Be Your Own TAC: Advanced Gateway Troubleshooting Commands
|
|
Presentation
View Video
|
The classic & extremely popular "My Top 3 Check Point CLI commands" CheckMates thread written by Moti Sagey in 2017 is getting a big update for 2024 at CPX! Join Tim Hall as he takes you on a tour of advanced security gateway troubleshooting commands, many of which are mysterious & undocumented. These commands are frequently employed in consulting engagements, with some of them featured in the official 2-day "Gateway Performance Optimization" course authored and taught exclusively by Mr. Timothy Hall at Shadow Peak.
|
Enterprise AI Patterns for Cyber Security - Where Language Models Meet Security
|
|
Presentation |
With the rapid adoption of artificial intelligence in organizations, new enterprise AI patterns have started to emerge. This engaging session provides insights into the integration of large language models with your Check Point security portfolio, where you can “chat” about security in your organization. Learn how “be-spoken” solutions can accelerate your response to events, dig deeper into threats, and even provide you quick answers for your Check Point products.
|
How to Use Automation to Scale Your Network-as-a-Service Practice
|
|
Presentation |
Phil and Jessica engage in an open dialogue to explore the transformative impact of automation and generative AI — particularly on the evolution of network-as-a-service (NaaS) as the next-gen business model. They'll discuss how generative AI and high-quality data in business workflows can help VARs and MSSPs strategically automate and scale their businesses. They’ll also focus on how AI affects the collaboration between partners and customers, and the impact on the future of business operations. The discussion concludes with practical strategies for implementing AI into business processes and predictions for the anticipated surge of AI tools in 2024.
|
Using CloudGuard to Build a Center of Cloud Excellence
|
|
Presentation |
As organizations try to consolidate their cloud use for better savings, many organizations are realizing that centralizing their cloud and DevOps operations leads to biggest savings in a FinOps Operation. Enterprises are building Cloud Centers of Excellence in order to streamline their operations to us cloud more efficiently. CloudGuard and Harmony allow businesses to securely create standards within their organization. We will review use cases that have succeeded with other organizations to show how Check Point can help an enterprise build towards a Cloud Center of Excellence using CloudGuard Spectral, Public Cloud, Posture Management, and Harmony.
|
Digital Transformation at Healthcare Scale
|
|
Presentation |
In 2020, Atrium Healthcare found that they were out of firewall capacity in several firewall instances and that they a had a large firewall sprawl that needed consolidation and operational improvement. There was also a corporate directive for a digital transformation project that included adopting cloud and moving from corporate datacenters to external hosting providers. Join this session to learn how met met these challenges.
|
Automate Your Blocklists - Security Orchestration with Microsoft Sentinel and Check Point
|
|
Presentation |
Thomas Dang, Security Architect for the Yukon Government, demonstrates a system for security orchestration. Leveraging Microsoft Sentinel playbooks, this system automates Intrusion Prevention System (IPS) and alert-based blocking. It triggers Azure Runbook hybrid workers to dynamically update blocklists and settings on Check Point firewalls, including through SecureXL technology. This approach not only accelerates blocklist implementation but also significantly boosts firewall performance compared to object-based ACLs. The integration adheres to best practices, like least-privilege and use of SSH-key authentication. Attendees will gain insights into advanced automation techniques for security orchestration, emphasizing efficiency and robust security protocols.
|
Continuous Optimization and Security of Environments
|
|
Presentation |
Unfortunately, more often than we wish, our IT environments are neglected, or small details are not given much attention. The presentation will consist of bringing the proactive checks and uses of new tools from the versions R80.40, R81.10, and R81.20, to constantly optimize, secure, and prevent BIG problems with small actions procedures, and automations. We made these actions and procedures in some of our customers, Henrique Brito will bring some real use cases to prove the efficiency, overall satisfaction and security for our customers.
|
Consolidating Multiple Security Vendors for Better Perimeter and Data Center Security
|
|
Presentation |
This presentation will discuss the migration process of transitioning from Fortinet, Palo Alto, and Tipping Point to Check Point for perimeter and data center security. The challenges and limitations of the existing multi-vendor security infrastructure are discussed, emphasizing complexity, operational overhead, interoperability issues, and more. The decision to consolidate security solutions with Check Point's Multi-Domain Security Management (MDSM), Maestro Scalable Platform, and Virtual System Extension (VSX) is explained. The integrated features of MDSM, Maestro, and VSX are highlighted, addressing centralized management, scalability, resource optimization, and flexibility. The migration plan, including objectives, infrastructure planning, Maestro configuration, security group design, policy migration, documentation, continuous monitoring, and ongoing support, is detailed to guide organizations in achieving a seamless transition and establishing a robust security foundation.
|
Avoiding the Path to Failure in Cybersecurity
|
|
Presentation |
Steinbeck said even "the best laid plans of mice and men often go astray". Combatants may quote some version of "no plan survives first contact" (or "everyone has a plan until they get punched in the face"). Do you even have a plan? Is it the right plan? Can (and should) you stick to it?
|
The Need for Speed: Fast But Resilient
|
|
Presentation |
Attack surfaces are growing and threats become more impactful; everything connects and requires a network, whether that is OT/IOT/IIOT, endpoints, mobile devices, cloud environments going all the way up to interconnected smart cities. Network providers have the opportunity to deliver strongly secured networks, positively impacting their customers while avoiding additional costs to security investments. Fred Van Keirsblick will highlight the existing and new opportunities for MSPs and network providers if they can create scalability into network services they offer based on the embedded security features while upscaling their market positioning from transport to application (security) layer services.
|
Check Point SASE - Best Practices
|
|
Presentation |
This presentation highlights how easy and user-friendly security best practices can be implemented with Check Point Quantum SASE. Enjoy!
|
Check Point Automation Experience (CPAX)
|
|
Presentation |
Businesses today need automation to swiftly respond to emerging threats and network changes with minimal or no human errors. Fortunately, today's API tools have evolved and become the best tools used by businesses for automating IT and security processes to improve operational efficiency, optimize their IT infrastructure, and enhance their cybersecurity posture. Check Point, being the leading security product vendor, provides a number of APIs that are used by organizations to automate and integrate with other products and services.
|
Cyber Security Controls and Evidence
|
|
Presentation |
It is very important to maintain cybersecurity controls not only to prevent cybercrimes from happening, but just as important to have an infrastructure where electronic evidence can be discovered and documented for use in a court of law. In this session, we'll explain how to do that.
|
Network Microsegmentation with Zero Trust
|
|
Presentation |
A presentation on why and how to microsegment your existing network infrastructure based on communication roles. The presentation will explain why network segmentation is vital to a secure environment and will be followed by some methods of segmentation that will aid in doing this on your own network.
|
Chasing the Silver Bullet
|
|
Presentation |
We all try to implement new products and features, looking for the silver bullet. But there is not really any one solution but a combo of things. And in reality we need to focus on the basics because everyone will be hacked somehow. We are all dependent on Network, System and the users that are using these applications. There are integrations everywhere and we need to assume and take the mindset of being attacked. Therefore, we need to make sure to segment, patch and use identity rules.
|
Accelerating Cybersecurity: Real-World Examples of Swift and Automated Operations with APIs
|
|
Presentation |
In this presentation, witness the practical application of cybersecurity theory as Pedro Boavida showcases real-world examples of how APIs empower swift and automatic operations. The spotlight remains on APIs, revealing their pivotal role in simplifying complex cybersecurity tasks. Through quick demonstrations, discover how APIs facilitate automated cybersecurity execution, enabling rapid responses to emerging threats and the automation of recurrent tasks. Join us at the Check Point Experience for a session that transcends theory, providing concrete examples of efficient, swift, and automatic cybersecurity operations. Whether a seasoned professional or new to cybersecurity, gain actionable insights into leveraging API power for a robust and responsive security future.
|
IOT/OT Security in the Enterprise
|
|
Presentation |
How can IOT/OT security be implemented in the enterprise? How does it get protected and how does we make sure that only approved devices is allowed to connect to the network? How is Check Point integrated into the client access network with 802.1x? Join this session to find out!
|
Hacking Webviews for Fun & Profit
|
|
Presentation |
There are two interesting vulnerabilities that are mostly not tested by security researchers and bug bounty hunters when they test Android applications. The presentation will focus on how to exploit interesting bugs in Webview. The presentation will share the approach for testing the bug through black-box testing where the security researcher does not require code to verify the vulnerability. The easiest ideas for exploiting the webview bugs will be shared with some bonus hints for future work. (Exploit shall be published after the end of the conference)
|
Security Automation of Perimeter 81, Harmony Mobile and other Products in the Infinity Portfolio
|
|
Presentation |
Integrate automation into Check Point Harmony and related products in the Infinity Portfolio (Harmony, Quantum, XDR, SD-WAN, Email, and Endpoint Security). Perform automated deployments of Check Point Infinity Products using an enhanced UI with drag and drop capabilities.
|
Beyond the Cyber Surface: Unveiling AI-Powered Tactics of Hacktivist Movements
|
|
Presentation |
This session discusses the increasing threat of political and religious hacktivist threat actors. We will demonstrate how these groups make sophisticated use of Telegram and other social networks to communicate their messages and innovative tactics. In addition, we will explore their use of AI to create powerful attack tools that go undetected by standard protections. In the second part of the session, we will focus on why businesses fail to protect against these new tools. Specifically, how hacktivists have mastered the use of advanced evasion techniques that disguise their attack vectors to bypass standard network and application detection tools. We will also review a new attack vector called Web DDoS Tsunami, understand why it bypasses all prevention tools, and how to mitigate it using AI.
|
Threat Detection & Response @ DC, Cloud, OT, SaaS with Use Case Engineering
|
|
Presentation |
The journey of enterprise data requires threat hunting, use cases gameboard, and improving defenses of risk remediation to the enterprise. We will show you how to achieve this with Check Point solutions.
|
Machine Learning Poisoning: How Attackers Can Manipulate AI Models for Malicious Purposes
|
|
Presentation |
The use of machine learning and artificial intelligence has been on the rise in various industries, including the field of cybersecurity. These technologies have shown great potential in detecting and mitigating cyber threats, but they also come with their own set of risks. One of the most significant risks is the threat of machine learning poisoning attacks. Machine learning poisoning attacks involve an attacker manipulating the data or the learning algorithm used by an AI model to compromise its accuracy or functionality. This type of attack is particularly dangerous because it can go undetected for a long time, and it can be challenging to trace its origins. A successful poisoning attack can result in the AI model making incorrect decisions, which can lead to a security breach or data loss.
|
Connecting the Cloud Security Dots by Leveraging CloudGuard Effective Risk Management
|
|
Presentation |
This session will introduce audiences to CNAPP and share observation from the field whereby acquiring CNAPP as a tool for security compliance and auditing purpose alone may still leave gap to improve security of the cloud. We will discuss how CloudGuard Effective Risk Management and Advanced Security Controls capabilities can aid security leadership and practitioner to take preventive actions to mitigate risk to organization’s services and data on the public cloud.
|