CPX 360 promises to be the premier cyber security summit. For the first time, we will bring our customers and partners together in a mega conference and expo. CPX 360 is where you’ll receive up-to-the-minute intelligence about global-threats and other vital topics from the world’s leading cyber-security experts. In addition, you’ll enjoy getting hands on with cutting-edge security solutions from Check Point, networking with your peers, and celebrating with the world’s cyber-security elite. If you attend one cyber security event this year, make it CPX 360.

 

Tracks at a Glance

Cyber Talk keynotes – Experience TED-like sessions bringing together top cybersecurity experts to identify ways to tackle unprecedented security challenges and discuss cybersecurity priorities, trends and innovations
Architect – Industry thought leaders investigate the dynamics of today’s threat landscape. Learn how to prepare for the next major attack
Prevent – Learn how Check Point’s emerging technology secures Cloud, Zero-Day Threats, and mobile devices
Manage – Explore day-to-day best practices and operations of Check Point products
Customer Use Cases – The world’s top cyber-security experts discuss challenges, priorities, trends, and innovations
Technology Innovation Labs – Experience Infinity threat prevention and security architecture
Hands-On Labs – Test drive Check Point’s latest technology with step-by-step cook books
EXPO – Explore the latest solutions with live demonstrations by Check Point and our partners
Games – Join the fun: 2018 Cyber Challenge, our CTF game, and the CheckMates Infinity “scavenger hunt”

Speakers

Gil Shwed

Founder and CEO

Gil Shwed is the founder and Chief Executive Officer. Mr. Shwed is considered the inventor of the modern firewall and authored several patents, such as the company’s Stateful Inspection technology.

    Amnon Bar-Lev

    President

    Amnon Bar-Lev, President at Check Point, is responsible for worldwide sales, global partner programs, business development and technical services for the company.

      Dorit Dor

      Vice President of Products

      Dr. Dorit Dor, Vice President of products at Check Point, manages all product definition and development functions for both the enterprise and consumer divisions of the company

        Peter Alexander

        Chief Marketing Officer

        As CMO, Peter leads Check Point’s Marketing Organization, including Corporate Marketing, Corporate Communications, GEO/Field Marketing, Strategic Marketing, and Demand Generation.

          Pierre-Paul Allard

          EVP Worldwide Sales

          Pierre-Paul Allard serves as executive vice president of Worldwide Sales for Check Point. Allard has achieved tremendous success through his extensive professional career with various Fortune 500 enterprises that span a wide variety of industries.

            Avi Rembaum

            VP of Security Solutions

            Avi Rembaum is Check Point’s Vice President, Security Solutions. Avi is responsible for the solution center, incident response team, strategic alliance program and security architecture function.

              Gabi Reish

              VP of Product Marketing & Product Management

              Gabi Reish is VP of Product Marketing & Product Management at Check Point. A recognized security advocate, Gabi brings more than 15 years of experience in the data networking industry.

                Neatsun Ziv

                VP of Threat Prevention

                Neatsun is Check Point’s Vice President for Threat Prevention. He has led a few of the key innovations within the company and is the internal founder of the Cloud Initiative.

                  Dan Wiley

                  Head of Incident Response

                  Daniel Wiley, Head of Incident Response, manages Check Point’s advanced security operations including the Incident Response Service.

                    Moti Sagey

                    Head of Strategic Marketing

                    Moti Sagey is the Head of Strategic Marketing & Intelligence at Check Point Software. Moti is responsible for strategically transforming intelligence and information into a compelling and resonating story.

                      Oded Vanunu

                      Head of Products Vulnerability Research

                      Oded Vanunu is the Group Manager of Security Research. His main responsibilities include leading white-hat hacker groups to identify low-high risk vulnerabilities in Check Point products.

                        MICHAEL SHAULOV

                        Head of Mobility Product Management

                        Michael Shaulov leads product direction for Check Point’s mobile security solutions including Check Point Mobile Threat Prevention.

                          ORLI GAN

                          Product Manager, Threat Prevention

                          Orli Gan, Head of Threat Prevention Product Management, has a background in development as well as in Product Management. Orli brings more than 20 years of experience in data security.

                            Sponsors

                            Platinum Sponsors

                            Gold Sponsors

                            Bronze Sponsors

                            Schedule

                            9:00 AM - 10:30 PM
                            Cyber Talk Keynotes - Architect

                            1) Security Message 2018
                            2) CISO Viewpoint on Modern IT
                            3) Artificial No Longer: Intelligence-based Security

                            1) Inside the Mind of a Hacker
                            2) Protecting Check Point
                            3) Security First: New Technologies and Solutions

                            8:00 AM - 9:00 AM and 12:00 PM - 6:00 PM
                            Expo

                            Explore the latest solutions with live demonstrations by Check Point and our partners.

                            Architect - Industry thought leaders investigate the dynamics of today’s threat landscape. Learn how to prepare for the next major attack
                            1) Architecting Consolidated Security with Check Point Infinity
                            2) Migrate to the Cloud Securely
                            3) Advanced Threat Prevention at Wire Speed

                            Prevent - Learn how Check Point’s emerging technology secures Cloud, Zero-Day Threats, and mobile devices
                            1) Latest Innovations in Threat Prevention
                            2) Auto Scaling to the Cloud with Automation and Orchestration
                            3) Game of Pwns - Emerging Threats & Cyber Security Trends

                            Manage - Explore day-to-day best practices and operations of Check Point products
                            1) Check Point Infinity - A Day in the Life of a Security Administrator
                            2) Centralized Security Management Across the Enterprise
                            3) Incident Mitigation with Forensics and Advanced Protections

                            Customer Use Cases – The world’s top cyber-security experts discuss challenges, priorities, trends, and innovations

                            Advanced Threat Prevention
                            SandBlast Network
                            SandBlast Agent
                            SandBlast Mobile
                            Security Effectiveness Live Test
                            A Day in the Life of a Security Researcher
                            Private Cloud
                            Public Cloud
                            SaaS security

                            Infinity Architecture
                            Infinity Demo Upgrading to R80.10
                            SCADA & IoT Security
                            Automation & Orchestration with R80.10
                            Security Gateway Acceleration
                            Device Operations - Simplified!
                            R80.10 Migration Best Practices
                            SMB Security

                            Hands-on Labs
                            SandBlast Network, Agent, IDA
                            Private Cloud (Cisco ACI, VMware NSX)
                            Capsule Workspace
                            Security Management R80.10

                            9:00 AM - 10:30 AM
                            Cyber Talk Keynotes - Prevent

                            1) Check Point 2018 Roadmap
                            2) Yes, You Can Get Burned When It's Cloudy
                            3) Why Our Security Problems are Getting Worse

                            1) This Call Is Being Monitored (Not for Quality of Service Purposes)
                            2) Incident Response War Stories
                            3) Hacking the Boardroom
                            4) Internet of Things: Is Winter Coming?

                            8:00 AM - 9:00 AM and 12:00 PM - 6:00 PM
                            Expo

                            Explore the latest solutions with live demonstrations by Check Point and our partners.

                            Architect - Industry thought leaders investigate the dynamics of today’s threat landscape. Learn how to prepare for the next major attack
                            1) Healthcare Security - Challenges and Effective Approaches
                            2) Securing the SaaS Environment with CASB - the Pragmatic Approach
                            3) IoT & Industrial Cyber-Attacks - Myth or Reality?
                            4) Latest Mobile Security Threats

                            Prevent - Learn how Check Point’s emerging technology secures Cloud, Zero-Day Threats, and mobile devices
                            1) Protecting Endpoints with SandBlast Agent
                            2) Preventing Attacks on Mobile Devices
                            3) Integrating Intelligence in Threat Prevention
                            4) Recommendations for Data Security and GDPR

                            Manage - Explore day-to-day best practices and operations of Check Point products
                            1) Mobile Security: Configuration and Policy Management
                            2) Automating the Rule Base
                            3) Cloud Security Operations: Best Practices
                            4) Orchestrating Gateway Operations

                            Customer Use Cases – The world’s top cyber-security experts discuss challenges, priorities, trends, and innovations

                            Advanced Threat Prevention
                            SandBlast Network
                            SandBlast Agent
                            SandBlast Mobile
                            Security Effectiveness Live Test
                            A Day in the Life of a Security Researcher
                            Private Cloud
                            Public Cloud
                            SaaS security

                            Infinity Architecture
                            Infinity Demo Upgrading to R80.10
                            SCADA & IoT Security
                            Automation & Orchestration with R80.10
                            Security Gateway Acceleration
                            Device Operations - Simplified!
                            R80.10 Migration Best Practices
                            SMB Security

                            Hands-on Labs
                            SandBlast Network, Agent, IDA
                            Private Cloud (Cisco ACI, VMware NSX)
                            Capsule Workspace
                            Security Management R80.10

                            8:30 AM - 12:30 PM
                            Training Tracks

                            1. Automating and orchestrating your security network with Check Point R80.10
                              • Use the new API to automate security management operations and other security functions.
                            2. Deep Dive into Check Point’s SandBlast product family
                              • Detect and prevent malware and phishing attacks.
                              • Use Threat Emulation and Extraction to scan for malicious files.
                              • Protect against unknown threats in files that are downloaded from the Internet or attached to emails.
                            3. Be a technical expert on the Check Point R80.10 software release
                              • Learn what’s new with R80.10 NGFW/NGTP.
                              • Employ the new security policy layers functionality.
                            4. Hacking 101: Introducing the main cyber-attack techniques
                              • Learn about common security holes in the IT world.
                              • Learn the basics of preventing security holes in your network.
                            5. Preventing mobile cyber security attacks with Check Point mobile security
                              • SandBlast mobile – Protects mobile devices, including cell phones, tablets, and laptops.
                              • Check Point Capsule – Provides a secure business environment for mobile device use and protects your business documents wherever they go.
                            6. Securing your cloud workloads with Check Point
                              • Protect your assets in the cloud from the most sophisticated threats with dynamic scalability, intelligent provisioning and consistent control across physical and virtual networks.
                            7. Tutorial: Building your new cyber security architecture.
                              • Harness the power of Check Point’s Infinity™ and learn how to implement our security capabilities in your organization

                            Pricing

                            Customers
                            $1490
                            • All General Sessions
                            • All Breakout Sessions
                            • CPX Expo Pass
                            • Welcome Reception
                            • Evening Social Event
                            • Hotels from $200/night
                            • Training with additional cost
                            Register
                            Partners
                            $1590
                            • All General Sessions
                            • All Breakout Sessions
                            • CPX Expo Pass
                            • Welcome Reception
                            • Evening Social Event
                            • Hotels from $200/night
                            • Training with additional cost
                            Register
                            Hotels for Customers
                            SB Diagonal Zero
                            Plaça de Llevant, s/n, 08019 Barcelona, Spain

                            Hotel Barcelona Princess
                            Avinguda Diagonal, 1, 08019 Barcelona, Spain

                            Hilton Diagonal Mar Barcelona
                            Passeig del Taulat, 262-264, 08019 Barcelona, Spain
                            Hotels for Partners
                            AC Hotel Barcelona Forum
                            Passeig del Taulat, 278, 08019 Barcelona, Spain

                            FAQ

                            Registration

                            Who should attend?

                            CPX 360 delivers several conference tracks of vital interest for professionals in many cyber security and business roles. The Cyber Talk keynotes track  is perfect for C-level executives and other policy makers. Patterned after TED sessions, Cyber Talks bring together top cyber security experts who identify today’s unprecedented security challenges as they discuss cyber security priorities, trends and innovations. The Architect, Prevent and Manage tracks provide the best and most practical ways to secure your organization. Cyber Security engineers, architects, administrators and geeks will benefit greatly from the Customer Community Use Cases track as well as the Technology Innovation and Hands-on Labs to test drive our latest technology.

                            Why should I attend?

                            Understanding the current state of cyber security has never been more important for sustaining normal operations and preventing data breaches that can prove catastrophic to organizations of all types. CPX 360 brings together the world’s elite cyber security experts to give you the latest trends in threats and the strategies and technologies needed to prevent damage from cyber attacks.

                            How do I register?

                            Follow this link to register for the January 23-25 conference to be held at Barcelona International Convention Centre, Barcelona, Spain

                            May I register on-site?

                            No. To ensure sufficient seating for all sessions and events, all attendees must preregister online for the conference.

                            May more than one person from the same company attend the Check Point Experience 360 Conference?

                            Yes, but each person must register individually.

                            Will I receive a receipt for my registration?

                            Yes, you will receive a receipt for your registration from Check Point approximately two weeks after the event.

                            How do I book a hotel room?

                            If you registered for a package that includes a hotel room, Check Point will reserve a hotel room on your behalf for the nights of January 23-25. A separate hotel confirmation number will be provided to you (this is different from the CPX2018 registration confirmation number you receive). If you chose to register without a hotel room, lodging reservations are wholly your responsibility.

                            Conference Technical Training

                            When is the training?

                            Conference training is on January 26th.

                            Who can attend the training?

                            The training sessions are optional and open to everyone. Simply choose to attend as part of your CPX 360 registration process. The fee ($200) to attend is in addition to the CPX registration fee.  Space for these training sessions is limited so be sure to register early.

                            What can I expect to receive from this training session?

                            Technical Training attendees will receive one continuing education credit good for six months toward extending a current CCSA or CCSE certification.

                            Do I have to stay overnight to attend training?

                            The technical training sessions will begin on Friday, January 26. If you need a hotel room on January 26, we can gladly make arrangements on your behalf. This option appears on the registration page.

                            How do I register for a training session?

                            You can register for technical training online on the CPX 360 registration form.

                            Co-op

                            Can I use Co-op funds to attend the event?

                            Yes. If you pre-register for the event pass, partners and distributors can use co-op for this event for each employee and end user that you wish to sponsor excluding hotel and training costs.

                            The fee will be directly discounted at the time you or your customer registers. No additional reimbursements apply, so no claims are required in 2018. There is no limit to the number of end user guests that a Check Point partner or distributor can sponsor through Co-op.

                            Can I use co-op to cover conference expenses beyond the approved allowance?

                            No.

                            Do I need to open a co-op project for the approved allowance?

                            No. Please enter the co-op sponsoring partner’s name and email address on the “Summary and Payments” page during online registration so that you get the appropriate allowance.

                            Do I need to file a claim after the event?

                            No. Since no additional reimbursements apply, no claims are required.

                            I have questions about my registration with co-op. How can I follow up?

                            Please contact coop@checkpoint.com.

                            Other Questions

                            What is the dress code?

                            The dress code is business casual.

                            How do I get information on exhibits and sponsorships?

                            Learn more about CPX 360 sponsorship opportunities – contact Demi Battaglia.

                            What if I still have unanswered questions about the Check Point Experience 360 Conference?

                            If you have questions about the conference, please email cpx360.europe@checkpoint.com.

                            What is the Check Point Experience Conference cancellation policy?

                            Conference cancellations received up to two weeks prior to the event are fully refundable. No refunds will be made less than two weeks before the first day of the event. To be eligible for a refund, cancellations must be submitted to cpx360.europe@checkpoint.com. Refunds will be issued within 30 days of the conference.

                            Note: Hotel cancellations are subject to respective hotel cancellation policy.

                            Testimonials

                            “I’m having a great time at CPX – being able to not only network and collaborate with my peers, but to be able to have one-on-one time and collaborate with a lot of industry leaders and with the actual R&D and engineers from Check Point. You actually listen and want to know what you can do to help me to do a better job, CPX is fantastic!”
                            On the Event
                            “I’ve enjoyed most the breakout sessions and the CyberTalks. I find the new format more attractive. It’s more dynamic. It feels fresh.”
                            On the Agenda

                            Call for Papers

                            Share your Cyber Security insights on-stage at CPX 360!

                            We’re looking for speakers who will teach, share and inspire Check Point customers and partners to use the strategies, tools, and techniques needed to prevent cyber threats! How are you leveraging the power of Check Point Architecture to protect your organization? What are some of the technical tips and tricks you can recommend? Submit your ideas to CPX 360!

                            Recommended topic areas include:

                            • Cutting edge cyber security trends
                            • Cloud Security
                            • Perimeter and Data Center Security
                            • Mobile security
                            • Advanced Threat Prevention
                            • R80.X use cases
                            • Security Automation

                            Remember to include practical advice, key success factors, proven examples, an in-depth explanation of the challenges you’ve overcome and lessons learned on topics related to securing your datacenter, your cloud environments, and your mobile endpoints.

                            Key Dates

                            Submissions will be accepted from now until November 30th
                            Decision and notification to speaker December 15th

                            How to Submit

                            Submitting your abstract is simple – follow the steps here on the CheckMates user community. You will receive a response to your submission advising you of receipt of your abstract.

                            Items to Include in Submission

                            All submissions must include the following information:

                            • Presenter’s name
                            • Presenter’s organization, job title and biography
                            • Presentation title
                            • “Soundbyte” abstract – maximum 140 characters
                            • Full abstract – maximum of 200 words
                            • Length – (ideally 20-30 minutes)
                            • If applicable, please also include any links to previous presentations, slide decks, or papers
                            • Please include an estimate of how ‘technical’ your presentation will be. The following rating will be used:

                            T1  = Very little technical knowledge required
                            T2  = Some technical knowledge is assumed
                            T3 = Largely technical and/or detailed content aimed at technicians

                            • Presentations must be written in English
                            • Presentations should present original work, which ideally has not been previously published
                            • Presentations will be selected based on their originality, significance, correctness and clarity of presentation

                            Key Disclaimers

                            It is important for presentations to avoid vendor/partner/sponsor specific  ‘product pitches/sales pitches’. If presentation proposals are considered to contain such material (product pitches/sales) they will more than likely be rejected early in the review process. Further, vendors are reminded that there is no  linkage between conference sponsorship and the opportunity to present at the conference.

                            For More Information and questions please ask in the CheckMates dedicated page.

                            Looking Back at CPX

                            Photos from Past CPX

                            Location

                            • Barcelona International Convention Centre