Geo Policy - Your Secret Weapon for Increased Security and Gateway Performance | Dameon Welch-Abernathy, Cyber Security Evangeslist Timothy Hall, Shadow Peak Inc | | Geo Policy is a little-known feature that can pay big dividends in terms of firewall performance and security. |
Automate Everything - The Future of Security Automation | Tomer Sole, Technology Leader | | In this session, we will show real stories of how our customers successfully use automation to overcome repeating activities and streamline their operations. |
Creating a DevSecOps Culture For Your Business | Aaron McKeown, Xero | | Learn how the network team at Xero, a global online platform for small businesses, were able to communicate the power of Check Point and Amazon Web Services with the business, aligning the technical solution with the ever-evolving business requirements, communicating value to the business. |
Million ways of stealing Cryptocurrencies | Indrajeet Bhuyan, Techlomedia | | Over the last few years, cryptocurrency have become very popular all over the world. Most of the people are into it as it gives quick profit. |
How to Prevent Attacks Before They Strike | Meir Jonathan-Dahan, Technology Leader Elad Goldenberg, Solution Manager | | ThreatGuard is a new service that on ongoing basis checks for threats that organizations are exposed to from attackers’ perspective. Once threats were found, the service remediates them to improve security and avoid cyber events. Click to Expand |
Organized Syndicates, the Defenders Way | Nicky Fang, Artic Security Oy | | Why does it always seems like the adversaries are ahead of organisations defending it? What do attackers, hackers, nation-state sponsors, APT groups etc, have in common? They are highly 'ORGANISED' operatives, extremely focus respective individuals excelling in their own forte. Think ransomware. And yet, the constant security propaganda we hear is always about you and your organisation, defending in silo. |
Orchestrating Gateway Operations - Best Practices | Valeri Loukine, Cyber Security Evangelist | | Security System Orchestration has many challenges that are hard to address with classic management and configuration tool. |
Cyber Security for Smart Manufacturing and Industry 4.0 | Ramandeep Singh Walia, QOS Technology | | The launch of the Check Point AAD solution and the expansion of the Applications WiKI support for the OT and IIoT with the existing Virtual Patch support of the Check Point has made the Check Point storyline for Industry4.0, very promising. |
Finding the Breach in a Haystack - Live Demo | Oren Koren, Technical Product Manager Kierk Sanderlin, Head of Engineering, US Central | | The amount of Cyber attacks are enormous in a single network. Without automatic aggregation of logs into actionable events, the admin/analyst can’t handle the amount of logs he sees every day. Also, by presenting events in a technology language, the admin/analyst can’t understand the impact of this event on his envinroment. |
Regain Visibility Of Your Network Traffic | Michael Poczobut, Blue Cross and Blue Shield of Vermont (BCBSVT) | | |
CloudGuard Deployment Scenarios in AWS | Vladimir Yakovlev, Higher Intelligence LLC | | Presentation will be addressing variety of implementations of vSEC in AWS. From a simple Single AZ and Single VPC to a multi-AZ with multiple peered VPCs. Additionally, it will include a breakdown of the Check Point’s Transit VPC functionality. |
SandBlast Mobile Security - Dob't Put it On Hold | Stacy Dunn, RCB Bank | | |
Honeypotting and Sandboxing Beginners Guide | Eric Crutchlow, Security Engineer | | Want to waste an attackers time and help train your security team simultaneously? Learn techniques that will help you gather intel at earlier stages of an attack. |
Enabling Business & IT Operations in the face of Mounting Security Requirements | Emmanuel D. Bot, Wiley Rain LLP | | |
How to Plan for Incident Response on the Power Grid Without Getting Zapped! | Tim Otis, Team Leader, Incident Response Operations Melissa Kjendle, Connexus Energy | | In this talk we will discuss how CPIRT knowledge of adversarial Tactics Techniques & Procedures is leveraged when preparing for attacks or Penetration Tests, how tabletop drills can be used to effectively communicate a positive security conciseness across all levels of an enterprise, and how CPIRT Compromise Assessments can identify possible areas of improvement. |
Buiding Your Very Own Check Point "Playground" | Eric Anderson, Atlantic Data Security | | |
Finding the Breach in the Haystack - Live Demo | Kierk Sanderlin, Head of Engineering, US Central | Presentation | The amount of Cyber attacks are enormous in a single network. Without automatic aggregation of logs into actionable events, the admin/analyst can’t handle the amount of logs he sees every day. Also, by presenting events in a technology language, the admin/analyst can’t understand the impact of this event on his envinroment. |
ICS Security Challenges n Smart Grid Environment | Jordan Krueger, Xcel Energy | | In Smart Grid and regulated environment, the security challenges comes from growing amount of connected devices starting from Gas and Electricity smart meters, Distribution Automation assets up to grid management. |
Umbrella Security: How Morton Salt Prevents and Manages Its Threat Landscape | Caleb Wilson, Morton Salt | | Cloud apps (SaaS) helped Neopharm gain business agility and assisted in simplifying our IT operations. |
Implementing a National Network for Inter-Government Services | Eli Faskha, Soluciones Seguras | | In 2012, Panamanian Government launched the RNMS (National Network for Multiple Services). The idea was to have a network to connect almost 100 government entities and offer secure Internet connections to smaller entities as a SaaS. |
VSX Performance Optimization | Kaspars Zibarts, Scania | | Kaspars Zibarts have been working with VSX since 2006 in rather different deployments and have accumulated useful information. Kaspars will share best practices on leveraging VSX technology to provide scalable and optimized security while keeping maximum performance |
Check Point for a New Security Administrator in a Company. How Check Point Can Help You to Save Money and Show Your Value for Business | Evgeniy Olkov, TS Solution | | |
Threat Modeling Off-The-Shelf Security Products | Robert Graham | | This talk will provide a very brief introduction to threat modeling and show how it can be applied to off-the-shelf security solutions. Only a minority of organizations perform threat modeling and build their solutions with a secure architecture in mind. Even fewer evaluate the security posture of the security solutions they deploy in their environment. |
CheckMates in 10 Moves | Shahar Grober, Grand City Property | | While threats are becoming more sophisticated and security solutions becoming more complex, Getting the right information to protect your assets is becoming a big challenge to security administrators. |
Security Policy Design - The LEGO® Principle | Danny Jung, Electronic Service Center | | Firewall security policies should always be properly designed to ensure a high level of consistency, integrity, readability and manageability. Choosing the the right methods and tools for structuring, coloring, naming and configuring objects, rules and sections is key to keep the overall firewall security policy healthy, trouble shooting times low, working with different firewall administrators towards the same security principles and goals. |
Securing the Mobile Workforce in a Mobile World - How Asystel Protects Enterprises With SandBlast Mobile | Maurizio Guardassoni, Asystel Jeremy Kaye, Head of Mobile Security, Check Point | | Asystel, a leading Italian provider of IT managed solutions and innovation, and a long time Check Point partner, will present how we are evolving to a Mobile-centric world, the challenges that enterprises face with the rise of mobile malware, and how SandBlast Mobile helps them and their hundreds of customers to secure organizations from data breaches and cyberattacks. |
Data Center Migration - Moving From Appliances to Virtualization | Shay Rozov, Ezbob | | Ezbob is running a 24*7 operation at UK data centers. During Q3-2018, Ezbob has migrated all its environments, production and none-production to a new data center. |