder and CEO&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Check Point Software Technologies&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Marius Nacht&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Co-Founder and Chairman&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;A href="https://youtu.be/11UAnUnDozw" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube&amp;nbsp;&lt;/A&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;&lt;SPAN&gt;Gil Shwed &amp;amp; Marius Nacht Interview @ 2017 CPX Milan&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;&lt;SPAN&gt;Cyber Security in the Era of Exponential Technology&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Amnon Bar-Lev&lt;/STRONG&gt;&lt;BR /&gt;President&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2057" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A href="https://youtu.be/kBnirnGNc-g" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;We are in an extraordinary time in human history. Thanks to innovative and disruptive technologies we live longer, healthier and more educated than ever before. While technologies such as cloud computing, mobile and Internet of Things open up new opportunities, they are, in many cases, the biggest barriers for adoption due to cyber security concerns. How do you innovate, inspire and compete while remaining secure? In his inspiring session, Amnon Bar-Lev shares the Check Point vision on how organizations can keep focus on innovating while being secured with a security architecture that is one step ahead.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Seeing is Believing: Hacking the Smartphone&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Michael Shaulov&lt;/STRONG&gt;&lt;BR /&gt;Head of Product Management and Product Marketing, Mobile&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2050" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/Tn2etDAul98" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;Join this exciting live demo to see first-hand how easy it is to hack any smartphone today. In this session Michael Shaulov will demonstrate live hacking of a smartphone, the risks and possible mitigations for the new Achilles heel of enterprises today and tomorrow.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Surviving the Ransomware Plague&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Orli Gan&lt;/STRONG&gt;&lt;BR /&gt;Head of Products, Threat Prevention&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2088" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/ILWt3GgCcn0" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;Ransomware reached epidemic proportions in 2016. Organizations of all sizes and sectors fell victim to malware that locked down, encrypted – and in some cases threatened to destroy – critical systems and data. How would you avoid becoming tomorrow’s headline? How can businesses continue to operate without disruption despite this looming threat? Learn how Check Point Anti-Ransomware technology protects against every type of ransomware attack, ensuring continuous access to your data&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Check Point Latest Announcements&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Gabi Reish&lt;/STRONG&gt;&lt;BR /&gt;VP, Product Management and Product Marketing&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2095" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/rp0FMcw9DSY" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;Check Point Infinity announcement&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Choosing the Right Security Architecture&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Moti Sagey&lt;/STRONG&gt;&lt;BR /&gt;Head of Strategic Marketing &amp;amp; Intelligence&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2071" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/K-yEjj_Ku-o" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;When it comes to choosing the right security architecture &amp;amp; security vendor, what does it take to win your trust?&amp;nbsp; In this session Moti Sagey will cover three key pillars the security solution must possess to win in a highly competitive environment:&amp;nbsp; Uncompromised Security, Everywhere Architecture and Operational Efficiency. Moti will share pragmatic tips to unveil the true efficacy of the solution with zero marketing "fluffy claims".&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Shedding Light on the Dark Web&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Avi Rembaum&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;Vice President, Security Solutions&lt;BR /&gt;&lt;STRONG&gt;Neatsun Ziv&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;VP, Threat Prevention&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2087" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/8e1KeinR3NU" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;The dark web is quickly evolving into a marketplace of information and tools that the hackers and adversaries use to breach company networks. The question we face as an industry is how to leverage an awareness of information for sale in the dark web to improve corporate security architectures. This session showcase real examples of data in the dark web and suggest pragmatic tips to mitigate future attacks.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;What To Do When It Happens to You - Check Point Incident Response&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Daniel Wiley&lt;/STRONG&gt;&lt;BR /&gt;Head of Incident Response&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2092" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/aKV2H0WD3zo" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;Based on real world experiences of helping customers, this candid discussion will focus on ensuring that your organization is prepared when a breach occurs in your network.&amp;nbsp; The discussion will provide real world examples of what works and what does not work and provides a framework on how to center your organizations security strategy to face any incident head on.&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;IoT Hacking - Live&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Oded Vanunu&lt;/STRONG&gt;&lt;BR /&gt;Head of Products Vulnerability Research&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2076" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;Ready or not, the Internet of things (IoT) is here. No longer a buzz word, it continues to grow at an unprecedented pace for years to come and is expected to reach over 25 billion connected devices by 2020. Most IoT devices, apps, and infrastructure were developed without security in mind and have already been exploited on major hacking campaigns in the past two years &amp;amp; will continue to be the main targets for hackers. Are organizations ready to protect themselves? What are the key vulnerable points? In this session Oded Vanunu enters into the Hacker mind to exploit IoT devices. Oded will also share insights on possible mitigations for these threats&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Life Inside the Cloud&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Brian Linder&lt;/STRONG&gt;&lt;BR /&gt;Datacenter Sales Manager, Eastern US&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/9N-CahQ7fV4" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;The era of cloud is upon us; firms of all sizes and in all walks of life are looking to leverage the agility and elasticity of cloud.&amp;nbsp; But cloud carries a totally new and unique set of security challenges. In this informative and entertaining session, you will take away five key tenants of cloud security, along with an accompanying set of recommendations on best practices securing hybrid cloud deployments. Brian Linder will share a healthy dose of a real-life experience with an actual Check Point customer use case securing their complex hybrid cloud deployment.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Safe Journey to the Cloud&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Itai Greenberg&lt;/STRONG&gt;&lt;BR /&gt;Head of Cloud Security&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2084" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/OAuUQBJtIBo" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;The era of cloud is upon us; firms of all sizes and in all walks of life are looking to leverage the agility and elasticity of cloud.&amp;nbsp; But cloud carries a totally new and unique set of security challenges. In this session, you will take away five key tenants of cloud security, along with an accompanying set of recommendations on best practices securing hybrid cloud deployments.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TH colspan="4" style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; width: 1479px;"&gt;External Speakers&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Moving to the Public Cloud, Securely - FireChat with AWS &amp;amp; Azure&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;Amazon AWS , Microsoft Azure&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;SPAN&gt;View YouTube Video&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;&lt;DIV class=""&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;P&gt;More than 70% of &amp;nbsp;the organizations are committed to a cloud strategy in 2017.&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Businesses are moving their applications to the Cloud to gain more agility and efficiencies.&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;At the same time, Cloud security remains their &amp;nbsp;top concern.&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Customers are looking for solution to secure their data and applications from modern threat targeting their shared, connected and agile cloud environment.&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Join us for a fireside chat with top leaders from AWS, Azure and learn about their perspectives and recommendations for security best practices in the cloud.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;How We Blocked a Targeted Attack&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Dr. Matthias Rosche&lt;/STRONG&gt;&lt;BR /&gt;Senior Vice President, Solution Sales &amp;amp; Consulting&lt;BR /&gt;Deutsche Telekom Group&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2075" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;A story of a real incident in which Deutsche Telekom was able to detect and prevent a specific cyber-attack. Describing the kill chain in laymen terms, how the attack was mitigated and the lessons learned.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;We Make Jeans; How Hard Can That Be?&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Steve Zalewski&lt;/STRONG&gt;&lt;BR /&gt;Chief Security Architect&lt;BR /&gt;Levi Strauss &amp;amp; Co.&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2065" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/kwnOVdX6s8s" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;This talk will present some of the business challenges, learnings and roadmaps from a security perspective to protect the global Levi Brand&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Keeping it Simple&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Luke Beeson&lt;/STRONG&gt;&lt;BR /&gt;Vice President of Security&lt;BR /&gt;British Telecom&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2081" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;Presenting key guidance and directions related to the main needs of security architecture for 2017; how it must follow the business needs - and first and foremost - be simple and efficient to operate.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;The Evolving Role of the CISO in a Post Breach Organization&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Joey Smith&lt;/STRONG&gt;&lt;BR /&gt;CISO&lt;BR /&gt;Schnuck Markets&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2063" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/1Cl7HaMcV50" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;In this session CISO Joey Smith will discuss understanding the importance of compliance and security and how they are very different.&amp;nbsp; Additionally he will review many of the personal leanings that he has gained from his experience as a CISO responsible for maturing an Information Security program.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;Simple Security Is Your Best Bet&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Patrick Woods&lt;/STRONG&gt;&lt;BR /&gt;CISO&lt;BR /&gt;Missouri State Highway Patrol&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2061" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;SPAN&gt;&lt;A href="https://youtu.be/6fNc8SBPfuI" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;View YouTube Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;This thought-provoking session will challenge current models in cyber security management and architecture that suggest that complex problems demand complex solutions. Instead, it is a simplified approach, keeping users and senior leadership engaged while leveraging key partnerships that will prepare organizations to combat the cyber threats of today and tomorrow&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 121px;"&gt;CISO... What's Next?&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 246px;"&gt;&lt;STRONG&gt;Geremy Benkirane&lt;/STRONG&gt;&lt;BR /&gt;Chief Information Security Officer&lt;BR /&gt;Exane SA&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 163px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2072" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; width: 949px;"&gt;When managing and controlling information systems and data risks leads to the data controlling the business.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;H2 style="font-weight: normal;"&gt;&lt;/H2&gt;&lt;H2 style="font-weight: normal;"&gt;Future of Cyber Security&lt;/H2&gt;&lt;DIV class="" style="font-weight: normal; font-size: 14px; margin: 10px 0px 0px;"&gt;&lt;TABLE style="border-bottom: thin solid #6d6e71; font-size: 0.9em;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;" title="null"&gt;Topic&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;" title="null"&gt;Speaker&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;" title="null"&gt;Content&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px;"&gt;Don't Fear the Cloud: Secure It&lt;/TD&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px;"&gt;&lt;P style="margin: 0px;"&gt;&lt;STRONG&gt;Erez Berkner&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2058" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;Understanding Advanced Threats and How to Prevent Them&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;P style="margin: 0px;"&gt;&lt;STRONG&gt;Nathan Shuchami&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2089" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;GDPR - Jump-Start Your Compliance Today!&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;STRONG&gt;Gabi Reish&lt;/STRONG&gt;&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2060" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;H2 style="color: #333333; background-color: #ffffff; border-bottom-color: #cccccc; margin: 30px 0px 0px;"&gt;Vertical Sessions&lt;/H2&gt;&lt;DIV class="" style="color: #333333; background-color: #ffffff; font-size: 14px; margin: 10px 0px 0px;"&gt;&lt;TABLE style="border-bottom: thin solid #6d6e71; font-size: 0.9em;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;" title="null"&gt;Topic&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;" title="null"&gt;Speaker&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;" title="null"&gt;Content&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;Protecting Industrial Control Systems&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;P&gt;&lt;STRONG&gt;Noam Green&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Mati Epstein&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2083" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;Best Practices for Securing the Retail Sector&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;STRONG&gt;Gabi Reish&lt;/STRONG&gt;&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2070" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;Telcos and ISPs: The Next Generation of Security Services&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;STRONG&gt;Yoav Shay Daniely&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2062" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;H2 style="color: #333333; background-color: #ffffff; border-bottom-color: #cccccc; font-size: 20px; margin: 30px 0px 0px;"&gt;&lt;/H2&gt;&lt;DIV class="" style="color: #333333; background-color: #ffffff; font-size: 14px; margin: 10px 0px 0px;"&gt;&lt;H2 style="background-color: #ffffff; border-bottom-color: #cccccc; font-size: 20px; margin: 30px 0px 0px;"&gt;Meet the Experts&lt;/H2&gt;&lt;DIV class="" style="background-color: #ffffff; margin: 10px 0px 0px;"&gt;&lt;TABLE style="border-bottom: thin solid #6d6e71; font-size: 0.9em;"&gt;&lt;TBODY&gt;&lt;TR style="height: 21px;"&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; height: 21px;"&gt;Topic&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; height: 21px;"&gt;Speaker&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; height: 21px;"&gt;Content&lt;/TH&gt;&lt;/TR&gt;&lt;TR style="height: 63px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 63px;"&gt;How Organizations Can Gain Infrastructure Efficiency by Automating Their Network Operations&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 63px;"&gt;&lt;STRONG&gt;Rafi Zvi&lt;/STRONG&gt;&lt;BR /&gt;CEO and Co-Founder&lt;BR /&gt;BackBox&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 63px;"&gt;&lt;EM&gt;sponsor sessions&lt;/EM&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 63px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 63px;"&gt;How to Become a Firewall Automation Ninja&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 63px;"&gt;&lt;STRONG&gt;Ruvi Kitov&lt;/STRONG&gt;&lt;BR /&gt;CEO and Co-Founder&lt;BR /&gt;Tufin&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 63px;"&gt;&lt;EM&gt;sponsor sessions&lt;/EM&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 54px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;How Hackers Think - Dissecting Malware Operations&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;P&gt;&lt;STRONG&gt;Maya Horowitz&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2074" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 85px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 85px;"&gt;WannaCry Under the Microscope&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 85px;"&gt;&lt;P&gt;&lt;STRONG&gt;Yaniv Balmas&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&lt;STRONG&gt;Maya Horowitz&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 85px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2064" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 54px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;How to Build the Rule-Base of the Future&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;P&gt;&lt;STRONG&gt;Amnon Perlmutter&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2059" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 54px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;Unleashing the Power of the Cloud&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;P&gt;&lt;STRONG&gt;Erez Berkner&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2091" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 54px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;Scalable Security Platforms - Done the Right Way&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;P&gt;&lt;STRONG&gt;Benny Shlesinger&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Derek Middlemiss&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2085" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 65px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 65px;"&gt;Automation &amp;amp; Orchestration Deep Dive&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 65px;"&gt;&lt;STRONG&gt;Marco Garcia&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Ryan Darst&lt;/STRONG&gt;&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 65px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2069" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 85px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 85px;"&gt;Leveraging White &amp;amp; Black Hat Cyber Intelligence to Stay One Step Ahead&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 85px;"&gt;&lt;P&gt;&lt;STRONG&gt;Maya Horowitz&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Oded Vanunu&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 85px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2077" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 54px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;Advanced Gateway Configuration and Management&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;P&gt;&lt;STRONG&gt;Tomer Noy&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2055" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 54px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;Analyzing and Preventing Attacks from the Network to the Endpoint&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;P&gt;&lt;STRONG&gt;Lior Arzi&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 54px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2094" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 89px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 89px;"&gt;&lt;P&gt;Understanding and Blocking Advanced Mobile Attacks&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;EM&gt;Note: Due to large file size the slide deck is split&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 89px;"&gt;&lt;P&gt;&lt;STRONG&gt;Micha Burd&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;&lt;STRONG&gt;Ohad Bobrov&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 89px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2090" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;H2 style="background-color: #ffffff; border-bottom-color: #cccccc; font-size: 20px; margin: 30px 0px 0px;"&gt;Tech Rooms&lt;/H2&gt;&lt;DIV class="" style="background-color: #ffffff; margin: 10px 0px 0px;"&gt;&lt;TABLE style="border-bottom: thin solid #6d6e71; font-size: 0.9em;"&gt;&lt;TBODY&gt;&lt;TR style="height: 21px;"&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; height: 21px;" title="null"&gt;Topic&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; height: 21px;"&gt;Speaker&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px; height: 21px;"&gt;Content&lt;/TH&gt;&lt;/TR&gt;&lt;TR style="height: 56px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 56px;"&gt;99.9 Effectiveness with IPS + NSS&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 56px;"&gt;&lt;P&gt;&lt;STRONG&gt;Roman Kunicher&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Smadar Paradise&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 56px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2093" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/servlet/JiveServlet/downloadBody/2096-102-1-2610/SKO_IPS_DEMO.wmv"&gt;Video&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(WMV) - Click to Download&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 23px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;Performance - Acceleration Cards&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2082" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 23px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;Automation and Orchestration&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2069" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 23px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;Upgrade and Migrations to R80.10&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 23px;"&gt;&lt;A href="https://youtu.be/egAIQqMUOPE" rel="nofollow" style="color: #205081; text-decoration: none;"&gt;YouTube Video&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 21px;"&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 21px;"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 21px;"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px; height: 21px;"&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;H2 style="background-color: #ffffff; border-bottom-color: #cccccc; font-size: 20px; margin: 30px 0px 0px;"&gt;Pre-Conference&lt;/H2&gt;&lt;DIV class="" style="background-color: #ffffff; margin: 10px 0px 0px;"&gt;&lt;TABLE style="border-bottom: thin solid #6d6e71; font-size: 0.9em;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;"&gt;Topic&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;" title="null"&gt;Speaker&lt;/TH&gt;&lt;TH style="color: #ffffff; background-color: #e45785; border: 1px solid #dddddd; padding: 5px 10px 4px;"&gt;Content&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;Hands-On Security Management and Gateway&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;STRONG&gt;Jim Öqvist&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2073" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;Securing Clouds&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;STRONG&gt;Javier Hijas&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2086" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;Orchestration and Automation&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;P&gt;&lt;STRONG&gt;Ryan Darst&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 10px 0px 0px;"&gt;&lt;STRONG&gt;Marco Garcia&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD class="" colspan="1" style="border: none; padding: 3px 7px 2px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2068" style="color: #205081; text-decoration: none;"&gt;Presentation&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;P style="background-color: #ffffff; margin: 10px 0px 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jun 2017 13:00:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-2017-Slides/m-p/38890#M8384</guid>
      <dc:creator>Niran</dc:creator>
      <dc:date>2017-06-19T13:00:58Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 2017 Slides</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-2017-Slides/m-p/38891#M8385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great share Niran! Many thx!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Jun 2017 07:19:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-2017-Slides/m-p/38891#M8385</guid>
      <dc:creator>Hassan_Mohamed_</dc:creator>
      <dc:date>2017-06-23T07:19:54Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 2017 Slides</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-2017-Slides/m-p/38892#M8386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for sharing! I am missing the presentation of Dorit Dor. Is there a chance to add it?&lt;/P&gt;&lt;P&gt;I missed the second part of her presentation due to a face2face meeting... &lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/cry.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jun 2017 09:33:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-2017-Slides/m-p/38892#M8386</guid>
      <dc:creator>Sven_Glock</dc:creator>
      <dc:date>2017-06-30T09:33:29Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 2017 Slides</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-2017-Slides/m-p/38893#M8387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's one of those presentations you had to be there for.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jun 2017 14:04:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-2017-Slides/m-p/38893#M8387</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-06-30T14:04:49Z</dc:date>
    </item>
    <item>
      <title>Re: CPX 2017 Slides</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX-2017-Slides/m-p/38894#M8388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great stuff!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 07:48:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX-2017-Slides/m-p/38894#M8388</guid>
      <dc:creator>Daniel_Dor</dc:creator>
      <dc:date>2017-09-28T07:48:38Z</dc:date>
    </item>
  </channel>
</rss>

