JOIN US IN LAS VEGAS ON February 4 - 7 | #CPX360

CPX 360










CPX 360 promises to be the premier cyber security summit. CPX 360 is where you’ll receive up-to-the-minute intelligence about global threats and other vital topics from the world’s leading cyber security experts. In addition, you’ll enjoy getting hands on with cutting-edge security solutions from Check Point, networking with your peers, and celebrating with the world’s cyber security elite. If you attend one cyber security event this year, make it CPX 360.


Tracks at a Glance

Cyber Talk Keynotes – Experience TED-like sessions bringing together top cyber security experts to identify ways to tackle unprecedented security challenges and discuss cyber security priorities, trends and innovations
Securing your Cloud (NEW) – All about securing your cloud with effective blueprints to SaaS, Public and Private Cloud
Hackers Exposed (NEW) – Learn how hackers are developing the next wave of Gen VI threats
Cyber Security Innovations (NEW) – Explore Cyber Security Innovations to effectively prevent threats before they cause damage
Cyber Innovation Competition (NEW) – 20×20 short cyber innovation stories
CheckMates Community use-cases – Listen first-hand to industry best practices from other organizations discussing real use-cases
Technology Innovation Labs – Experience Infinity threat prevention and security architecture
Geek Village (NEW) – geeky workshops (e.g. malware reversing, lock picking, crypto, Lego models etc.)
Hands-On Labs – Test Drive our latest technology through our hands-on Lab with a step by step cookbooks
EXPO – Explore the EXPO; see the latest technology solutions and demonstrations from Check Point and our Partners, Start-Up Pavilion
Gamification – Explore the 2019 Cyber challenge – CTF game, Shoot down hackers in the Cyber Range, or go on the CheckMates Scavenger Hunt
Certification – Bring your laptop and Credit card and come get Certified. Pass an exam (CCSA, CCSE or CCSM) here and your certification benefit will be valid for 3 years instead of 2 years!


FC (Freaky Clown)

CEO, Hacker, Social Engineer

An ethical social engineer, FC ‘breaks into’ hundreds of banks, offices and government facilities finding weaknesses that assist organizations in improving their security.


    CEO, BackBox

    Rafi Zvi discusses how intelligent automation drives change in organizations and essential steps for NGFW implementations. He uses real examples and demonstrations.

      Gil Shwed

      Founder and CEO

      Gil Shwed is the founder and Chief Executive Officer. Mr. Shwed is considered the inventor of the modern firewall and authored several patents, such as the company’s Stateful Inspection technology.

        Dorit Dor

        Vice President of Products

        Dr. Dorit Dor, Vice President of products at Check Point, manages all product definition and development functions for both the enterprise and consumer divisions of the company

          Peter Alexander

          Chief Marketing Officer

          As CMO, Peter leads Check Point’s Marketing Organization, including Corporate Marketing, Corporate Communications, GEO/Field Marketing, Strategic Marketing, and Demand Generation.


            Diamond Sponsors

            Platinum Sponsors

            Gold Sponsors

            Silver Sponsors

            Bronze Sponsors

            Start-up Sponsors


            9:00 - 13:00
            Training Tracks

            1. Hacking 101: Introduction to common web attack techniques
              • Learn about common security holes in the IT world. Learn the basics of preventing security holes in your network.
            2. Cyber Range
              • Hyper-realistic simulation and virtual training environment, providing Gen V cyber range training for all type of customers and partners
            3. Offensive Web hacking (Time: 09:00-16:00)
              • This fast paced training gives attendees an insight into advanced AppSec topics
            4. Automating and orchestrating your security network with Check Point R80.20
              • Use the new API to automate security management operations and other security functions.
            5. Deep Dive into Check Point’s SandBlast product family
              • Detect and prevent malware and phishing attacks. Use Threat Emulation and Extraction to scan for malicious files. Protect against unknown threats in files that are downloaded from the Internet or attached to emails.
            6. Be a technical expert on the Check Point R80.20 software release
              • Learn what’s new with R80.20 NGFW/NGTP. Employ the new security policy layers functionality.
            7. Preventing mobile cyber security attacks with Check Point mobile security
              • Are your employees accessing their corporate information through their mobile devices? Are those devices secured? How vulnerable is your corporate network without Mobile Security? Come, learn, and try Check Point SandBlast Mobile and how to protect your network from mobile security breaches with our advanced mobile threat defense. Hear about Capsule Workspace and how to create a secure environment on device that will prevent corporate data loss and unwanted access using a seamless and secure user experience.
            8. Securing your cloud workloads with Check Point
              • Protect your assets in the cloud from the most sophisticated threats with dynamic scalability, intelligent provisioning and consistent control across physical and virtual networks.
            9:00 - 10:30
            Cyber Talk Keynotes

            1) Welcome
            2) Cyber Security for 2020 – Gil Shwed, Founder & CEO
            3) Forrester Keynote – Generations of Cyber Threats and Solutions – Josh Zelonis, Senior Analyst Forrester
            4) CISO Point of View – Customer Session
            5) Cyber Security Customer Needs in the Modern Era and Effective Approaches – Avi Rembaum, VP, Security Solutions

            1) External Speaker Keynote
            2) AI Innovations in Cyber Security – Neatsun, VP, Threat Prevention + Eddie Doyle, Cyber Security Evangelist
            3) Incident Response Cloud War Stories – Dan Wiley, Head of Incident Response
            4) IoT and Nano Security Unraveled – Yariv Fishman, Head of Product Management, Cloud Security

            1) The Cyber Risk Paradox – Jeff Schwartz, VP, US Engineering
            2) Cloudy with a Chance of a Breach – John Bloomer, Security Engineering Manager, Midwest Area
            3) Check Point 2019 Innovations, Roadmap & Vision, Dorit Dor, VP, Products

            12:00 - 18:00

            Explore the latest solutions with live demonstrations by Check Point and our partners.

            Securing your Cloud
            13:30 - 14:00 -- 1) Sponsor Session
            14:00 - 14:30 -- 2) Securing SaaS Applications – The Pragmatic Approach – Mark Ostrowsky
            15:00 - 15:30 -- 3) Who’s Responsible for Your Cloud Security? – Lessons Learned – Ran Nahmias
            15:30 - 16:00 -- 4) Lift & Shift vs. Cloud Native – Yariv Fishman

            Cyber Security Innovations
            13:30 - 14:00 -- 1) Sponsor Session
            14:00 - 14:30 -- 2) Security of Hyper-Scale – Glen Deskin
            15:00 - 15:30 -- 3) Preventing Attacks on Mobile Devices – Scot Kight
            15:30 - 16:00 -- 4) Are you covered? Advanced cyber – defense for modern IT – Rich Comber

            Security Autmation & Orechestration
            13:30 - 14:00 -- 1) Sponsor Session
            14:00 - 14:30 -- 2) API Best Practices Skeleton – Greg Pepper
            15:00 - 15:30 -- 3) Finding the Breach in a Haystack – Live Demo – Oren Koren
            15:30 - 16:00 -- 4) Orchestrating Gateway Operations – Best Practices – Valeri Loukin

            Hackers Exposed
            13:30 - 14:00 -- 1) The Next Wave of Breaches Dissected – Orli Gan
            14:00 - 14:30 -- 2) Tracing Ransomeware Payments in the Bitcoin Ecosystem – Masarah Paquet-Clouston GoSecure
            15:00 - 15:30 -- 3) Designing Exploits & Implants For Industrial Control Systems – Jos Wetzels
            15:30 - 16:00 -- 4) Game of Trojans: Dissecting The Russian Underground Cyber Scene – Chen Erlich

            CheckMates Community Use-Cases
            13:30 - 16:00 -- Submit Call for Papers @ htttp://

            Technology Innovation Labs
            1. CloudGuard IaaS – Public , Private Cloud
            2. Cloud Visualization & Compliance – Dome9
            3. CloudGuard SaaS
            4. SandBlast Agent
            5. SandBlast Network
            6. Threat Prevention - Innovation (ThreatGuard)
            7. Mobile Security 3.0
            8. Securing IoT
            9. R80.20 new Security Management & Gateway
            10. Automation & Orchestration with R80
            11. Homeland Security + Vanguard
            12. R80.20 migration best practices - Live!
            13. Device Operations - Simplified!
            14. SMB Security
            15. IPS & Application control best practices
            16. SD-WAN
            17. Infinity
            18. GW Acceleration
            19. Cloud Management
            20. Securing SCADA environment

            Hands-on Labs
            1. SandBlast Network, Agent, IDA
            2. Private Cloud (Cisco ACI, VMware NSX)
            3. Public Cloud (AWS, Azure), Dome9
            4. Mobile Security
            5. Security Management R80.20

            9:00 - 10:20
            Cyber Talk Keynotes

            1) Automating Security Orchestration & Recovery with Check Point & BackBox – Ted Czarnecki, Pfizer + Rafi Zvi, CEO BackBox
            2) Age of Things – Gen VI Security – Itai Greenberg, VP, Product Management + Oded Gonda, VP, Information & Innovation
            3) CloudGuard Dome9 and Check Point’s CloudGuard Family – Zohar Alon, Head of Cloud Product Line

            1) Hackers Exposed – Gen VI Threats Under the Microscope – Oded Vanunu, Head of Products Vulnerability Research + Yaniv Balmas, Group Manager
            2) How Do We Protect Our Own Cloud Infrastructure? – Sharon Schusheim, VP, Information Systems
            3) 20X20 Cyber Innovation winner

            12:00 - 16:00

            Explore the latest solutions with live demonstrations by Check Point and our partners.

            Securing your Cloud
            13:30 - 14:00 -- 1) AWS & Azure IaaS Architecture Blueprint – Gustavo Coronel
            14:00 - 14:30 -- 2) Dockers & Containers: How to Contain it Securely – Amir Kaushansky
            15:00 - 15:30 -- 3) Continuous Cloud Compliance and Security Simplified with Dome9 – Grant Asplund
            15:30 - 16:00 -- 4) SDWAN, PaaS, IaaS & SaaS, Oh My – Assess Your Risk – Sudarshan Srinivasan

            Cyber Security Innovations
            13:30 - 14:00 -- 1) Continues Cyber Security Protection Deployment – Brian Gleeson + Robbie Elliot
            14:00 - 14:30 -- 2) Managed Security Services & NFV – Unique Challenges & Effective Approaches – Aviv Abramovich
            15:00 - 15:30 -- 3) Endpoint Security Total Protection - Best Practices – Yossi Hasson
            15:30 - 16:00 -- 4) Threat Hunting with SandBlast NOW – Nir Naaman

            Security Automation & Orchestration
            13:30 - 14:00 -- 1) Automate Everything – The Future of Security Automation – Ryan Darst
            14:00 - 14:30 -- 2) Security for DevOps – No Humans Necessary – Marco Garcia + Joe Dillig
            15:00 - 15:30 -- 3) Security as Code - TBD
            15:30 - 16:00 -- 4) SMB Security – Unique Challenges & Effective Approaches – Aviv Abramovich

            Hackers Exposed
            13:30 - 14:00 -- 1) The short story of terrifying state of our tool set and what we can do to make it better – Maciej Kotowicz
            14:00 - 14:30 -- 2) Domestic Kitten Unravelling ISIS Espionage – Aseel Kayal
            15:00 - 15:30 -- 3) Why mobile malware is our concern – Avigayil Mechtinger
            15:30 - 16:00 -- 4) What the fax? – Eyal Itkin
            CheckMates Community Use-Cases
            13:30 - 16:00 -- Submit Call for Papers @ htttp://

            9:00 - 12:00
            Sessions for Partners

            1) CCO + Geo Leader Welcome
            2) Partnering for Success!
            3) Coming out Swinging in 2019
            4) Coffee Break and Networking
            5) Winning Through Innovation
            6) Partner Awards

            13:00 - 17:00
            Breakouts: Sales and Technical

            Sales A
            1) Understanding the Infinity Value Proposition
            2) TBA
            3) How to Sell CloudGuard with Customer Centric Approach
            4) Facts Tell Stories Sell: The Art of Winning New Customers

            Sales B
            1) Facts Tell Stories Sell: The Art of Winning New Customers
            2) Understanding the Infinity Value Proposition
            3) TBA
            4) How to Sell CloudGuard with Customer Centric Approach

            Sales C
            1) How to Sell CloudGuard with Customer Centric Approach
            2) Facts Tell Stories Sell: The Art of Winning New Customers
            3) Understanding the Infinity Value Proposition
            4) TBA

            Sales D
            1) TBA
            2) How to Sell CloudGuard with Customer Centric Approach
            3) Facts Tell Stories Sell: The Art of Winning New Customers
            4) Understanding the Infinity Value Proposition

            SE 1
            1) How to Whiteboard the Gen V Story
            2) How to Win EVERY POC!
            3) Maximize the Value of Technical Sales Tools
            4) Dive Deep into Competitive Analysis

            SE 2
            1) Dive Deep into Competitive Analysis
            2) How to Whiteboard the Gen V Story
            3) How to Win EVERY POC!
            4) Maximize the Value of Technical Sales Tools

            SE 3
            1) Maximize the Value of Technical Sales Tools
            2) Dive Deep into Competitive Analysis
            3) How to Whiteboard the Gen V Story
            4) How to Win EVERY POC!

            SE 4
            1) How to Win EVERY POC!
            2) Maximize the Value of Technical Sales Tools
            3) Dive Deep into Competitive Analysis
            4) How to Whiteboard the Gen V Story

            Explore the latest solutions with live demonstrations by Check Point and our partners.


            • Two Day Event
            • All General Sessions
            • All Breakout Sessions
            • CPX Expo Pass
            • Welcome Reception
            • Training with additional cost
            • Three Day Event
            • All General Sessions
            • All Breakout Sessions
            • CPX Expo Pass
            • Welcome Reception
            • Training with additional cost



            Who should attend?

            CPX 360 delivers several conference tracks of vital interest for professionals in many cyber security and business roles. The Cyber Talk keynotes track  is perfect for C-level executives and other policy makers. Patterned after TED sessions, Cyber Talks bring together top cyber security experts who identify today’s unprecedented security challenges as they discuss cyber security priorities, trends and innovations. The Architect, Prevent and Manage tracks provide the best and most practical ways to secure your organization. Cyber Security engineers, architects, administrators and geeks will benefit greatly from the Customer Community Use Cases track as well as the Technology Innovation and Hands-on Labs to test drive our latest technology.

            Why should I attend?

            Understanding the current state of cyber security has never been more important for sustaining normal operations and preventing data breaches that can prove catastrophic to organizations of all types. CPX 360 brings together the world’s elite cyber security experts to give you the latest trends in threats and the strategies and technologies needed to prevent damage from cyber attacks.

            How do I register?

            Follow this link to register for the February 4-7 conference to be held at Mandalay Bay Resort and Casino, Las Vegas, USA.

            May I register on-site?

            No. To ensure sufficient seating for all sessions and events, all attendees must preregister online for the conference.

            May more than one person from the same company attend the Check Point Experience 360 Conference?

            Yes, but each person must register individually.

            Will I receive a receipt for my registration?

            Yes, you will receive a receipt for your registration from Check Point approximately two weeks after the event.

            How do I book a hotel room?

            If you registered for a package that includes a hotel room, Check Point will reserve a hotel room on your behalf for the nights of February 4-6 (for customers) and 4-7 (for partners). A separate hotel confirmation number will be provided to you (this is different from the CPX2019 registration confirmation number you receive). If you chose to register without a hotel room, lodging reservations are wholly your responsibility.


            Can I use Co-op funds to attend the event?

            Yes. If you pre-register for the event pass, partners and distributors can use co-op for this event for each employee and end user that you wish to sponsor excluding hotel.

            The fee will be directly discounted at the time you or your customer registers. No additional reimbursements apply, so no claims are required in 2019. There is no limit to the number of end user guests that a Check Point partner or distributor can sponsor through Co-op.

            Can I use co-op to cover conference expenses beyond the approved allowance?


            Do I need to open a co-op project for the approved allowance?

            No. Please enter the co-op sponsoring partner’s name and email address on the “Preferences” page during online registration so that you get the appropriate allowance.

            Do I need to file a claim after the event?

            No. Since no additional reimbursements apply, no claims are required.

            I have questions about my registration with co-op. How can I follow up?

            Please contact

            Other Questions

            What is the dress code?

            The dress code is business casual.

            How do I get information on exhibits and sponsorships?

            Learn more about CPX 360 sponsorship opportunities – contact Demi Battaglia.

            What if I still have unanswered questions about the Check Point Experience 360 Conference?

            If you have questions about the conference, please email

            What is the Check Point Experience Conference cancellation policy?

            Conference cancellations received up to two weeks prior to the event are fully refundable. No refunds will be made less than two weeks before the first day of the event. To be eligible for a refund, cancellations must be submitted to Refunds will be issued within 30 days of the conference.

            Note: Hotel cancellations are subject to respective hotel cancellation policy.

            Call for Papers

            Share your Cyber Security insights on-stage at CPX 360!

            We’re looking for speakers who will teach, share and inspire Check Point customers and partners to use the innovations, strategies, tools, and techniques needed to prevent cyber threats! How are you leveraging the power of Check Point Infinity Architecture to protect your organization? What are some of the technical tips and tricks you can recommend? Submit your ideas to CPX 360 !

            This year we have two dedicated call for papers tracks:
            *20×20 Cyber Innovation Competition
            *CheckMates Community use cases

            Recommended topic areas include:
            • Cutting edge cyber security innovations
            • Cloud Security
            • Perimeter and Data Center Security
            • Mobile security
            • Advanced Threat Prevention
            • R80.X use cases
            • Security Automation

            Remember to include practical advice, key success factors, proven examples, an in-depth explanation of the challenges you’ve overcome and lessons learned on topics related to securing your datacenter, your cloud environments, your mobile and endpoints.

            Key Dates

            • Submissions deadline is November 30th
            • Decision and notification to speaker December 15th
            Submit your abstract to

            Items to Include in Submission

            All submissions must include the following information:

            • Presenter’s name
            • Presenter’s organization, job title and biography
            • Presentation title
            • Track you are submitting for (20×20 Cyber Innovation Competition or CheckMates)
            • Short abstract – maximum 100 words
            • Length – ideally 20-30 minutes for the CheckMates track, 6 minutes 40 seconds for the 20×20 Cyber Innovation Competition track
            • If applicable, please also include any links to previous presentations, slide decks, or papers
            • Please include an estimate of how ‘technical’ your presentation will be. The following rating will be used:

            T1  = Very little technical knowledge required
            T2  = Some technical knowledge is assumed
            T3 = Largely technical and/or detailed content aimed at technicians

            • Event you are submitting to (Bangkok (Jan. 21th-23th), Las Vegas (Feb. 4th-6th), Vienna (Feb. 18th-20th))
            • Presenters are to submit for an event in their respective GEO’s
            • Presentations must be written in English
            • Presentations should present original work, which ideally has not been previously published
            • Presentations will be selected based on their originality, significance, correctness and clarity of presentation

            Key Disclaimers

            It is important for presentations to avoid vendor/partner/sponsor specific ‘product pitches/sales pitches’. If presentation proposals are considered to contain such material (product pitches/sales) they will more than likely be rejected early in the review process. Further, vendors are reminded that there is no linkage between conference sponsorship and the opportunity to present at the conference.

            proposals with real use cases from customers will be given priority in the selection criteria

            We will give full conference passes (with hotel) only to those who actively participate as speakers on accepted presentations.

            Earn CPE Credits

            We are pleased to announce that Check Point is partnering with the following world-class cyber security certification vendors to provide CPX 360 attendees the opportunity to gain Continuing Professional Education (CPE) credits.

            • (ISC)2
            • GIAC
            • EC Council
            • CompTIA

            How to Obtain CPE Credits

            • After attending CPX 360, you will receive a digital badge of attendance from Check Point (example shown below)
              • (ISC)2 – Please send your (ISC)² Member ID# with the badge to
              • GIAC, EC Council, CompTIA – Please visit the certification vendor website and provide them the link to the CPX digital badge as proof of attendance

            If you have any questions, please contact us at


            • Mandalay Bay Resort and Casino
            • 3950 S. Las Vegas Blvd. 89119, Las Vegas, NV