<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: #CPX360 Slides 2018 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39887#M8451</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much for this. One hint: The link for "&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Mobile Security: Configuration and Policy Management Best Practices" seems to point to the wrong presentation. Maybe you could fix that. Would be very nice.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 05 Mar 2018 09:40:54 GMT</pubDate>
    <dc:creator>Oliver_Fink</dc:creator>
    <dc:date>2018-03-05T09:40:54Z</dc:date>
    <item>
      <title>#CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39876#M8440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H2 style="background: white; margin: 22.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="color: #333333; font-size: 15.0pt;"&gt;&lt;STRONG&gt;&lt;IMG __jive_id="63379" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63379_pastedImage_1.png" style="width: 1566px; height: 245px;" /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H2&gt;&lt;H2 style="background: white; margin: 22.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="color: #333333; font-size: 15.0pt;"&gt;&lt;STRONG&gt;CPX 2018 content is now available online!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H2&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;Learn more about the Future of Cyber Security, Gen V of threats and solutions&amp;nbsp;from Industry leaders, Check Point founder and CEO Gil Shwed and other Check Point experts. Explore the power of the Cloud &amp;amp; Mobile, understand advanced threats and how to block them, and master efficient security management techniques.&amp;nbsp;For exclusive access to full slide decks from each presentation, please&amp;nbsp;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-1066-getting-started-on-checkmates"&gt;&lt;SPAN style="color: #2989c5;"&gt;log into&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;your Check Point CheckMates account.&lt;/SPAN&gt;&lt;/P&gt;&lt;H2 style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 15.0pt; color: #e45785;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;&lt;H2 style="background: white; margin: 22.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 15.0pt; color: #e45785;"&gt;Cyber Talks&lt;/SPAN&gt;&lt;/H2&gt;&lt;TABLE style="margin-left: -0.75pt; border-color: transparent transparent #6d6e71; width: 1425px;"&gt;&lt;TBODY&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="border: 1pt solid #dddddd; background: #e45785; padding: 3.75pt 7.5pt 3pt; width: 132px;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Topic&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: 1pt solid #dddddd; border-right: 1pt solid #dddddd; border-bottom: 1pt solid #dddddd; border-image: initial; border-left: none; background: #e45785; padding: 3.75pt 7.5pt 3pt; width: 205px;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Speaker&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: 1pt solid #dddddd; border-right: 1pt solid #dddddd; border-bottom: 1pt solid #dddddd; border-image: initial; border-left: none; background: #e45785; padding: 3.75pt 7.5pt 3pt; width: 126px;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Content&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: 1pt solid #dddddd; border-right: 1pt solid #dddddd; border-bottom: 1pt solid #dddddd; border-image: initial; border-left: none; background: #e45785; padding: 3.75pt 7.5pt 3pt; width: 902px;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Abstract&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 132px;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;Stepping Up to GEN V of Cyber Security&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 205px;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;STRONG&gt;Gil Shwed&lt;/STRONG&gt;&lt;BR /&gt;Founder and CEO&lt;BR /&gt;Check Point Software Technologies&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 126px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2751"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: #222222; font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://pages.checkpoint.com/gil-shwed-future-cyberthreats-explained.html" style="color: #2989c5; text-decoration: underline;"&gt;Video&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 902px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;2017 has been a game changer in the world of cyber-crime, Mega-attacks have spread fast to almost every country and every industry possible – from banking, transportation to healthcare to production lines.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Moreover, regardless of all our current investments in&amp;nbsp;cyber security,&amp;nbsp;according to a recent survey conducted by Check Point, 98% of IT professional respondents have experienced a significant&amp;nbsp;cyber security&amp;nbsp;threat in past 3 years.&amp;nbsp; Are we adopting the right security strategy?&amp;nbsp;Are we&amp;nbsp;using the appropriate generation of technologies to cope with these Mega-attacks? Finally, how different will our security challenges look like in 5 years from now?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 132px;"&gt;&lt;P&gt;Protecting Check Point&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 205px;"&gt;&lt;P&gt;&lt;STRONG&gt;Sharon Schusheim&lt;/STRONG&gt;, VP, Information Systems&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 126px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2753"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6262"&gt;&lt;SPAN style="color: #222222;"&gt;Video&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 902px;"&gt;Check Point CIO Sharon Schusheim shares what keeps him up at night, the modern challenges of protecting borderless networks, and pragmatic approaches you can take to protect your network.&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 132px;"&gt;&lt;P&gt;Check Point 2018: New Technologies and Solutions&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 205px;"&gt;&lt;P&gt;&lt;STRONG&gt;Gabi Reish&lt;/STRONG&gt;, VP, Product Management and Product Marketing&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 126px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2654"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6288"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 902px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Check Point is your partner against cyber-crime. This is realized on a daily basis by thousands of Check Point customers worldwide using the most advanced cyber security technologies.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;These technologies are part of Check Point Infinity’s&amp;nbsp;cyber security&amp;nbsp;architecture&amp;nbsp;all&amp;nbsp;focused&amp;nbsp;on prevention technologies across the entire network, mobile&amp;nbsp;and&amp;nbsp;cloud. How will this architecture progress in 2018? What new technologies and capabilities will be available in 2018 to our customers? In this&amp;nbsp;session, we will highlight the top product and technology announcements to be introduced in this year’s CPX360&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 132px;"&gt;&lt;P&gt;Hacking the boardroom&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 205px;"&gt;&lt;P&gt;&lt;STRONG&gt;Edwin Doyle&lt;/STRONG&gt;, Head of Customer Engagement &amp;amp;&amp;nbsp;&lt;STRONG&gt;Neatsun Ziv&lt;/STRONG&gt;, VP, Threat Prevention&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 126px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2691"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6263"&gt;&lt;SPAN style="color: #222222;"&gt;Video&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 902px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Cybersecurity is a boardroom discussion for enterprise corporations globally.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;In this fun &amp;amp; entertaining presentation, you will learn how to approach senior executive for an effective discussion on Cybersecurity &amp;amp; how the Internet of Everything has elevated cybersecurity professionals to the most valuable resources in any company.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 132px;"&gt;&lt;P&gt;Internet of Things: Is Winter Coming?&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 205px;"&gt;&lt;P&gt;&lt;STRONG&gt;Avi Rembaum&lt;/STRONG&gt;, Vice President, Security Solutions&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 126px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2657"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6269"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 902px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;The concept of the Internet of Things (IoT) truly represents a radical shift in how companies will operate, governments will govern and individuals will live their lives.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Microcomputetechnologies and autonomous systems will permeate our day-to-day activities. They will introduce opportunities for simplification,&amp;nbsp;optimization and accuracy, and they will threaten to distribute cyber threats into the deepest levels of our shared experience. This session will provide a view into what an IoT future will look like, a summary of the cyber risks that such a future could see and present practical security considerations that enterprises can consider when planning their moves towards wide-spread IoT implementation.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="background: white; padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 132px;"&gt;&lt;P&gt;Is AI Silver Bullet in Cyber Security&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: white; padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 205px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Orli Gan&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Head of Product Management and Product Marketing, Threat Prevention&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: white; padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 126px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2672"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6290"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: white; padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 902px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Artificial Intelligence is the Industrial Revolution of our time. It is already reshaping our world and is likely to transform practically every facet of our human lives.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Fighting cybercrime is one of its many applications, but at what cost? Are AI technologies the silver bullet that the cyber-defense industry has been looking for? As of today, how mature are these technologies? What should you look for in an AI-based security product? Learn about Check Point’s unique advantages in harnessing AI technologies and how already they are built into our systems to offer superior security throughout.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="background: white; padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 132px;"&gt;&lt;P&gt;Yes, You Can Get Burned When It's Cloudy&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: white; padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 205px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Peter Sandkuijl&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Head of Security Solutions, Engineering, Europe&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #6d6e71; font-size: 10.5pt; font-family: 'Arial','sans-serif';"&gt;&lt;STRONG&gt;Don Meyer&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Arial','sans-serif'; color: #6d6e71;"&gt;, Head of Marketing, Cloud Security, Check Point&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #6d6e71; font-size: 10.5pt; font-family: 'Arial','sans-serif';"&gt;&lt;STRONG&gt;Dennis Moreau&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Arial','sans-serif'; color: #6d6e71;"&gt;, Senior Engineering Architect, Vmware&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: white; padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 126px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2680"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6270"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: white; padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 902px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Public and hybrid cloud adoption is exploding among enterprises, but so are cloud hacks and breaches. Cloud assets are at risk from the same types of threats targeting physical networks.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;What’s more, cybercriminals are using increasingly automated and sophisticated techniques to target and penetrate cloud environments. Cloud-enabled businesses need to understand where they are vulnerable and how to leverage advanced threat prevention security to keep their cloud assets protected. Join us for&amp;nbsp;a thought provoking session&amp;nbsp;to gain practical knowledge of not only the risks but also how to close your security gaps in the cloud.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="background: white; padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 132px;"&gt;&lt;P&gt;Why Our Security Problems are Getting Worse&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: white; padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 205px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Jeffrey Schwartz&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Vice President, US Engineering&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Thierry Karsenti&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, VP, SE &amp;amp; New Technology Unit, Europe&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Tony Jarvis&lt;/STRONG&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Threat Prevention Architect, AMA&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: white; padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 126px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: #222222; font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2667"&gt;Presentation&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6271"&gt;Video (Jeff)&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6272"&gt;Video (Thierry)&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: white; padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 902px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Security spending is up 8% year over year, yet security incidents are up ~40%. Why does the security “ball of yarn” continue to unravel as we pull the string.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;In this session, you will learn why our security problems continue to get worse and what we need to do about it.&amp;nbsp; How do organizations succeed in delivering “agile” to their business while increasing security effectiveness at the same time?&amp;nbsp; Evolving from traditional networking and security models one step at a time, will not empower you to deliver Change to your organization, nor will it change your security outcomes.&amp;nbsp; In this session, you’ll learn strategies and techniques to deliver better security in the areas of Cloud, Advanced Threat and Mobility.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 132px;"&gt;&lt;P&gt;This Call Is Being Monitored (Not for Quality of Service Purposes)&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 205px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Jeremy Kaye&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Head of Mobile Security&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Michael Petit&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Head of Mobility&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Michael Shaulov&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Head of Product Management and Product Marketing, Mobile and Cloud Security &amp;amp;&amp;nbsp;&lt;STRONG&gt;Pedro Pablo Pérez,&amp;nbsp;&lt;/STRONG&gt;SVP Global Security Telefónica – CEO ElevenPaths, Telefónica Cyber Security Unit&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 126px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2664"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: #222222; font-size: 11.0pt;"&gt;&lt;A href="https://community.checkpoint.com/videos/6273"&gt;Video&lt;/A&gt;‌&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;A href="https://community.checkpoint.com/videos/6341"&gt;Video with Eleven Paths&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 902px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Ever wanted to know how to hack a smartphone? Join this exciting live demo to see first-hand how easy it is.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;In this session, Jeremy Kaye and Michael Shaulov will demonstrate a live hacking of a smartphone. In the Eleven Paths version of the video, we &lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;hold a fireside chat with, Pedro Pablo Perez, the CEO of Telefonica Cyber Security, to discuss Telefonica’s strategy in the mobile security space.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 132px;"&gt;&lt;P&gt;Incident Response War Stories&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 205px;"&gt;&lt;P&gt;&lt;STRONG&gt;Daniel Wiley&lt;/STRONG&gt;, Head of Incident Response&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 126px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2684"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6274"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 902px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;The Cloud is an amazing game changer.&amp;nbsp; It provides the ability to revolutionize IR.&amp;nbsp; But it can also have a much darker side.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Join the head of the&amp;nbsp; Check Point Incident Response Team as we explore the darker side of the Cloud and provide war stories of some of the compromises and how to prevent them from happening to you.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 132px;"&gt;&lt;P&gt;Are All Security Products Created Equal?&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 205px;"&gt;&lt;P&gt;&lt;STRONG&gt;Moti Sagey&lt;/STRONG&gt;, Head of Strategic Marketing &amp;amp; Intelligence&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 126px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="http://tiny.cc/genv"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6286"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 902px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;Are All Security Products Created Equal? In his keynote, Moti will discuss in a pragmatic fact based way what it takes to build a Gen V security solution and how the cyber landscape matches the must have for effective security&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD colspan="4" style="border: 1pt solid #dddddd; background: #e45785; padding: 3.75pt 7.5pt 3pt; width: 1365px;"&gt;&lt;P&gt;&lt;SPAN style="color: white;"&gt;External Speakers&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 132px;"&gt;&lt;P&gt;Inside the Mind of a Hacker&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 205px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Pablos Holman&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 126px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-2902"&gt;Presentation&lt;/A&gt;‌&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;A href="https://community.checkpoint.com/videos/6435"&gt;Pablos Holman: Inside The Mind of a Hacker (Excerpt)&lt;/A&gt;‌&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;A href="https://pages.checkpoint.com/inside-mind-of-hacker-pablos-holman.html?utm_source=checkmates&amp;amp;utm_medium=cp-website&amp;amp;utm_campaign=cm_wr_18q2_cpx360_pablos_holman&amp;amp;utm_term=ad-cam&amp;amp;utm_content=ms-impact"&gt;Video&lt;/A&gt;&amp;nbsp;(full)&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 902px;"&gt;&lt;P&gt;Hackers are the new superheroes. They have seemingly magical powers that most people can’t comprehend. Where there are superheroes, there are also supervillains, and in the world we live in, there’s a war of escalation going on.&lt;/P&gt;&lt;P&gt;Unprecedented developments in both the complexity and scale of hacking have reformed the economic, political &amp;amp; social environment we live in. &lt;BR /&gt; &lt;BR /&gt;Pablos is a hacker with a deep understanding of these issues. He will show how the mind of a hacker works and how it can be deployed for both breaking the things we use every day and building the new technologies we need to advance into the future.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 132px;"&gt;&lt;P&gt;CISO viewpoint on modern IT&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 205px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Britney Hommertzheim&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Director, Information Security. AMC Theatres.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Gioacchino Buscemi&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Network Security Officer, European Space Agency.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 126px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2675"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6275"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2656"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6276"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 902px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;In this session, CISOs will share their vision on modern IT, the importance of compliance and security, and how they are very different.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Additionally, they will review many of the personal leanings that they have gained from their experience as a CISO responsible for maturing an Information Security program.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 132px;"&gt;&lt;P&gt;Vmware &amp;amp; Check Point - Better Together&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 205px;"&gt;&lt;P&gt;&lt;STRONG&gt;Dennis Moreau&lt;/STRONG&gt;, Security Architect Vmware (with Don Mayer)&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 126px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2680"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6280"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 902px;"&gt;&lt;P&gt;Public and hybrid cloud adoption is exploding among enterprises, but so are cloud hacks and breaches. Cloud assets are at risk from the same types of threats targeting physical networks.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 132px;"&gt;&lt;P&gt;Microsoft Azure and Check Point - Intelligent Cloud Security&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 205px;"&gt;&lt;P&gt;&lt;STRONG&gt;Avi Ben Menahem&lt;/STRONG&gt;, Director of Azure Security Microsoft&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 126px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2762"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6281"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 902px;"&gt;&lt;P&gt;In his keynote Avi will discuss what it takes to build and operate a secure cloud platform, the approach the team at Microsoft takes to secure Azure, and the importance of a strong developer and partner ecosystem to the success of cloud adoption.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P style="background: white; margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: #6d6e71;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background: white; margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: #e45785;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;H2 style="background: white; margin: 22.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 15.0pt; color: #e45785;"&gt;Architect&lt;/SPAN&gt;&lt;/H2&gt;&lt;TABLE style="margin-left: -.75pt; border-color: transparent transparent #6d6e71;"&gt;&lt;TBODY&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="border: solid #DDDDDD 1.0pt; background: #E45785; padding: 3.75pt 7.5pt 3.0pt 7.5pt;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Topic&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: solid #DDDDDD 1.0pt; border-left: none; background: #E45785; padding: 3.75pt 7.5pt 3.0pt 7.5pt;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Speaker&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: solid #DDDDDD 1.0pt; border-left: none; background: #E45785; padding: 3.75pt 7.5pt 3.0pt 7.5pt;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Content&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: solid #DDDDDD 1.0pt; border-left: none; background: #E45785; padding: 3.75pt 7.5pt 3.0pt 7.5pt;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Abstract&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;Architecting&amp;nbsp; Consolidated Security with Infinity&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Jeffrey Schwartz&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Vice President, US Engineering&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Gary Gardiner&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Head of Security Engineering, AMA &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Noam Green,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;Head of Product Management and Product Marketing, Security Platforms&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2759"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6320"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Presenting The Good, The Bad and The Ugly. Where does your company’s architecture fit?&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Learn how to build the best Infinity architecture and chime into a live interview listening to those who have transformed Ugly into Good.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Who’s responsible for your cloud security? - lessons learned&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Richard Crane&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Head of Cloud Security Sales, Americas&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Guy Rosenthal&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Product Manager&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Stephan Fritsche,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;Cloud Security Expert&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2752"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6315"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;A full breakdown of what is shared responsibility and the layers of security needed to protect you from security breaches in the cloud.&amp;nbsp;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Hear about the advanced protection and automated security Check Point vSEC offers.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P&gt;The Mobile Threat Landscape&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Ricardo Panez&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Head of Mobile Threat Prevention, Americas&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Michael Petit&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Head of Mobility&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Frederic Dru,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;Head of Mobile Security Sales Europe&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P&gt;&amp;nbsp;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2727" style="color: #2989c5; text-decoration: none;"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6313"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;From Judy to Blueborne, the proliferation of mobile threats has grown rapidly in the past year.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;In this session, we review the various types of mobile threats, how they spread and the damage they cause. We will also be providing practical explanations as to how to reduce the risk of infection from these threats.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P&gt;Healthcare Security - Challenges and effective approaches&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Yariv Fishman&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Product Manager&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Aviv Abramovich&lt;/STRONG&gt;,&amp;nbsp;&lt;SPAN&gt;Product Manager&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2712"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6298"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;During recent years we have witnessed countless cyber-attacks on the healthcare environment.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;While some attacks may cause the loss of patients data others may cause real harm to the patients themselves.&amp;nbsp; Join our session to learn why hackers are particularly fund of healthcare and what can be done to mitigate those attacks.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P&gt;Securing SaaS Applications -&amp;nbsp; the Pragmatic Approach&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Yoav Shay Daniely&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Principal Product Manager&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2728" style="color: #2989c5; text-decoration: none;"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;The use of cloud services in modern day businesses is on the rise.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Cloud application and Software as a Service product– ‘SaaS’, are becoming increasingly prominent as organizations are looking to deliver business applications at the fraction of cost and time while providing new targets for cybercriminals. Join our session to learn more about real-life SaaS security breaches and how to prevent the next attack on your organization.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P&gt;IoT &amp;amp; Industrial Cyber attacks -Myth or Reality?&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Yariv Fishman&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Product Manager&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Mati&amp;nbsp;Epstein -&amp;nbsp;Lead Sales Manager, Critical Infrastructure &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2713"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6300"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;There is a lot of hype around how IoT will be able to change our lives, make us smarter, more efficient and more connected than ever.&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;On the other end some site the potential danger this revolution will bring assuming IoT will&amp;nbsp;not be architected with cyber security in mind. Join our session to evaluate if IoT and Industrial attacks are myth or reality and where Check Point is focusing its efforts as to mitigate those potential attacks.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P&gt;Advanced Threat Prevention at wire speed&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Mark Ostrowski&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Regional Director Security Engineering, Eastern&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Ashwin Ram&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Security Engineer&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Peter Sandkuijl,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;Head of Security Solutions, Engineering, Europe&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2716"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt 5.25pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Implementing advanced Threat Prevention in fast-paced network environments has different aspects such as the need to inspect encrypted traffic and to scale-up our security solution when the dynamic of our business demands it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;In&amp;nbsp;this session we&amp;nbsp;will go over the challenges we are seeing for 2018 in this regard and introduce you to the way Check Point’s new acceleration cards will help you run the most sophisticated protections without compromising performance.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P style="background: white; margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="color: #6d6e71; font-size: 10.5pt;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;H2 style="background: white; margin: 22.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 15.0pt; color: #e45785;"&gt;Prevent&lt;/SPAN&gt;&lt;/H2&gt;&lt;TABLE style="margin-left: -0.75pt; border-color: transparent transparent #6d6e71; width: 1424px;"&gt;&lt;TBODY&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="border: 1pt solid #dddddd; background: #e45785; padding: 3.75pt 7.5pt 3pt; width: 172px;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Topic&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: 1pt solid #dddddd; border-right: 1pt solid #dddddd; border-bottom: 1pt solid #dddddd; border-image: initial; border-left: none; background: #e45785; padding: 3.75pt 7.5pt 3pt; width: 213px;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Speaker&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: 1pt solid #dddddd; border-right: 1pt solid #dddddd; border-bottom: 1pt solid #dddddd; border-image: initial; border-left: none; background: #e45785; padding: 3.75pt 7.5pt 3pt; width: 85px;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Content&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: 1pt solid #dddddd; border-right: 1pt solid #dddddd; border-bottom: 1pt solid #dddddd; border-image: initial; border-left: none; background: #e45785; padding: 3.75pt 7.5pt 3pt; width: 895px;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Abstract&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 172px;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;Latest Innovations in Cyber Defense&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 213px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Richard Comber&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Head of Threat Prevention Engineering, Americas&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Lior Arzi,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;Director, End Point Cyber Security&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Ofir Israel,&amp;nbsp;&lt;/STRONG&gt;Group Manager Threat Prevention Frameworks&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 85px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2686"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6302"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 895px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;In this session, we are going to see and use the latest protections from SandBlast Network and SandBlast Agent against the recent strains of malware and security risks from 2017.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 172px;"&gt;&lt;P&gt;Adaptive Security that&amp;nbsp; drives innovation in the cloud&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 213px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Greg Pepper&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Head of Data Center Virtualization and Cloud Security Architects, Americas&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Akhil Behl&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Cloud Security Engineer;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Itai Greenberg,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;Head of Cloud Security&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 85px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2679"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 895px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Business are gaining tremendous agility moving to the cloud, and security is more relevant than ever.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;See how Check Point delivers adaptive security to keep your business focused on innovating and remain secure.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 172px;"&gt;&lt;P&gt;Game of pwns - Emerging threats &amp;amp; cyber security trends&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 213px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Gad Naveh&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Advanced Threat Prevention Evangelist&amp;nbsp;&amp;amp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Tal Eisner&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Product Marketing Manager&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 85px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2718"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 895px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;2017 was the year of state-sponsored cyberwars.&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;The recent NotPetya attack served as a turning point in which attackers began using cyber-based tools as weapons of massive destruction, creating extensive damages and an overwhelming global impact. In a “Game of Thrones” themed session, we will review some of these trends and learn what the upcoming&amp;nbsp;cyber security&amp;nbsp;predictions. Winter is coming. Are you armed with the right coat?&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 172px;"&gt;&lt;P&gt;360° Attack Prevention&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 213px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Steve Johnson&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Head of Advanced Threat Prevention, Americas&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Evan Dumas&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Threat Prevention Sales Leader&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Nathan Shuchami,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;VP, Emerging Products&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 85px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2711"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 895px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;2017 was a turning point in the cyber threat landscape. The amount of threats and their sophistication increased dramatically and a new wave of mega attacks crippled organizations globally.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Join us to learn of Check Point’s comprehensive 360° Attack Prevention approach: Reducing the attack surface, screening&amp;nbsp;known&amp;nbsp;attacks, simulating unknown attacks and intercepting threats at runtime, all using Check Point’s innovative SandBlast advanced threat prevention suite.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 172px;"&gt;&lt;P&gt;Preventing attacks on mobile devices&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 213px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Scot Kight&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Regional Expert, Mobility &amp;amp;&amp;nbsp;&lt;STRONG&gt;Ran Schwartz&lt;/STRONG&gt;, Product Manager&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Dan Tan&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Mobility Channel Manager&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Anthony Fox,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;Mobile Security Expert&amp;nbsp;&amp;amp;&amp;nbsp;&lt;STRONG&gt;Ran Schwartz,&lt;/STRONG&gt;Product Manager&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 85px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2722"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 895px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Mobile Malware will account for 1/3 of all malware by 2019.&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Learn about the latest Mobile threats and how damaging they&amp;nbsp;are for your&amp;nbsp;business. See how SandBlast Mobile protects against these threats with a live demonstration. Listen to what we’ve done in 2017 and how we’re expanding our solution in 2018.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 172px;"&gt;&lt;P&gt;Cyber Academy Awards 2017 – Leading Trends in the Threat Landscape&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 213px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Lotem Finkelsteen&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Team Leader Threat Intelligence&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Maya Horowitz&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Group manager Threat Intelligence&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 85px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2689"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 895px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Each January, the hacker community and cyber fans around the world turn their attention to the Cyber Academy Awards, also known as the Oscars.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;In this glamorous ceremony, we will learn who will receive the highest honors in hacking as we announce this year’s best threat actor, best short-campaign, best foreign language attack and others.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 172px;"&gt;&lt;P&gt;Recommendations for Data Security and GDPR&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 213px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Noa Katz&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Product Marketing Manager&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Sunny Gil,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;Security Expert Europe&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 85px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2660"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6317"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 895px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Coming into effect in May 2018, the European Union’s General Data Protection Regulation (‘GDPR’) poses the biggest change to the regulatory landscape of data protection and privacy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;While data privacy is the core of GDPR, very little is shared on how to secure it and the technical implications associated with it. Join us to learn how to establish a GDPR aware network and how you can be proactive in your GDPR efforts. We will discuss:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="margin: 0in; margin-bottom: .0001pt;"&gt;What does a data security approach for GDPR look like?&lt;/LI&gt;&lt;LI style="margin: 0in; margin-bottom: .0001pt;"&gt;A GDPR aware network: Where to start?&lt;/LI&gt;&lt;LI style="margin: 0in; margin-bottom: .0001pt;"&gt;Fundamental security controls and a risk-based approach&lt;/LI&gt;&lt;LI style="margin: 0in; margin-bottom: .0001pt;"&gt;Being proactive in your GDPR journey&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 172px;"&gt;&lt;P&gt;SMB Security - Unique Challenges &amp;amp; Effective Approaches&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 213px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Aviv Abramovich&lt;/STRONG&gt;, Principal Product Manager&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 85px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2747"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6430"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 895px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: #111111; background-color: #ffffff; font-size: 14px;"&gt;The Small and Medium Business market has the same security challenges as larger enterprises. What they don't have a lot of is time or money.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P style="background: white; margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: #e45785;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;H2 style="background: white; margin: 22.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 15.0pt; color: #e45785;"&gt;Manage&lt;/SPAN&gt;&lt;/H2&gt;&lt;TABLE style="margin-left: -0.75pt; border-color: transparent transparent #6d6e71; width: 1326px;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="border: 1pt solid #dddddd; background-color: #e45785; padding: 3.75pt 7.5pt 3pt; width: 91px;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Topic&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: 1pt solid #dddddd; border-right: 1pt solid #dddddd; border-bottom: 1pt solid #dddddd; border-left-style: none; background-color: #e45785; padding: 3.75pt 7.5pt 3pt; width: 142px;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Speaker&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: 1pt solid #dddddd; border-right: 1pt solid #dddddd; border-bottom: 1pt solid #dddddd; border-left-style: none; background-color: #e45785; padding: 3.75pt 7.5pt 3pt; width: 85px;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Content&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: 1pt solid #dddddd; border-right: 1pt solid #dddddd; border-bottom: 1pt solid #dddddd; border-left-style: none; background-color: #e45785; padding: 3.75pt 7.5pt 3pt; width: 948px;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Abstract&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 91px;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;Infinity - A Day in the Life of a Security Administrator&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 142px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;John Bloomer&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Security Engineering Manager, Midwest Area&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Gary Gardiner&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Head of Security Engineering, AMA&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Peter Sandkuijl,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;Head of Security Solutions, Engineering, Europe&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 85px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2719"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6299"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 948px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Having worked with access control as a basic security level for over 20 years, the speakers reminisce about how much better it was in the past.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;But hang on! It wasn’t! In the session the old gets compared to the new just to show that life was not always better in the past and despite the fact the world is in turmoil, the administrator of today indeed &lt;EM&gt;has&lt;/EM&gt; a better life and can spend time on chores that matter rather than punching in new objects and rules all day long. Want to find out how he deals with change requests, shrinking budgets and new challenges such as cloud and SDN? Join this session.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 91px;"&gt;&lt;P&gt;Centralized security management across the enterprise&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 142px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Gil Gabay,&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Product Manager&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Nuno Sousa,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;Security Engineering Manager, East Strategic&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Clement Lee&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, AMA Solution Architect&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 85px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2760"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6292"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 948px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Managing security means having to deal with multiple point solutions.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;This is not only a challenge from an operations/TCO perspective, but also from a security standpoint (point solutions versus a consolidated approach will create security holes). Given the rapid rate change of networks/technology/devices/Number of Objects, scaling is an additional challenge.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 91px;"&gt;&lt;P&gt;Learn from the masters: Maximize the value of your Threat Prevention&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 142px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Chris Morris&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Regional Expert, Threat Prevention &amp;amp;&amp;nbsp;&lt;STRONG&gt;Yossi Hasson&lt;/STRONG&gt;, Product Manager&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Tony Jarvis&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Threat Prevention Architect, AMA &amp;amp;&amp;nbsp;&lt;STRONG&gt;Eytan Segal,&lt;/STRONG&gt;&amp;nbsp;Principal Product Manager&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Christian Sandberg&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Head of Threat Prevention Engineering, Europe &amp;amp;&amp;nbsp;&lt;STRONG&gt;Eytan Segal,&lt;/STRONG&gt;&amp;nbsp;Principal Product Manager&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 85px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2720"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6307"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 948px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Would you like to use SandBlast like a cyber Jedi?&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Find out how to achieve the best possible prevention and visibility utilizing the full power of SandBlast’s cutting-edge cyber technologies. Learn from our top experts' cool tricks and best practices for implementing SandBlast in your organization.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 91px;"&gt;&lt;P&gt;Orchestrating Gateway Operations&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 142px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Daniel Colwell&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Security Engineering Manager&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Amit Schnitzer&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Data Center Security Expert&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Derek Middlemiss,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;Security Experts, team Leader&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 85px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2715"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6306"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 948px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;In this session, we will take you through some of the operations that are performed on gateways that are not the typical rule base changes.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Topics are “how to best stay up to date” and “how to quickly provision a new gateway with all initial settings configured”. Finally the topic of “how to deal with large volumes of gateways” will be discussed. The challenges addressed in this session are the workflow around deploying a new gateway. Having to run initial binary install, first-time wizard, setting routing, setting secure internal communication. This used to require a well-trained person to go onsite and deploy. Derek will explain how to optimize and streamline this process making people aware of latest tools and technologies and highlight the best practices surrounding the gateway operations topic.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 91px;"&gt;&lt;P&gt;Automating the Rule-Base&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 142px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Marco Garcia&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Director of Engineering, Global SI &amp;amp; MSP&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Nils Schaefer&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Cloud Security Architect&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 85px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2714"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6323"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 948px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;From beginning to scripting, learn how to get started and automate common tasks in the rule base using R80.10 and common scripting/orchestration tools.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Get the tools needed and learn some orchestration tips from Check Point's automation experts&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 91px;"&gt;&lt;P&gt;Cloud Security Architecture Blueprint&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 142px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Greg Pepper&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Head of Data Center Virtualization and Cloud Security Architects, Americas&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Amit Schnitzer&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Data Center Security Expert&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Javier Hijas,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;Cloud Security Team Leader, Europe&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 85px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2678"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6310"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 948px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Discover the Check Point recommended blueprint for multi-cloud security.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Take a deep dive on perimeter security, east-west security,&amp;nbsp; connected clouds, auto-scale, and auto-provision.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 91px;"&gt;&lt;P&gt;Mobile Security: Configuration and Policy Management Best Practices&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 142px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Bobby Buggs&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Regional Expert, Mobility&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Denis Satria&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Mobile Security Engineer&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Phillip Woon,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;Mobile Security Expert&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 85px;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2763"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6305"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 948px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;What is your mobility policy? Have you ever considered the impact of your mobility policy on your organization? On your employees?&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Whether it is BYOD, CYOD or corporate owned, traditional mobile management will not cover the security aspect.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Objectives:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Threats on mobile devices&lt;/LI&gt;&lt;LI&gt;BYOD Vs. CYOD considerations&lt;/LI&gt;&lt;LI&gt;Recorded and live demo of the SideStepper attack&lt;/LI&gt;&lt;LI&gt;Live demo of how this attack is mitigated 3 times (SMS, Network, App) if this device was protected with SBM&lt;/LI&gt;&lt;LI&gt;Discuss and show the security integration with EMM (Tagging)&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 91px;"&gt;&lt;P&gt;Google Cloud &amp;amp; Check Point Cloudguard - Better Together&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 142px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Vineet Bhan&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Google - Head of Security Partnerships&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Radhika Mitra&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;, Check Point – Go To Market &amp;amp; Strategic Alliances&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 85px;"&gt;&lt;P&gt;&amp;nbsp;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2748"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit; width: 948px;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;It’s no secret that the dynamic benefits of cloud can transform businesses, but how are companies getting started and ensuring they are protecting their data in the public cloud? In this session we break down the characteristics and traits of businesses that are successfully securing their workloads and growing their business agility with Google Cloud and Check Point.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P style="background: white; margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="color: #6d6e71; font-size: 10.5pt;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;H2 style="background: white; margin: 22.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 15.0pt; color: #e45785;"&gt;CheckMates Community Use-Cases&lt;/SPAN&gt;&lt;/H2&gt;&lt;TABLE style="margin-left: -0.75pt; border-color: transparent transparent #6d6e71;"&gt;&lt;TBODY&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="border: 1pt solid #dddddd; background-color: #e45785; padding: 3.75pt 7.5pt 3pt;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Topic&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: 1pt solid #dddddd; border-right: 1pt solid #dddddd; border-bottom: 1pt solid #dddddd; border-left-style: none; background-color: #e45785; padding: 3.75pt 7.5pt 3pt;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Speaker&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: 1pt solid #dddddd; border-right: 1pt solid #dddddd; border-bottom: 1pt solid #dddddd; border-left-style: none; background-color: #e45785; padding: 3.75pt 7.5pt 3pt;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Content&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: 1pt solid #dddddd; border-right: 1pt solid #dddddd; border-bottom: 1pt solid #dddddd; border-left-style: none; background-color: #e45785; padding: 3.75pt 7.5pt 3pt;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;&lt;SPAN style="color: white;"&gt;Abstract&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin-bottom: 1.5pt;"&gt;vSEC on AWS cloud use case and best practices&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Aaron Mckeown&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-2729"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6322"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Moving computing resources and data to public clouds means security responsibilities become shared between you and your cloud provider.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;While infrastructure protection is delivered by the provider, customers are responsible for protecting anything they place in the cloud. Join this informative session to learn how Check Point worked with AWS to deliver a security solution for customers looking to extend advanced protections to their cloud-based workloads. In this session, we discuss how Check Point, member of the APN Partners and AWS Competency Program, complements AWS cloud security controls to enable you to easily and seamlessly secure your assets in the cloud with elastic scalability and high availability. Gain practical knowledge from best practices on deploying advanced security that fits the dynamic and automated nature of public and hybrid cloud environments.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Enterprise Security in the Cloud – The Benefits of Infrastructure as Code&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;DJ Schleen &amp;amp;&lt;BR /&gt;Michael Trofi&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2693"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt; color: #0066cc;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Infrastructure as Code presents an unprecedented opportunity for organizations to increase their Security posture and reduce overall risk to their business.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;When adopting a strategy of coded infrastructure these organizations can react rapidly to external threats, continuously monitor their compliance goals, and extend their traditional security programs seamlessly into the cloud.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Check Point R80.X WORKFLOW, API and AUTOMATION USE CASES&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Ekta Siwani&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2694"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6309"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Spearheaded and developed a portal to orchestrate the workflow from raising the request to final implementation.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;The REST API provided by R80.x has been used to automate the Admin work.&amp;nbsp;User&amp;nbsp;will raise a request from simple GUI on this portal. After submitting the request, the manager will allow or reject the request. Once approved, Firewall Admin will implement the rule. This portal allows L1 engineer (with limited skills) to create rules leveraging automation facilitated by R80 API and L3 engineer can now dedicate their time to critical security issues. This will reduce time, effort and human error&amp;nbsp;to&amp;nbsp;great&amp;nbsp;extent and also helps to optimize&amp;nbsp;number&amp;nbsp;of rules in&amp;nbsp;rule&amp;nbsp;base and increase performance at the same time.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Building your very own Check Point “playground&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Eric Anderson&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2676"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;How to leverage standard tools to create a live environment where you can safely play, experiment, test, and learn with Check Point products&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;More Security is Less Security Or How HTTPS Blinds Security Architectures&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Eric Crutchlow&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2721"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;The Internet has significantly changed to HTTPS usage making any NGFW, sandboxing, or other inspection technologies blind to emerging threat&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;From mischief to cyber warfare: the connections most people missed&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Eward Driehuis&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2695"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Over a decade, hackers became hardened criminals, servicing fraudsters, spies, and nation states. These are the stories connecting them&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;SmartAdvisor Your automated trusted advisor&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Gil Israeli&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2723"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Cyber threat is real. Given the growing number of cyber-attacks and security breaches, the need for security becomes more and more important.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Security threats are a matter of when it will happen, not if. This means we need to act quickly and efficiently. We need to develop a sophisticated approach to face this real and persistent threat of cybercrime. Check Point’s&amp;nbsp;SmartAdvisor&amp;nbsp;takes the lead in assisting you, to protect your environment from these ever-real security challenges.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Deploying Check Point SandBlast Agent from Proof of Concept to Production&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Joe Sullivan&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2692"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;During this presentation, I will cover my initial assessment of Checkpoint Endpoint, the tests I performed, and what I learned when it came time to deploy Endpoint in a production environment.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Security Infrastructure as Code&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Kellman Meghu&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2765"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Abstraction in cloud architecture can feel disconnected, for this session we will take a look at a very low-level toolkit based entirely on open source, that let's us manipulate and manage security policy at a whole new level.&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Rather then slides, we will show a live version of these tools, wrapped in containers.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;A new life with R80.10- My Journey&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Kim Moberg &amp;amp; Niels Poulsen&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2671"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;How Eurowind Energy A/S got new life and visibility with Check Point R80.10&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Cyber Race: Hacking The Giants&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Oded Vanunu&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2690"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;The hunt for the hackers has begun, but who is going to win - the good guys or the bad guys?&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Cybercrime continues to make the cyber landscape ever more aggressive. It is no longer the small online platforms, but rather the giant mass-use platforms that are now being targeted. The aim is to serve malicious content to hundreds of millions of users in order to increase profits for cybercriminals.&amp;nbsp; In the last 12 months, Check Point’s Security Research Team has revealed significant security flaws on these giant mass-use platforms such as WhatsApp, Facebook, Windows 10, Kodi open source, LG Smart Home and Android development platforms. In the session, I will be diving into these researchers and share our experience on what cyber-crime looks like today and demo the hacking methods being used.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Artificial Intelligence in Managed Incident Response&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Ramandeep Singh Walia&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2703"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6321"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;The presentation is focused on the Managed Incident Response 5.(MIR) and it will be based on the case studies of our two award-winning** customer projects, ITC and GSTN.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;We have successfully executed &amp;amp; extended the Check Point Sandblast Solution to this storyline of Managed Incident Response (much before Cisco launched their solution of MDR) by integrating Check Point solutions with our in-house (QOSTechnology’s Intellectual Property) Machine Learning based platform.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Adaptive Security Framework for Internet of Drones&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Rohan Patil&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2670"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6318"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Internet of Drones is an architecture designed for providing coordinated access to controlled airspace for Unmanned aerial vehicles (UAVs).&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;UAVs can operate autonomously or remotely&amp;nbsp;bypilotat&amp;nbsp;the Ground Control Station (GCS). UAVs are being utilized in Geo Mapping, Surveillance, Inspections, Un-manned Explorations, Aerial Photography, Crop monitoring, Disaster management etc. Many business models such as Drone Operation Center (DOC), Drone Surveillance Unit (DSU), Autonomous Drones Systems (ADS) are emerging. The drone ecosystem is not limited to the aircraft or the GCS but moved across to Cloud and Cloud Command &amp;amp; Control Stations (C-CCS). Already there are several drone attacks and demonstrations of drone hacking, the current drone systems lack critical security functions. In this paper, we present our new “Adaptive Security Framework” taking into consideration the UAV ecosystems (Infrastructure, Network Communications, Applications and Operations) which utilizes the unique layered approach towards building better defense strategy and architecture to safeguard the UAS (Unmanned Aerial Systems) from cyber-attacks and making it safer for the Internet of Drones &amp;amp; the UAS Industry.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;An Infinity Case Study: The Mississippi Secretary of State Experience&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Russell Walker&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2705"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;The Check Point Infinity Architecture is defined as complete threat prevention, threat intelligence sharing, and consolidated security management for an efficient security operation.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Essentially, an Infinity Architecture is a combination of advanced threat prevention capabilities found in the SandBlast family of solutions, preferably in more than one vector, combined with Check Point’s Next Generation Security Management Platform, R80.&amp;nbsp; The Mississippi Secretary of State has been using just such a combination of modules – SandBlast Network Security, SandBlast Agent, SandBlast Mobile and r80- for more than a year now. IN this session their CTO, Russell Walker, will share his year +long experience with this architecture.&amp;nbsp;&amp;nbsp; The talk will start at the beginning with organizational considerations and legacy issues that help shape goals for the new infrastructure. Then, you will follow the agency’s journey through deployment and even learn how they avoided a ransomware attack just two days after deployment! Russell will walk you through each of the SandBlast components and how they are preventing threats at the agency and making his life easier. Finally, you will get a peek into the visibility and ease of management R80 has brought to the agency. Attend and learn the agency’s best practices and get the scoop straight from an actual user.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Best of CheckMates: My Top Check Point CLI Commands&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/41625"&gt;Tim Hall&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/2075"&gt;Dameon Welch Abernathy&lt;/A&gt;‌&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;SPAN style="color: #222222;"&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-2739"&gt;Presentation&lt;/A&gt;&amp;nbsp;‌&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6291"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;This presentation will highlight the most useful Check Point CLI commands submitted via CheckMates by real users just like you!&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Use cases, examples and case studies will be presented for the top CLI commands from the CheckMates thread &lt;A href="https://community.checkpoint.com/message/6843"&gt;My Top 3 Check Point CLI commands&lt;/A&gt;‌&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;The Evolution of Cyber Defense Capabilities in Parliaments – a case study&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Tomer Nuri &amp;amp; Aviv Fried&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2706"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;The Evolution of Cyber Defense Capabilities in the Israeli Parliament, Powered by Check Point Next-Generation Technologies.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Cloud Security best practices for Amazon VPC&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Valeri Loukine&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2677"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Check Point vSEC perimeter security with Amazon VPC&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;VPC Micro-segmentation and breach detection set-up with GuardiCore Centra&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 7.5pt 0in .0001pt 0in;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Integration of Centra with Check Point vSEC&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Use Case - Securing SaaS in the Pharma industry&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Amir Shay, CISO / Neopharm Group&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2673"&gt;&lt;SPAN style="color: #222222;"&gt;Presentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Cloud apps (SaaS) helped Neopharm gain business agility and assisted in simplifying our IT operations.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Adopting cloud apps also introduced security challenges which we had to immediately address.&lt;BR /&gt;Amir will share Neopharm’s journey into a secure, responsible cloud transformation.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border-color: inherit; border-width: inherit;"&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;L’Oréal vSEC Case Study&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;Jay Togarrati Infrastructure Manager, L’Oréal&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2761"&gt;Presentation&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6303"&gt;Video&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 2.25pt 5.25pt 1.5pt; font-size: inherit;"&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;As one of the world’s leading beauty brands, the L'Oréal group has spent the last century in the pursuit of perfection.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;One of the largest transformations is cloud adoption and globally we have chosen VWWare NSX as our Software-Defined solution. While in AsiaPacific, we are the first who chose to couple Check Point virtual security with NSX micro-segmentation for advanced protection of east-west data center traffic,&amp;nbsp;providing us full stack of&amp;nbsp;protection from Layer 3 to Layer 7. Our cloud services ranged from private to Microsoft Azure to Amazon Web Services, resulting in a complex environment. vSec’s ability to extend itself across the hybrid cloud environments, while allowing us to manage it seamlessly from a single pane of glass, helped us to ensure that existing resources are being used effectively. In the next phase to combat against Advanced Persistence Threats, we have also invited Check Point to be part of our evaluation due to its sophisticated breach detection result that it has demonstrated. It is the security strategy that Check Point can provide that we have decided to embark this journey with them in our long term IT security roadmap.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2018 07:22:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39876#M8440</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-03-01T07:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39877#M8441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will video of&amp;nbsp;all&amp;nbsp;presentations be released? One of the slides I am interested in is 16 pages with nothing but diagrams. Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2018 17:19:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39877#M8441</guid>
      <dc:creator>Ryan_St__Germai</dc:creator>
      <dc:date>2018-03-01T17:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39878#M8442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Really Nice Information. Got all the information without attending CPX.&lt;/P&gt;&lt;P&gt;Great Work Dameon..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2018 17:54:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39878#M8442</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-03-01T17:54:34Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39879#M8443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very&amp;nbsp;good Dameon, Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2018 18:01:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39879#M8443</guid>
      <dc:creator>Fabio_Souza</dc:creator>
      <dc:date>2018-03-01T18:01:28Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39880#M8444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Sharing !!&amp;nbsp;&lt;/P&gt;&lt;P&gt;Very well documented !!&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2018 18:43:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39880#M8444</guid>
      <dc:creator>Santhosh_V</dc:creator>
      <dc:date>2018-03-01T18:43:47Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39881#M8445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wondeful! Now I regret spending so much time photographing slides instead of listening &lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/silly.png" /&gt;&lt;/P&gt;&lt;P&gt;Lots of good read!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2018 21:56:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39881#M8445</guid>
      <dc:creator>Ilmo_Anttonen</dc:creator>
      <dc:date>2018-03-01T21:56:46Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39882#M8446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not every session was recorded with video.&lt;/P&gt;&lt;P&gt;That said not everything we've recorded with video has been posted yet.&lt;/P&gt;&lt;P&gt;Which session are you interested in seeing a video of?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2018 22:29:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39882#M8446</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-03-01T22:29:19Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39883#M8447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To be fair, it was not all my handiwork, but rather the work of &lt;A href="https://community.checkpoint.com/migrated-users/54223"&gt;https://community.checkpoint.com/people/danak8b0c6163-e65c-4659-a8c5-b3e4f688a678&lt;/A&gt;‌ and &lt;A href="https://community.checkpoint.com/migrated-users/43178"&gt;https://community.checkpoint.com/people/niran71bbac03-1f73-491c-a8d7-a46f6c168c25&lt;/A&gt;‌, who I'm sure will appreciate the positive kudos.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2018 22:31:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39883#M8447</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-03-01T22:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39884#M8448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;how to win every POC -&amp;nbsp; where is this presentation?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2018 04:17:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39884#M8448</guid>
      <dc:creator>batmunkh_unubuk</dc:creator>
      <dc:date>2018-03-05T04:17:03Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39885#M8449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I suspect since that presentation was more of an internal/partner presentation that it won't be provided on CheckMates.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2018 06:02:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39885#M8449</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-03-05T06:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39886#M8450</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;how can i get this presentation? who can send to me? thanks&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2018 06:09:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39886#M8450</guid>
      <dc:creator>batmunkh_unubuk</dc:creator>
      <dc:date>2018-03-05T06:09:11Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39887#M8451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much for this. One hint: The link for "&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Mobile Security: Configuration and Policy Management Best Practices" seems to point to the wrong presentation. Maybe you could fix that. Would be very nice.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2018 09:40:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39887#M8451</guid>
      <dc:creator>Oliver_Fink</dc:creator>
      <dc:date>2018-03-05T09:40:54Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39888#M8452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;any idea if the session by Pablos Holman (inside the mind of a hacker) was recorded &amp;amp; is to be made available?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2018 11:49:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39888#M8452</guid>
      <dc:creator>Martin_Webster</dc:creator>
      <dc:date>2018-03-05T11:49:57Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39889#M8453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have a few other updates to this list forthcoming.&lt;/P&gt;&lt;P&gt;Will check that one specifically, thanks for letting us know.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2018 14:09:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39889#M8453</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-03-05T14:09:16Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39890#M8454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks so much. Nice documents.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2018 20:00:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39890#M8454</guid>
      <dc:creator>EdesLC</dc:creator>
      <dc:date>2018-03-05T20:00:57Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39891#M8455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe this is one of the presentations "you had to be there" for.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2018 23:38:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39891#M8455</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-03-05T23:38:56Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39892#M8456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was there &amp;amp; enjoyed the session - it was in my view the best presentation at CPX.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the presentation is ever made available I'd recommend it to anyone who wasn't lucky enough to see Pablos in the flesh.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Mar 2018 09:49:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39892#M8456</guid>
      <dc:creator>Martin_Webster</dc:creator>
      <dc:date>2018-03-06T09:49:49Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39893#M8457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is the preso from Dr. Dor available?&amp;nbsp; I didn't see it in the list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2018 03:40:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39893#M8457</guid>
      <dc:creator>John_Linkowsky</dc:creator>
      <dc:date>2018-03-28T03:40:10Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39894#M8458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That was another presentation "you had to be there for."&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2018 05:26:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39894#M8458</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-03-28T05:26:55Z</dc:date>
    </item>
    <item>
      <title>Re: #CPX360 Slides 2018</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39895#M8459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Apr 2018 08:16:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CPX360-Slides-2018/m-p/39895#M8459</guid>
      <dc:creator>Ukko_Metsola</dc:creator>
      <dc:date>2018-04-08T08:16:07Z</dc:date>
    </item>
  </channel>
</rss>

