CPX 360 promises to be the premier cyber security summit. For the first time, we will bring our customers and partners together in a mega conference and expo. CPX 360 is where you’ll receive up-to-the-minute intelligence about global-threats and other vital topics from the world’s leading cyber-security experts. In addition, you’ll enjoy getting hands on with cutting-edge security solutions from Check Point, networking with your peers, and celebrating with the world’s cyber-security elite. If you attend one cyber security event this year, make it CPX 360.
Cyber Talk keynotes – Experience TED-like sessions bringing together top cybersecurity experts to identify ways to tackle unprecedented security challenges and discuss cybersecurity priorities, trends and innovations
Architect – Industry thought leaders investigate the dynamics of today’s threat landscape. Learn how to prepare for the next major attack
Prevent – Learn how Check Point’s emerging technology secures Cloud, Zero-Day Threats, and mobile devices
Manage – Explore day-to-day best practices and operations of Check Point products
Customer Use Cases – The world’s top cyber-security experts discuss challenges, priorities, trends, and innovations
Technology Innovation Labs – Experience Infinity threat prevention and security architecture
Hands-On Labs – Test drive Check Point’s latest technology with step-by-step cook books
EXPO – Explore the latest solutions with live demonstrations by Check Point and our partners
Games – Join the fun: 2018 Cyber Challenge, our CTF game, and the CheckMates Infinity “scavenger hunt”
Speakers
Pablos Holman
Futurist, Inventor, Notorious Hacker
Hackers are the new superheroes people can’t understand. Pablos is a hacker who shows how a hacker works breaking things and building the new technologies.
Rafi Zvi
CEO, BackBox
Rafi Zvi discusses how intelligent automation drives change in organizations and essential steps for NGFW implementations. He uses real examples and demonstrations.
Ruvi Kitov
CEO, Tufin
Learn how to successfully navigate the stages of the maturity model and see a demonstration of zero-touch automation in practice.
Avi Ben-Menahem
Director of Program Management, Cloud & Enterprise Security, Microsoft
Avi discusses building and operating a secure cloud platform, how Microsoft secures Azure, and the importance of a strong developer and partner ecosystem.
Dennis Moreau
Senior Engineering Architect, VMware
Dennis Moreau discusses how hosting platforms can provide focused isolation, service insertion, context, and dynamics, which let security solutions be more efficient and more effective.
Vineet Bhan
Head of Security Partnerships, Google Cloud
Vineet Bhan from Google and Radhika Mitra from Check Point will discuss how Google and Checkpoint are working closely as partners and building new security solutions for Google Cloud customers.
Jerry Pittman
CISO at Tenneco
Eddie Doyle will be hosting a Live Q&A session with Jerry who will be answering our sales teams’ questions about how to sell to a CISO.
Ramandeep Singh Walia
CEO, QOS Technology
Ramandeep will discuss case studies about an innovative Check Point & QOS managed incident response using a machine learning platform.
Britney Hommertzheim
Director of Information Security at AMC Theatres
Counting to 5: The building blocks of security. This brief will revisit the five security basics and help bring understanding to the role your executives play.
Eric Anderson
Chief Technology Officer, Netanium
Eric Anderson will create a “Playground” live environment where you can safely play, experiment, and test Check Point products.
Joe Sullivan
Information Security Professional, RCB Bank
Joe Sullivan will cover his initial assessment and tests of Check Point SandBlast Agent and share lessons learned deploying Endpoint in a production environment.
Kellman Meghu
Global Security Manager, Sycomp
Kellman Meghu shows you simple, low-level methods for turning your security policy into a Web 2.0 dynamic object you can use everywhere.
Russell Walker
Chief Technology Officer Mississippi Secretary of State
Russell Walker will share his experience integrating advanced security for cloud, mobile, endpoint, and networks using Infinity architecture.
TIM HALL
CEO, ShadowPeak
Tim Hall’s presentation highlights the most useful Check Point CLI commands users have submitted to CheckMates. He will present use cases, examples, and case studies.
DJ Schleen
US Holocaust Memorial Museum
DJ Schleen and Michael Trofi show how Infrastructure as Code is an unprecedented opportunity for organizations to upgrade security and reduce overall risks.
Gil Shwed
Founder and CEO, Check Point
Check Point Founder Gil Shwed gives his sweeping vision of the threat landscape and predicts the future of cyber threats and security technologies.
Dorit Dor
Vice President of Products
In this future-centric presentation, Dorit Dor shares Check Point’s product roadmap for the future of cyber security.
Peter Alexander
Chief Marketing Officer
As CMO, Peter leads Check Point’s Marketing Organization, including Corporate Marketing, Corporate Communications, GEO/Field Marketing, Strategic Marketing, and Demand Generation.
Pierre-Paul Allard
EVP Worldwide Sales
Pierre-Paul Allard serves as executive vice president of Worldwide Sales for Check Point.
Avi Rembaum
VP of Security Solutions
Avi Rembaum tells what future IoT will look like, a summary of future cyber risks and describes the practical security needed to plan IoT implementations.
Gabi Reish
VP of Product Marketing & Product Management
Gabi Reish presents the game-changing products Check Point is launching at CPX 360 and explains how they mesh with Check Point’s revolutionary Infinity architecture.
Neatsun Ziv
VP of Threat Prevention
Neatsun is Check Point’s Vice President for Threat Prevention. He has led a few of the key innovations within the company and is the internal founder of the Cloud Initiative.
Dan Wiley
Head of Incident Response
Join Dan Wiley, head of Check Point’s Incident Response Team to explore the darker side of the Cloud through war stories about true-life incidents.
Moti Sagey
Head of Strategic Marketing
Moti Sagey is the Head of Strategic Marketing & Intelligence at Check Point Software. Moti is responsible for strategically transforming intelligence and information into a compelling and resonating story.
Oded Vanunu
Head of Products Vulnerability Research
Cyber criminals are targeting mass-use platforms like WhatsApp and Facebook. Oded Vanunu reveals the hacking methods behind mass attacks and security flaws in these platforms.
MICHAEL SHAULOV
Head of Mobility Product Management
Michael Shaulov’s live demo shows how easy it is to hack smartphones. He then discusses mobile security with Pedro Pablo Perez, the CEO of Telefonica Cyber Security.
ORLI GAN
Head of Threat Prevention Products
Artificial Intelligence (AI) is revolutionizing technology. Orli Gan gives an overview of AI and reveals how AI already in Check Point solutions is reshaping cyber security.
Sponsors
Platinum Sponsors
Gold Sponsors
Silver Sponsors
Bronze Sponsors
Schedule
Sessions for Partners
1) CEO Welcome - Gil Shwed
2) 2018 - Take No Prisoners & Win the Day - Pierre-Paul Allard, Head of Worldwide Sales
3) Global Awards - Leslie Canning, Head of Sales Strategy and Enablement
4) Not All Security Products Were Created Equal - Moti Sagey, Head of Strategic Marketing & Intelligence
5) Ask Me Anything - How to Sell to a CISO (with live CISO Q&A) - Jerry Pitman, CISO, Tenneco
6) New Products, New Message, New Customers! - Gabi Reish, VP, Product Management and Product Marketing
Tracks at a Glance
1:30 to 2:00
Understanding the Infinity Value Proposition - Gabi Reish, VP, Product Management and Product Marketing + Avi Rembaum, Vice President, Security Solutions
Facts Tell Stories Sell: The Art of Winning New Customers - Eddie Doyle, Head of Customer Engagement
How to Sell CloudGuard with Customer Centric Approach - Yoav Danielli-Prnicipal Product Manager
Cross-Sell and Upsell with Infinity Pricing - Noam Green, Head of Product Management and Product Marketing, Security Platforms
Architecting Infinity And Delivering Customer Value - Dan Colwell, Security Engineering Manager + Yair Herling, Technical Marketing Engineer
Dive Deep into Competitive Analysis - Hezi Chen, Head of Competitive Intelligence
Maximize the Value of Technical Sales Tools - Yael Haker, Manager, Israel Solution Center
How to Win EVERY POC! - Whatcha McCallum, Manager, Americas Solution Center
2:10 to 2:40
Cross-Sell and Upsell with Infinity Pricing - Noam Green, Head of Product Management and Product Marketing, Security Platforms
Understanding the Infinity Value Proposition - Gabi Reish, VP, Product Management and Product Marketing + Avi Rembaum, Vice President, Security Solutions
Facts Tell Stories Sell: The Art of Winning New Customers - Eddie Doyle, Head of Customer Engagement
Replicating success - New Customer Acquisition Case Studies - 3 Account managers (+Leslie as faciltator)
How to Win EVERY POC! - Whatcha McCallum, Manager, Americas Solution Center
Architecting Infinity And Delivering Customer Value - Dan Colwell, Security Engineering Manager + Yair Herling, Technical Marketing Engineer
Dive Deep into Competitive Analysis - Hezi Chen, Head of Competitive Intelligence
Maximize the Value of Technical Sales Tools - Yael Haker, Manager, Israel Solution Center
3:00 to 3:30
How to Sell CloudGuard with Customer Centric Approach - Yoav Danielli-Prnicipal Product Manager
Cross-Sell and Upsell with Infinity Pricing - Noam Green, Head of Product Management and Product Marketing, Security Platforms
Understanding the Infinity Value Proposition - Gabi Reish, VP, Product Management and Product Marketing + Avi Rembaum, Vice President, Security Solutions
Facts Tell Stories Sell: The Art of Winning New Customers - Eddie Doyle, Head of Customer Engagement
Maximize the Value of Technical Sales Tools - Yael Haker, Manager, Israel Solution Center
How to Win EVERY POC! - Whatcha McCallum, Manager, Americas Solution Center
Architecting Infinity And Delivering Customer Value - Dan Colwell, Security Engineering Manager + Yair Herling, Technical Marketing Engineer
Dive Deep into Competitive Analysis - Hezi Chen, Head of Competitive Intelligence
3:40 to 4:10
Facts Tell Stories Sell: The Art of Winning New Customers - Eddie Doyle, Head of Customer Engagement
Replicating success - New Customer Acquisition Case Studies - 3 Account managers (+Leslie as faciltator)
Cross-Sell and Upsell with Infinity Pricing - Noam Green, Head of Product Management and Product Marketing, Security Platforms
Understanding the Infinity Value Proposition - Gabi Reish, VP, Product Management and Product Marketing + Avi Rembaum, Vice President, Security Solutions
Dive Deep into Competitive Analysis - Hezi Chen, Head of Competitive Intelligence
Maximize the Value of Technical Sales Tools - Yael Haker, Manager, Israel Solution Center
How to Win EVERY POC! - Whatcha McCallum, Manager, Americas Solution Center
Architecting Infinity And Delivering Customer Value - Dan Colwell, Security Engineering Manager + Yair Herling, Technical Marketing Engineer
Expo
Explore the latest solutions with live demonstrations by Check Point and our partners.
Cyber Talk Keynotes - Architect
1) Making REAL Cyber Security Possible in 2018 - Gil Shwed, Founder & CEO
2) CISO viewpoint on modern IT - Britney Hommertzheim, Director, Information Security. AMC Theatres.
3) Artificial No Longer: Intelligence-Based Security - Orli Gan, Head of Product Management and Product Marketing, Threat Prevention
Cyber Talk Keynotes - Prevent
1) Inside the Mind of a Hacker - Pablos Holman - Futurist, Inventor, and Hacker
2) This Call Is Being Monitored (Not for Quality of Service Purposes) - Jeremy Kaye, Head of Mobile Security
3) Check Point 2018 : New Technologies and Solutions - Gabi Reish, VP, Product Management and Product Marketing
Cyber Talk Keynotes - Prevent
Check Point 2018 Roadmap - Dorit Dor, Vice President, Products
Expo
Explore the latest solutions with live demonstrations by Check Point and our partners.
Break Out Sessions
Architect - Industry thought leaders investigate the dynamics of today’s threat landscape. Learn how to prepare for the next major attack
13:30 - 14:00 -- 1) Architecting consolidated security with Infinity - Jeff Schwartz, Vice President, US Engineering
14:00 - 14:30 -- 2) Securing SaaS Applications - the Pragmatic Approach - Yoav Shay Daniely, Principal Product Manager
15:00 - 15:30 -- 3) Who’s responsible for your cloud security? - lessons learned - Richard Crane, Head of Cloud Security Sales, Americas
15:30 - 16:00 -- 4) IoT & Industrial Cyber attacks - Myth or Reality ? - Yariv Fishman, Product Manager
Prevent - Learn how Check Point’s emerging technology secures Cloud, Zero-Day Threats, and mobile devices
13:30 - 14:00 -- 1) Latest Innovations in Cyber Defense - Rich Comber, Head of Threat Prevention Engineering, Americas
14:00 - 14:30 -- 2) Adaptive Security that drives innovation in the cloud - Greg Pepper, Head of Data Center Virtualization and Cloud Security Architects, Americas
15:00 - 15:30 -- 3) Preventing attacks on mobile devices - Scot Kight, Regional Expert, Mobility + Ran Schwartz, Product Manager
15:30 - 16:00 -- 4) Google Cloud & Check Point CloudGuard- Better Together
Manage - Explore day-to-day best practices and operations of Check Point products
13:30 - 14:00 -- 1) Infinity - A day in a life of a security administrator - John Bloomer, Security Engineering Manager, Midwest Area
14:00 - 14:30 -- 2) Centralized security management across the enterprise - Nuno Sousa, Security Engineering Manager, East Strategic
15:00 - 15:30 -- 3) Learn from the masters: Maximize the value of your Threat Prevention - Nick McKerrall, Regional Expert, Threat Prevention + Yossi Hasson, Product Manager
15:30 - 16:00 -- 4) Mobile Security: Configuration and Policy Management Best Practices - Bobby Buggs, Regional Expert, Mobility
Customer Use Cases – The world’s top cyber-security experts discuss challenges, priorities, trends, and innovations
13:30 - 14:00 -- 1) Best of CheckMates: My Top Check Point CLI Commands - Tim Hall, Moti Sagey, Dameon Welch-Abernathy - ShadowPeak / Check Point
14:00 - 14:30 -- 2) An Infinity Case Study: The Mississippi Secretary of State Experience - Russell Walker - Chief Technology Officer Mississippi Secretary of State
15:00 - 15:30 -- 3) Deploying Check Point SandBlast Agent from Proof of Concept to Production - Joe Sullivan - Information Security Professional RCB Bank
15:30 - 16:00 -- 4) Enterprise Security in the Cloud – The Benefits of Infrastructure as Code - DJ Schleen, Michael Trofi - 1US Holocaust Memorial Museum
Technology Innovation Labs + Hands-On Labs
Advanced Threat Prevention
SandBlast Network
SandBlast Agent
SandBlast Mobile
Security Effectiveness Live Test
A Day in the Life of a Security Researcher
Private Cloud
Public Cloud
SaaS security
Infinity Architecture
Infinity Demo Upgrading to R80.10
SCADA & IoT Security
Automation & Orchestration with R80.10
Security Gateway Acceleration
Device Operations - Simplified!
R80.10 Migration Best Practices
SMB Security
Hands-on Labs
SandBlast Network, Agent, IDA
Private Cloud (Cisco ACI, VMware NSX)
Capsule Workspace
Security Management R80.10
Evening Social Event
Includes dinner, drinks and entertainment
Cyber Talk Keynotes - Prevent
1) Protecting Check Point - Sharon Schusheim, VP, Information Systems
2) Yes, You Can Get Burned When It's Cloudy - Don Meyer, Head of Product Marketing, Data Center , Dennis Moreau, Security Architect, Vmware
3) Why Our Security Problems are Getting Worse - Jeff Schwartz, Vice President, US Engineering
Cyber Talk Keynotes - Manage
1) Microsoft Azure and Check Point - Intelligent Cloud Security - Avi Ben Menahem, Director of Azure Security, Microsoft
2) Incident Response War Stories - Dan Wiley, Head of Incident Response
3) Hacking the boardroom - Eddie Doyle, Head of Customer Engagement + Neatsun Ziv, VP, Threat Prevention
4) Internet of Things: Is Winter Coming? - Avi Rembaum, Vice President, Security Solutions
Expo
Explore the latest solutions with live demonstrations by Check Point and our partners.
Break Out Sessions
Architect - Industry thought leaders investigate the dynamics of today’s threat landscape. Learn how to prepare for the next major attack
13:30 - 14:00 -- 1) How Organizations Can Gain Infrastructure Efficiency by Automating Their Network Operations - Rafi Zvi - CEO, BackBox
14:00 - 14:30 -- 2) Latest Mobile Security Threats - Ricardo Panez, Head of Mobile Threat Prevention, Americas
15:00 - 15:30 -- 3) Healthcare Security - Challenges and effective approaches - Yariv Fishman, Product Manager
15:30 - 16:00 -- 4) Advanced Threat Prevention at wire speed - Mark Ostrowski, Regional Director Security Engineering, Eastern
Prevent - Learn how Check Point’s emerging technology secures Cloud, Zero-Day Threats, and mobile devices
13:30 - 14:00 -- 1) Game of pwns - Emerging threats & cyber security trends - Gad Naveh, Advanced Threat Prevention Evangelist / Tal Eisner, Product Marketing Manager
14:00 - 14:30 -- 2) 360° Attack Prevention - Steve Johnson, Head of Advanced Threat Prevention, Americas
15:00 - 15:30 -- 3) Cyber Academy Awards 2017 – Leading Trends in the Threat Landscape - Lotem Finkelsteen, Team Leader Threat Intelligence
15:30 - 16:00 -- 4) Recommendations for Data Security and GDPR - Noa Katz, Product Marketing Manager
Manage - Explore day-to-day best practices and operations of Check Point products
13:30 - 14:00 -- 1) Achieving Zero-Touch Automation: A Network Security Policy Management Maturity Model - Ruvi Kitov - CEO, Tufin
14:00 - 14:30 -- 2) Automating the Rule-Base - Marco Garcia, Director of Engineering, Global SI & MSP
15:00 - 15:30 -- 3) Cloud Security Architecture Blueprint - Greg Pepper, Head of Data Center Virtualization and Cloud Security Architects, Americas
15:30 - 16:00 -- 4) Orchestrating Gateway Operations - Dan Colwell, Security Engineering Manager
Customer Use Cases – The world’s top cyber-security experts discuss challenges, priorities, trends, and innovations
13:30 - 14:00 -- 1) Cyber Race: Hacking The Giants - Oded Vanunu, Head of Products Vulnerability Research Check Point
14:00 - 14:30 -- 2) Kellman Meghu - Global Security Manager Sycomp - "Security Infrastructure as Code"
15:00 - 15:30 -- 3) Artificial Intelligence in Managed Incident Response - Ramandeep Singh- CEO, QOS Technology
Building your very own Check Point “playground" - Eric Anderson - Chief Technology Officer Netanium
15:30 - 16:00 -- 4) More Security is Less Security Or How HTTPS Blinds Security Architectures - Eric Crutchlow Security Engineer Check Point
Technology Innovation Labs + Hands-On Labs
Advanced Threat Prevention
SandBlast Network
SandBlast Agent
SandBlast Mobile
Security Effectiveness Live Test
A Day in the Life of a Security Researcher
Private Cloud
Public Cloud
SaaS security
Infinity Architecture
Infinity Demo Upgrading to R80.10
SCADA & IoT Security
Automation & Orchestration with R80.10
Security Gateway Acceleration
Device Operations - Simplified!
R80.10 Migration Best Practices
SMB Security
Hands-on Labs
SandBlast Network, Agent, IDA
Private Cloud (Cisco ACI, VMware NSX)
Capsule Workspace
Security Management R80.10
Training Tracks
- Automating and orchestrating your security network with Check Point R80.10
- Use the new API to automate security management operations and other security functions.
- Deep Dive into Check Point’s SandBlast product family
- Detect and prevent malware and phishing attacks.
- Use Threat Emulation and Extraction to scan for malicious files.
- Protect against unknown threats in files that are downloaded from the Internet or attached to emails.
- Be a technical expert on the Check Point R80.10 software release
- Learn what’s new with R80.10 NGFW/NGTP.
- Employ the new security policy layers functionality.
- Hacking 101: Introduction to common web attack techniques
- Learn about common security holes in the IT world.
- Learn the basics of preventing security holes in your network.
- Preventing mobile cyber security attacks with Check Point mobile security
- Are your employees accessing their corporate information through their mobile devices? Are those devices secured? How vulnerable is your corporate network without Mobile Security? Come, learn, and try Check Point SandBlast Mobile and how to protect your network from mobile security breaches with our advanced mobile threat defense. Hear about Capsule Workspace and how to create a secure environment on device that will prevent corporate data loss and unwanted access using a seamless and secure user experience.
- Securing your cloud workloads with Check Point
- Protect your assets in the cloud from the most sophisticated threats with dynamic scalability, intelligent provisioning and consistent control across physical and virtual networks.
Pricing
Customers
- Two Day Event
- All General Sessions
- All Breakout Sessions
- CPX Expo Pass
- Welcome Reception
- Evening Social Event
- Hotels from $200/night
- Training with additional cost
Partners
- Three Day Event
- All General Sessions
- All Breakout Sessions
- CPX Expo Pass
- Welcome Reception
- Evening Social Event
- Hotels from $200/night
- Training with additional cost
FAQ
Registration
Who should attend?
CPX 360 delivers several conference tracks of vital interest for professionals in many cyber security and business roles. The Cyber Talk keynotes track is perfect for C-level executives and other policy makers. Patterned after TED sessions, Cyber Talks bring together top cyber security experts who identify today’s unprecedented security challenges as they discuss cyber security priorities, trends and innovations. The Architect, Prevent and Manage tracks provide the best and most practical ways to secure your organization. Cyber Security engineers, architects, administrators and geeks will benefit greatly from the Customer Community Use Cases track as well as the Technology Innovation and Hands-on Labs to test drive our latest technology.
Why should I attend?
Understanding the current state of cyber security has never been more important for sustaining normal operations and preventing data breaches that can prove catastrophic to organizations of all types. CPX 360 brings together the world’s elite cyber security experts to give you the latest trends in threats and the strategies and technologies needed to prevent damage from cyber attacks.
How do I register?
Follow this link to register for the February 6-8 conference to be held at the Venetian, Las Vegas, Nevada
May I register on-site?
No. To ensure sufficient seating for all sessions and events, all attendees must preregister online for the conference.
May more than one person from the same company attend the Check Point Experience 2018 Conference?
Yes, but each person must register individually.
Will I receive a receipt for my registration?
Yes, you will receive a receipt for your registration (including hotel stay) from Check Point approximately two weeks after the event.
How do I book a hotel room?
If you registered for a package that includes a hotel room, Check Point will reserve a hotel room on your behalf for the nights of February 6-8. A separate hotel confirmation number will be provided to you (this is different from the CPX2018 registration confirmation number you receive). If you chose to register without a hotel room, lodging reservations are wholly your responsibility.
Conference Technical Training
When is the training?
Conference training is on February 9.
Who can attend the training?
The training sessions are optional and open to everyone. Simply choose to attend as part of your CPX 360 registration process. The fee ($200) to attend is in addition to the CPX registration fee. Space for these training sessions is limited so be sure to register early.
What can I expect to receive from this training session?
Technical Training attendees will receive one continuing education credit good for six months toward extending a current CCSA or CCSE certification.
Do I have to stay overnight to attend training?
The technical training sessions will begin on Friday, February 9. If you need a hotel room on February 9, we can gladly make arrangements on your behalf. This option appears on the registration page.
How do I register for a training session?
You can register for technical training online on the CPX 360 registration form.
Co-op
Can I use Co-op funds to attend the event?
Yes. If you pre-register for the event pass, partners and distributors can use co-op for this event for each employee and end user that you wish to sponsor excluding hotel and training costs.
The fee will be directly discounted at the time you or your customer registers. No additional reimbursements apply, so no claims are required in 2018. There is no limit to the number of end user guests that a Check Point partner or distributor can sponsor through Co-op.
Can I use co-op to cover conference expenses beyond the approved allowance?
No.
Do I need to open a co-op project for the approved allowance?
No. Please enter the co-op sponsoring partner’s name and email address on the “Summary and Payments” page during online registration so that you get the appropriate allowance.
Do I need to file a claim after the event?
No. Since no additional reimbursements apply, no claims are required.
I have questions about my registration with co-op. How can I follow up?
Please contact Coop@checkpoint.com.
Other Questions
What is the dress code?
The dress code is business casual.
How do I get information on exhibits and sponsorships?
Learn more about CPX 360 sponsorship opportunities – contact Demi Battaglia.
What if I still have unanswered questions about the Check Point Experience 360 Conference?
If you have questions about the conference, please email cpx360.usa@checkpoint.com.
What is the Check Point Experience Conference cancellation policy?
Conference cancellations received up to two weeks prior to the event are fully refundable. No refunds will be made less than two weeks before the first day of the event. To be eligible for a refund, cancellations must be submitted to cpx360.usa@checkpoint.com. Refunds will be issued within 30 days of the conference.
Note: Hotel cancellations are subject to respective hotel cancellation policy.
Testimonials
Call for Papers
Share your Cyber Security insights on-stage at CPX 360!
We’re looking for speakers who will teach, share and inspire Check Point customers and partners to use the strategies, tools, and techniques needed to prevent cyber threats! How are you leveraging the power of Check Point Architecture to protect your organization? What are some of the technical tips and tricks you can recommend? Submit your ideas to CPX 360!
Recommended topic areas include:
• Cutting edge cyber security trends
• Cloud Security
• Perimeter and Data Center Security
• Mobile security
• Advanced Threat Prevention
• R80.X use cases
• Security Automation
Remember to include practical advice, key success factors, proven examples, an in-depth explanation of the challenges you’ve overcome and lessons learned on topics related to securing your datacenter, your cloud environments, and your mobile endpoints.
Key Dates
Submissions will be accepted from now until November 30th
Decision and notification to speaker December 15th
How to Submit
Submitting your abstract is simple – follow the steps here on the CheckMates user community. You will receive a response to your submission advising you of receipt of your abstract.
Items to Include in Submission
All submissions must include the following information:
• Presenter’s name
• Presenter’s organization, job title and biography
• Presentation title
• “Soundbyte” abstract – maximum 140 characters
• Full abstract – maximum of 200 words
• Length – (ideally 20-30 minutes)
• If applicable, please also include any links to previous presentations, slide decks, or papers
• Please include an estimate of how ‘technical’ your presentation will be. The following rating will be used:
T1 = Very little technical knowledge required
T2 = Some technical knowledge is assumed
T3 = Largely technical and/or detailed content aimed at technicians
• Presentations must be written in English
• Presentations should present original work, which ideally has not been previously published
• Presentations will be selected based on their originality, significance, correctness and clarity of presentation
Key Disclaimers
It is important for presentations to avoid vendor/partner/sponsor specific ‘product pitches/sales pitches’. If presentation proposals are considered to contain such material (product pitches/sales) they will more than likely be rejected early in the review process. Further, vendors are reminded that there is no linkage between conference sponsorship and the opportunity to present at the conference.
For More Information and questions please ask in the CheckMates dedicated page.
Looking Back at CPX
Photos from Past CPX
Location
- The Venetian, Las Vegas
- 3355 S Las Vegas Blvd, Las Vegas, NV 89109