Introduction to the Exciting New World of CNAPP |
Chris Federico Head of Global Cloud Security Sales, Check Point
|
Presentation
View YouTube Video
|
How can you achieve more secure cloud-native development with less time and effort?
Gartner defines CNAPP as an integrated set of security and compliance capabilities designed to help secure and protect cloud-native applications across development and production. Discover how CloudGuard's expanded CNAPP enables more context with actionable security for smarter prevention. Learn about the four new capabilities (CIEM, AWP, Pipeline Security and ERM) and how customers can use these for deeper visibility from code to cloud, while focusing on the risks that matter for improved operational efficiency.
|
Don’t Be Another Headline- Uncovering Secrets By Leveraging Scanning Tools |
Giovanni Verrienti Cloud Security Architect, Check Point
|
Presentation
View YouTube Video
|
With the modernization of cloud, development processes and applications, DevOps is constantly working to improve their own Continuous Integration (CI) and Continuous Deployment (CD) processes by providing higher quality code at greater speeds. Automation becomes an essential key-factor to build code and applications “on the fly” and at the same time, to deploy applications continuously into production. But quite often this also increases the security risks. New capabilities can help developers to scan any code within their own CI/CD pipeline, to detect secrets, API tokens, certificates, keys and other vulnerabilities that are exposed in the code, and to address any misconfiguration that could lead to unwanted data exfiltration or targeted attacks.
|
Securing Public Cloud infrastructures 2.0 |
Hezi Bahry Manager, Product Management Cloud Security, Check Point |
Presentation
View YouTube Video
|
With increasing cloud maturity and modern application development, organizations increasingly look for cloud-native SaaS advantages, intuitive automation, and operational efficiency when considering cloud network security solution. Join this session to understand more about the second generation of public cloud network security and how it supports the business needs of all organizational stakeholders including security, developers and operations teams.
|
The Future Is Agentless, Getting Started With Agentless Workload Posture |
Aaron Brongersma Cloud Security Architect, Check Point |
Presentation
View YouTube Video
|
You no longer need to rely on agents to provide the most critical information about your cloud workloads. Now you can continuously scan your cloud workloads for misconfigurations, malware, vulnerabilities, and secrets without impacting performance. Avoid the operational overhead and supply chain risks of maintaining 3rd party agents. Find out how to start using Agentless Workload Posture seamlessly! You no longer need to rely on agents to provide the most critical information about your cloud workloads. Now you can continuously scan your cloud workloads for misconfigurations, malware, vulnerabilities, and secrets without impacting performance. Avoid the operational overhead and supply chain risks of maintaining 3rd party agents. Find out how to start using Agentless Workload Posture seamlessly within your CloudGuard environment today!
|
AppSec - Preventing the Next Log4j, Preemptive Protection For Your Cloud Applications |
Sergio Silva Product Incubation Manager, Check Point |
Presentation
View YouTube Video
|
Are you tired of not being able to protect your web applications and API's from the onset? Of having to wait for critical updates, and signatures? Of knowing that your applications are vulnerable and that there is a high possibility that your applications may have been compromised? Would it not be easier for your application teams to not be reliant on signatures? Check Point’s contextual AI-based WAAP is our answer to protecting your valuable applications. Learn how our contextual AI can preemptively protect against unknown attacks without the need for signatures. We will show how it protected customers from Log4J, Spring4shell and most recently, Text4Shell.
|
Infusing Zero Trust in DevOps Supply Chain |
Bisham Kishnani Head of Security Engineering, APAC Cloud Security, Check Point |
Presentation
View YouTube Video
|
Zero Trust is every organization’s priority, but it is predominately been looked at from the network and user side. However, sophisticated attacks like Solarwinds and Kaseya are recent classic cases of breach in the DevOps supply chain, where organizations have not emphasized Zero Trust, and recently there has been a significant growth of attacks in the DevOps supply chain with a major impact on individuals, organizations, and nations. As a result, infusing Zero Trust in DevOps supply chain is becoming a top security priority for CIOs, CISO’s and organizations. When criminal threat actors only need one vulnerability or misconfiguration in the code to paralyze the entire ecosystem, it is absolutely critical that companies build Zero Trusted DevOps supply chains to ensure complete DevOps security from code to cloud. In this session, you will learn how CloudGuard can help customers design their Zero Trusted supply chain, which helps them securely deploy microservices from Deep Shift Left to a running environment in K8s.
|
Kubernetes Admissions and Other Best Practices |
Rolando Panez Global Cloud Technologies Engineering Manager, Check Point |
Presentation
View YouTube Video
|
Kubernetes admission control allows your organization to set security guardrails and best practices when deploying applications in your clusters. Admission controllers can leverage information from other security layers to achieve defense in depth security for Kubernetes. Learn how to use the different security layers of CloudGuard Workload Protection to build effective admission control policies for your Kubernetes environments.
|
CIEM - Reduce the Risk Posed By Cloud Identities |
Abigael Saal Levy Product Manager, Cloud Security, Check Point |
Presentation
View YouTube Video
|
We’ve been warned: identity is the new perimeter and, in the cloud, identities go beyond humans. Even machines have rights! Oftentimes, unnecessary permissions are given to cloud identities due to lack of resources or knowledge. Join this session to learn how CIEM helps you be more secure by optimizing cloud entitlements. Understand what CIEM stands for and if it is pronounced SEEM or KIM. Walk away with clear action items to reduce your attack surface and your overall security risk.
|
Fight Alert Fatigue with ERM |
Yuval Shchory Head of Global Product Management, Cloud Security, Check Point |
Presentation
View YouTube Video
|
Cloud security teams rely on alerts from multiple security capabilities but are increasingly overwhelmed by the number of alerts generated. They simply do not have the person-power to respond to every alert at the speed required to eliminate the risk and reduce exposure. Learn how CloudGuard’s Effective Risk Management engine prioritizes risks and provides actionable remediation guidance based on the full context of the workload posture, network exposure, identity permissions, attack path analysis, and the application business value.
|
AWS - Top Things to Know about Security and Networking in AWS |
Patrick McDowell Principal Solutions Architect, Security, Amazon Web Services |
View YouTube Video
|
Join this session to see how AWS thinks about security and learn about our most popular security and networking services
|
Gigamon - Ensuring Security in the Cloud with Deep Observability Pipeline |
Martyn Crew Director, Solutions Marketing, Gigamon |
View YouTube Video
|
90 percent of organizations operate in a hybrid and multi-cloud world. The shift to a multi-cloud strategy helps organizations propel their digital transformation efforts, but also creates new challenges around security, delivering consistent digital experiences, and operational overhead. The Gigamon Deep Observability Pipeline, based on the GigaVUE® Cloud Suite, amplifies the power of your cloud, security, and observability tools with real-time network intelligence to eliminate security and performance blind spots so you can proactively mitigate security and compliance risks, deliver a superior digital experience and contain runaway complexity and cost across hybrid environments. Learn more by joining this session.
|
CyberUp: Check Point for Startups |
|
Presentation - Grip Security
Presentation - Suridata
View YouTube Video
|
Join this session to learn how the following startups are working with Check Point to increase customer value with cyber security.
- Grip Security runs covered from 6:47 - 11:43
- Reflectiz runs from 16:26 - 20:13
- Sentra runs from 20:16 - 26:12
- Suridata runs from 26:14 - 30:34
|
Microsoft - Winning Formula: Microsoft and Check Point |
Denver McKelheer Sr. PDM, Microsoft |
View YouTube Video
|
Leveraging best-in-class security on Azure, we will provide details on the value of the partnership, including how we integrate and secure some of the most challenging security problems.
|
Radware - Adapting Network and Application Security to the Risks of 2023 |
Ezer Goshen VP Global Business Development & GSI’s, Radware |
View YouTube Video
|
The growing threat landscape and introduction of new vectors and attack methods are only one part of the CISO top of mind. The CISO needs to secure organization digital transformation and the transition to the cloud, while suffering from extreme shortage of skilled cyber security experts. The CISO challenge is how to allow frictionless security, that does not hold the business back, while maintaining best of breed application and network security. In this session we will review the growing threat landscape, security challenges of cloud transition and application modernization. Then we will review Check Point Protector series and how Check Point helps the CISO to achieve best of breed, frictionless security and reduce the TCO of security solutions.
|