Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
PhoneBoy
Admin
Admin

Check Point @ Black Hat 2025

For exclusive access to the slides from each presentation, please log into your Check Point CheckMates account

**If you are not a member yet, its easy (and free) to join, click here**

Topic Speaker Content Description
Optimize Cloud Network Security Architecture with Check Point

Grant Asplund

Presentation

Think attackers don’t already have a dossier on your company? They do – and in this session, Grant shows you what they see before they even launch an attack. He’ll walk you through the digital breadcrumbs you’re unknowingly leaving behind and how to protect your digital brand globally. 

Always Start with the Big Rocks

Grant Asplund

Presentation

Email has quietly become one of the most neglected security holes in modern infrastructure. This talk uncovers what’s really happening when companies switch to Gmail or O365 and assume they're covered. Grant digs into the layers beyond phishing that every org needs to rethink, including file sharing, identity spoofing, and insider risk.  

Why Modern Infrastructure Is Breaking Your Defenses (And What to Do About It)

Grant Asplund

Presentation

Your infrastructure has outpaced your team and attackers know it. In this session, Grant unpacks the rise in complexity caused by AI, multi-cloud, and third-party APIs, and how that’s breaking traditional security models. Learn how modern security teams can prioritize threats and shrink their blast radius without burning out.

Exposed. Stolen. Abused. How Hybrid Mesh Neutralizes Identity Threats

Marc Davidson

Presentation

Stolen credentials are still the golden ticket for attackers, but they don’t have to be. Marc shows how identity-driven security and hybrid mesh architecture can flip the script – blocking infostealers at the edge, catching weird logins mid-attack, and auto-remediating exposed creds before they’re weaponized. It’s control, visibility, and automation all stitched together.

How Generative AI Is Supercharging Fraud—and What to Watch For

Micki Boland

Presentation

Deepfakes are no longer a curiosity—they’re showing up in fund transfer fraud and CEO impersonation attacks, as we speak. Micki brings real-world examples of how GenAI is being used to dismantle trust inside organizations. She’ll also show how to build an AI-powered threat intel fusion that helps organizations identify precursors of evolving attacks and interdict them.

From Hybrid Mess to Hybrid Mesh: Leveraging Automation in Hybrid Mesh

Eytan Sopher

Presentation

Most hybrid architectures pose many challenges due to its complex nature; in most cases the network is secure in some places while exposed in others. Eytan lays out how automation tools like Terraform and Playblocks can stitch consistency across firewalls, cloud zones, and on-prem hardware with fewer missteps and way less manual labor. You’ll even see a live demo of a full network deployment happening in seconds.

Harnessing AI to Stay Ahead of Email Cyber Criminals

Sebastien Rho

Presentation

Phishing attacks are leveling up fast, using AI to craft messages that even your savviest employees struggle to spot. In this session, Sebastien reveals how threat actors are using large language models to bypass filters and fool humans – and how defenders can respond with AI-driven detection that actually works. Spoiler: training alone won’t cut it anymore.

Building the Right Security Architecture in a Distributed World

Sameer Basha

Presentation

The cloud-only dream? Didn’t last long. One-size-fits-all security stacks? Also, long gone. Sameer walks through a brutally honest framework for how to actually protect the modern, distributed enterprise – where on-prem, cloud, and everything in between can be secured without reinventing the wheel or replacing everything you own.

Top Tools for Unifying Cloud and Network Security

Eyal Golombek, Product Leader @ Wiz

Presentation

Security tools are notorious for speaking different languages. In this session, Eyal from Wiz breaks down how to bridge that gap – unifying network security and CNAPP to create meaningful context and smarter prioritization. You’ll learn how integrated insights can harden multi-cloud environments without making your security stack harder to manage.

Shut it Down Fast: Proactive Prevention and Real-Time Containment of Lateral Movement Threats

Raghu Nandakumara, Head of Industry Solutions @ Illumio

Presentation

While security teams chase alerts, attackers move sideways – quietly and quickly. This hands-on session shows how Check Point and Illumio work together to shut down lateral movement using real-time microsegmentation and firewall intelligence. Raghu walks through live threat scenarios and shows how to isolate risky workloads in seconds, enforce Zero Trust segmentation, and stay ahead of the breach instead of reacting after it happens.

From Exposure to Remediation Without Disruption

Michael Greenberg

Presentation

Security leaders face a growing challenge: exposures are multiplying, and remediation remains slow, complex, and disruptive. Through real world case studies, Michael will walk through how Veriti’s Exposure Assessment and Remediation platform automates large-scale remediation, fixing exposures without disruption, hardens security controls to prevent attacks before they happen, and unifies security response by enforcing threat intelligence across all security controls both on-prem and in the cloud.

Transforming Security Operations with External Risk Management

Amit Wegman

Presentation

In today’s threat landscape, the most dangerous risks are no longer behind your firewall—they live across shadow IT, third-party vendors, and the open, deep, and dark web. Amit will explore how Cyberint, now part of Check Point, is redefining External Risk Management (ERM) with a proactive, intelligence-driven approach.

0 Replies

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events