Cloud.   Mobile.   Threat Prevention.
Welcome to the Future of Cyber Security

The pervasiveness of digital transformation and IoT calls for fundamental changes to existing and future IT security strategies. Join us at Check Point Experience 2017 Singapore for an opportunity to network with your peers and colleagues, listen to technology updates and best practices and learn how to implement innovative strategies to secure your business.

Sessions offered will include:

  • Check Point CyberTalks
  • The Future of Cyber Security
  • Meet the Experts
  • Technology Innovation Labs
  • Check Point and Partner Expo

We look forward to seeing you at CPX 2017 Singapore!


Peter Alexander

Chief Marketing Officer

As CMO, Peter leads Check Point’s Marketing Organization, including Corporate Marketing, Corporate Communications, GEO/Field Marketing, Strategic Marketing, and Demand Generation.

    Pierre Paul Allard

    Executive Vice President, Worldwide Sales

    Pierre-Paul Allard serves as executive vice president of Worldwide Sales for Check Point. As executive vice president, Allard leads a customer-centric, services-led organization responsible for the strategy, orchestration and inspection for all customer touch points throughout the sales cycle. This includes sales, services, and channels, alliances, inside sales, field enablement and field operations.

      Nathan Shuchami

      Vice President, Emerging Products

      Nathan Shuchami is a senior professional with 20 years of executive management and entrepreneurial experience. He is the VP of Emerging Products for Check Point Software Technologies with global responsibilities.

        Stephen McWhirter

        Vice President, Asia Pacific, Middle East and Africa

        Steve McWhirter is Vice President of Asia Pacific, Middle East and Africa for Check Point Software Technologies and is responsible in driving the sales growth as well as the technical wellbeing of Check Point customers. His leadership has been instrumental in the growth of Check Point in the region, especially in the areas of Threat Prevention, Mobility and Cloud.

          Collin Penman

          Regional Managing Director, South Asia

          A veteran in IT security, Collin Penman is an active participant to technology changes, from securing telex machines in the 80’s to today’s Cloud and Mobile adoption. He is passionate about enabling businesses to adopt emerging technologies while staying secure.

            Evan Dumas

            Head, Emerging Technologies

            An advocate for cloud, mobile and threat prevention best practice, Evan works with multiple stakeholders to ensure customer satisfaction. He also heads a multi-cultural team at Check Point, helping customers and partners secure their business using cutting edge technology.

              Bruce Chai

              Head, Threat Prevention, Asia

              Bruce Chai, Head of Threat Prevention for Asia, is responsible for Check Point’s Threat Prevention strategic products across Asia. He focuses on developing relationships with clients to identify and solve their problems, while ensuring the visibility and transparency of Check Point’s solutions.

                Michael Petit

                Head of Mobility, APAC, Middle East & Africa (AMA)

                Michael Petit holds the role of Head of Mobility, where he is responsible for Check Point’s mobility solutions across Asia Pacific, Middle East & Africa. In this position, Michael works closely with customers and partners to help them bridge the gap between enabling and securing the modern day mobile enterprise.

                  Craig Lim

                  Head, Virtual Security, Asia.

                  Craig heads up the Cloud and Next Generation Data Centre security portfolio across Asia. Prior to joining Check Point, Craig Lim ran the OEM business for VMware in ASEAN, driving the Cloud adoption to customer through key enterprise partners like HPE, Dell, Lenovo and Cisco.

                    Peter Marini

                    MSP/Cloud Provider Channel Sales Manager

                    At Check Point, Peter Marini manages alliances with strategic cloud providers and Managed Security Providers (MSPs) across the Asia Pacific region. His responsibilities include go-to-market, business development and enablement for the public cloud and MSP business.

                      Akhil Behl

                      Cloud Security Engineer

                      Akhil Behl is a published author, an evangelist and a passionate IT executive with over 13 years of experience in IT security. He leads the charter for Public and Private Clouds in APAC for Check Point from business and technology perspective.

                        Gad Naveh

                        Advanced Threat Prevention Evangelist

                        Gadi works closely with Check Point’s Threat Intelligence and R&D teams to help customers understand the current threat environment and how they can prevent attacks. With more than 15 years of Information Security experience, Gadi is a frequent presenter in cyber security conferences and events across the globe.

                          Daniel Dor

                          Mobile Security Presale Manager

                          Daniel is proactively promoting the worldwide sales efforts of Check Point’s Mobile Security Suite of Products, while creating and supporting all markets. In the past few years, he managed and assisted in hundreds of projects in the Information Security and Analytics domains. Prior to that, he led 10+ teams to achievements in 20+ different technological and organizational projects in several fields, in dealing with these projects initiation, design and execution phases. Finally, Daniel is a PhD student at the Department of Software and Information Systems Engineering at Ben Gurion University.

                            Keith Holtham

                            Emerging Technologies Lead ANZ

                            Having started his IT career as a mainframe programmer in Papua New Guinea, Keith has worked in consulting, education, technical marketing and sales leadership roles. He now leads Check Point’s emerging technologies group for A/NZ specifically focusing on enabling businesses to face the evolving security challenges that IOT, Cloud and increased mobility bring..

                              Matthew Gyde

                              Group Executive, Security

                              Responsible for managing Dimension Data’s Security Business Unit globally, Matthew’s primary focus is on strategically driving innovation within the business. His career in IT Security spans almost 20 years and his vast experience equips him with a profound understanding of the security space, and understands how platforms need to be implemented, used and managed to ensure clients remain competitive while minimising their risk in a shifting threat landscape.

                                Jonathan Andresen

                                Senior Director of Marketing & Products - Asia Pacific

                                Mr. Andresen has been working in the telecommunications and IT sector since 1996, relocating to Asia in 2003.
                                Prior to joining MobileIron in 2014, Mr. Andresen held various product, marketing, strategy and business development management positions at Blue Coat Systems and Nortel Networks Wireless Business Unit in Asia. Mr. Andresen’s career includes earlier positions with Teleglobe International, MetroPhotonics and Canada’s Department of Foreign Affairs and International Trade.

                                  Deepraj Emmanuel Datt

                                  Solution Design Leader, IBM Security Services, Asia Pacific

                                  Responsible for the management and success of the solution design and architecture division for IBM Security Services business in APAC, Deepraj works closely with a number of enterprises in the region towards holistic improvement of their security posture. Deepraj also has overall responsibility for proactive risk mitigation and incremental agility in key IBM customer technology initiatives, driving innovation and collaboration together with key IBM pillars.


                                    Platinum Sponsors

                                    20140918_Singtel Masterbrand Logo Colour

                                    Gold Sponsors

                                    IBM has been helping companies innovate for over 100 years and has achieved over 3,700 security-related patents in the last decade while acquiring more than 12 security companies to build its portfolio. As a recognized security leader, IBM offers one of the world’s broadest, most advanced and integrated portfolios of security products and services to help protect against advanced threats, safeguard your most valuable assets, and help you innovate with cloud and mobile while reducing risk. Our security experts can help you assess your security posture, develop security strategies, and deploy and manage the best security solutions to defend your enterprise

                                    Silver Sponsors

                                    Silver Sponsor

                                    App Sponsor


                                    Supporting Association



                                    Registration & Expo

                                    Registration & Expo

                                    We are all living in a connected world which is affecting every aspect of our lives. In the past couple of years, we have been discussing implications of a technology and digital-driven world (i.e.) cloud, mobile, advanced threats. Today, we are seeing some of our worst predictions shaping into real life. So why are businesses not protecting themselves and instead keep making excuses? In today’s world, business need security that meet their business needs. Pierre Paul Allard's discussion defines the pillars of security that businesses should adopt, based on their actual business needs.

                                    Pierre Paul Allard

                                    We are in an extraordinary time in human history. Thanks to innovative and disruptive technologies we live longer, healthier and more educated than ever before. While technologies such as cloud computing, mobile and Internet of Things open up new opportunities, they are, in many cases, the biggest barriers for adoption due to cyber security concerns. How do you innovate, inspire and compete while remaining secure? In his inspiring session, Nathan Schuchami shares the Check Point vision on how organizations can keep focus on innovating while being secured with a security architecture that is one step ahead.

                                    Nathan Schuchami

                                    Based on real world experiences of helping customers, this candid discussion will focus on ensuring that your organization is prepared when a breach occurs in your network. The discussion will provide real world examples of what works and what does not work and provides a framework on how to center your organizations security strategy to face any incident head on.

                                    Peter Alexander

                                    What would you do if you had the ability to see 40% of the world’s Internet traffic? As part of the NTT Group, we are using this information to create a machine learning predictive threat platform that could be used to provide real-time and contexualised threat information to our clients – we call it the Global Threat Intelligence Platform. Join us in this session as Matthew Gyde, Dimension Data’s Group Executive – Security, offers insights in to the capabilities of the Global Threat Intelligence Platform and how it might be used within your organisation. Matthew will also explore the recently released 2017 NTT Global Threat Intelligence Report (GTIR). The report provides visibility into current and evolving threats and trends in the context of the geo-political and cyber threat climate, including actionable insights and expert strategic recommendations businesses can take to enhance their security posture. The GTIR is compiled from data collected by NTT Security and other NTT operating companies including Dimension Data, from the networks of 10,000 clients across five continents, 3.5 trillion security logs, 6.2 billion attempted attacks, and global honeypots and sandboxes located in over 100 different countries.

                                    Matthew Gyde

                                    As the world becomes increasingly connected, securing your data and devices is no mean feat. How do you stay secure? We invite some of the top minds in cyber security to share their thoughts. Moderator: Collin Penman

                                    Please refer to Breakout Sessions for agenda.

                                    Ransomware Under the Microscope

                                    Want to build your own cybercrime extortion empire? Have close to zero underground or hacking background? Come to this talk, we will get to know the ease of chaining malicious advanced services into a cyber-attack funnel all the way down to monetizing by revenue share using Ransomware-As-A-Service. We will highlight the needed services and where to get them. Taking a look on the different level of sophistication these services allow all the way up to nation state sponsored weapons now readily available to everyone through the NSA and CIA leaked tool set. The talk will highlight how easy it is to build an almost undetectable cyber-crime campaign and raise awareness for the need to put on advanced threat preventions.

                                    Gad Naveh

                                    Curious on how modern threats bypass your security defences? Interested in protecting yourself against such advance attacks? Let’s discuss the ways we prevent your organisation from being tomorrow’s front page news through having an integrated solution which defend against the various attack vectors.

                                    Bruce Chai
                                    Mobility: The Next Threat Wave

                                    Your mobile phone is the next battlefield frontline in cyberspace. Spy on the latest trends and learn what some of the latest tools the enemy has in their arsenal, so you can protect yourself from invasion.

                                    Michael Petit

                                    Protecting against advanced mobile threats on iOS and Android devices requires an integrated, multi-layered approach to mobile security. Join this special session to learn how best-in-class mobile threat protection can be deployed and managed in your organization.

                                    John Andresen

                                    Join this exciting live demo to see first hand how easy it is to hack any smartphone today. In this session Daniel Dor will demonstrate live hacking of a smartphone, the risks and possible mitigations for the new achiles heel of enterprises today and tomorrow.

                                    Daniel Dor
                                    Safe journey to the Cloud

                                    The era of cloud is upon us; firms of all sizes and in all walks of life are looking to leverage the agility and elasticity of cloud. But cloud carries a totally new and unique set of security challenges. In this session, you will take away five key tenants of cloud security, along with an accompanying set of recommendations on best practices securing hybrid cloud deployments.

                                    Craig Lim



                                    How do I register?

                                    Register for the August 23 event to be held at the Marina Bay Sands, Singapore.

                                    May I register on-site?

                                    On-site registration is subject to availability.

                                    May more than one person from the same company attend the Check Point Experience 2017 Conference?

                                    Yes, but each person must register individually.

                                    Will I receive a confirmation for my registration?

                                    An email acknowledgement for your registration will be sent to the email address registered. An email confirmation will be sent within one week from your registration.

                                    Other Questions

                                    What is the dress code?

                                    The dress code is business casual.

                                    How do I get information on exhibits and sponsorships?

                                    Learn more about CPX 2017 Singapore sponsorship opportunities – contact

                                    What if I still have unanswered questions about the Check Point Experience 2017 Conference?

                                    If you have questions about the conference, please email


                                    • Sands Expo and Convention Centre
                                      Marina Bay Sands Singapore
                                      10 Bayfront Avenue
                                      Singapore 018956
                                    • (65) 6435 1318