Topic | Speaker | Content | Abstract |
Stepping Up to GEN V of Cyber Security | Gil Shwed Founder and CEO Check Point Software Technologies | Presentation Video | 2017 has been a game changer in the world of cyber-crime, Mega-attacks have spread fast to almost every country and every industry possible – from banking, transportation to healthcare to production lines. Moreover, regardless of all our current investments in cyber security, according to a recent survey conducted by Check Point, 98% of IT professional respondents have experienced a significant cyber security threat in past 3 years. Are we adopting the right security strategy? Are we using the appropriate generation of technologies to cope with these Mega-attacks? Finally, how different will our security challenges look like in 5 years from now? |
Protecting Check Point | Sharon Schusheim, VP, Information Systems | Presentation Video | Check Point CIO Sharon Schusheim shares what keeps him up at night, the modern challenges of protecting borderless networks, and pragmatic approaches you can take to protect your network. |
Check Point 2018: New Technologies and Solutions | Gabi Reish, VP, Product Management and Product Marketing | Presentation Video | Check Point is your partner against cyber-crime. This is realized on a daily basis by thousands of Check Point customers worldwide using the most advanced cyber security technologies. These technologies are part of Check Point Infinity’s cyber security architecture all focused on prevention technologies across the entire network, mobile and cloud. How will this architecture progress in 2018? What new technologies and capabilities will be available in 2018 to our customers? In this session, we will highlight the top product and technology announcements to be introduced in this year’s CPX360 |
Hacking the boardroom | Edwin Doyle, Head of Customer Engagement & Neatsun Ziv, VP, Threat Prevention | Presentation Video | Cybersecurity is a boardroom discussion for enterprise corporations globally. In this fun & entertaining presentation, you will learn how to approach senior executive for an effective discussion on Cybersecurity & how the Internet of Everything has elevated cybersecurity professionals to the most valuable resources in any company. |
Internet of Things: Is Winter Coming? | Avi Rembaum, Vice President, Security Solutions | Presentation Video | The concept of the Internet of Things (IoT) truly represents a radical shift in how companies will operate, governments will govern and individuals will live their lives. Microcomputetechnologies and autonomous systems will permeate our day-to-day activities. They will introduce opportunities for simplification, optimization and accuracy, and they will threaten to distribute cyber threats into the deepest levels of our shared experience. This session will provide a view into what an IoT future will look like, a summary of the cyber risks that such a future could see and present practical security considerations that enterprises can consider when planning their moves towards wide-spread IoT implementation. |
Is AI Silver Bullet in Cyber Security | Orli Gan, Head of Product Management and Product Marketing, Threat Prevention | Presentation Video | Artificial Intelligence is the Industrial Revolution of our time. It is already reshaping our world and is likely to transform practically every facet of our human lives. Fighting cybercrime is one of its many applications, but at what cost? Are AI technologies the silver bullet that the cyber-defense industry has been looking for? As of today, how mature are these technologies? What should you look for in an AI-based security product? Learn about Check Point’s unique advantages in harnessing AI technologies and how already they are built into our systems to offer superior security throughout. |
Yes, You Can Get Burned When It's Cloudy | Peter Sandkuijl, Head of Security Solutions, Engineering, Europe Don Meyer, Head of Marketing, Cloud Security, Check Point Dennis Moreau, Senior Engineering Architect, Vmware | Presentation Video | Public and hybrid cloud adoption is exploding among enterprises, but so are cloud hacks and breaches. Cloud assets are at risk from the same types of threats targeting physical networks. What’s more, cybercriminals are using increasingly automated and sophisticated techniques to target and penetrate cloud environments. Cloud-enabled businesses need to understand where they are vulnerable and how to leverage advanced threat prevention security to keep their cloud assets protected. Join us for a thought provoking session to gain practical knowledge of not only the risks but also how to close your security gaps in the cloud. |
Why Our Security Problems are Getting Worse | Jeffrey Schwartz, Vice President, US Engineering Thierry Karsenti, VP, SE & New Technology Unit, Europe Tony Jarvis, Threat Prevention Architect, AMA | Presentation Video (Jeff) Video (Thierry) | Security spending is up 8% year over year, yet security incidents are up ~40%. Why does the security “ball of yarn” continue to unravel as we pull the string. In this session, you will learn why our security problems continue to get worse and what we need to do about it. How do organizations succeed in delivering “agile” to their business while increasing security effectiveness at the same time? Evolving from traditional networking and security models one step at a time, will not empower you to deliver Change to your organization, nor will it change your security outcomes. In this session, you’ll learn strategies and techniques to deliver better security in the areas of Cloud, Advanced Threat and Mobility. |
This Call Is Being Monitored (Not for Quality of Service Purposes) | Jeremy Kaye, Head of Mobile Security Michael Petit, Head of Mobility Michael Shaulov, Head of Product Management and Product Marketing, Mobile and Cloud Security & Pedro Pablo Pérez, SVP Global Security Telefónica – CEO ElevenPaths, Telefónica Cyber Security Unit | Presentation Video Video with Eleven Paths | Ever wanted to know how to hack a smartphone? Join this exciting live demo to see first-hand how easy it is. In this session, Jeremy Kaye and Michael Shaulov will demonstrate a live hacking of a smartphone. In the Eleven Paths version of the video, we hold a fireside chat with, Pedro Pablo Perez, the CEO of Telefonica Cyber Security, to discuss Telefonica’s strategy in the mobile security space. |
Incident Response War Stories | Daniel Wiley, Head of Incident Response | Presentation Video | The Cloud is an amazing game changer. It provides the ability to revolutionize IR. But it can also have a much darker side. Join the head of the Check Point Incident Response Team as we explore the darker side of the Cloud and provide war stories of some of the compromises and how to prevent them from happening to you. |
Are All Security Products Created Equal? | Moti Sagey, Head of Strategic Marketing & Intelligence | Presentation Video | Are All Security Products Created Equal? In his keynote, Moti will discuss in a pragmatic fact based way what it takes to build a Gen V security solution and how the cyber landscape matches the must have for effective security |
External Speakers |
Inside the Mind of a Hacker | Pablos Holman | Presentation Pablos Holman: Inside The Mind of a Hacker (Excerpt) Video (full) | Hackers are the new superheroes. They have seemingly magical powers that most people can’t comprehend. Where there are superheroes, there are also supervillains, and in the world we live in, there’s a war of escalation going on. Unprecedented developments in both the complexity and scale of hacking have reformed the economic, political & social environment we live in. Pablos is a hacker with a deep understanding of these issues. He will show how the mind of a hacker works and how it can be deployed for both breaking the things we use every day and building the new technologies we need to advance into the future. |
CISO viewpoint on modern IT | Britney Hommertzheim, Director, Information Security. AMC Theatres. Gioacchino Buscemi, Network Security Officer, European Space Agency. | Presentation Video Presentation Video | In this session, CISOs will share their vision on modern IT, the importance of compliance and security, and how they are very different. Additionally, they will review many of the personal leanings that they have gained from their experience as a CISO responsible for maturing an Information Security program. |
Vmware & Check Point - Better Together | Dennis Moreau, Security Architect Vmware (with Don Mayer) | Presentation Video | Public and hybrid cloud adoption is exploding among enterprises, but so are cloud hacks and breaches. Cloud assets are at risk from the same types of threats targeting physical networks. |
Microsoft Azure and Check Point - Intelligent Cloud Security | Avi Ben Menahem, Director of Azure Security Microsoft | Presentation Video | In his keynote Avi will discuss what it takes to build and operate a secure cloud platform, the approach the team at Microsoft takes to secure Azure, and the importance of a strong developer and partner ecosystem to the success of cloud adoption. |