2021 in Cyber: New World, New Challenges, New Opportunities |
Gil Shwed, Founder and CEO Check Point Software Technologies |
Presentation
View YouTube Video
|
For over 25 years we have pioneered cyber security and introduced technological innovation to allow better experiences in a safer world. 2021 is no different.
While the new world becomes more digitally connected, it also creates challenges as cyber threats become more sophisticated and criminals launch attacks that cause colossal damage.
In this session, Gil will present why in this new world, we have an opportunity to redefine the role of cyber security, become cyber heores, and adopt a secure, consolidated, and preventive approach to cyber security with Check Point Infinity.
|
Pillars of Innovation - New Products Announcements |
Itai Greenberg, VP, Product Management |
Presentation
View YouTube Video
|
Organizations’ attack surfaces are widening, now more than ever before. Modern organizations need to recalibrate their cyber security approach around three main elements: Securing their corporate networks and data centers, securing cloud environments and lastly, securing employees – wherever they are. Join this session to learn how the Check Point product roadmap will turn this vision into a reality. We will present product and technology innovations that will provide our customers with uncompromised security, based on our core principles of prevention, management and consolidation.
|
Hacking like a Greek Goddess |
Maya Horowitz, Directory, Threat Intelligence and Research |
View YouTube Video
|
The session will take us through some epic Greek mythology stories, and their correlation to no less epic cyber-attacks discovered by Check Point Research throughout the year. See what happens when we open Pandora’s (in)box, where is the Achilles heel of our applications and more.
|
Lessons from the "Biggest Work from Home Experiment" |
Dan Wiley, Head of Incident Response |
View YouTube Video
|
You wake up one morning and get an urgent call from your manager. Your manager tells you that you have to move ALL of the IT infrastructure to a 100% remote work environment. Offices will close. Datacenters will be shutdown. Everyone will work from home from now on. This happened to thousands of companies around the world in 2020. It means that in a very short period of time you have to change everything….But in the rush to move to the cloud mistakes are made, corners cut, security was important but not a central focus. This discussion was lethal to many companies that experienced large scale compromises in 2020. Let’s learn from their mistakes and chart a way out of the fog of the cloud…
|
The Truth Behind Sunburst |
Oded Vanunu, Head Of Products Vulnerability Research
Yaniv Balmas, Head of Security Research
|
View YouTube Video
|
No one can argue that 2020 was a very different year! It was different in so many (obvious) ways, but for us, cyber people, there was one event that shook the whole cybersecurity industry to its core. This is the year where one of the biggest cyber events that we have seen in our career happened, and perhaps even the biggest cyber event that has ever taken place. In our talk, we will take you through the Sunburst attack, step by step in a way that will make perfect sense and finally put some order into what happened.
|
Infinity NEXT Architecture -The Need of Consolidation in Cyber Security |
Avi Rembaum, VP Security Solutions
|
Presentation
View YouTube Video
|
2020 ended with the initial rollout of the COVID vaccines as well attacks on the COVID vaccination and, separately, the US Federal Government. These two events hint at how 2021 will take shape. There will be a global recovery that will improve the quality of life and the economic fortunes of many, but there will still be lingering pain. And, in cybersecurity, there will a concerted effort among many companies to accelerate cybersecurity investment but also reduce costs in other areas. This need to do more and less will drive IT teams to look for solutions that can help consolidate and improve cyber resiliency at the same time. Check Point’s Infinity Architecture is exactly such a solution. It brings the most advanced threat prevention technologies into network, cloud, endpoint and mobile use cases. Infinity also enables intelligence gathering, threat hunting and event management to help organizations understand their threat landscape in real-time. And, as organizations look to a future that further embraces cloud and cloud-enabled technologies, Infinity evolves as well. With Infinity NEXT, native-cloud services, network security components, specialized nano-security functions, endpoint agents and workload protections become shared elements of a new unified security policy framework. This will help organizations bridge, and ensure a consistent security approach across, their cloud and network environment and applications.
|
Cyber Pandemic Cure--Harmonizing Secure Users & Access |
Neatsun Ziv, VP, Threat Prevention
|
Presentation (Part 1)
Presentation (Part 2)
View YouTube Video
|
This session will demonstrate the proven battle plan for success in defeating unknown threats using Check Point’s newest strategy on securing users and their access.
|
Cloud Security - Now More Than EVER |
Tsion (TJ) Gonen, Head of Cloud Product Line
|
Presentation
View YouTube Video
|
The cloud is more dynamic now than ever before. How do you keep up with development while thwarting off threats? Hear how CloudGuard is fending off threats and turning security into an enabling force behind enterprise digital transformation.
|
External Speakers
|
Behind the Scenes of a Cyber Pandemic |
Chris Krebs, Former Director of Cyber Secyrity and Infrastructure Security Agency (CISA)
|
View YouTube Video
|
How do you defend an entire nation from cyber actors? Chris Krebs, our featured CPX 360 speaker, will share his insights. As the former Director of the Cybersecurity & Infrastructure Agency (CISA), Chris has extensive experience in confronting cyber attacks on critical organizations. You’ll learn strategies that will help you be more prepared for whatever the Internet throws at you, and you won’t want to miss this.
|
CISO Life Corona Style |
Mac Avancena, CIO Kern County |
View YouTube Video
|
In this presentation, we will cover recent trends and highlight some of the advancements made in fending off threats and turning security into an enabler force in enterprise digital transformation.
|
Microsoft Azure Keynote |
Ann Johnson, Corporate VP Security, Compliance & Identity - Microsoft
|
View YouTube Video
|
Microsoft Security CVP Ann Johnson sits down with Erez Yarkoni, Check Point’s Head of Cloud, to discuss how the security strategies of Microsoft and Check Point are crucial to completing the vision of customer success in the cloud. They’ll look at what’s on the horizon for cloud security, as well as how joint customers have implemented security and used cloud functionality to attain their goals.
|
AWS Keynote |
Scott Ward, Principal Solutions Architect - AWS
|
View YouTube Video
|
AWS Keynote - Security Segment Technology Lead - Interview with Erez Yarkoni & Scott Ward
|
Customer Awards |
|
View YouTube Video
|
|