- Products
- Learn
- Local User Groups
- Partners
-
More
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
IDC Spotlight -
Uplevel The SOC
Important! R80 and R80.10
End Of Support around the corner (May 2021)
Learn more about the Future of Cyber Security and Check Point Infinity from Check Point founder and CEO Gil Shwed and other Check Point experts. Explore the power of the Cloud & Mobile, understand advanced threats and how to block them, and master efficient security management techniques. For exclusive access to full slide decks from each presentation, please log into your Check Point CheckMates account.
Topic | Speaker | Content | Abstract | |
---|---|---|---|---|
Welcome to the Future of Cyber Security | Gil Shwed Founder and CEO Check Point Software Technologies | We are all living in a connected world which is affecting every aspect of our lives. In the past couple of years, we have been discussing implications of a technology and digital-driven world (i.e.) cloud, mobile, advanced threats. Today, we are seeing some of our worst predictions shaping into real life. So why are businesses not protecting themselves and instead keep making excuses? In today’s world, business need security that meet their business needs. Gil Shwed's discussion defines the pillars of security that businesses should adopt, based on their actual business needs. | ||
Gil Shwed & Marius Nacht Interview @ 2017 CPX Milan | Gil Shwed Marius Nacht Co-Founder and Chairman | View YouTube | Gil Shwed & Marius Nacht Interview @ 2017 CPX Milan | |
Cyber Security in the Era of Exponential Technology | Amnon Bar-Lev President Check Point Software Technologies | We are in an extraordinary time in human history. Thanks to innovative and disruptive technologies we live longer, healthier and more educated than ever before. While technologies such as cloud computing, mobile and Internet of Things open up new opportunities, they are, in many cases, the biggest barriers for adoption due to cyber security concerns. How do you innovate, inspire and compete while remaining secure? In his inspiring session, Amnon Bar-Lev shares the Check Point vision on how organizations can keep focus on innovating while being secured with a security architecture that is one step ahead. | ||
Seeing is Believing: Hacking the Smartphone | Michael Shaulov Head of Product Management and Product Marketing, Mobile Check Point Software Technologies | Join this exciting live demo to see first-hand how easy it is to hack any smartphone today. In this session Michael Shaulov will demonstrate live hacking of a smartphone, the risks and possible mitigations for the new Achilles heel of enterprises today and tomorrow. | ||
Surviving the Ransomware Plague | Orli Gan Head of Products, Threat Prevention Check Point Software Technologies | Ransomware reached epidemic proportions in 2016. Organizations of all sizes and sectors fell victim to malware that locked down, encrypted – and in some cases threatened to destroy – critical systems and data. How would you avoid becoming tomorrow’s headline? How can businesses continue to operate without disruption despite this looming threat? Learn how Check Point Anti-Ransomware technology protects against every type of ransomware attack, ensuring continuous access to your data | ||
Check Point Latest Announcements | Gabi Reish VP, Product Management and Product Marketing Check Point Software Technologies | Check Point Infinity announcement | ||
Choosing the Right Security Architecture | Moti Sagey Head of Strategic Marketing & Intelligence Check Point Software Technologies | When it comes to choosing the right security architecture & security vendor, what does it take to win your trust? In this session Moti Sagey will cover three key pillars the security solution must possess to win in a highly competitive environment: Uncompromised Security, Everywhere Architecture and Operational Efficiency. Moti will share pragmatic tips to unveil the true efficacy of the solution with zero marketing "fluffy claims". | ||
Shedding Light on the Dark Web | Avi Rembaum Vice President, Security Solutions Neatsun Ziv VP, Threat Prevention Check Point Software Technologies | The dark web is quickly evolving into a marketplace of information and tools that the hackers and adversaries use to breach company networks. The question we face as an industry is how to leverage an awareness of information for sale in the dark web to improve corporate security architectures. This session showcase real examples of data in the dark web and suggest pragmatic tips to mitigate future attacks. | ||
What To Do When It Happens to You - Check Point Incident Response | Daniel Wiley Head of Incident Response Check Point Software Technologies | Based on real world experiences of helping customers, this candid discussion will focus on ensuring that your organization is prepared when a breach occurs in your network. The discussion will provide real world examples of what works and what does not work and provides a framework on how to center your organizations security strategy to face any incident head on. | ||
IoT Hacking - Live | Oded Vanunu Head of Products Vulnerability Research Check Point Software Technologies | Ready or not, the Internet of things (IoT) is here. No longer a buzz word, it continues to grow at an unprecedented pace for years to come and is expected to reach over 25 billion connected devices by 2020. Most IoT devices, apps, and infrastructure were developed without security in mind and have already been exploited on major hacking campaigns in the past two years & will continue to be the main targets for hackers. Are organizations ready to protect themselves? What are the key vulnerable points? In this session Oded Vanunu enters into the Hacker mind to exploit IoT devices. Oded will also share insights on possible mitigations for these threats | ||
Life Inside the Cloud | Brian Linder Datacenter Sales Manager, Eastern US Check Point Software Technologies |
| The era of cloud is upon us; firms of all sizes and in all walks of life are looking to leverage the agility and elasticity of cloud. But cloud carries a totally new and unique set of security challenges. In this informative and entertaining session, you will take away five key tenants of cloud security, along with an accompanying set of recommendations on best practices securing hybrid cloud deployments. Brian Linder will share a healthy dose of a real-life experience with an actual Check Point customer use case securing their complex hybrid cloud deployment. | |
Safe Journey to the Cloud | Itai Greenberg Head of Cloud Security Check Point Software Technologies | The era of cloud is upon us; firms of all sizes and in all walks of life are looking to leverage the agility and elasticity of cloud. But cloud carries a totally new and unique set of security challenges. In this session, you will take away five key tenants of cloud security, along with an accompanying set of recommendations on best practices securing hybrid cloud deployments. | ||
External Speakers | ||||
Moving to the Public Cloud, Securely - FireChat with AWS & Azure | Amazon AWS , Microsoft Azure | View YouTube Video |
| |
How We Blocked a Targeted Attack | Dr. Matthias Rosche Senior Vice President, Solution Sales & Consulting Deutsche Telekom Group | A story of a real incident in which Deutsche Telekom was able to detect and prevent a specific cyber-attack. Describing the kill chain in laymen terms, how the attack was mitigated and the lessons learned. | ||
We Make Jeans; How Hard Can That Be? | Steve Zalewski Chief Security Architect Levi Strauss & Co. | This talk will present some of the business challenges, learnings and roadmaps from a security perspective to protect the global Levi Brand | ||
Keeping it Simple | Luke Beeson Vice President of Security British Telecom | Presenting key guidance and directions related to the main needs of security architecture for 2017; how it must follow the business needs - and first and foremost - be simple and efficient to operate. | ||
The Evolving Role of the CISO in a Post Breach Organization | Joey Smith CISO Schnuck Markets | In this session CISO Joey Smith will discuss understanding the importance of compliance and security and how they are very different. Additionally he will review many of the personal leanings that he has gained from his experience as a CISO responsible for maturing an Information Security program. | ||
Simple Security Is Your Best Bet | Patrick Woods CISO Missouri State Highway Patrol | This thought-provoking session will challenge current models in cyber security management and architecture that suggest that complex problems demand complex solutions. Instead, it is a simplified approach, keeping users and senior leadership engaged while leveraging key partnerships that will prepare organizations to combat the cyber threats of today and tomorrow | ||
CISO... What's Next? | Geremy Benkirane Chief Information Security Officer Exane SA | When managing and controlling information systems and data risks leads to the data controlling the business. |
Topic | Speaker | Content |
---|---|---|
Don't Fear the Cloud: Secure It | Erez Berkner Check Point Software Technologies | Presentation |
Understanding Advanced Threats and How to Prevent Them | Nathan Shuchami Check Point Software Technologies | Presentation |
GDPR - Jump-Start Your Compliance Today! | Gabi Reish Check Point Software Technologies | Presentation |
Topic | Speaker | Content |
---|---|---|
Protecting Industrial Control Systems | Noam Green Mati Epstein | Presentation |
Best Practices for Securing the Retail Sector | Gabi Reish Check Point Software Technologies | Presentation |
Telcos and ISPs: The Next Generation of Security Services | Yoav Shay Daniely | Presentation |
Topic | Speaker | Content |
---|---|---|
How Organizations Can Gain Infrastructure Efficiency by Automating Their Network Operations | Rafi Zvi CEO and Co-Founder BackBox | sponsor sessions |
How to Become a Firewall Automation Ninja | Ruvi Kitov CEO and Co-Founder Tufin | sponsor sessions |
How Hackers Think - Dissecting Malware Operations | Maya Horowitz Check Point Software Technologies | Presentation |
WannaCry Under the Microscope | Yaniv Balmas Maya Horowitz Check Point Software Technologies | Presentation |
How to Build the Rule-Base of the Future | Amnon Perlmutter Check Point Software Technologies | Presentation |
Unleashing the Power of the Cloud | Erez Berkner Check Point Software Technologies | Presentation |
Scalable Security Platforms - Done the Right Way | Benny Shlesinger Derek Middlemiss | Presentation |
Automation & Orchestration Deep Dive | Marco Garcia Ryan Darst Check Point Software Technologies | Presentation |
Leveraging White & Black Hat Cyber Intelligence to Stay One Step Ahead | Maya Horowitz Oded Vanunu Check Point Software Technologies | Presentation |
Advanced Gateway Configuration and Management | Tomer Noy Check Point Software Technologies | Presentation |
Analyzing and Preventing Attacks from the Network to the Endpoint | Lior Arzi Check Point Software Technologies | Presentation |
Understanding and Blocking Advanced Mobile Attacks
Note: Due to large file size the slide deck is split | Micha Burd Ohad Bobrov Check Point Software Technologies |
Topic | Speaker | Content |
---|---|---|
99.9 Effectiveness with IPS + NSS | Roman Kunicher Smadar Paradise | |
Performance - Acceleration Cards | Presentation | |
Automation and Orchestration | Presentation | |
Upgrade and Migrations to R80.10 | YouTube Video | |
Topic | Speaker | Content |
---|---|---|
Hands-On Security Management and Gateway | Jim Öqvist | Presentation |
Securing Clouds | Javier Hijas | Presentation |
Orchestration and Automation | Ryan Darst Marco Garcia | Presentation |
Great share Niran! Many thx!
Thanks for sharing! I am missing the presentation of Dorit Dor. Is there a chance to add it?
I missed the second part of her presentation due to a face2face meeting...
That's one of those presentations you had to be there for.
Great stuff!
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY