JOIN US IN LAS VEGAS ON February 4 - 7 | #CPX360

CPX 360

THE PREMIER CYBER SECURITY SUMMIT AND EXPO
{d&lt}
{dn}

{dl}

{d>}{h&lt}
{hn}

{hl}

{h>}{m&lt}
{mn}

{ml}

{m>}{s&lt}
{sn}

{sl}

{s>}

CPX 360 promises to be the premier cyber security summit. CPX 360 is where you’ll receive up-to-the-minute intelligence about global threats and other vital topics from the world’s leading cyber security experts. In addition, you’ll enjoy getting hands on with cutting-edge security solutions from Check Point, networking with your peers, and celebrating with the world’s cyber security elite. If you attend one cyber security event this year, make it CPX 360.

 

Tracks at a Glance

Cyber Talk Keynotes – Experience TED-like sessions bringing together top cyber security experts to identify ways to tackle unprecedented security challenges and discuss cyber security priorities, trends and innovations
Securing your Cloud (NEW) – All about securing your cloud with effective blueprints to SaaS, Public and Private Cloud
Hackers Exposed (NEW) – Learn how hackers are developing the next wave of Gen VI threats
Cyber Security Innovations (NEW) – Explore Cyber Security Innovations to effectively prevent threats before they cause damage
Cyber Innovation Competition (NEW) – 20×20 short cyber innovation stories
CheckMates Community use-cases – Listen first-hand to industry best practices from other organizations discussing real use-cases
Technology Innovation Labs – Experience Infinity threat prevention and security architecture
Geek Village (NEW) – geeky workshops (e.g. malware reversing, lock picking, crypto, Lego models etc.)
Hands-On Labs – Test Drive our latest technology through our hands-on Lab with a step by step cookbooks
EXPO – Explore the EXPO; see the latest technology solutions and demonstrations from Check Point and our Partners, Start-Up Pavilion
Certification – Bring your laptop and Credit card and come get Certified. Pass an exam (CCSA, CCSE or CCSM) here and your certification benefit will be valid for 3 years instead of 2 years!
Gamification – Explore the 2019 Cyber challenge – CTF game, Shoot down hackers in the Cyber Range, or go on the CheckMates Scavenger Hunt.
Cyber Range – Shoot down hackers and compete for the crown in our Expo Cyber Range. Sign up now to secure your place!

Speakers

FC (Freaky Clown)

CEO, Hacker, Social Engineer

An ethical social engineer, FC ‘breaks into’ hundreds of banks, offices and government facilities finding weaknesses that assist organizations in improving their security.

    RAFI ZVI

    CEO, BackBox

    Rafi Zvi discusses how intelligent automation drives change in organizations and essential steps for NGFW implementations. He uses real examples and demonstrations.

      Jeremiah Cornelius

      Architect Evangelist – VMware

      Jeremiah is VMware’s Alliance Security Architect for partner product strategy and security use cases. He’s advised Fortune 500 CSOs, with over a decade prior in practical aspects of cyber security.

        Simon Hamilton-Wilkes

        Solution Architect – VMware

        Simon is VMware’s NSX Partner Solutions Technical Architect. A VMware VCDX and vExpert, and a Cisco CCIE.

          Ann Johnson

          Corporate Vice President, Microsoft

          Ann leads and drives the evolution and implementation of Microsoft’s short and long-term security solutions roadmap with alignment across the marketing, engineering and product teams.

            Sameer Vasanthapuram

            Partner Solutions Architect, Amazon Web Services

            Sameer architect and build new products and solutions on AWS with AWS network and security partners for customers and designed secure networks for several Fortune 500 companies.

              Tim Hall

              Founder, Shadow Peak Inc

              Tim has been providing security consulting services for organizations along the Colorado Front Range full time since 1999.

                Eric Anderson

                Senior Engineer, Atlantic Data Security

                Eric is Senior Engineer at Atlantic Data Security and has been working with Check Point products as a VAR for almost 20 years, and as a Check Point certified instructor for 18 years.

                  Vladimir Yakovlev

                  Founder, Higher Intelligence LLC

                  Vladimir is head of IT for brokerage firm G. X. Clarke & Co. and responsible for multiple iterations of infrastructure design, engineering and implementation with focus on resiliency and security.

                    Eli Faskha

                    CEO, Soluciones Seguras

                    Eli is Founder and CEO of Soluciones Seguras, one of the leading Cybersecurity companies in Central America.

                      Stacy Dunn

                      Information Security Analyst, RCB Bank

                      Stacy has educational background in Fine Arts and Design and believe she bring a unique perspective to the world of tech.

                        Gil Shwed

                        Founder and CEO

                        Gil Shwed is the founder and Chief Executive Officer. Mr. Shwed is considered the inventor of the modern firewall and authored several patents, such as the company’s Stateful Inspection technology.

                          Dorit Dor

                          Vice President of Products

                          Dr. Dorit Dor, Vice President of products at Check Point, manages all product definition and development functions for both the enterprise and consumer divisions of the company

                            Peter Alexander

                            Chief Marketing Officer

                            As CMO, Peter leads Check Point’s Marketing Organization, including Corporate Marketing, Corporate Communications, GEO/Field Marketing, Strategic Marketing, and Demand Generation.

                              Sponsors

                              Diamond Sponsors

                              Platinum Sponsors

                              Gold Sponsors

                              Silver Sponsors

                              Bronze Sponsors

                              Start-up Sponsors

                              Schedule

                              18:00 - 21:00
                              Registration and Welcome Cocktail Reception

                              Registration and Welcome Cocktail Reception (All Field, Partners & Customers) – EXPO Opens + R&D Ask me Anything + 20x20 Cyber Innovation Competition + Cyber Range Competition

                              9:00 - 13:00
                              Training Tracks

                              1. Hacking 101: Introduction to common web attack techniques
                                • Learn about common security holes in the IT world. Learn the basics of preventing security holes in your network.
                              2. Cyber Range
                                • Hyper-realistic simulation and virtual training environment, providing Gen V cyber range training for all type of customers and partners
                              3. Automating and orchestrating your security network with Check Point R80.20
                                • Use the new API to automate security management operations and other security functions.
                              4. Deep Dive into Check Point’s SandBlast product family
                                • Detect and prevent malware and phishing attacks. Use Threat Emulation and Extraction to scan for malicious files. Protect against unknown threats in files that are downloaded from the Internet or attached to emails.
                              5. Be a technical expert on the Check Point R80.20 software release
                                • Learn what’s new with R80.20 NGFW/NGTP. Employ the new security policy layers functionality.
                              6. Preventing mobile cyber security attacks with Check Point mobile security
                                • Are your employees accessing their corporate information through their mobile devices? Are those devices secured? How vulnerable is your corporate network without Mobile Security? Come, learn, and try Check Point SandBlast Mobile and how to protect your network from mobile security breaches with our advanced mobile threat defense. Hear about Capsule Workspace and how to create a secure environment on device that will prevent corporate data loss and unwanted access using a seamless and secure user experience.
                              7. Securing your cloud workloads with Check Point
                                • Protect your assets in the cloud from the most sophisticated threats with dynamic scalability, intelligent provisioning and consistent control across physical and virtual networks.

                              Technology Innovation Labs
                              1. SandBlast Network + Web Threat Extraction
                              2. Securing EndPoints with SandBlast Agent
                              3. Mobile Security 3.0
                              4. CloudGuard & Dome9
                              5. Securing Clouds with CloudGuard SaaS
                              6. Container Security with CloudGuard IaaS (Private)
                              7. Securing Public Clouds
                              8. SD-WAN Security
                              9. Latest Innovation with ThreatGuard
                              10. SecaaS, TELCO & Virtualization and DevOps
                              11. ICS + SCADA Security
                              12. Latest on Security Management - R80.20
                              13. DEVOPS - Automation & Orchestration - R80.20
                              14. Device operations-simplified!
                              15. MAESTRO - Scalable platform - Demo!
                              16. SMB Security
                              17. R80.20 Best practices - Use cases
                              18. Automated Tailored Threat Prevention
                              19. Check Point Infinity - Multi vector security
                              20. EndPoint Cloud Management & Operations
                              21. HLS & SandBlast Now
                              22. Threat Hunting
                              23. SandBlast Agent for MAC
                              24. Securing the future - Sandblast for Educational
                              25. Security management on the Cloud

                              9:10 - 10:30
                              Cyber Talk Keynotes

                              1) Welcome
                              2) Gil Shwed Keynote – Cyber Security for 2020 – Gil Shwed, Founder & CEO
                              3) Microsoft Azure Keynote – Ann Johnson, Corporate Vice President, Cybersecurity Solutions Group, Microsoft
                              4) Forrester Keynote – Generations of Cyber Threats and Solutions – Josh Zelonis, Senior Analyst, Forrester
                              5) Use Case – Securing the Broncos with Infinity – Russ Trainor, SVP IT Denver Broncos

                              1) A Hacker’s Mind Exposed – FREAKY CLOWN
                              2) A Cyber Security Gut Check: Good is Not Good Enough – Avi Rembaum, VP, Security Solutions
                              3) Incident Response Cloudy War Stories – Dan Wiley, Head of Incident Response
                              4) Age of Things – Gen VI Security – Itai Greenberg, VP, Product Management + Oded Gonda, VP, Technology & Innovation

                              1) Automating Security Orchestration & Recovery with Check Point & BackBox – Ted Czarnecki – Pfizer + Rafi Zvi, CTO and Co-Founder, BackBox
                              2) Cloudy with a Chance of a Breach – John Bloomer, Regional Director, Security Engineering
                              3) Check Point 2019 Innovations, Roadmap & Vision, Dorit Dor, VP, Products

                              12:00 - 16:00
                              Expo

                              Explore the latest solutions with live demonstrations by Check Point and our partners + 20x20 Cyber Innovation Competition + Cyber Range Competition

                              Securing your Cloud
                              13:30 - 14:00 -- 1) Kick-*aas Cloud Security: Architecting Robust Security and Compliance Across Your *-as-a- Service Footprint – Zohar Alon
                              14:00 - 14:30 -- 2) Securing SaaS Applications – The Pragmatic Approach – Mark Ostrowsky
                              14:30 - 15:00 -- 3) Who’s Responsible for Your Cloud Security? – Lessons Learned - Ran Nahmias + Yoni Lebowitsch
                              15:00 - 15:30 -- 4) AWS IaaS Architecture Blueprint – Gustavo Coronel + Sameer Vasanghapuram, Cloud Architect AWS

                              Cyber Security Innovations
                              13:30 - 14:00 -- 1) Cyber Attacks on Industrial Control System (ICS) – Reality!! – Mati Epstein
                              14:00 - 14:30 -- 2) Preventing Attacks on Mobile Devices – Scot Kight
                              14:30 - 15:00 -- 3) Security at Hyperscale – Glen Deskin
                              15:00 - 15:30 -- 4) Humans Are Your Weakest Link. Protecting Against Social Engineering With Infinity – Rich Comber

                              Security Automation & Orchestration
                              13:30 - 14:00 -- 1) Intelligent Automation for Security Operations – Rafi Zvi, CEO BackBox
                              14:00 - 14:30 -- 2) How to Prevent Attacks Before They Strike – Meir-Jonathan Dahan & Elad Goldenberg
                              14:30 - 15:00 -- 3) API Best Practices with Check Point – Robbie Elliott
                              15:00 - 15:30 -- 4) Orchestrating Gateway Operations – Best Practices – Valeri Loukine

                              Hackers Exposed
                              13:30 - 14:00 -- 1) The Next Wave of Breaches Dissected – Orli Gan
                              14:00 - 14:30 -- 2) The Short Story of Terrifying State of Our Tool Set and What We Can Do to Make to Better – Maciej Kotowicz, Kapersk’s GReAT
                              14:30 - 15:00 -- 3) Designing Exploits & Implants For Industrial Control Systems – Jos Wetzels, Midnight Blue
                              15:00 - 15:30 -- 4) Game of Trojans: Dissecting The Russian Underground Cyber Scene – Chen Erlich, Researcher, enSilo

                              CheckMates Community Use-Cases
                              13:30 - 13:50 -- 1) Geo Policy – Your Secret Weapon for Increased Security and Gateway Performance – Timothy Hall – Shadow Peak Inc
                              13:50 - 14:10 -- 2) Regain Visibility of your Network Traffic – Michael Poczobut, Blue Cross and Blue Shield Vermont (BCBSVT)
                              14:10 - 14:30 -- 3) CloudGuard Deployment Scenarios in AWS – Vladimir Yakovlev, Cybersecurity and Infrastructure Solutions Architect, Higher Intelligence LLC
                              14:30 - 14:50 -- 4) SandBlast Mobile Security – Don’t Put It On Hold – Stacy Dunn, Information Security, RCB Bank
                              14:50 - 15:10 -- 5) Honeypotting and Sandboxing Beginners Guide – Eric Crutchlow & Synopsis, Check Point & Synopsis
                              15:10 - 15:30 -- 6) Enabling Business & IT Operations in the Face of Mounting Security Requirements – Emmanuel D. Bot, Director of Information Security, Wiley Rein LLP

                              Technology Innovation Labs
                              1. SandBlast Network + Web Threat Extraction
                              2. Securing EndPoints with SandBlast Agent
                              3. Mobile Security 3.0
                              4. CloudGuard & Dome9
                              5. Securing Clouds with CloudGuard SaaS
                              6. Container Security with CloudGuard IaaS (Private)
                              7. Securing Public Clouds
                              8. SD-WAN Security
                              9. Latest Innovation with ThreatGuard
                              10. SecaaS, TELCO & Virtualization and DevOps
                              11. ICS + SCADA Security
                              12. Latest on Security Management - R80.20
                              13. DEVOPS - Automation & Orchestration - R80.20
                              14. Device operations-simplified!
                              15. MAESTRO - Scalable platform - Demo!
                              16. SMB Security
                              17. R80.20 Best practices - Use cases
                              18. Automated Tailored Threat Prevention
                              19. Check Point Infinity - Multi vector security
                              20. EndPoint Cloud Management & Operations
                              21. HLS & SandBlast Now
                              22. Threat Hunting
                              23. SandBlast Agent for MAC
                              24. Securing the future - Sandblast for Educational
                              25. Security management on the Cloud

                              Hands-on Labs
                              1. New R80.20 SmartEvent
                              2. SandBlast Network + Agent
                              3. Private Cloud (Cisco ACI, Vmware NSX)
                              4. Check Point Infinity
                              5. Security Management & Automation R820.10 - DevOps

                              9:00 - 10:15
                              Cyber Talk Keynotes

                              1) The Cyber Risk Paradox – Jeff Schwartz, VP, US Engineering
                              2) Hacking like a Disney Villain– Maya Horowitz, Director, Threat Intelligence & Research
                              3) IoT and Nano Security Unraveled – Yariv Fishman, Head of Product Management, Cloud Security
                              4) CloudGuard Dome9 and Check Point’s CloudGuard Family – Zohar Alon, Head of Cloud Product Line
                              5) CISO Point of View – Joe Bennett – CISO Hertz

                              1) AI Innovations in Cyber Security –Neatsun, VP, Threat Prevention + Eddie Doyle, Cyber Security Evangelist
                              2) Hackers Exposed – Gen VI Threats Under the Microscope – Oded Vanunu, Head of Products Vulnerability Research + Yaniv Balmas, Head of Security Research
                              3) How Do We Protect Our Own Cloud Infrastructure? – Sharon Schusheim, VP, Information Systems
                              4) 20X20 Cyber Innovation winner

                              12:00 - 16:00
                              Expo

                              Explore the latest solutions with live demonstrations by Check Point and our partners + 20x20 Cyber Innovation Competition + Cyber Range Competition

                              Securing your Cloud
                              13:30 - 14:00 -- 1) DevOps and Security – Friends or Foes? – Reuven Harrison, CTO and Co-Founder, Tufin
                              14:00 - 14:30 -- 2) Docker & Containers: How to Contain it Securely – Roy Feintuch
                              15:00 - 15:30 -- 3) SEE SPOT SECURE – Continuous Cloud Compliance and Security Simplified with Dome9 – Grant Asplund
                              15:30 - 16:00 -- 4) Lift & Shift vs Cloud Native – Yariv Fishman

                              Cyber Security Innovations
                              13:30 - 14:00 -- 1) The Final Frontier Beyond Your Perimeter – Protecting Devices, Security Data – Brian Gleeson, Head of Product Marketing
                              14:00 - 14:30 -- 2) SD-WAN and Branch Office Security – Unique Challenges & Effective Approaches – Aviv Abramovich
                              15:00 - 15:30 -- 3) Endpoint Security Total Protection - Best Practices – Yossi Hasson
                              15:30 - 16:00 -- 4) Threat Hunting with SandBlast NOW – Jerrod Piker

                              Security Automation & Orchestration
                              13:30 - 14:00 -- 1) Automate Everything – The Future of Security Automation – Ryan Darst
                              14:00 - 14:30 -- 2) Security for DevOps – No Humans Necessary – Marco Garcia
                              15:00 - 15:30 -- 3) Secure the Virtual Cloud Network Against Advanced Threats with VMware NSX and Check Point – Simon Hamilton-Wilkes, Security Architect + Jeremiah Cornelius, Architect Evangelist VMware Strategic Technology Alliance
                              15:30 - 16:00 -- 4) SMB Security – Unique Challenges & Effective Approaches – Aviv Abramovich

                              Hackers Exposed
                              13:30 - 14:00 -- 1) Tracing Ransomware Payments in the Bitcoin Ecosystem – Masarah Paquet-Clouston, GoSecure
                              14:00 - 14:30 -- 2) Domestic Kitten Unravelling ISIS Espionage – Aseel Kayal
                              15:00 - 15:30 -- 3) Why Mobile Adware Is Our Concern – Avigayil Mechtinger
                              15:30 - 16:00 -- 4) What The Fax? – Eyal Itkin

                              CheckMates Community Use-Cases
                              13:30 - 13:50 -- 1) How to Plan for Incident Response on the Power Grid Without Getting Zapped! – Tim Otis, Check Point & Melissa Kjendle, Connexus Energy
                              13:50 - 14:10 -- 2) Building your very own Check Point “playground” – Eric Anderson, Training Director/Senior Security Engineer, Atlantic Data Security
                              14:10 - 14:30 -- 3) Finding the Breach in a Haystack – Live Demo – Kierk Sanderlin
                              15:00 - 15:20 -- 4) ICS Security Challenges in Smart Grid Environment – Jordan Krueger, Substantion Communication Engineer, Xcel Energy
                              15:20 - 15:40 -- 5) Umbrella Security: How Morton Salt prevents and manages its Threat Landscape
                              15:40 - 16:00 -- 6) Implementing a National Network for Inter-Government Services, Eli Faskha, Soluciones Seguras

                              Technology Innovation Labs
                              1. SandBlast Network + Web Threat Extraction
                              2. Securing EndPoints with SandBlast Agent
                              3. Mobile Security 3.0
                              4. CloudGuard & Dome9
                              5. Securing Clouds with CloudGuard SaaS
                              6. Container Security with CloudGuard IaaS (Private)
                              7. Securing Public Clouds
                              8. SD-WAN Security
                              9. Latest Innovation with ThreatGuard
                              10. SecaaS, TELCO & Virtualization and DevOps
                              11. ICS + SCADA Security
                              12. Latest on Security Management - R80.20
                              13. DEVOPS - Automation & Orchestration - R80.20
                              14. Device operations-simplified!
                              15. MAESTRO - Scalable platform - Demo!
                              16. SMB Security
                              17. R80.20 Best practices - Use cases
                              18. Automated Tailored Threat Prevention
                              19. Check Point Infinity - Multi vector security
                              20. EndPoint Cloud Management & Operations
                              21. HLS & SandBlast Now
                              22. Threat Hunting
                              23. SandBlast Agent for MAC
                              24. Securing the future - Sandblast for Educational
                              25. Security management on the Cloud

                              Hands-on Labs
                              1. New R80.20 SmartEvent
                              2. SandBlast Network + Agent
                              3. Private Cloud (Cisco ACI, Vmware NSX)
                              4. Check Point Infinity
                              5. Security Management & Automation R820.10 - DevOps

                              9:00 - 12:00
                              Sessions for Partners

                              1) Welcome
                              2) Partnering for Success! - Dan Yerushalmi, Chief Customer Office + Frank Rauch, Head of Worldwide Channel
                              3) Taking the gloves off in 2019 - Peter Alexander, Chief Marketing Officer
                              4) Partner Awards
                              5) Coffee Break and Networking
                              6) Winning Through Innovation - Moti Sagey, Head of Strategic Marketing & Intelligence
                              7)Leveraging Emerging Products to Over Achieve Your Quota – Nathan Shuchami, VP, Emerging Products

                              13:30 - 16:10
                              Breakouts: Sales and Technical

                              Sales A
                              1) Understanding the Infinity Total Protection Value Proposition - Eran Orzel, Head of Strategic Sales and Partnerships
                              2) New Customers - Leveraging Partner Program - Yifat Bavli, Sales Enablement Manager + Aviel Katz, Head of Partner Alliance
                              3) How to Sell CloudGuard with Customer Centric Approach - Yariv Fishman, Head of Product Management, Cloud Security + Zohar Alon, Head of Cloud Product Line
                              4) Replicating Success with Customer Win Cases - Amit Sharon, Head of Customer Community

                              Sales B
                              1) Replicating Success with Customer Win Cases - Amit Sharon, Head of Customer Community
                              2) Understanding the Infinity Total Protection Value Proposition - Eran Orzel, Head of Strategic Sales and Partnerships
                              3) New Customers - Leveraging Partner Program - Yifat Bavli, Sales Enablement Manager + Aviel Katz, Head of Partner Alliance
                              4) How to Sell CloudGuard with Customer Centric Approach - Yariv Fishman, Head of Product Management, Cloud Security + Zohar Alon, Head of Cloud Product Line

                              Sales C
                              1) How to Sell CloudGuard with Customer Centric Approach - Yariv Fishman, Head of Product Management, Cloud Security + Zohar Alon, Head of Cloud Product Line
                              2) Replicating Success with Customer Win Cases - Amit Sharon, Head of Customer Community
                              3) Understanding the Infinity Total Protection Value Proposition - Eran Orzel, Head of Strategic Sales and Partnerships
                              4) New Customers - Leveraging Partner Program - Yifat Bavli, Sales Enablement Manager + Aviel Katz, Head of Partner Alliance

                              Sales D
                              1) New Customers - Leveraging Partner Program - Yifat Bavli, Sales Enablement Manager + Aviel Katz, Head of Partner Alliance
                              2) How to Sell CloudGuard with Customer Centric Approach - Yariv Fishman, Head of Product Management, Cloud Security + Zohar Alon, Head of Cloud Product Line
                              3) Replicating Success with Customer Win Cases - Amit Sharon, Head of Customer Community
                              4) Understanding the Infinity Total Protection Value Proposition - Eran Orzel, Head of Strategic Sales and Partnerships

                              SE 1
                              1) How to Whiteboard the Gen V Story - Greg Pepper, Security Architect
                              2) How to Win EVERY POC! - Whatacha McCallum
                              3) Maximize the Value of Technical Sales Tools - Elad Goldenberg, Solution Manager
                              4) Dive Deep into Competitive Analysis - Hezi Chen, Head of Competitive Intelligence

                              SE 2
                              1) Dive Deep into Competitive Analysis - Hezi Chen, Head of Competitive Intelligence
                              2) How to Whiteboard the Gen V Story - Greg Pepper, Security Architect
                              3) How to Win EVERY POC! - Whatacha McCallum
                              4) Maximize the Value of Technical Sales Tools - Elad Goldenberg, Solution Manager

                              SE 3
                              1) Maximize the Value of Technical Sales Tools - Elad Goldenberg, Solution Manager
                              2) Dive Deep into Competitive Analysis - Hezi Chen, Head of Competitive Intelligence
                              3) How to Whiteboard the Gen V Story - Greg Pepper, Security Architect
                              4) How to Win EVERY POC! - Whatacha McCallum

                              SE 4
                              1) How to Win EVERY POC! - Whatacha McCallum
                              2) Maximize the Value of Technical Sales Tools - Elad Goldenberg, Solution Manager
                              3) Dive Deep into Competitive Analysis - Hezi Chen, Head of Competitive Intelligence
                              4) How to Whiteboard the Gen V Story - Greg Pepper, Security Architect

                              Pricing

                              Customers
                              $1490
                              • Two Day Event
                              • All General Sessions
                              • All Breakout Sessions
                              • CPX Expo Pass
                              • Welcome Reception
                              • Training with additional cost
                              Register
                              Partners
                              $1590
                              • Three Day Event
                              • All General Sessions
                              • All Breakout Sessions
                              • CPX Expo Pass
                              • Welcome Reception
                              • Training with additional cost
                              Register

                              FAQ

                              Registration

                              Who should attend?

                              CPX 360 delivers several conference tracks of vital interest for professionals in many cyber security and business roles. The Cyber Talk keynotes track  is perfect for C-level executives and other policy makers. Patterned after TED sessions, Cyber Talks bring together top cyber security experts who identify today’s unprecedented security challenges as they discuss cyber security priorities, trends and innovations. The Architect, Prevent and Manage tracks provide the best and most practical ways to secure your organization. Cyber Security engineers, architects, administrators and geeks will benefit greatly from the Customer Community Use Cases track as well as the Technology Innovation and Hands-on Labs to test drive our latest technology.

                              Why should I attend?

                              Understanding the current state of cyber security has never been more important for sustaining normal operations and preventing data breaches that can prove catastrophic to organizations of all types. CPX 360 brings together the world’s elite cyber security experts to give you the latest trends in threats and the strategies and technologies needed to prevent damage from cyber attacks.

                              How do I register?

                              Follow this link to register for the February 4-7 conference to be held at Mandalay Bay Resort and Casino, Las Vegas, USA.

                              May I register on-site?

                              No. To ensure sufficient seating for all sessions and events, all attendees must preregister online for the conference.

                              May more than one person from the same company attend the Check Point Experience 360 Conference?

                              Yes, but each person must register individually.

                              Will I receive a receipt for my registration?

                              Yes, you will receive a receipt for your registration from Check Point approximately two weeks after the event.

                              How do I book a hotel room?

                              If you registered for a package that includes a hotel room, Check Point will reserve a hotel room on your behalf for the nights of February 4-6 (for customers) and 4-7 (for partners). A separate hotel confirmation number will be provided to you (this is different from the CPX2019 registration confirmation number you receive). If you chose to register without a hotel room, lodging reservations are wholly your responsibility.

                              Co-op

                              Can I use Co-op funds to attend the event?

                              Yes. If you pre-register for the event pass, partners and distributors can use co-op for this event for each employee and end user that you wish to sponsor excluding hotel.

                              The fee will be directly discounted at the time you or your customer registers. No additional reimbursements apply, so no claims are required in 2019. There is no limit to the number of end user guests that a Check Point partner or distributor can sponsor through Co-op.

                              Can I use co-op to cover conference expenses beyond the approved allowance?

                              No.

                              Do I need to open a co-op project for the approved allowance?

                              No. Please enter the co-op sponsoring partner’s name and email address on the “Preferences” page during online registration so that you get the appropriate allowance.

                              Do I need to file a claim after the event?

                              No. Since no additional reimbursements apply, no claims are required.

                              I have questions about my registration with co-op. How can I follow up?

                              Please contact coop@checkpoint.com.

                              Other Questions

                              What is the dress code?

                              The dress code is business casual.

                              How do I get information on exhibits and sponsorships?

                              Learn more about CPX 360 sponsorship opportunities – contact Demi Battaglia.

                              What if I still have unanswered questions about the Check Point Experience 360 Conference?

                              If you have questions about the conference, please email cpx360.usa@checkpoint.com.

                              What is the Check Point Experience Conference cancellation policy?

                              Conference cancellations received up to two weeks prior to the event are fully refundable. No refunds will be made less than two weeks before the first day of the event. To be eligible for a refund, cancellations must be submitted to cpx360.usa@checkpoint.com. Refunds will be issued within 30 days of the conference.

                              Note: Hotel cancellations are subject to respective hotel cancellation policy.

                              Earn CPE Credits

                              We are pleased to announce that Check Point is partnering with the following world-class cyber security certification vendors to provide CPX 360 attendees the opportunity to gain Continuing Professional Education (CPE) credits.

                              • (ISC)2
                              • GIAC
                              • EC Council
                              • CompTIA


                              How to Obtain CPE Credits

                              • After attending CPX 360, you will receive a digital badge of attendance from Check Point (example shown below)
                                • (ISC)2 – Please send your (ISC)² Member ID# with the badge to CPE@checkpoint.com
                                • GIAC, EC Council, CompTIA – Please visit the certification vendor website and provide them the link to the CPX digital badge as proof of attendance

                              If you have any questions, please contact us at cpe@checkpoint.com.

                              Location

                              • Mandalay Bay Resort and Casino
                              • 3950 S. Las Vegas Blvd. 89119, Las Vegas, NV