Topic | Speaker | Content | Abstract |
---|
Welcome to the Future of Cyber Security | Gil Shwed Founder and CEO Check Point Software Technologies | Presentation View YouTube Video | We are all living in a connected world which is affecting every aspect of our lives. In the past couple of years, we have been discussing implications of a technology and digital-driven world (i.e.) cloud, mobile, advanced threats. Today, we are seeing some of our worst predictions shaping into real life. So why are businesses not protecting themselves and instead keep making excuses? In today’s world, business need security that meet their business needs. Gil Shwed's discussion defines the pillars of security that businesses should adopt, based on their actual business needs. |
Gil Shwed & Marius Nacht Interview @ 2017 CPX Milan | Gil Shwed Founder and CEO Check Point Software Technologies Marius Nacht Co-Founder and Chairman | View YouTube | Gil Shwed & Marius Nacht Interview @ 2017 CPX Milan |
Cyber Security in the Era of Exponential Technology | Amnon Bar-Lev President Check Point Software Technologies | Presentation View YouTube Video | We are in an extraordinary time in human history. Thanks to innovative and disruptive technologies we live longer, healthier and more educated than ever before. While technologies such as cloud computing, mobile and Internet of Things open up new opportunities, they are, in many cases, the biggest barriers for adoption due to cyber security concerns. How do you innovate, inspire and compete while remaining secure? In his inspiring session, Amnon Bar-Lev shares the Check Point vision on how organizations can keep focus on innovating while being secured with a security architecture that is one step ahead. |
Seeing is Believing: Hacking the Smartphone | Michael Shaulov Head of Product Management and Product Marketing, Mobile Check Point Software Technologies | Presentation View YouTube Video | Join this exciting live demo to see first-hand how easy it is to hack any smartphone today. In this session Michael Shaulov will demonstrate live hacking of a smartphone, the risks and possible mitigations for the new Achilles heel of enterprises today and tomorrow. |
Surviving the Ransomware Plague | Orli Gan Head of Products, Threat Prevention Check Point Software Technologies | Presentation View YouTube Video | Ransomware reached epidemic proportions in 2016. Organizations of all sizes and sectors fell victim to malware that locked down, encrypted – and in some cases threatened to destroy – critical systems and data. How would you avoid becoming tomorrow’s headline? How can businesses continue to operate without disruption despite this looming threat? Learn how Check Point Anti-Ransomware technology protects against every type of ransomware attack, ensuring continuous access to your data |
Check Point Latest Announcements | Gabi Reish VP, Product Management and Product Marketing Check Point Software Technologies | Presentation View YouTube Video | Check Point Infinity announcement |
Choosing the Right Security Architecture | Moti Sagey Head of Strategic Marketing & Intelligence Check Point Software Technologies | Presentation View YouTube Video | When it comes to choosing the right security architecture & security vendor, what does it take to win your trust? In this session Moti Sagey will cover three key pillars the security solution must possess to win in a highly competitive environment: Uncompromised Security, Everywhere Architecture and Operational Efficiency. Moti will share pragmatic tips to unveil the true efficacy of the solution with zero marketing "fluffy claims". |
Shedding Light on the Dark Web | Avi Rembaum Vice President, Security Solutions Neatsun Ziv VP, Threat Prevention Check Point Software Technologies | Presentation View YouTube Video | The dark web is quickly evolving into a marketplace of information and tools that the hackers and adversaries use to breach company networks. The question we face as an industry is how to leverage an awareness of information for sale in the dark web to improve corporate security architectures. This session showcase real examples of data in the dark web and suggest pragmatic tips to mitigate future attacks. |
What To Do When It Happens to You - Check Point Incident Response | Daniel Wiley Head of Incident Response Check Point Software Technologies | Presentation View YouTube Video | Based on real world experiences of helping customers, this candid discussion will focus on ensuring that your organization is prepared when a breach occurs in your network. The discussion will provide real world examples of what works and what does not work and provides a framework on how to center your organizations security strategy to face any incident head on. |
IoT Hacking - Live | Oded Vanunu Head of Products Vulnerability Research Check Point Software Technologies | Presentation | Ready or not, the Internet of things (IoT) is here. No longer a buzz word, it continues to grow at an unprecedented pace for years to come and is expected to reach over 25 billion connected devices by 2020. Most IoT devices, apps, and infrastructure were developed without security in mind and have already been exploited on major hacking campaigns in the past two years & will continue to be the main targets for hackers. Are organizations ready to protect themselves? What are the key vulnerable points? In this session Oded Vanunu enters into the Hacker mind to exploit IoT devices. Oded will also share insights on possible mitigations for these threats |
Life Inside the Cloud | Brian Linder Datacenter Sales Manager, Eastern US Check Point Software Technologies | View YouTube Video | The era of cloud is upon us; firms of all sizes and in all walks of life are looking to leverage the agility and elasticity of cloud. But cloud carries a totally new and unique set of security challenges. In this informative and entertaining session, you will take away five key tenants of cloud security, along with an accompanying set of recommendations on best practices securing hybrid cloud deployments. Brian Linder will share a healthy dose of a real-life experience with an actual Check Point customer use case securing their complex hybrid cloud deployment. |
Safe Journey to the Cloud | Itai Greenberg Head of Cloud Security Check Point Software Technologies | Presentation View YouTube Video | The era of cloud is upon us; firms of all sizes and in all walks of life are looking to leverage the agility and elasticity of cloud. But cloud carries a totally new and unique set of security challenges. In this session, you will take away five key tenants of cloud security, along with an accompanying set of recommendations on best practices securing hybrid cloud deployments. |
External Speakers |
---|
Moving to the Public Cloud, Securely - FireChat with AWS & Azure | Amazon AWS , Microsoft Azure | View YouTube Video | More than 70% of the organizations are committed to a cloud strategy in 2017. Businesses are moving their applications to the Cloud to gain more agility and efficiencies. At the same time, Cloud security remains their top concern. Customers are looking for solution to secure their data and applications from modern threat targeting their shared, connected and agile cloud environment. Join us for a fireside chat with top leaders from AWS, Azure and learn about their perspectives and recommendations for security best practices in the cloud. |
|
How We Blocked a Targeted Attack | Dr. Matthias Rosche Senior Vice President, Solution Sales & Consulting Deutsche Telekom Group | Presentation | A story of a real incident in which Deutsche Telekom was able to detect and prevent a specific cyber-attack. Describing the kill chain in laymen terms, how the attack was mitigated and the lessons learned. |
We Make Jeans; How Hard Can That Be? | Steve Zalewski Chief Security Architect Levi Strauss & Co. | Presentation View YouTube Video | This talk will present some of the business challenges, learnings and roadmaps from a security perspective to protect the global Levi Brand |
Keeping it Simple | Luke Beeson Vice President of Security British Telecom | Presentation | Presenting key guidance and directions related to the main needs of security architecture for 2017; how it must follow the business needs - and first and foremost - be simple and efficient to operate. |
The Evolving Role of the CISO in a Post Breach Organization | Joey Smith CISO Schnuck Markets | Presentation View YouTube Video | In this session CISO Joey Smith will discuss understanding the importance of compliance and security and how they are very different. Additionally he will review many of the personal leanings that he has gained from his experience as a CISO responsible for maturing an Information Security program. |
Simple Security Is Your Best Bet | Patrick Woods CISO Missouri State Highway Patrol | Presentation View YouTube Video | This thought-provoking session will challenge current models in cyber security management and architecture that suggest that complex problems demand complex solutions. Instead, it is a simplified approach, keeping users and senior leadership engaged while leveraging key partnerships that will prepare organizations to combat the cyber threats of today and tomorrow |
CISO... What's Next? | Geremy Benkirane Chief Information Security Officer Exane SA | Presentation | When managing and controlling information systems and data risks leads to the data controlling the business. |