Cryptojacking - The big hacker jackpot |
Indrajeet Bhuyan, Security Researcher - Techlomedia
|
Presentation
View YouTube Video
|
After further research, I found some interesting findings in the field of cryptojacking malwares. I successfully found cryptojacking in Indian government websites which had millions of visitors per month. As this was the first time someone had found cryptojacking in Indian government websites, my work was featured in various national and international media channels.
|
Gateway Orchestration and Automation Best Practices |
Valeri Loukine, Cyber Security Evangelist, Customer Community |
Presentation
View YouTube Video
|
These days, security without automation is bound to fail. In this session, we talk about various ways and tools to automate and orchestrate gateway deployments, provisioning and administration changes. |
Digital Transformation Cyber Challenges & Top 5 Attacks
|
Smit Kotadiya, Cyber Security Consultant
|
Presentation
View YouTube Video
|
Digital transformation enables business models to create mesmerizing user experiences, but it also magnifies risk.
|
AWS Transit Gateway and Upcoming CloudGuard IaaS HA solution |
Shay Levin, Technical Community Manager
|
View YouTube Video
|
With AWS Transit Gateway, you only have to create and manage a single connection from the central gateway in to each Amazon VPC, on-premises data center, or remote office across your network.
|
Big Game Hunting: Elephant Flows |
Dameon Welch-Abernathy (aka PhoneBoy), Cyber Security Evangelist
Timothy Hall, Founder - Shadow Peak Inc
|
Presentation
View YouTube Video
|
Even on a well-tuned and optimized firewall, elephant flows (a.k.a. heavy connections) can intermittently wreak havoc with the consistency of your firewall's performance. In this practical, hard-hitting presentation, the new detection and remediation tools introduced in R80.20 for this issue will be covered, along with the pros and cons of each. This presentation features content from a new chapter in the Third Edition of the book "Max Power: Check Point Firewall Performance Optimization" published in early 2020.
|
Terraform, Ansible, and APIs with Check Point - Making Sense |
Ryan Darst, Solution Architect
|
Presentation
View YouTube Video
|
Terraform, Ansible and APIs with Check Point, how do we make sense of it all?
You have heard of Restful APIs, JSON, YAML and HCL data structures, but what do they mean? How can they help? In this session you will learn how to enable automation for common tasks and workflows.
|
Branch Office and SD-WAN Security |
Tomer Sole, Product Manager, Security on Cloud
|
Presentation
|
This deep-dive session will showcase practical approaches for maintaining consistent security for hundreds of branch offices.
|
SOC 2.0, Threat Hunting And Intelligence |
Avishai Duer, Director, Cyber Security Protection
Oren Koren, Technical Product Manager, Cyber Security Protection Area
|
Presentation
View YouTube Video
|
Running a security operations center (SOC) can be very challenging.
|
Automating firewall rules for DevOps |
Evan Gillette, IT Security Engineer - Paychex
|
Presentation
|
This presentation will explain how to update firewall rules to accommodate the rapid spin up/down of IP addresses in a fully automated DevOps environment. We need to overcome challenges including competing requests, anti-spoofing, and slow policy pushes.
|
How to migrate a massive environment to Check Point and automate your activities to succeed |
Federico Meiners, Cyber Security Architect - Tecsystem |
Presentation
|
Imagine that you have to migrate a vast amount of virtual systems with 250k+ rules from another vendor to Check Point in a highly critical environment for an ISP and datacenter company.
|
Why we chose Maestro to protect our ever-growing hospital system |
Tom Tully, Director - The Cleveland Clinic
Shawn Babinyecz, Cybersecurity Engineer - The Cleveland Clinic
Alex Shields, Network and Security Engineer- The Cleveland Clinic
Mitch Brustman, Network Design/Cybersecurity Engineer - The Cleveland Clinic
|
Presentation
|
When growth is exponential, you need flexible and dynamic scalability Enter: Check Point Maestro Join us to talk about the problems we faced and how Maestro helped us overcome them.
|
Gas South keeps business secure and running with Check Point CloudGuard IaaS |
Rajiv Thomas, Senior System Engineer - Gas South |
Presentation
|
Gas South hosts most of its infrastructure in Azure. The challenge for the team was to provide access to our Azure environment and partner environments in a disaster or business continuity situation. The business challenge from Gas South leadership was “How can we service our customers if we can’t access our building or the building has a total loss of power?” In this session, Rajiv Thomas, Systems Engineer at Gas South, will share his journey of selection, implementation, daily use and technical and business benefits with CloudGuard IaaS for Azure. Learn how it was easy to use, kept business running and improved security.
|
24/7/365 Network Monitoring with Check Point SandBlast Now |
Silas Whittaker, Manager - The Mid-Hudson Regional Information Center (MHRIC) |
Presentation
|
This session will cover MHRIC’s experience after starting to use Check Point’s SandBlast Now in 2019. POCs have been performed in five districts and two local BOCES, in several counties.
|
The W. R. Grace secure journey to Sd-Wan |
David Antlitz, Senior analyst Internet Technology - W. R. Grace |
Presentation
|
W. R. Grace is a global specialty chemicals and materials company that makes their partners’ products and processes work better.
|
Show and Tell From a Professional Hacker (and how I’d catch* myself) |
David Parker, VP of Technology - Novacoast |
Presentation
|
Join this session to hear stories from the field of how advanced penetration testers bypass security controls every day. You’ll learn how to understand common attack tactics and patterns based on data, not assumptions. You’ll leave this session thinking like an attacker and hear strategies on how to build a framework measuring overall security program effectiveness. (Spoiler: running scans or pentests alone won’t get you there!)
|
Evaluating Our Defenses with a Data Science Approach |
Brennan Lodge, Data Science Lead - Goldman Sachs
|
Presentation
|
SOC analysts are under siege to keep pace with the ever-changing threat landscape. These analysts are overworked, burnt out and overwhelmed by the sheer number of alerts that they must carefully investigate.
|
Public Cloud Security Challenges: Common Challenges and How to Overcome Them |
Chris Nottingham, Security Engineering Manager, Channel Sales Central |
Presentation
|
Organizations are being bombarded with news stories related to data breaches and other public cloud security issues. When you couple this with the challenges associated with the learning curve of adopting public cloud in general, many organizations are either choosing to wait or facing common challenges as they deploy.
|
Office 365 advanced threat protection - financial institution case study |
Erick Garay, Vice President of Technology and Operations - Canal Bank |
Presentation
|
Canal Bank is a financial institution in Panama with branches throughout the country. When they decided to move their 300 users to the cloud with Office 365, they knew they had to add a layer of security that Office 365 didn’t offer them.
|
Native Tools – Are they enough for Enterprise Public Cloud Security? |
Sam Murdoch, Managing Director & Co-Owner - e92cloud Limited
|
Presentation
|
Join this session to learn more about the need for enterprise security tools as an extra layer of defense in the public cloud, while integrating and utilizing native tooling.
|
CheckMates - Best of Code Hub Contributions |
Danny Jung, Chief Technology Officer - Electronic Service Center |
Presentation
|
This presentation will showcase the most interesting Check Point CheckMates Code Hub solutions used, tested and improved by Check Point end-users, partners and even Check Point support professionals. You will learn about the various solutions, use of Check Point automation, different runtime environments and much more.
|
Running bleeding edge technology – Experience our world of wind protected by Check Point |
Kim Moberg, IT Coordinator - Eurowind Energy A/S |
Presentation
|
There isn’t really any real stories on how to participate in the EA program and stories of success or failures. My session will show you how you can participate and involve yourself in the EA program and gain a lot of quality hands-on experience with Check Point products.
|
Amdocs Cloud Security & Compliance Use Case Study |
Ofir Shuves, Cyber Security Product Manager - Amdocs |
Presentation
|
Cloud has been defined as one of the central focus areas for Amdocs in 2020. With the journey to the cloud, security has become both the primary benefit and the biggest challenge for IT professionals. At Information Security, we are leading the way and have already begun this transformative journey and established a cross-Amdocs Cyber Technologies team, leading processes and technology on the infra, cloud and application vectors. Our focus- Cloud security monitoring and governance. This is our journey.
|
Securing of all – Using the Check Point Infinity Architecture |
Søren Kristensen, Administrator, IT Network - TERMA
Niels Z. Poulsen, Manager, Security Engineering
|
Presentation
|
This is a story about why TERMA, a company with the demand of the highest level of IT security, chose to change its approach of "best of bread" to "IT security as an architecture", an architecture which includes the requested high level of IT security as well as market best management and visibility. |