Founder & CEO Gil Shwed Keynote |
Gil Shwed Founder and CEO Check Point
Dr. Dorit Dor Chief Product Officer Check Point
Amit Krig SVP Software Nvidia
Moti Sagey Chief Evangelist, VP Strategic Marketing Check Point
Aviv Abramovich Head of Product Management Check Point
Itai Greenberg VP Product Management Check Point
|
Presentation - Gil
Presentation - Moti
Presentation - Itai
View YouTube Video
|
For over 25 years Check Point have pioneered cyber security and introduced technological innovation to allow better experiences in a safer world. 2022 is no different.
While the new world becomes more digitally connected, it also creates challenges like cyber threats becoming sophisticated and criminals launching attacks that cause colossal damage.
In this session, Gil will present why, in this new world, its imperative to have the best security, become cyber heroes, and adopt a secure, consolidated, and preventive approach to cyber security with Check Point Infinity.
This session will also feature how Check Point and Nvidia are redefining data center and network security performance, as well as announcement of new exciting innovations in 2022.
|
What Does It Take To Be The Best? |
Usain Bolt 8 Time Olympic Champion and Worlds Fastest Man
Gil Shwed Founder & CEO Check Point
|
View YouTube Video
|
What can IT leaders learn from the most gifted sprinter of all time? Join Usain Bolt in an exclusive interview event to discuss how top-performance and speed can be the mere difference between winning and losing. Securing your organization’s network and dominating your rivals in an Olympic race both come down to one key factor: moving at light speed.
|
Customer Story: Is Vendor Consolidation a Genuine Cyber Strategy or is it Just Hype |
Sharat Sinha Vice President and General Manager APAC and Japan Check Point
Suman Mukhopadhyay AVP & Senior Director - Technology Management EdgeVerve Systems
|
View YouTube Video
|
Hear first hand from customers their use cases to secure their everything. In this session Sharat Sinha, General Manager APAC & Suman Mukhopadhyay, AVP & Senior Director – Technology Management, EdgeVerve Systems will discuss the question "Is vendor consolidation a genuine cyber strategy or is it just hype?"
|
"Evolved Security in the Real World": How State Bank of India Secures with Maestro |
Amol Pai CTO State Bank of India
Gary Gardiner Head of Security Engineering APAC Check Point
|
View YouTube Video
|
Hear first hand from customers their use cases to secure their everything. This session will focus on How Infosys secures 150,000 remote workers and how State Bank of India secures with Maestro.
|
Customer Stories: Securing the Everywhere and Anything Employee: CISO's secrets for Zero Incidents |
David Ulloa CISO IMC
Brian Linder Head of Worldwide Evangelists Office of the CTO Check Point
|
View YouTube Video
|
How consolidation assists CISOs in securing the supply chain.
|
Hacking Like a White Hat Witch |
Maya Horowitz VP Research Check Point
|
View YouTube Video
|
“We’ve all got both light and dark inside us. What matters is the part we choose to act on...that’s who we really are” – J.K. Rowling, Harry Potter and the Order of the Phoenix. Threat actors and security researchers both have the cyber power, and it is our choice to use it to protect rather than attack. In this session, we will go through some of the most magical cyber attacks Check Point Research exposed in 2021.
|
A Conversation with George Takei |
George Takei Actor, Social Justice Activist and Social Media Mega-Power
Peter Alexander Chief Marketing Officer Check Point
|
View YouTube Video
|
Join Check Point for an inspired session with Mr. George Takei, one of this generation’s most celebrated social media luminaries. Mr. Takei will join us at CPX 360 2022 for a lively and broad-ranging conversation. You won’t want to miss this captivating talk.
|
Lessons From the "Biggest Work From Home Experiment" |
Dan Wiley Head of Threat Management and Chief Security Advisor Check Point |
View YouTube Video
|
Threats just keep getting more targeted, aggressive, stealthy, and damaging to companies throughout the world. Everyone’s security operations team is stretched to the limits ensuring the enterprise continues to operate. But what do you do when you have no more resources to defend, respond and ensure your protections are working as expected? You need a new approach to dealing with these threats.
Check Point’s MDR service supported by the Check Point Incident Response Team provides a single solution to monitor, respond, hunt, and this protection ensures you have the support of the industry’s most elite cyber defenders 24x7x365 globally.
|
Inside Your Crypto Wallet |
Oded Vanunu Head of Products Vulnerability Research Check Point |
View YouTube Video
|
Blockchain revolution introduces a near fool-proof level of verification to the age of the internet. This is due to the unique way blockchain stores data where each new block of data connects to all the blocks in a cryptographic method that is impossible to tamper with. The revolution continued with new innovations to trade in digital currencies and assets. Trillions of dollars have been traded in the blockchain emerging economy.
The decentralized nature of blockchain transactions introduces both its greatest strength and most significant threat. There is no governing entity that can reverse a crypto transaction once it has been recorded on the chain. Hence this fuels cybercrime and malicious actors as a prime target to get access to users’ private key or crypto account. In the session, I’ll introduce crypto platforms' security challenges and examine the gap today. I’ll share how hackers exploit the gap and reveal the methods they use. I’ll expose a real story we uncovered on how hackers hijacked crypto wallets on OpenSea, which is the largest digital collectible marketplace, a peer-to-peer marketplace for crypto collectibles and non-fungible tokens (aka NFT).
|
Why Our Security Problems are Getting Worse and What We Should Do About It? |
Gary Gardiner Head of Security APAC Check Point
Jeff Schwartz Vice President North America Engineering Check Point
|
Presentation - APAC View YouTube Video - APAC
Presentation - Americas View YouTube Video - Americas
Presentation - EMEA View YouTube Video - EMEA
|
Despite significant year-over-year growth in security spending and increases in overall security awareness, it seems that our problems are getting worse: ransomware, phishing, supply chain attacks, cloud compromises. At the same time, most security teams are overwhelmed with the rate of changes and volume of events to manage. In this session, you’ll learn how Zero Trust approaches, combined with better security intelligence and tools, can help you deliver better outcomes for our user communities.
|
CISO Secrets with Tiktok Global CSO, Roland Cloutier |
Roland Cloutier Global CSO TikTok
Grant Asplund Growth Technologies Evangelist Check Point
|
View YouTube Video
|
In this episode of CISO Secrets, our guest is the Global Chief Security Officer for one of the biggest social networks worldwide. TikTok is the single most downloaded app with nearly 3 billion downloads. In September 2021 the company reported reaching 1 billion users. With thousands of employees working from all around the world, find out what keeps Roland Cloutier up at night. Global CSO, TikTok.
|
Protecting Office 365 & Teams the Right Way: JetBlue Case Study |
Gil Friedrich VP Email Security Check Point
Tim Rohrbaugh CISO JetBlue
|
View YouTube Video
|
Email security has changed. Instead of on-prem servers and outdated rules, it's now about artificial intelligence, machine learning and keeping users and data safe. Join this session to see Harmony Email & Collaboration, our industry-leading solution that prevents phishing emails from reaching the inbox. We will discuss the importance of AI and ML for email security, how collaboration apps are the next significant vector, and why you need to pair powerful email security with robust threat intelligence to guard against all manner of attacks.
|
How Cloud Posture Management Accelerated the Journey to the cloud: ViuTV |
Roger Lau Technical Head Digital ViuTV |
View YouTube Video
|
Hear first hand from customer use cases on how to secure everything, this session will focus on how cloud posture management accelerated the Journey to the cloud.
|
How Canaccord & Sallie Mae Secured Their Cloud |
Greg Drazenovic VP IT Infrastructure and Security Canaccord Genuity Corporation
Andrew Smith Manager of Cybersecurity Operations Sallie Mae
|
View YouTube Video
|
Hear first hand use cases from customers on how they secure their everything: This session will focus on how Canaccord & Sallie Mae secured their cloud.
|
How Fresenius Secured Their Cloud |
Markus Zack Director Cloud Enterprise Architecture Fresenius Digital Technology
|
View YouTube Video
|
Hear first hand use cases from customers on how they secure their everything: this session will focus on how Fresenius secured their cloud.
|
Learning from the Cloud Secure Deployments with AWS |
Merritt Baer Principal, AWS Office of the CISO
TJ Gonen Head of Cloud and Telco Check Point |
View YouTube Video
|
Cloud migration, posture management, web application deployments, the list goes on. More and more customer are migrating and deploying valuable workloads in the cloud. How are they ensuring the transition is foolproof and secure? How are they protecting their assets, their permissions, and ensuring policies are in place across their cloud environments. Join Head of Cloud Strategy, TJ Gonen as he speed dates through the top cloud deployments in a two-part session. Hear the perspective of cloud providers, customers, and technology vendors as they tackle the top use cases perplexing organizations of all sizes and verticals. Learn best practice strategies and tips from industry experts to help you navigate your next cloud project securely.
|
Learning from the Cloud Secure Deployments with Microsoft |
David Totten CTO Partners Microsoft
TJ Gonen Head of Cloud and Telco, Check Point
|
View YouTube Video
|
Cloud migration, posture management, web application deployments, the list goes on. More and more customer are migrating and deploying valuable workloads in the cloud. How are they ensuring the transition is foolproof and secure? How are they protecting their assets, their permissions, and ensuring policies are in place across their cloud environments. Join Head of Cloud Strategy, TJ Gonen as he speed dates through the top cloud deployments in a two-part session. Hear the perspective of cloud providers, customers, and technology vendors as they tackle the top use cases perplexing organizations of all sizes and verticals. Learn best practice strategies and tips from industry experts to help you navigate your next cloud project securely.
|
Customer Awards |
|
View YouTube Video
|
Join us to celebrate innovation, awarding top customers and their outstanding case studies in Cloud, Network, Endpoint and Infinity the most secured architecture.
|