Identity Awareness won't pick this up as is looking at the Domain Controller Logs for Login Events etc.
When you unplug and move from Wired to Wireless you do get a new IP but you aren't authenticating against the AD Servers so no event on the AD Server.
Where you have that type of connectivity change then Identity Collector or even the older AD Query won't have an AD Log to update them.
As such the IA Collector won't see the change as IA Collector is looking at the following events
4624 - An Account was successfully logged on
4768 - A Kerboros Authentication Ticket was requested ie Account Logged in
4769 - Kerberos Service Ticket requested
4770 - Kerberos Service Ticket renewed
That would be where the Identity Agent on the machine would come in useful as the Agent updates the PDP which would do with a change of IP Address
Another potential way forward depending upon the Network is that if you are using Network Access Control on the Network and use either Cisco ISE or possibly one of the products using the Identity Awareness - Web API
Out-of-the-box integration with 3rd party vendors
3rd party vendors already implement client side which updates Identity Awareness blade using the Identity Awareness Web-API:
These should also update the PDP as users move and not reliant on the AD Server events.
Used with the One User option then should disassociate the Wired IP for the User, and associate to the Wireless IP.
Obviously these have costs though whereas the Agent would be part of the Check Point License (obviously cost in terms of deployment) but possibly incorporate as part of machine build?