CPX 360 promises to be the premier cyber security summit. CPX 360 is where you’ll receive up-to-the-minute intelligence about global threats and other vital topics from the world’s leading cyber security experts. In addition, you’ll enjoy getting hands on with cutting-edge security solutions from Check Point, networking with your peers, and celebrating with the world’s cyber security elite. If you attend one cyber security event this year, make it CPX 360.


Tracks at a Glance

Cyber Talk Keynotes – Experience TED-like sessions bringing together top cyber security experts to identify ways to tackle unprecedented security challenges and discuss cyber security priorities, trends and innovations
Securing your Cloud (NEW) – All about securing your cloud with effective blueprints to SaaS, Public and Private Cloud
Hackers Exposed (NEW) – Learn how hackers are developing the next wave of Gen VI threats
Cyber Security Innovations (NEW) – Explore Cyber Security Innovations to effectively prevent threats before they cause damage
Cyber Innovation Competition (NEW) – 20×20 short cyber innovation stories
CheckMates Community use-cases – Listen first-hand to industry best practices from other organizations discussing real use-cases
Technology Innovation Labs – Experience Infinity threat prevention and security architecture
Geek Village (NEW) – geeky workshops (e.g. malware reversing, lock picking, crypto, Lego models etc.)
Hands-On Labs – Test Drive our latest technology through our hands-on Lab with a step by step cookbooks
EXPO – Explore the EXPO; see the latest technology solutions and demonstrations from Check Point and our Partners, Start-Up Pavilion
Gamification – Explore the 2019 Cyber challenge – CTF game, Shoot down hackers in the Cyber Range, or go on the CheckMates Scavenger Hunt



Chief Technology Officer, Tufin

Learn how to successfully navigate the stages of the maturity model and see a demonstration of zero-touch automation in practice.


    CEO, QOS Technology

    Ramandeep will discuss case studies about an innovative Check Point & QOS managed incident response using a machine learning platform

      Joshua Behar

      CEO, Ericom Software

      Pair cloud computing with firewalls, secure web gateways and remote browser isolation to avoid browser-borne threats and endpoint software breaches.

        Aaron Mckeown

        Head of Security Engineering & Architecture, Xero

        Aaron McKeown from Xero shares how Check Point and AWS delivered an advanced security solution with elastic scalability to protect Xero’s cloud-based workloads.

          Rohan Patil

          Head of Operations, VISTA InfoSec

          Rohan Patil presents the new “Adaptive Security Framework” for UAV ecosystems: infrastructure, network communications, applications and operations.

            Ekta Siwani

            Senior Software Engineer, QOS Technology

            Ekta Siwani will give a live demo of R80 Workflow use cases using API and automation techniques.

              Shikwang Jang

              Regional Director - APAC, FireMon

              Businesses have evolved from simple, inefficient paper-based operations into to complex, efficient digital organizations. Let’s examine your business, or your customer’s business to begin its next step in evolution.

                Marlon Corpuz

                Solution Architect-APAC, Skybox Security

                A unique subset of vulnerabilities and exploits pose the biggest threats to your IT operations. Learn threat-centric vulnerability management (TCVM) to align remediation with the risks that threaten your network.

                  Gil Shwed

                  Founder and CEO

                  Gil Shwed is the founder and Chief Executive Officer. Mr. Shwed is considered the inventor of the modern firewall and authored several patents, such as the company’s Stateful Inspection technology.

                    Dorit Dor

                    Vice President of Products

                    Dr. Dorit Dor, Vice President of products at Check Point, manages all product definition and development functions for both the enterprise and consumer divisions of the company

                      Peter Alexander

                      Chief Marketing Officer

                      As CMO, Peter leads Check Point’s Marketing Organization, including Corporate Marketing, Corporate Communications, GEO/Field Marketing, Strategic Marketing, and Demand Generation.

                        Pierre-Paul Allard

                        EVP Worldwide Sales

                        Pierre-Paul Allard serves as executive vice president of Worldwide Sales for Check Point.

                          Avi Rembaum

                          VP of Security Solutions

                          Avi Rembaum is Check Point’s Vice President, Security Solutions. Avi is responsible for the solution center, incident response team, strategic alliance program and security architecture function.

                            Gabi Reish

                            VP of Product Marketing & Product Management

                            Gabi Reish is VP of Product Marketing & Product Management at Check Point. A recognized security advocate, Gabi brings more than 15 years of experience in the data networking industry.

                              Neatsun Ziv

                              VP of Threat Prevention

                              Neatsun is Check Point’s Vice President for Threat Prevention. He has led a few of the key innovations within the company and is the internal founder of the Cloud Initiative.

                                Dan Wiley

                                Head of Incident Response

                                Daniel Wiley, Head of Incident Response, manages Check Point’s advanced security operations including the Incident Response Service.

                                  Moti Sagey

                                  Head of Strategic Marketing

                                  Moti Sagey is the Head of Strategic Marketing & Intelligence at Check Point Software. Moti is responsible for strategically transforming intelligence and information into a compelling and resonating story.

                                    Oded Vanunu

                                    Head of Products Vulnerability Research

                                    Oded Vanunu is the Group Manager of Security Research. His main responsibilities include leading white-hat hacker groups to identify low-high risk vulnerabilities in Check Point products.

                                      MICHAEL SHAULOV

                                      Head of Mobility Product Management

                                      Michael Shaulov leads product direction for Check Point’s mobile security solutions including Check Point Mobile Threat Prevention.

                                        ORLI GAN

                                        Head of Threat Prevention Products

                                        Orli Gan, Head of Threat Prevention Product Management, has a background in development as well as in Product Management. Orli brings more than 20 years of experience in data security.


                                          Silver Sponsors

                                          Start-up Sponsors


                                          9:00 - 13:00
                                          Training Tracks

                                          1. Hacking 101: Introduction to common web attack techniques
                                            • Learn about common security holes in the IT world. Learn the basics of preventing security holes in your network.
                                          2. Cyber Range
                                            • Hyper-realistic simulation and virtual training environment, providing Geb V cyber range training for all type of customers and partners
                                          3. Advanced Web Hacking – Introduction (Time: 09:00-16:00)
                                            • This fast paced training gives attendees an insight into advanced AppSec topics
                                          4. Automating and orchestrating your security network with Check Point R80.10
                                            • Use the new API to automate security management operations and other security functions.
                                          5. Deep Dive into Check Point’s SandBlast product family
                                            • Detect and prevent malware and phishing attacks. Use Threat Emulation and Extraction to scan for malicious files. Protect against unknown threats in files that are downloaded from the Internet or attached to emails.
                                          6. Be a technical expert on the Check Point R80.10 software release
                                            • Learn what’s new with R80.10 NGFW/NGTP. Employ the new security policy layers functionality.
                                          7. Preventing mobile cyber security attacks with Check Point mobile security
                                            • Are your employees accessing their corporate information through their mobile devices? Are those devices secured? How vulnerable is your corporate network without Mobile Security? Come, learn, and try Check Point SandBlast Mobile and how to protect your network from mobile security breaches with our advanced mobile threat defense. Hear about Capsule Workspace and how to create a secure environment on device that will prevent corporate data loss and unwanted access using a seamless and secure user experience.
                                          8. Securing your cloud workloads with Check Point
                                            • Protect your assets in the cloud from the most sophisticated threats with dynamic scalability, intelligent provisioning and consistent control across physical and virtual networks.
                                          9:00 - 10:30
                                          Cyber Talk Keynotes

                                          1) Welcome
                                          2) Gil Shwed Keynote
                                          3) Cyber Security Customer Needs in the Modern Era and Effective Approaches
                                          4) CISO Point of View – Customer Session

                                          1) External Speaker Keynote
                                          2) Dome9 Keynote
                                          3) AI Innovations in Cyber Security
                                          4) IoT and Nano Security Unraveled

                                          12:00 - 18:00

                                          Explore the latest solutions with live demonstrations by Check Point and our partners.

                                          Securing your Cloud
                                          13:30 - 14:00 -- 1) AWS & Azure IaaS Architecture Blueprint
                                          14:00 - 14:30 -- 2) Securing SaaS Applications with CloudGuard SaaS – The Pragmatic Approach
                                          15:00 - 15:30 -- 3) Who’s Responsible for Your Cloud Security? – Lessons Learned
                                          15:30 - 16:00 -- 4) Lift & Shift vs. Cloud Native

                                          Cyber Security Innovations
                                          13:30 - 14:00 -- 1) Continues Cyber Security Protection Deployment
                                          14:00 - 14:30 -- 2) Advanced Threat Prevention at Wire Speed
                                          15:00 - 15:30 -- 3) Threat Hunting with Vanguard
                                          15:30 - 16:00 -- 4) 360° Attack Prevention with Infinity

                                          Security Autmation & Orechestration
                                          13:30 - 14:00 -- 1) Automate Everything – The Future of Security Automation
                                          14:00 - 14:30 -- 2) API Best Practices with Check Point
                                          15:00 - 15:30 -- 3) Finding the Breach in a Haystack – Live Demo
                                          15:30 - 16:00 -- 4) Orchestrating Gateway Operations – Best Practices

                                          Hackers Exposed
                                          13:30 - 14:00 -- 1) The Next Wave of Breaches Dissected
                                          14:00 - 14:30 -- 2) Faxploit – Your Enterprise Pwned through a Fax Machine
                                          15:00 - 15:30 -- 3) WhatsApp – Fake News through Message Manipulation
                                          15:30 - 16:00 -- 4) Man in the Disk – Your Phone Belongs to Us

                                          CheckMates Community Use-Cases
                                          13:30 - 16:00 -- Submit Call for Papers @ htttp://tiny.cc/CPXCFP19

                                          Technology Innovation Labs
                                          1. SandBlast Network
                                          2. Endpoint Security SandBlast Agent
                                          3. CloudGuard SaaS
                                          4. IPS
                                          5. CloudGuard –Dome9 & IaaS Public Cloud
                                          6. Cloudia
                                          7. Dev Ops – Open Stack
                                          8. Security Management
                                          9. Mobility 3.0
                                          10. Securing Small Mid Business
                                          11. Homeland Security + Vanguard
                                          12. Check Point Infinity
                                          13. Threat Intelligence
                                          14. Maestro
                                          15. Deployment
                                          16. SSL Acceleration

                                          Hands-on Labs
                                          1. SandBlast Network, Agent, IDA
                                          2. Private Cloud (Cisco ACI, VMware NSX)
                                          3. Public Cloud (AWS, Azure), Dome9
                                          4. Mobile Security
                                          5. Security Management R80.20

                                          9:00 - 10:20
                                          Cyber Talk Keynotes

                                          1) Check Point 2019 Innovations, Roadmap & Vision
                                          2) Age of Things – Gen VI Security
                                          3) Cyber Risk Culture: The Next Board Struggle

                                          1) Incident Response Cloudy War Stories
                                          2) Hackers Exposed – Gen VI Threats Under the Microscope
                                          3) How Do We Protect Our Own Cloud Infrastructure?
                                          4) Cloudy with a Chance of a Breach

                                          12:00 - 16:00

                                          Explore the latest solutions with live demonstrations by Check Point and our partners.

                                          Securing your Cloud
                                          13:30 - 14:00 -- 1) Sponsor Session
                                          14:00 - 14:30 -- 2) Dockers & Containers: How to Contain It Securely
                                          15:00 - 15:30 -- 3) Cloud Compliance Done Right with Dome9
                                          15:30 - 16:00 -- 4) SDWAN, PaaS, IaaS & SaaS, Oh My – Assess Your Risk

                                          Cyber Security Innovations
                                          13:30 - 14:00 -- 1) Sponsor Session
                                          14:00 - 14:30 -- 2) Managed Security Services & NFV – Unique Challenges & Effective Approaches
                                          15:00 - 15:30 -- 3) Endpoint Security Total Protection - Best Practices
                                          15:30 - 16:00 -- 4) Preventing Attacks on Mobile Devices

                                          Security Automation & Orchestration
                                          13:30 - 14:00 -- 1) Sponsor Session
                                          14:00 - 14:30 -- 2) Security for DevOps – No Humans Necessary
                                          15:00 - 15:30 -- 3) Security as Code
                                          15:30 - 16:00 -- 4) Orchestrating Gateway Operations – Best Practices

                                          Hackers Exposed
                                          13:30 - 14:00 -- 1) SiliVaccine – A Deep Look inside North Korea's Anti-Virus Software
                                          14:00 - 14:30 -- 2) Hacking Drones
                                          15:00 - 15:30 -- 3) Using Intelligence and Research to be #1 on Security
                                          15:30 - 16:00 -- 4) TBD
                                          CheckMates Community Use-Cases
                                          13:30 - 16:00 -- Submit Call for Papers @ htttp://tiny.cc/CPXCFP19

                                          9:00 - 12:00
                                          Sessions for Partners

                                          1) CCO + Geo Leader Welcome
                                          2) Partnering for Success!
                                          3) Coming out Swinging in 2019
                                          4) Coffee Break and Networking
                                          5) Winning Through Innovation
                                          6) Partner Awards

                                          13:00 - 17:00
                                          Breakouts: Sales and Technical

                                          Sales A
                                          1) Understanding the Infinity Value Proposition
                                          2) TBA
                                          3) How to Sell CloudGuard with Customer Centric Approach
                                          4) Facts Tell Stories Sell: The Art of Winning New Customers

                                          Sales B
                                          1) Facts Tell Stories Sell: The Art of Winning New Customers
                                          2) Understanding the Infinity Value Proposition
                                          3) TBA
                                          4) How to Sell CloudGuard with Customer Centric Approach

                                          Sales C
                                          1) How to Sell CloudGuard with Customer Centric Approach
                                          2) Facts Tell Stories Sell: The Art of Winning New Customers
                                          3) Understanding the Infinity Value Proposition
                                          4) TBA

                                          Sales D
                                          1) TBA
                                          2) How to Sell CloudGuard with Customer Centric Approach
                                          3) Facts Tell Stories Sell: The Art of Winning New Customers
                                          4) Understanding the Infinity Value Proposition

                                          SE 1
                                          1) How to Whiteboard the Gen V Story
                                          2) How to Win EVERY POC!
                                          3) Maximize the Value of Technical Sales Tools
                                          4) Dive Deep into Competitive Analysis

                                          SE 2
                                          1) Dive Deep into Competitive Analysis
                                          2) How to Whiteboard the Gen V Story
                                          3) How to Win EVERY POC!
                                          4) Maximize the Value of Technical Sales Tools

                                          SE 3
                                          1) Maximize the Value of Technical Sales Tools
                                          2) Dive Deep into Competitive Analysis
                                          3) How to Whiteboard the Gen V Story
                                          4) How to Win EVERY POC!

                                          SE 4
                                          1) How to Win EVERY POC!
                                          2) Maximize the Value of Technical Sales Tools
                                          3) Dive Deep into Competitive Analysis
                                          4) How to Whiteboard the Gen V Story

                                          Explore the latest solutions with live demonstrations by Check Point and our partners.


                                          Register by December 1st to get $200 discount on regular price.
                                          • Includes Early Bird Discount
                                          • Two Day Event
                                          • All General Sessions
                                          • All Breakout Sessions
                                          • CPX Expo Pass
                                          • Welcome Reception
                                          • Training with additional cost
                                          • Includes Early Bird Discount
                                          • Three Day Event
                                          • All General Sessions
                                          • All Breakout Sessions
                                          • CPX Expo Pass
                                          • Welcome Reception
                                          • Training with additional cost



                                          Who should attend?

                                          CPX 360 delivers several conference tracks of vital interest for professionals in many cyber security and business roles. The Cyber Talk keynotes track  is perfect for C-level executives and other policy makers. Patterned after TED sessions, Cyber Talks bring together top cyber security experts who identify today’s unprecedented security challenges as they discuss cyber security priorities, trends and innovations. The Architect, Prevent and Manage tracks provide the best and most practical ways to secure your organization. Cyber Security engineers, architects, administrators and geeks will benefit greatly from the Customer Community Use Cases track as well as the Technology Innovation and Hands-on Labs to test drive our latest technology.

                                          Why should I attend?

                                          Understanding the current state of cyber security has never been more important for sustaining normal operations and preventing data breaches that can prove catastrophic to organizations of all types. CPX 360 brings together the world’s elite cyber security experts to give you the latest trends in threats and the strategies and technologies needed to prevent damage from cyber attacks.

                                          How do I register?

                                          Follow this link to register for the January 21-24 conference to be held at Centara Grand at CentralWorld, Bangkok, Thailand.

                                          May I register on-site?

                                          No. To ensure sufficient seating for all sessions and events, all attendees must preregister online for the conference.

                                          May more than one person from the same company attend the Check Point Experience 360 Conference?

                                          Yes, but each person must register individually.

                                          Will I receive a receipt for my registration?

                                          Yes, you will receive a receipt for your registration from Check Point approximately two weeks after the event.

                                          How do I book a hotel room?

                                          If you registered for a package that includes a hotel room, Check Point will reserve a hotel room on your behalf for the nights of January 21-23 (for customers) and 21-24 (for partners). A separate hotel confirmation number will be provided to you (this is different from the CPX2019 registration confirmation number you receive). If you chose to register without a hotel room, lodging reservations are wholly your responsibility.


                                          Can I use Co-op funds to attend the event?

                                          Yes. If you pre-register for the event pass, partners and distributors can use co-op for this event for each employee and end user that you wish to sponsor excluding hotel.

                                          The fee will be directly discounted at the time you or your customer registers. No additional reimbursements apply, so no claims are required in 2019. There is no limit to the number of end user guests that a Check Point partner or distributor can sponsor through Co-op.

                                          Can I use co-op to cover conference expenses beyond the approved allowance?


                                          Do I need to open a co-op project for the approved allowance?

                                          No. Please enter the co-op sponsoring partner’s name and email address on the “Preferences” page during online registration so that you get the appropriate allowance.

                                          Do I need to file a claim after the event?

                                          No. Since no additional reimbursements apply, no claims are required.

                                          I have questions about my registration with co-op. How can I follow up?

                                          Please contact coop@checkpoint.com.

                                          Other Questions

                                          What is the dress code?

                                          The dress code is business casual.

                                          How do I get information on exhibits and sponsorships?

                                          Learn more about CPX 360 sponsorship opportunities – contact Demi Battaglia.

                                          What if I still have unanswered questions about the Check Point Experience 360 Conference?

                                          If you have questions about the conference, please email cpx360.asia@checkpoint.com.

                                          What is the Check Point Experience Conference cancellation policy?

                                          Conference cancellations received up to two weeks prior to the event are fully refundable. No refunds will be made less than two weeks before the first day of the event. To be eligible for a refund, cancellations must be submitted to cpx360.asia@checkpoint.com. Refunds will be issued within 30 days of the conference.

                                          Note: Hotel cancellations are subject to respective hotel cancellation policy.


                                          “I’m having a great time at CPX – being able to not only network and collaborate with my peers, but to be able to have one-on-one time and collaborate with a lot of industry leaders and with the actual R&D and engineers from Check Point. You actually listen and want to know what you can do to help me to do a better job, CPX is fantastic!”
                                          On the Event
                                          “I’ve enjoyed most the breakout sessions and the CyberTalks. I find the new format more attractive. It’s more dynamic. It feels fresh.”
                                          On the Agenda

                                          Call for Papers

                                          Share your Cyber Security insights on-stage at CPX 360!

                                          We’re looking for speakers who will teach, share and inspire Check Point customers and partners to use the innovations, strategies, tools, and techniques needed to prevent cyber threats! How are you leveraging the power of Check Point Infinity Architecture to protect your organization? What are some of the technical tips and tricks you can recommend? Submit your ideas to CPX 360 !

                                          This year we have two dedicated call for papers tracks:
                                          *20×20 Cyber Innovation Competition
                                          *CheckMates Community use cases

                                          Recommended topic areas include:
                                          • Cutting edge cyber security innovations
                                          • Cloud Security
                                          • Perimeter and Data Center Security
                                          • Mobile security
                                          • Advanced Threat Prevention
                                          • R80.X use cases
                                          • Security Automation

                                          Remember to include practical advice, key success factors, proven examples, an in-depth explanation of the challenges you’ve overcome and lessons learned on topics related to securing your datacenter, your cloud environments, your mobile and endpoints.

                                          Key Dates

                                          • Submissions deadline is November 30th
                                          • Decision and notification to speaker December 15th
                                          Submit your abstract to checkmates@checkpoint.com

                                          Items to Include in Submission

                                          All submissions must include the following information:

                                          • Presenter’s name
                                          • Presenter’s organization, job title and biography
                                          • Presentation title
                                          • Track you are submitting for (20×20 Cyber Innovation Competition or CheckMates)
                                          • Short abstract – maximum 100 words
                                          • Length – ideally 20-30 minutes for the CheckMates track, 6 minutes 40 seconds for the 20×20 Cyber Innovation Competition track
                                          • If applicable, please also include any links to previous presentations, slide decks, or papers
                                          • Please include an estimate of how ‘technical’ your presentation will be. The following rating will be used:

                                          T1  = Very little technical knowledge required
                                          T2  = Some technical knowledge is assumed
                                          T3 = Largely technical and/or detailed content aimed at technicians

                                          • Event you are submitting to (Bangkok (Jan. 21th-23th), Las Vegas (Feb. 4th-6th), Vienna (Feb. 18th-20th))
                                          • Presenters are to submit for an event in their respective GEO’s
                                          • Presentations must be written in English
                                          • Presentations should present original work, which ideally has not been previously published
                                          • Presentations will be selected based on their originality, significance, correctness and clarity of presentation

                                          Key Disclaimers

                                          It is important for presentations to avoid vendor/partner/sponsor specific ‘product pitches/sales pitches’. If presentation proposals are considered to contain such material (product pitches/sales) they will more than likely be rejected early in the review process. Further, vendors are reminded that there is no linkage between conference sponsorship and the opportunity to present at the conference.

                                          proposals with real use cases from customers will be given priority in the selection criteria

                                          We will give full conference passes (with hotel) only to those who actively participate as speakers on accepted presentations.

                                          Earn CPE Credits

                                          We are pleased to announce that Check Point is partnering with the following world-class cyber security certification vendors to provide CPX 360 attendees the opportunity to gain Continuing Professional Education (CPE) credits.

                                          • (ISC)2
                                          • GIAC
                                          • EC Council

                                          How to Obtain CPE Credits

                                          1. After attending CPX 360, you will receive a digital badge of attendance from Check Point (example shown below)
                                          2. Next, visit the certification vendor website and provide them the link to the CPX digital badge as proof of attendance

                                          If you have any questions, please contact us at cpe@checkpoint.com.


                                          • Centara Grand, Bangkok
                                          • 999/99 Rama 1 Road, Pathumwan, Bangkok 10330, Thailand
                                          • Tel: +66 (0) 2100 1234
                                          • Fax: +66 (0) 2100 1235