- CheckMates
- :
- Products
- :
- General Topics
- :
- Re: #CPX360 Slides 2019
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
#CPX360 Slides 2019
For exclusive access to the slides and videos from each presentation, please log into your Check Point CheckMates account
**If you are not a member yet, its easy (and free) to join, click here**
Cyber Talk Keynotes
Topic | Speaker | Content | Abstract |
---|---|---|---|
Gil Shwed Keynote - Cyber Security for 2020 | Gil Shwed Founder and CEO Check Point Software Technologies | 2018 brought new challenges for our industry and new accomplishments for Check Point. While there has been great progress, the need for better security with scalability and manageability will inevitably lead to consolidated solutions which can provide seamless prevention. Check Point Infinity is the leading such solution. Gil will discuss his vision for Infinity, and how the architecture will provide cloud-based services to address Gen I through VI attacks. | |
A Cyber Security Gut Check: Good Is Not Good Enough | Avi Rembaum, VP, Security Solutions | This session will dissect the gap between attack and prevention generations and showing a financial view. We spend $120 Billion on security technology and services and lose $600 Billion. The impact of GDPR and the alignment of risk management to security: application of traditional financial risk management methods on IT security. IT security professionals will need to learn how to show the benefit of their investment and how to reduce spend and increase risk reduction. This leads to the importance of strategies toward consolidation and embracing the move to security through automation. | |
How Do We Protect Our Own Cloud Infrastructure? | Sharon Schusheim, VP, Information Systems | Check Point CIO shares on stage challenges and pragmatic approaches in securing public cloud infrastructures at Check Point to answer different departments requirements for agility, quick delivery of compute power and operating the big data lake called ThreatCloud to address Check Point Customers security needs | |
Hackers Exposed - Gen VI Threats Under the Microscope | Yaniv Balmas, Head of Security Research Oded Vanunu, Head of Products Vulnerability Research | ||
Hacking Like a Disney Villain | Maya Horowitz, Director, Threat Intelligence & Research | The session will illustrate different types of cyber-attacks through the vicious activities done by notorious Disney villains, with examples of attacks discovered by Check Point researchers throughout the year. See how Ursula asked Ariel for ransom, how Cruella de Vil recruited a botnet of Dalmatians and more. | |
AI Innovations in Cyber Security | Neatsun Ziv, VP, Threat Prevention Eddie Doyle, Cyber Security Evangelist | Algorithms are being used to choose who lives & who dies. Computers are being programmed to make ethical decisions that impact every facet of our lives. Based on the ethics of cyber-criminals, Check Point has made another gigantic leap forward by teaching our gateways to use algorithms to detect the DNA of Malware & in an industry-first breakthrough that will provide the best threat prevention in the world! | |
Age of Things - Gen VI Security | Itai Greenberg, VP, Product Management Oded Gonda, VP, Technology & Innovation | The number of digital connected assets that needs to be secure is growing exponentially. In addition to endpoint, servers and networks, organizations are facing the challenge to secure cloud applications, containers as well as IoT and Mobile devices of different kind, that utilize a plethora of operating systems, software frameworks and technologies from many vendors. Ensuring secure design, hardening, compliance and enforcement for such a diversity of assets is challenging. It is time to re-think how security should be done, delivered and consumed - we call it Infinity GenVI Security. | |
Cloudy with a Chance of a Breach | John Bloomer, Security Engineering Manager, Midwest Area Gary Gardiner, Head of Security Engineering, AMA Peter Sandkuijl, Head of Security Solutions, Engineering, Europe |
In this session we will examine a couple cases where disrespecting the shared responsibility model have resulted in significant disclosures, and high costs. We will also examine what you can do to prevent them. | |
The Cyber Risk Paradox | Tony Jarvis, Threat Prevention Architect, AMA Jeff Schwartz, VP, US Engineering Thierry Karsenti, VP, SE & New Technology Unit, Europe | Technology’s primary purpose is to enhance the human experience: optimizing performance, increasing efficiency, solving problems more quickly. At the same time, “winter is coming”, the next cyber-pearl harbor is on the horizon. These conflicting hard trends demonstrate a clear and present challenge for organizations. Inching us closer to instability, we have some that have accepted “breach fatigue” while at the same time there is pressure for greater regulation (GDPR and California’s Consumer Privacy Act). If we accept the idea that regulatory compliance is the lowest common denominator for true security control, how can organizations truly reduce risk while enhancing the human experience? | |
CloudGuard Dome9 and Check Point's CloudGuard Family | Zohar Alon, Head of Cloud Product Line | Using the cloud is the new norm and this is how we secure it. In this session we will showcase the new member of Check Point’s CloudGuard family, Dome9 and will reveal several of the early integrations coming up. We will share with the audience the benefits of the CloudGuard Dome9 platform and cover several exciting use cases for the technology and show in real time how we prevent AWS account takeover. | |
Incident Response Cloudy War Stories | Dan Wiley, Head of Incident Response | Lessons are repeated until they are learned. Over the course of the 2018 the Check Point Incident Response Team has handled over 800 cases. We will share with the audience the benefits of the CloudGuard Dome9 platform and cover several exciting use cases for the technology and show in real time how we prevent AWS account takeover. | |
IoT and Nano Security Unraveled | Yariv Fishman, Head of Product Management, Cloud Security | “The internet of things’ is all around us: in your office coffee machine, its building elevators, light system, and even around your city in traffic lights, surveillance cameras and more. While the ever increasing connectivity makes our on-and-off work lives easier, it also broadens attack surfaces, making it inevitably easier for hackers to target us as businesses. | |
Predicting the Unpredictable: A Look into 2019 Cyber Threat Landscape | Orli Gan, Head of Product Management and Product Marketing, Threat Prevention | The pace of change in the cyber world makes predictions almost impossible to make. Can we truly prepare for what’s next? Probably not entirely, but there is a lot we can learn from our ongoing research of current cyber threats. In this talk we will take you on a journey through the current trends in the cyber threat landscape and show how they may well help shape the next generation of attacks. A deeper perspective into the motivation, means and opportunities fueling cyber attacks and how the latest technologies of cloud, mobile, IoT, blockchain and AI are leveraged for malicious gain. | |
20x20 Cyber Innovation Winner - Cyber Story Axonius | Nathan Burke, Chief Marketing Officer, Axonius | ||
External Speakers | |||
Alibaba Keynote | Kenny Tan, GM, Alibaba Cloud | ||
Microsoft Azure Keynote | Jonathan Trull, GM Cyber Security, Group Microsoft | ||
Forrester Keynote - Generations of Cyber Threats and Solutions | Josh Zelonis, Senior Analyst, Forrster | ||
Use Case - Securing the Broncos with Infinity | Russ Trainor, CISO Denver Broncos | ||
Automating Security Orchestration & Recovery with Check Point & BackBox | Ted Czarnecki, Pfizer Rafi Zvi, CTO and Co-Founder, BackBox | ||
Cybercrime & the geo-political Impact | Eward Driehuis, Chief Research Officer, SecureLink | Not so long ago, our goal in infosec was to prevent attacks. Today, we can only make ourselves a more difficult target, and ready ourselves for events slipping through. Eward Driehuis, SecureLink’s research chief, outlines the lessons he’s learned from analyzing a quarter of a million events bypassing defenses in 2018. | |
A Hacker's mind Exposed | Freaky Clown | FC (FreakyClown) will deliver a fascinating keynote at CPX Americas and Europe about the inner workings of the hacker’s mind. | |
CISO Point of View | Joe Bennett, CISO Hertz |
Securing Your Cloud
Topic | Speaker | Content | Abstract |
---|---|---|---|
Kick-*aas Cloud Security: Architecting Robust Security and Compliance Across Your *-as-a- Service Footprint | Zohar Alon, Head of Cloud Product Line David Gubiani, SE Manager | Modern enterprises rely on a variety of IaaS, PaaS and SaaS solutions to meet the growing IT needs of their organizations. How do you establish and maintain consistent security and governance across a sprawling footprint. How do you get visibility and control of your security posture across your dynamic cloud environments? | |
Securing SaaS Applications – The Pragmatic Approach | Asaf Henig, Product Manager Mark Ostrowsky, Regional Director Security Engineering, Eastern Noa Katz, Product Marketing Manager | Cloud Access Security Broker (CASB) solutions have evolved in the last few years from providing mainly visibility, i.e. presenting data about used SaaS applications, to detecting and preventing data breaches caused by exploiting SaaS vulnerabilities. However, though many CASB vendors are following this transition, most, if not all, are simplifying the task at hand and provide the same protection paradigms to all SaaS applications as if they have exactly the same attack surface. | |
Who’s Responsible for Your Cloud Security? – Lessons Learned | Ran Nahmias, Head of Cloud Security Richard Cove, SE, Data Center Expert | Everyone is transitioning to the Clouds. Not so many years ago, security teams within organizations were battling the rouge addition of new operating systems into the data center; the multi-OS practice was considered a security risk many CISOs did want to allow in their data centers. | |
Lift & Shift vs Cloud Native | Yariv Fishman, Head of Product Manager, Cloud Security Peter Sandkuijl, Head of Security Solutions, Engineering, Europe | “For some, moving to the cloud is a journey. It starts with moving their own data center workloads to the cloud and evolves as they get familiar with its native capabilities. For others, the journey starts natively in the cloud. | |
AWS Architecture Blueprint | Gustavo Coronel, Cloud Security Architect Sameer Vasanghapuram, Cloud Architect AWS Javier Hijas, Cloud Security Team Leader Amit Schnitzer, Cloud Security Architect | “This session will elaborate on how the latest Check Point CloudGuard security solutions for AWS are a perfect match for implementing the best practices recommended by AWS to protect cloud infrastructures” | |
Docker & Containers: How to Contain It Securely | Amir Kaushansky, Product Manager Roy Feintuch, Chief Technologist, Cloud | Raise your hand if you too, constantly hear about ‘Containers’. Not yet, wait for the session. ‘Containers’ are the IT word of cloud IT, and often rise in contexts like: Docker, Kubernetes, Open Shift, etc. | |
SEE SPOT SECURE - Continuous Cloud Compliance and Security Simplified with Dome9 | Grant Asplund, Cloud Evangelist | In this session you will learn why Gartner says, “Through 2022, at least 95% of cloud security failures will be the customer’s fault.”
| |
DevOps and Security - Friends or Foes? | Reuven Harrison, CTO and Co-Founder, Tufin |
Cyber Security Innovations
Topic | Speaker | Content | Abstract |
---|---|---|---|
Cyber Attacks on Industrial Control System (ICS) – Reality!! | Mati Epstein, Lead Sales Manager, Critical Infrastructure | Cyber-attacks on Industrial Control Systems (ICS) and in particular critical and manufacturing infrastructures are now a reality. | |
Preventing Attacks on Mobile Devices | Jeremy Kaye, Head of Mobile Security Ran Schwartz, Product Manager Scot Kight, Regional Expert, Mobility James Alliband, Mobile Security SE NER | The mobile threat landscape is ever-changing. As Apple and Google continue to battle each other to win the hearts and minds of users, attackers are lurking in the shadows trying to find new ways to manipulate both the user and the device to gain access to what is not theirs.
| |
Security at Hyper-Scale | Michael Greenberg, Product Marketing Manager Glen Deskin, Head of Engineering, Mid-Atlantic Derek Middlemiss, Security Experts, Team Leader | As cyber-security threats continues to evolve fast and network traffic volumes grow exponentially, we need security platforms that can keep up and scale. | |
Humans Are Your Weakest Link. Protecting Against Social Engineering With Infinity | Eytan Segal, Head of Product Management, Threat Prevention Eitan Erez, Head of Threat Prevention Rich Comber, Head of Threat Prevention Engineering, Americas Magnus Skold, Threat Prevention Security Engineering | Are you prepared for the next attack? Cyberattacks are more dangerous than ever before, with devastating tools and techniques available to hackers. | |
Branch Office and SD-WAN Security - Unique Challenges & Effective Approaches | Aviv Abramovich, Head of Security Services, Product Management Nils Ujma, Cloud Security Architect | The world is changing around us, the traditional data centers and MPLS are migrating to cloud and SD-WAN. This session focus on Check Point solutions and partnerships for securing branch office connectivity in the era of SD-WAN through Network Security as a Service (NSaaS) and Network Functions Virtualization (NFV). | |
Secure the Virtual Cloud Network Against Advanced Threats with VMware NSX and Check Point | Simon Hamilton-Wilkes, Solution Architect Jeremiah Cornelius, Architect Evangelist, VMware Strategic Technology Alliance Scott Sloan, Director Global Technology Partners Brad Bock, Senior Product Marketing Manager VMware | ||
The Final Frontier Beyond Your Perimeter - Protecting Devices, Securing Data | Tal Eisner, Product Marketing Manager Brian Gleeson, Head of Product Marketing Christine Schoenig, Technical Manager | Discuss why today’s borderless networks and ad hoc workspaces are a field day for cybercriminals and havoc for security professionals. Corporate data on all devices, including smartphones which are really just another endpoint in the architecture- needs to be protected with the highest levels of security | |
Threat Hunting with SandBlast NOW | Nir Naaman, Head of Government and Defense Products Jerrod Piker, Regional Expert, Threat Prevention Peter Elmer, Cyber Security Architect | Would you go bear hunting with a switch? No way! Then why go threat hunting without the proper tools? Join us to learn more about what threat hunting is, and what tools you need to make it effective in your organization. | |
Transforming Your Endpoints From the Weakest Link to the Strongest Defense | Yossi Hasson, Product Manager Lior Arzi, Director, End Point Cyber Security Christian Sandberg, Head of Threat Prevention Engineering, Europe | In 2018 employee endpoints were the most targeted asset type in the enterprise, phishing was the #1 method for cyber-attacks and file-less malware was on the rise.
|
Security Automation & Orchestration
Topic | Speaker | Content | Abstract |
---|---|---|---|
Automate Everything - The Future of Security Automation | Tomer Sole, Technology Leader Ryan Darst, Manager, Regional Solution Center Jim Öqvist, Security Expert, Europe | In this session, we will show real stories of how our customers successfully use automation to overcome repeating activities and streamline their operations.
| |
Security for DevOps - No Humans Necessary | Donald Wasylyna, Security Architect Marco Garcia, Director of Engineering, Global SI & MSP Derek Middlemiss, Security Experts, Team Leader | Adding security as part of your development deployments doesn’t have to be a challenge. Security must be adaptable and easy to maintain to keep up with the always changing nature of the cloud.
| |
How to Prevent Attacks Before They Strike | Meir Jonathan-Dahan, Technology Leader Elad Goldenberg, Solution Manager | ThreatGuard is a new service that on ongoing basis checks for threats that organizations are exposed to from attackers’ perspective. Once threats were found, the service remediates them to improve security and avoid cyber events. | |
API Best Practices with Check Point | Tomer Sole, Technology Leader Robbie Elliot, Regional Director of Engineering Jim Öqvist, Security Expert, Europe | “a beginner’s guide to automation along with Pro tips and best practices to get you started”. | |
Cloud Security with Check Point - AWS Session | Saroj Punyapatthanakul, Chief Security Architect AWS | ||
Finding the Breach in a Haystack - Live Demo | Oren Koren, Technical Product Manager | The amount of Cyber attacks are enormous in a single network. Without automatic aggregation of logs into actionable events, the admin/analyst can’t handle the amount of logs he sees every day. Also, by presenting events in a technology language, the admin/analyst can’t understand the impact of this event on his envinroment. | |
SMB Security - Unique Challenges & Effective Approaches | Aviv Abramovich, Head of Security Services, Product Management Sunny Gil, Security Expert, Europe | Small and Medium Business face new challenges and world with an increasing complexity. This session focus on Check Point SMB solutions and our roadmap and focus for 2019-2020. | |
Orchestrating Gateway Operations - Best Practices | Valeri Loukine, Cyber Security Evangelist | Cyber threat is real. Given the growing number of cyber-attacks and security breaches, the need for security becomes more and more important. Security threats are a matter of when it will happen, not if. | |
Intelligent Automation for Security Operations | Rafi Zvi, CEO BackBox | ||
Secure the Virtual Cloud Network Against Advanced Threats with VMware NSX and Check Point | Simon Hamilton-Wilkes, Solution Architect Jeremiah Cornelius, Architect Evangelist VMware Strategic |
Hackers Exposed
Topic | Speaker | Content | Abstract |
---|---|---|---|
CPR - What the Hack? | Richard Clayton, Product Manager, Security Research | The late Stephen Hawking said “research is the joy of discovering something no-one knew before”. It is this joy of creating new knowledge that drives our expert team of cyber researchers. | |
Domestic Kitten Unravelling ISIS Espionage | Lotem Finkelsteen, Group Manager Aseel Kayal, Malware Analyst | In a fundamental regime that is constantly wary of anything that might jeopardize its stability and a region that is a hotbed of political conflicts and dissensions, it is not surprising to discover a large-scale espionage campaign that keeps an eye out not only for external threats but also for internal ones. | |
What the Fax? | Yaniv Balmas, Group Manager Eyal Itkin, Security Researcher | Unless you've been living under a rock for the past 30 years or so, you probably know what a fax machine is. But who uses such archaic technology today? The answer is almost everyone. | |
Hacking Drones & Speading Fake News Via WhatsApp | Roman Zaikin, Security Expert | In this talk we reveal how DJI, the world's largest drone manufacturer, was exposed to an attack that could have allowed attackers access to photos and drone film footage taken by emergency service and critical infrastrcture organizations, amongst others, who are increasinly using drones to carry out their operations.
| |
PS I See You: PowerShell and Fileless Attacks Hidden in Your Environments | Pasha Pal, Group Manager | Fileless attacks entail taking advantage of default Windows tools and using them for malicious activity. PowerShell, in particular, which comes with Windows is a preferred weapon of choice. | |
Turning the Enemy Against Himself | Raman Ladutska, Reverse Engineer | Function names and strings are pivotal points in reverse engineering process. When researchers know what functions are called and what strings are used, it's much easier for them to describe malware logic.
| |
MeeCukoo - Bypassing Sandboxes | Aliaksandr Chailytko, Reverse Engineer | A few years ago Mac users were confident about their security, because of the very low amount of malware targeting the platform. However, with the growing popularity of Apple products the number of macOS malware and its complexity also grows. While the malware threat landscape for Mac becoming more mature, the need for high-scale automated analysis increases as well. | |
Olympic Destroyer - The Games of Malware | Michael Abramzon, Team Leader | Although the cyber-attack which disrupted the IT infrastructure of the Winter Olympic Games 2018 was short-lived, it nevertheless managed to grab a lot of headlines and remained in the news for weeks.
| |
The Short Story of Terrifying State of Our Tool Set and What We Can Do to Make It Better | Maciej Kotowicz, Kaspersky's GReAT | We can't really do anything without our tools. For the last decade most reverse engineers where fine with leading solutions, not because they were perfect but because there was no real alternative - sadly a situation that has not changed to this day. This is not because we don't have many tools but because they are sometimes lacking basic features. | |
Designing Exploits & Implants For Industrial Control Systems | Jos Wetzels, Midnight Blue | In 2017 a malware framework dubbed TRITON was discovered targeting a petrochemical plant in Saudi Arabia. TRITON is the most complex publicly known ICS attack framework to date and the first publicly known one to target safety controllers. | |
Game Of Trojans: Dissecting The Russian Underground Cyber Scene | Chen Erlich, enSIlo | One day, a mysterious open directory flashed across my eyes. It was enchanting and lead me straight into the world of the Khalesi malware, also known as the KPOT campaign. I had unknowingly dived into the rabbit's hole. | |
Tracing Ransomware Payments in the Bitcoin Ecosystem | Masarah Paquet-Clouston, GoSecure | Ransomware can prevent a user from accessing a device and its files until a ransom is paid to the attacker, most frequently in Bitcoin. With over 500 known ransomware families, it has become one of the dominant cybercrime threats for law enforcement, security professionals and the public. | |
Why Mobile Adware is our Concern? | Avigayil Mechtinger, Cyber Analyst Elena Root, Cyber Analyst | In the past two years, Check Point’s mobile malware research team has discovered and published numerous blogs about mobile malware. Among them are the RottenSys, AdultSwine and Judy Malware.
| |
Silivaccine - Inside North Korea's Anti-Virus | Mark Lechtik, Team Leader | SiliVaccine is deployed widely and exclusively in the DPRK, and has been continuously in development by dedicated government teams for over fifteen years. When we heard of this strange software, we were immediately driven to investigate it. | |
Nexus Zeta | Adi Ikan, Team Leader | In the last 10 years, the number of connected devices has grown to over twenty billion, and, as the years go by, they get progressively smarter. However, whereas they score high on convenience, the latest discoveries from Check Point Research shows they still have a lot of homework to do to get their security score up to par. |
CheckMates Community Use-Cases
Topic | Speaker | Content | Abstract |
---|---|---|---|
Geo Policy - Your Secret Weapon for Increased Security and Gateway Performance | Dameon Welch-Abernathy, Cyber Security Evangeslist Timothy Hall, Shadow Peak Inc | Geo Policy is a little-known feature that can pay big dividends in terms of firewall performance and security. | |
Automate Everything - The Future of Security Automation | Tomer Sole, Technology Leader | In this session, we will show real stories of how our customers successfully use automation to overcome repeating activities and streamline their operations. | |
Creating a DevSecOps Culture For Your Business | Aaron McKeown, Xero | Learn how the network team at Xero, a global online platform for small businesses, were able to communicate the power of Check Point and Amazon Web Services with the business, aligning the technical solution with the ever-evolving business requirements, communicating value to the business. | |
Million ways of stealing Cryptocurrencies | Indrajeet Bhuyan, Techlomedia | Over the last few years, cryptocurrency have become very popular all over the world. Most of the people are into it as it gives quick profit.
| |
How to Prevent Attacks Before They Strike | Meir Jonathan-Dahan, Technology Leader Elad Goldenberg, Solution Manager | ThreatGuard is a new service that on ongoing basis checks for threats that organizations are exposed to from attackers’ perspective. Once threats were found, the service remediates them to improve security and avoid cyber events. Click to Expand
| |
Organized Syndicates, the Defenders Way | Nicky Fang, Artic Security Oy | Why does it always seems like the adversaries are ahead of organisations defending it? What do attackers, hackers, nation-state sponsors, APT groups etc, have in common? They are highly 'ORGANISED' operatives, extremely focus respective individuals excelling in their own forte. Think ransomware. And yet, the constant security propaganda we hear is always about you and your organisation, defending in silo. | |
Orchestrating Gateway Operations - Best Practices | Valeri Loukine, Cyber Security Evangelist | Security System Orchestration has many challenges that are hard to address with classic management and configuration tool. | |
Cyber Security for Smart Manufacturing and Industry 4.0 | Ramandeep Singh Walia, QOS Technology | The launch of the Check Point AAD solution and the expansion of the Applications WiKI support for the OT and IIoT with the existing Virtual Patch support of the Check Point has made the Check Point storyline for Industry4.0, very promising. | |
Finding the Breach in a Haystack - Live Demo | Oren Koren, Technical Product Manager Kierk Sanderlin, Head of Engineering, US Central | The amount of Cyber attacks are enormous in a single network. Without automatic aggregation of logs into actionable events, the admin/analyst can’t handle the amount of logs he sees every day. Also, by presenting events in a technology language, the admin/analyst can’t understand the impact of this event on his envinroment.
| |
Regain Visibility Of Your Network Traffic | Michael Poczobut, Blue Cross and Blue Shield of Vermont (BCBSVT) | ||
CloudGuard Deployment Scenarios in AWS | Vladimir Yakovlev, Higher Intelligence LLC | Presentation will be addressing variety of implementations of vSEC in AWS. From a simple Single AZ and Single VPC to a multi-AZ with multiple peered VPCs. Additionally, it will include a breakdown of the Check Point’s Transit VPC functionality. | |
SandBlast Mobile Security - Dob't Put it On Hold | Stacy Dunn, RCB Bank | ||
Honeypotting and Sandboxing Beginners Guide | Eric Crutchlow, Security Engineer | Want to waste an attackers time and help train your security team simultaneously? Learn techniques that will help you gather intel at earlier stages of an attack.
| |
Enabling Business & IT Operations in the face of Mounting Security Requirements | Emmanuel D. Bot, Wiley Rain LLP | ||
How to Plan for Incident Response on the Power Grid Without Getting Zapped! | Tim Otis, Team Leader, Incident Response Operations Melissa Kjendle, Connexus Energy | In this talk we will discuss how CPIRT knowledge of adversarial Tactics Techniques & Procedures is leveraged when preparing for attacks or Penetration Tests, how tabletop drills can be used to effectively communicate a positive security conciseness across all levels of an enterprise, and how CPIRT Compromise Assessments can identify possible areas of improvement. | |
Buiding Your Very Own Check Point "Playground" | Eric Anderson, Atlantic Data Security | ||
Finding the Breach in the Haystack - Live Demo | Kierk Sanderlin, Head of Engineering, US Central | Presentation | The amount of Cyber attacks are enormous in a single network. Without automatic aggregation of logs into actionable events, the admin/analyst can’t handle the amount of logs he sees every day. Also, by presenting events in a technology language, the admin/analyst can’t understand the impact of this event on his envinroment. |
ICS Security Challenges n Smart Grid Environment | Jordan Krueger, Xcel Energy | In Smart Grid and regulated environment, the security challenges comes from growing amount of connected devices starting from Gas and Electricity smart meters, Distribution Automation assets up to grid management. | |
Umbrella Security: How Morton Salt Prevents and Manages Its Threat Landscape | Caleb Wilson, Morton Salt | Cloud apps (SaaS) helped Neopharm gain business agility and assisted in simplifying our IT operations. | |
Implementing a National Network for Inter-Government Services | Eli Faskha, Soluciones Seguras | In 2012, Panamanian Government launched the RNMS (National Network for Multiple Services). The idea was to have a network to connect almost 100 government entities and offer secure Internet connections to smaller entities as a SaaS.
| |
VSX Performance Optimization | Kaspars Zibarts, Scania | Kaspars Zibarts have been working with VSX since 2006 in rather different deployments and have accumulated useful information. Kaspars will share best practices on leveraging VSX technology to provide scalable and optimized security while keeping maximum performance | |
Check Point for a New Security Administrator in a Company. How Check Point Can Help You to Save Money and Show Your Value for Business | Evgeniy Olkov, TS Solution | ||
Threat Modeling Off-The-Shelf Security Products | Robert Graham | This talk will provide a very brief introduction to threat modeling and show how it can be applied to off-the-shelf security solutions. Only a minority of organizations perform threat modeling and build their solutions with a secure architecture in mind. Even fewer evaluate the security posture of the security solutions they deploy in their environment. | |
CheckMates in 10 Moves | Shahar Grober, Grand City Property | While threats are becoming more sophisticated and security solutions becoming more complex, Getting the right information to protect your assets is becoming a big challenge to security administrators.
| |
Security Policy Design - The LEGO® Principle | Danny Jung, Electronic Service Center | Firewall security policies should always be properly designed to ensure a high level of consistency, integrity, readability and manageability. Choosing the the right methods and tools for structuring, coloring, naming and configuring objects, rules and sections is key to keep the overall firewall security policy healthy, trouble shooting times low, working with different firewall administrators towards the same security principles and goals.
| |
Securing the Mobile Workforce in a Mobile World - How Asystel Protects Enterprises With SandBlast Mobile | Maurizio Guardassoni, Asystel Jeremy Kaye, Head of Mobile Security, Check Point | Asystel, a leading Italian provider of IT managed solutions and innovation, and a long time Check Point partner, will present how we are evolving to a Mobile-centric world, the challenges that enterprises face with the rise of mobile malware, and how SandBlast Mobile helps them and their hundreds of customers to secure organizations from data breaches and cyberattacks.
| |
Data Center Migration - Moving From Appliances to Virtualization | Shay Rozov, Ezbob | Ezbob is running a 24*7 operation at UK data centers. During Q3-2018, Ezbob has migrated all its environments, production and none-production to a new data center. |
Sales Kickoff for Check Point Sales Field and Partners (limited access)
Partner Day - General Keynote Sessions | ||
---|---|---|
Partnering for Success! | Dan Yerushalmi, Chief Customer Officer Frank Rauch, Head of Worldwide Channel | |
Taking the Gloves Off in 2019 | Peter Alexander, Chief Marketing Officer | |
Partner Awards | ||
Winning Through Innovation | Moti Sagey, Head of Strategic Marketing & Intelligence | |
Leveraging Emerging Products to Over Achieve Your Quota | Nathan Shuchami, VP Emerging Products | |
Sales Track | ||
Understanding the Infinity Total Protection Value Proposition | Eran Orzel, Head Of Strategic Sales and Partnerships | |
New Customers - Leveraging Partner Program | Yifat Bavli, Sales Enablement Manager & Aviel Katz, Head of Partner Alliance | |
Selling Cloud Security - A Customer Centric Approach | Yariv Fishman, Head of Product Management, Cloud Security & Zohar Alon, Head of Cloud Product Line | |
Replicating success with Customer Win Cases | Amit Sharon, Head of Customer Community Gil Sarig, Market Intelligence Manager | |
SE TRACK | ||
How to Whiteboard the Gen V Story | Gary Gardiner, Head of Security Engineering, AMA Greg Pepper, Security Architect Peter Sandkuijl, Head of Security Solutions, Engineering, Europe | |
How to Win EVERY POC! | Asher Harosh, Manager, POC team & Anatoly Masover, POC Manager Whatcha McCallum, Manager, Americas Solution Center | |
Maximize the Value of Technical Sales Tools | Elad Goldenberg, Solution Manager Yael Haker, Customer Success and Pre-Sales Tools Manager Hanan Adika, Director, Global Solution Center | |
Dive Deep into Competitive Analysis | Hezi Chen, Head of Competitive Intelligence Mor Manor, Competitive Intelligence Lead Analyst |
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The permissions should be appropriately adjusted and you should have access to the content now.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
"The topic you are trying to access is not available. Note that some content is only available if you are signed into CheckMates."
I'm also getting this error message while trying to access other CheckMates member exclusive content. I tried different browsers, makes no difference. Something wrong with my profile?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
One issue that you probably ran into was that the documents would attempt to load in a previewer, which for some reason is not working. I've disabled this for now, so you should be able to retrieve the presentations.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thank you Dameon for checking this. But my profile is still not able to access any Checkmates exclusive content. I've tried it even on different computers (different browser profiles) and even on a browser of on of my colleagues: It is working with his Checkmates account, but not with mine.
See yourself:
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I've re-added them. If after you log in again, you're still having issues, let me know.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Not that I'm aware of.

- « Previous
-
- 1
- 2
- Next »