JOIN US IN LAS VEGAS ON February 4 - 7 | #CPX360

CPX 360

THE PREMIER CYBER SECURITY SUMMIT AND EXPO
{d&lt}
{dn}

{dl}

{d>}{h&lt}
{hn}

{hl}

{h>}{m&lt}
{mn}

{ml}

{m>}{s&lt}
{sn}

{sl}

{s>}

CPX 360 promises to be the premier cyber security summit. CPX 360 is where you’ll receive up-to-the-minute intelligence about global threats and other vital topics from the world’s leading cyber security experts. In addition, you’ll enjoy getting hands on with cutting-edge security solutions from Check Point, networking with your peers, and celebrating with the world’s cyber security elite. If you attend one cyber security event this year, make it CPX 360.

 

Tracks at a Glance

Cyber Talk Keynotes – Experience TED-like sessions bringing together top cyber security experts to identify ways to tackle unprecedented security challenges and discuss cyber security priorities, trends and innovations
Securing your Cloud (NEW) – All about securing your cloud with effective blueprints to SaaS, Public and Private Cloud
Hackers Exposed (NEW) – Learn how hackers are developing the next wave of Gen VI threats
Cyber Security Innovations (NEW) – Explore Cyber Security Innovations to effectively prevent threats before they cause damage
Cyber Innovation Competition (NEW) – 20×20 short cyber innovation stories
CheckMates Community use-cases – Listen first-hand to industry best practices from other organizations discussing real use-cases
Technology Innovation Labs – Experience Infinity threat prevention and security architecture
Geek Village (NEW) – geeky workshops (e.g. malware reversing, lock picking, crypto, Lego models etc.)
Hands-On Labs – Test Drive our latest technology through our hands-on Lab with a step by step cookbooks
EXPO – Explore the EXPO; see the latest technology solutions and demonstrations from Check Point and our Partners, Start-Up Pavilion
Certification – Bring your laptop and Credit card and come get Certified. Pass an exam (CCSA, CCSE or CCSM) here and your certification benefit will be valid for 3 years instead of 2 years!
Gamification – Explore the 2019 Cyber challenge – CTF game, Shoot down hackers in the Cyber Range, or go on the CheckMates Scavenger Hunt.
Cyber Range – Shoot down hackers and compete for the crown in our Expo Cyber Range. Sign up now to secure your place!

Speakers

FC (Freaky Clown)

CEO, Hacker, Social Engineer

An ethical social engineer, FC ‘breaks into’ hundreds of banks, offices and government facilities finding weaknesses that assist organizations in improving their security.

    RAFI ZVI

    CEO, BackBox

    Rafi Zvi discusses how intelligent automation drives change in organizations and essential steps for NGFW implementations. He uses real examples and demonstrations.

      Jeremiah Cornelius

      Architect Evangelist – VMware

      Jeremiah is VMware’s Alliance Security Architect for partner product strategy and security use cases. He’s advised Fortune 500 CSOs, with over a decade prior in practical aspects of cyber security.

        Simon Hamilton-Wilkes

        Solution Architect – VMware

        Simon is VMware’s NSX Partner Solutions Technical Architect. A VMware VCDX and vExpert, and a Cisco CCIE.

          Tim Hall

          Founder, Shadow Peak Inc

          Tim has been providing security consulting services for organizations along the Colorado Front Range full time since 1999.

            Eric Anderson

            Senior Engineer, Atlantic Data Security

            Eric is Senior Engineer at Atlantic Data Security and has been working with Check Point products as a VAR for almost 20 years, and as a Check Point certified instructor for 18 years.

              Vladimir Yakovlev

              Founder, Higher Intelligence LLC

              Vladimir is head of IT for brokerage firm G. X. Clarke & Co. and responsible for multiple iterations of infrastructure design, engineering and implementation with focus on resiliency and security.

                Eli Faskha

                CEO, Soluciones Seguras

                Eli is Founder and CEO of Soluciones Seguras, one of the leading Cybersecurity companies in Central America.

                  Stacy Dunn

                  Information Security Analyst, RCB Bank

                  Stacy has educational background in Fine Arts and Design and believe she bring a unique perspective to the world of tech.

                    Gil Shwed

                    Founder and CEO

                    Gil Shwed is the founder and Chief Executive Officer. Mr. Shwed is considered the inventor of the modern firewall and authored several patents, such as the company’s Stateful Inspection technology.

                      Dorit Dor

                      Vice President of Products

                      Dr. Dorit Dor, Vice President of products at Check Point, manages all product definition and development functions for both the enterprise and consumer divisions of the company

                        Peter Alexander

                        Chief Marketing Officer

                        As CMO, Peter leads Check Point’s Marketing Organization, including Corporate Marketing, Corporate Communications, GEO/Field Marketing, Strategic Marketing, and Demand Generation.

                          Sponsors

                          Diamond Sponsors

                          Platinum Sponsors

                          Gold Sponsors

                          Silver Sponsors

                          Bronze Sponsors

                          Start-up Sponsors

                          Schedule

                          18:00 - 21:00
                          Registration and Welcome Cocktail Reception

                          Registration and Welcome Cocktail Reception (All Field, Partners & Customers) – EXPO Opens + R&D Ask me Anything + 20x20 Cyber Innovation Competition + Cyber Range Competition

                          9:00 - 13:00
                          Training Tracks

                          1. Hacking 101: Introduction to common web attack techniques
                            • Learn about common security holes in the IT world. Learn the basics of preventing security holes in your network.
                          2. Cyber Range
                            • Hyper-realistic simulation and virtual training environment, providing Gen V cyber range training for all type of customers and partners
                          3. Automating and orchestrating your security network with Check Point R80.20
                            • Use the new API to automate security management operations and other security functions.
                          4. Deep Dive into Check Point’s SandBlast product family
                            • Detect and prevent malware and phishing attacks. Use Threat Emulation and Extraction to scan for malicious files. Protect against unknown threats in files that are downloaded from the Internet or attached to emails.
                          5. Be a technical expert on the Check Point R80.20 software release
                            • Learn what’s new with R80.20 NGFW/NGTP. Employ the new security policy layers functionality.
                          6. Preventing mobile cyber security attacks with Check Point mobile security
                            • Are your employees accessing their corporate information through their mobile devices? Are those devices secured? How vulnerable is your corporate network without Mobile Security? Come, learn, and try Check Point SandBlast Mobile and how to protect your network from mobile security breaches with our advanced mobile threat defense. Hear about Capsule Workspace and how to create a secure environment on device that will prevent corporate data loss and unwanted access using a seamless and secure user experience.
                          7. Securing your cloud workloads with Check Point
                            • Protect your assets in the cloud from the most sophisticated threats with dynamic scalability, intelligent provisioning and consistent control across physical and virtual networks.

                          Technology Innovation Labs
                          1. SandBlast Network + Web Threat Extraction
                          2. Securing EndPoints with SandBlast Agent
                          3. Mobile Security 3.0
                          4. CloudGuard & Dome9
                          5. Securing Clouds with CloudGuard SaaS
                          6. Container Security with CloudGuard IaaS (Private)
                          7. Securing Public Clouds
                          8. SD-WAN Security
                          9. Latest Innovation with ThreatGuard
                          10. SecaaS, TELCO & Virtualization and DevOps
                          11. ICS + SCADA Security
                          12. Latest on Security Management - R80.20
                          13. DEVOPS - Automation & Orchestration - R80.20
                          14. Device operations-simplified!
                          15. MAESTRO - Scalable platform - Demo!
                          16. SMB Security
                          17. R80.20 Best practices - Use cases
                          18. Automated Tailored Threat Prevention
                          19. Check Point Infinity - Multi vector security
                          20. EndPoint Cloud Management & Operations
                          21. HLS & SandBlast Now
                          22. Threat Hunting
                          23. SandBlast Agent for MAC
                          24. Securing the future - Sandblast for Educational
                          25. Security management on the Cloud

                          9:10 - 10:30
                          Cyber Talk Keynotes

                          1) Welcome
                          2) Gil Shwed Keynote – Cyber Security for 2020 – Gil Shwed, Founder & CEO
                          3) Microsoft Azure Keynote – Ann Johnson, Senior Corp VP Cybersecurity Solutions, Microsoft
                          4) Forrester Keynote – Generations of Cyber Threats and Solutions – Josh Zelonis, Senior Analyst, Forrester
                          5) CISO Point of View – Joe Bennet, CISO Hertz

                          1) A Hacker’s Mind Exposed – FREAKY CLOWN
                          2) A Cyber Security Gut Check: Good is Not Good Enough – Avi Rembaum, VP, Security Solutions
                          3) Incident Response Cloudy War Stories – Dan Wiley, Head of Incident Response
                          4) Age of Things – Gen VI Security – Itai Greenberg, VP, Product Management + Oded Gonda, VP, Technology & Innovation

                          1) Automating Security Orchestration & Recovery with Check Point & BackBox – Ted Czarnecki – Pfizer + Rafi Zvi, CTO and Co-Founder, BackBox
                          2) Cloudy with a Chance of a Breach – John Bloomer, Regional Director, Security Engineering
                          3) Check Point 2019 Innovations, Roadmap & Vision, Dorit Dor, VP, Products

                          12:00 - 16:00
                          Expo

                          Explore the latest solutions with live demonstrations by Check Point and our partners + 20x20 Cyber Innovation Competition + Cyber Range Competition

                          Technology Partners Innovations
                          13:30 - 14:00 -- 1) Cyber Security Innovations – Charles Eagan, CTO Blackberry + Dorit Dor, VP Products, Check Point
                          14:00 - 14:30 -- 2) Intelligent Automation for Security Operations – Rafi Zvi, CEO BackBox
                          15:00 - 15:30 -- 3) Google Cloud & Seal Case Study
                          15:30 - 16:00 -- 4) AWS Session

                          Securing your Cloud
                          13:30 - 14:00 -- 1) Kick-*aas Cloud Security: Architecting Robust Security and Compliance Across Your *-as-a- Service Footprint – Sudarshan Srinivassan
                          14:00 - 14:30 -- 2) Securing SaaS Applications – The Pragmatic Approach – Mark Ostrowsky
                          15:00 - 15:30 -- 3) Who’s Responsible for Your Cloud Security? – Lessons Learned – Ran Nahmias
                          15:30 - 16:00 -- 4) AWS & Azure IaaS Architecture Blueprint – Gustavo Coronel, Cloud Security Architect

                          Cyber Security Innovations
                          13:30 - 14:00 -- 1) How to Plan for Incident Response on the Power Grid Without Getting Zapped! – Tim Otis & Melissa Kjendle, Connexus Energy
                          14:00 - 14:30 -- 2) Preventing Attacks on Mobile Devices – Scot Kight
                          15:00 - 15:30 -- 3) Security at Hyperscale – Glen Deskin
                          15:30 - 16:00 -- 4) Humans Are Your Weakest Link. Protecting Against Social Engineering With Infinity – Rich Comber

                          Security Automation & Orchestration
                          13:30 - 14:00 -- 1) Honeypotting and Sandboxing Beginners Guide – Eric Crutchlow & Synopsis, Check Point & Synopsis
                          14:00 - 14:30 -- 2) Finding the Breach in a Haystack – Live Demo – Oren Koren
                          15:00 - 15:30 -- 3) API Best Practices with Check Point – Robbie Elliott
                          15:30 - 16:00 -- 4) Orchestrating Gateway Operations – Best Practices – Valeri Loukine

                          Hackers Exposed
                          13:30 - 14:00 -- 1) The Next Wave of Breaches Dissected – Orli Gan
                          14:00 - 14:30 -- 2) Tracing Ransomware Payments in the Bitcoin Ecosystem – Masarah Paquet-Clouston, Researcher, GoSecure
                          15:00 - 15:30 -- 3) Designing Exploits & Implants For Industrial Control Systems – Jos Wetzels, Midnight Blue
                          15:30 - 16:00 -- 4) Game of Trojans: Dissecting The Russian Underground Cyber Scene – Chen Erlich, Researcher, enSilo

                          CheckMates Community Use-Cases
                          13:30 - 13:50 -- 1) Geo Policy – Your Secret Weapon for Increased Security and Gateway Performance – Timothy Hall – Shadow Peak Inc
                          13:50 - 14:10 -- 2) Enabling Business & IT Operations in the Face of Mounting Security Requirements – Emmanuel D. Bot, Director of Information Security, Wiley Rein LLP
                          14:10 - 14:30 -- 3) CloudGuard Deployment Scenarios in AWS – Vladimir Yakovlev, Cybersecurity and Infrastructure Solutions Architect, Higher Intelligence LLC
                          15:00 - 15:30 -- 4) SandBlast Mobile Security – Don’t Put It On Hold – Stacy Dunn, Information Security, RCB Bank
                          15:30 - 16:00 -- 5) Implementing a National Network for Inter-Government Services – Eli Faskha, CEO, Soluciones Seguras

                          Technology Innovation Labs
                          1. SandBlast Network + Web Threat Extraction
                          2. Securing EndPoints with SandBlast Agent
                          3. Mobile Security 3.0
                          4. CloudGuard & Dome9
                          5. Securing Clouds with CloudGuard SaaS
                          6. Container Security with CloudGuard IaaS (Private)
                          7. Securing Public Clouds
                          8. SD-WAN Security
                          9. Latest Innovation with ThreatGuard
                          10. SecaaS, TELCO & Virtualization and DevOps
                          11. ICS + SCADA Security
                          12. Latest on Security Management - R80.20
                          13. DEVOPS - Automation & Orchestration - R80.20
                          14. Device operations-simplified!
                          15. MAESTRO - Scalable platform - Demo!
                          16. SMB Security
                          17. R80.20 Best practices - Use cases
                          18. Automated Tailored Threat Prevention
                          19. Check Point Infinity - Multi vector security
                          20. EndPoint Cloud Management & Operations
                          21. HLS & SandBlast Now
                          22. Threat Hunting
                          23. SandBlast Agent for MAC
                          24. Securing the future - Sandblast for Educational
                          25. Security management on the Cloud

                          Hands-on Labs
                          1. New R80.20 SmartEvent
                          2. SandBlast Network + Agent
                          3. Private Cloud (Cisco ACI, Vmware NSX)
                          4. Check Point Infinity
                          5. Security Management & Automation R820.10 - DevOps

                          9:00 - 10:15
                          Cyber Talk Keynotes

                          1) The Cyber Risk Paradox – Jeff Schwartz, VP, US Engineering
                          2) Hacking like a Disney Villain– Maya Horowitz, Director, Threat Intelligence & Research
                          3) IoT and Nano Security Unraveled – Yariv Fishman, Head of Product Management, Cloud Security
                          4) CloudGuard Dome9 and Check Point’s CloudGuard Family – Zohar Alon, Head of Cloud Product Line
                          5) Use Case – Securing the Broncos with Infinity – Russ Trainor, CISO Denver Broncos

                          1) AI Innovations in Cyber Security –Neatsun, VP, Threat Prevention + Eddie Doyle, Cyber Security Evangelist
                          2) Hackers Exposed – Gen VI Threats Under the Microscope – Oded Vanunu, Head of Products Vulnerability Research + Yaniv Balmas, Head of Security Research
                          3) How Do We Protect Our Own Cloud Infrastructure? – Sharon Schusheim, VP, Information Systems
                          4) 20X20 Cyber Innovation winner

                          12:00 - 16:00
                          Expo

                          Explore the latest solutions with live demonstrations by Check Point and our partners + 20x20 Cyber Innovation Competition + Cyber Range Competition

                          Technology Partners Innovations
                          13:30 - 14:00 -- 1) Managing Effective Security Policies in a Hybrid Enterprise Network – Reuven Harrison, CTO & CO-Founder Tufin Technologies
                          14:00 - 14:30 -- 2) VMware Session
                          15:00 - 15:30 -- 3) Google Cloud & Seal Case Study
                          15:30 - 16:00 -- 4) TBD

                          Securing your Cloud
                          13:30 - 14:00 -- 1) Kick-*aas Cloud Security: Architecting Robust Security and Compliance Across Your *-as-a- Service Footprint – Zohar Alon
                          14:00 - 14:30 -- 2) Dockers & Containers: How to Contain it Securely – Roy Feintuch
                          15:00 - 15:30 -- 3) SEE SPOT SECURE – Continuous Cloud Compliance and Security Simplified with Dome9 – Grant Asplund
                          15:30 - 16:00 -- 4) Lift & Shift vs Cloud Native – Yariv Fishman

                          Cyber Security Innovations
                          13:30 - 14:00 -- 1) The Final Frontier Beyond Your Perimeter – Protecting Devices, Security Data – Brian Gleeson, Head of Product Marketing
                          14:00 - 14:30 -- 2) SD-WAN and Branch Office Security – Unique Challenges & Effective Approaches – Aviv Abramovich
                          15:00 - 15:30 -- 3) Endpoint Security Total Protection - Best Practices – Yossi Hasson
                          15:30 - 16:00 -- 4) Threat Hunting with SandBlast NOW – Jerrod Piker

                          Security Automation & Orchestration
                          13:30 - 14:00 -- 1) Automate Everything – The Future of Security Automation – Ryan Darst
                          14:00 - 14:30 -- 2) Security for DevOps – No Humans Necessary – Marco Garcia
                          15:00 - 15:30 -- 3) How to Prevent Attacks Before They Strike – Lior Drihem, Meir Jonathan-Dahan + Elad Goldenberg
                          15:30 - 16:00 -- 4) SMB Security – Unique Challenges & Effective Approaches – Aviv Abramovich

                          Hackers Exposed
                          13:30 - 14:00 -- 1) The Short Story Of Terrifying State Of Our Tool Set And What We Can Do To Make It Better – Maciej Kotowicz, Security Researcher, Kaspersky's Lab/GReAT
                          14:00 - 14:30 -- 2) Domestic Kitten Unravelling ISIS Espionage – Aseel Kayal
                          15:00 - 15:30 -- 3) Why Mobile Adware Is Our Concern – Avigayil Mechtinger
                          15:30 - 16:00 -- 4) What The Fax? – Eyal Itkin

                          CheckMates Community Use-Cases
                          13:30 - 14:00 -- 1) Regain Visibility of your Network Traffic – Michael Poczobut, Blue Cross and Blue Shield Vermont (BCBSVT)
                          14:00 - 14:30 -- 2) Building your very own Check Point “playground” – Eric Anderson, Training Director/Senior Security Engineer, Atlantic Data Security
                          15:00 - 15:30 -- 3) ICS Security Challenges in Smart Grid Environment – Jordan Krueger, Substantion Communication Engineer, Xcel Energy
                          15:30 - 16:00 -- 4) Umbrella Security: How Morton Salt prevents and manages its Threat Landscape

                          Technology Innovation Labs
                          1. SandBlast Network + Web Threat Extraction
                          2. Securing EndPoints with SandBlast Agent
                          3. Mobile Security 3.0
                          4. CloudGuard & Dome9
                          5. Securing Clouds with CloudGuard SaaS
                          6. Container Security with CloudGuard IaaS (Private)
                          7. Securing Public Clouds
                          8. SD-WAN Security
                          9. Latest Innovation with ThreatGuard
                          10. SecaaS, TELCO & Virtualization and DevOps
                          11. ICS + SCADA Security
                          12. Latest on Security Management - R80.20
                          13. DEVOPS - Automation & Orchestration - R80.20
                          14. Device operations-simplified!
                          15. MAESTRO - Scalable platform - Demo!
                          16. SMB Security
                          17. R80.20 Best practices - Use cases
                          18. Automated Tailored Threat Prevention
                          19. Check Point Infinity - Multi vector security
                          20. EndPoint Cloud Management & Operations
                          21. HLS & SandBlast Now
                          22. Threat Hunting
                          23. SandBlast Agent for MAC
                          24. Securing the future - Sandblast for Educational
                          25. Security management on the Cloud

                          Hands-on Labs
                          1. New R80.20 SmartEvent
                          2. SandBlast Network + Agent
                          3. Private Cloud (Cisco ACI, Vmware NSX)
                          4. Check Point Infinity
                          5. Security Management & Automation R820.10 - DevOps

                          9:00 - 12:00
                          Sessions for Partners

                          1) Welcome
                          2) Partnering for Success! - Dan Yerushalmi, Chief Customer Office + Frank Rauch, Head of Worldwide Channel
                          3) Taking the gloves off in 2019 - Peter Alexander, Chief Marketing Officer
                          4) Partner Awards
                          5) Coffee Break and Networking
                          6) Winning Through Innovation - Moti Sagey, Head of Strategic Marketing & Intelligence
                          7)Leveraging Emerging Products to Over Achieve Your Quota – Nathan Shuchami, VP, Emerging Products

                          13:30 - 16:10
                          Breakouts: Sales and Technical

                          Sales A
                          1) Understanding the Infinity Total Protection Value Proposition - Eran Orzel, Head of Strategic Sales and Partnerships
                          2) New Customers - Leveraging Partner Program - Yifat Bavli, Sales Enablement Manager + Aviel Katz, Head of Partner Alliance
                          3) How to Sell CloudGuard with Customer Centric Approach - Yariv Fishman, Head of Product Management, Cloud Security + Sudarshan Srinivasan, VP, Product
                          4) Replicating Success with Customer Win Cases - Amit Sharon, Head of Customer Community

                          Sales B
                          1) Replicating Success with Customer Win Cases - Amit Sharon, Head of Customer Community
                          2) Understanding the Infinity Total Protection Value Proposition - Eran Orzel, Head of Strategic Sales and Partnerships
                          3) New Customers - Leveraging Partner Program - Yifat Bavli, Sales Enablement Manager + Aviel Katz, Head of Partner Alliance
                          4) How to Sell CloudGuard with Customer Centric Approach - Yariv Fishman, Head of Product Management, Cloud Security + Sudarshan Srinivasan, VP, Product

                          Sales C
                          1) How to Sell CloudGuard with Customer Centric Approach - Yariv Fishman, Head of Product Management, Cloud Security + Sudarshan Srinivasan, VP, Product
                          2) Replicating Success with Customer Win Cases - Amit Sharon, Head of Customer Community
                          3) Understanding the Infinity Total Protection Value Proposition - Eran Orzel, Head of Strategic Sales and Partnerships
                          4) New Customers - Leveraging Partner Program - Yifat Bavli, Sales Enablement Manager + Aviel Katz, Head of Partner Alliance

                          Sales D
                          1) New Customers - Leveraging Partner Program - Yifat Bavli, Sales Enablement Manager + Aviel Katz, Head of Partner Alliance
                          2) How to Sell CloudGuard with Customer Centric Approach - Yariv Fishman, Head of Product Management, Cloud Security + Sudarshan Srinivasan, VP, Product
                          3) Replicating Success with Customer Win Cases - Amit Sharon, Head of Customer Community
                          4) Understanding the Infinity Total Protection Value Proposition - Eran Orzel, Head of Strategic Sales and Partnerships

                          SE 1
                          1) How to Whiteboard the Gen V Story - Greg Pepper, Security Architect
                          2) How to Win EVERY POC! - Whatacha McCallum
                          3) Maximize the Value of Technical Sales Tools - Hanan Adika, Director, Global Solution Center
                          4) Dive Deep into Competitive Analysis - Hezi Chen, Head of Competitive Intelligence

                          SE 2
                          1) Dive Deep into Competitive Analysis - Hezi Chen, Head of Competitive Intelligence
                          2) How to Whiteboard the Gen V Story - Greg Pepper, Security Architect
                          3) How to Win EVERY POC! - Whatacha McCallum
                          4) Maximize the Value of Technical Sales Tools - Hanan Adika, Director, Global Solution Center

                          SE 3
                          1) Maximize the Value of Technical Sales Tools - Hanan Adika, Director, Global Solution Center
                          2) Dive Deep into Competitive Analysis - Hezi Chen, Head of Competitive Intelligence
                          3) How to Whiteboard the Gen V Story - Greg Pepper, Security Architect
                          4) How to Win EVERY POC! - Whatacha McCallum

                          SE 4
                          1) How to Win EVERY POC! - Whatacha McCallum
                          2) Maximize the Value of Technical Sales Tools - Hanan Adika, Director, Global Solution Center
                          3) Dive Deep into Competitive Analysis - Hezi Chen, Head of Competitive Intelligence
                          4) How to Whiteboard the Gen V Story - Greg Pepper, Security Architect

                          Pricing

                          Customers
                          $1490
                          • Two Day Event
                          • All General Sessions
                          • All Breakout Sessions
                          • CPX Expo Pass
                          • Welcome Reception
                          • Training with additional cost
                          Register
                          Partners
                          $1590
                          • Three Day Event
                          • All General Sessions
                          • All Breakout Sessions
                          • CPX Expo Pass
                          • Welcome Reception
                          • Training with additional cost
                          Register

                          FAQ

                          Registration

                          Who should attend?

                          CPX 360 delivers several conference tracks of vital interest for professionals in many cyber security and business roles. The Cyber Talk keynotes track  is perfect for C-level executives and other policy makers. Patterned after TED sessions, Cyber Talks bring together top cyber security experts who identify today’s unprecedented security challenges as they discuss cyber security priorities, trends and innovations. The Architect, Prevent and Manage tracks provide the best and most practical ways to secure your organization. Cyber Security engineers, architects, administrators and geeks will benefit greatly from the Customer Community Use Cases track as well as the Technology Innovation and Hands-on Labs to test drive our latest technology.

                          Why should I attend?

                          Understanding the current state of cyber security has never been more important for sustaining normal operations and preventing data breaches that can prove catastrophic to organizations of all types. CPX 360 brings together the world’s elite cyber security experts to give you the latest trends in threats and the strategies and technologies needed to prevent damage from cyber attacks.

                          How do I register?

                          Follow this link to register for the February 4-7 conference to be held at Mandalay Bay Resort and Casino, Las Vegas, USA.

                          May I register on-site?

                          No. To ensure sufficient seating for all sessions and events, all attendees must preregister online for the conference.

                          May more than one person from the same company attend the Check Point Experience 360 Conference?

                          Yes, but each person must register individually.

                          Will I receive a receipt for my registration?

                          Yes, you will receive a receipt for your registration from Check Point approximately two weeks after the event.

                          How do I book a hotel room?

                          If you registered for a package that includes a hotel room, Check Point will reserve a hotel room on your behalf for the nights of February 4-6 (for customers) and 4-7 (for partners). A separate hotel confirmation number will be provided to you (this is different from the CPX2019 registration confirmation number you receive). If you chose to register without a hotel room, lodging reservations are wholly your responsibility.

                          Co-op

                          Can I use Co-op funds to attend the event?

                          Yes. If you pre-register for the event pass, partners and distributors can use co-op for this event for each employee and end user that you wish to sponsor excluding hotel.

                          The fee will be directly discounted at the time you or your customer registers. No additional reimbursements apply, so no claims are required in 2019. There is no limit to the number of end user guests that a Check Point partner or distributor can sponsor through Co-op.

                          Can I use co-op to cover conference expenses beyond the approved allowance?

                          No.

                          Do I need to open a co-op project for the approved allowance?

                          No. Please enter the co-op sponsoring partner’s name and email address on the “Preferences” page during online registration so that you get the appropriate allowance.

                          Do I need to file a claim after the event?

                          No. Since no additional reimbursements apply, no claims are required.

                          I have questions about my registration with co-op. How can I follow up?

                          Please contact coop@checkpoint.com.

                          Other Questions

                          What is the dress code?

                          The dress code is business casual.

                          How do I get information on exhibits and sponsorships?

                          Learn more about CPX 360 sponsorship opportunities – contact Demi Battaglia.

                          What if I still have unanswered questions about the Check Point Experience 360 Conference?

                          If you have questions about the conference, please email cpx360.usa@checkpoint.com.

                          What is the Check Point Experience Conference cancellation policy?

                          Conference cancellations received up to two weeks prior to the event are fully refundable. No refunds will be made less than two weeks before the first day of the event. To be eligible for a refund, cancellations must be submitted to cpx360.usa@checkpoint.com. Refunds will be issued within 30 days of the conference.

                          Note: Hotel cancellations are subject to respective hotel cancellation policy.

                          Earn CPE Credits

                          We are pleased to announce that Check Point is partnering with the following world-class cyber security certification vendors to provide CPX 360 attendees the opportunity to gain Continuing Professional Education (CPE) credits.

                          • (ISC)2
                          • GIAC
                          • EC Council
                          • CompTIA


                          How to Obtain CPE Credits

                          • After attending CPX 360, you will receive a digital badge of attendance from Check Point (example shown below)
                            • (ISC)2 – Please send your (ISC)² Member ID# with the badge to CPE@checkpoint.com
                            • GIAC, EC Council, CompTIA – Please visit the certification vendor website and provide them the link to the CPX digital badge as proof of attendance

                          If you have any questions, please contact us at cpe@checkpoint.com.

                          Location

                          • Mandalay Bay Resort and Casino
                          • 3950 S. Las Vegas Blvd. 89119, Las Vegas, NV