JOIN US IN Vienna ON February 18 - 21 | #CPX360

CPX 360

THE PREMIER CYBER SECURITY SUMMIT AND EXPO
{d&lt}
{dn}

{dl}

{d>}{h&lt}
{hn}

{hl}

{h>}{m&lt}
{mn}

{ml}

{m>}{s&lt}
{sn}

{sl}

{s>}

CPX 360 promises to be the premier cyber security summit. CPX 360 is where you’ll receive up-to-the-minute intelligence about global threats and other vital topics from the world’s leading cyber security experts. In addition, you’ll enjoy getting hands on with cutting-edge security solutions from Check Point, networking with your peers, and celebrating with the world’s cyber security elite. If you attend one cyber security event this year, make it CPX 360.

 

Tracks at a Glance

Cyber Talk Keynotes – Experience TED-like sessions bringing together top cyber security experts to identify ways to tackle unprecedented security challenges and discuss cyber security priorities, trends and innovations
Securing your Cloud (NEW) – All about securing your cloud with effective blueprints to SaaS, Public and Private Cloud
Hackers Exposed (NEW) – Learn how hackers are developing the next wave of Gen VI threats
Cyber Security Innovations (NEW) – Explore Cyber Security Innovations to effectively prevent threats before they cause damage
Cyber Innovation Competition (NEW) – 20×20 short cyber innovation stories
CheckMates Community use-cases – Listen first-hand to industry best practices from other organizations discussing real use-cases
Technology Innovation Labs – Experience Infinity threat prevention and security architecture
Geek Village (NEW) – geeky workshops (e.g. malware reversing, lock picking, crypto, Lego models etc.)
Hands-On Labs – Test Drive our latest technology through our hands-on Lab with a step by step cookbooks
EXPO – Explore the EXPO; see the latest technology solutions and demonstrations from Check Point and our Partners, Start-Up Pavilion
Gamification – Explore the 2019 Cyber challenge – CTF game, Shoot down hackers in the Cyber Range, or go on the CheckMates Scavenger Hunt
Cyber Range – Shoot down hackers and compete for the crown in our Expo Cyber Range. Sign up now to secure your place!

Speakers

FC (Freaky Clown)

CEO, Hacker, Social Engineer

An ethical social engineer, FC ‘breaks into’ hundreds of banks, offices and government facilities finding weaknesses that assist organizations in improving their security.

    RAFI ZVI

    CEO, BackBox

    Rafi Zvi discusses how intelligent automation drives change in organizations and essential steps for NGFW implementations. He uses real examples and demonstrations.

      Roger Halbheer

      Chief Security Advisor, Microsoft EMEA

      Roger Halbheer is Chief Security Advisor for Microsoft. He is trusted advisor to C-level executives in the commercial and private sectors and has established relationships with industry leaders and intelligence agencies across the world.

        SAMEER VASANTHAPURAM

        Partner Solutions Architect, Amazon Web Services

        Sameer architect and build new products and solutions on AWS with AWS network and security partners for customers and designed secure networks for several Fortune 500 companies.

          Tim Hall

          Founder, Shadow Peak Inc

          Tim has been providing security consulting services for organizations along the Colorado Front Range full time since 1999.

            Danny Jung

            Chief Technology Officer, ESC

            Danny is an active contributor to the Check Point community, designs and reviews firewall security policies and is the author of the ccc script, which won the CheckMates Contribution of the Year award.

              Kaspars Zibarts

              Enterprise network security consultant, Scania

              Kaspars works at the truck manufacturer Scania with number of enterprise security products, with Check Point being his strongest subject.

                Shahar Grober

                Security Engineer, Grand City Property

                Shahar is security Engineer in one of the biggest Real Estate companies in Europe and uses Check Point as the main tool to protect the company from threats and to keep the business secured.

                  Gil Shwed

                  Founder and CEO

                  Gil Shwed is the founder and Chief Executive Officer. Mr. Shwed is considered the inventor of the modern firewall and authored several patents, such as the company’s Stateful Inspection technology.

                    Dorit Dor

                    Vice President of Products

                    Dr. Dorit Dor, Vice President of products at Check Point, manages all product definition and development functions for both the enterprise and consumer divisions of the company

                      Peter Alexander

                      Chief Marketing Officer

                      As CMO, Peter leads Check Point’s Marketing Organization, including Corporate Marketing, Corporate Communications, GEO/Field Marketing, Strategic Marketing, and Demand Generation.

                        Sponsors

                        Diamond Sponsors

                        Platinum Sponsors

                        Gold Sponsors

                        Silver Sponsors

                        Bronze Sponsors

                        Start-up Sponsors

                        Schedule

                        18:00 - 21:00
                        Registration and Welcome Cocktail Reception

                        Registration and Welcome Cocktail Reception (All Field, Partners & Customers) – EXPO Opens + R&D Ask me Anything + 20x20 Cyber Innovation Competition + Cyber Range Competition

                        9:00 - 13:00
                        Training Tracks

                        1. Hacking 101: Introduction to common web attack techniques
                          • Learn about common security holes in the IT world. Learn the basics of preventing security holes in your network.
                        2. Cyber Range
                          • Hyper-realistic simulation and virtual training environment, providing Gen V cyber range training for all type of customers and partners
                        3. Offensive Web hacking (Time: 09:00-16:00)
                          • This fast paced training gives attendees an insight into advanced AppSec topics
                        4. Automating and orchestrating your security network with Check Point R80.20
                          • Use the new API to automate security management operations and other security functions.
                        5. Deep Dive into Check Point’s SandBlast product family
                          • Detect and prevent malware and phishing attacks. Use Threat Emulation and Extraction to scan for malicious files. Protect against unknown threats in files that are downloaded from the Internet or attached to emails.
                        6. Be a technical expert on the Check Point R80.20 software release
                          • Learn what’s new with R80.20 NGFW/NGTP. Employ the new security policy layers functionality.
                        7. Preventing mobile cyber security attacks with Check Point mobile security
                          • Are your employees accessing their corporate information through their mobile devices? Are those devices secured? How vulnerable is your corporate network without Mobile Security? Come, learn, and try Check Point SandBlast Mobile and how to protect your network from mobile security breaches with our advanced mobile threat defense. Hear about Capsule Workspace and how to create a secure environment on device that will prevent corporate data loss and unwanted access using a seamless and secure user experience.
                        8. Securing your cloud workloads with Check Point
                          • Protect your assets in the cloud from the most sophisticated threats with dynamic scalability, intelligent provisioning and consistent control across physical and virtual networks.

                        Technology Innovation Labs
                        1. SandBlast Network + Web Threat Extraction
                        2. Securing EndPoints with SandBlast Agent
                        3. Mobile Security 3.0
                        4. CloudGuard & Dome9
                        5. Securing Clouds with CloudGuard SaaS
                        6. Container Security with CloudGuard IaaS (Private)
                        7. Securing Public Clouds
                        8. SD-WAN Security
                        9. Latest Innovation with ThreatGuard
                        10. SecaaS, TELCO & Virtualization and DevOps
                        11. ICS + SCADA Security
                        12. Latest on Security Management - R80.20
                        13. DEVOPS - Automation & Orchestration - R80.20
                        14. Device operations-simplified!
                        15. MAESTRO - Scalable platform - Demo!
                        16. SMB Security
                        17. R80.20 Best practices - Use cases
                        18. Automated Tailored Threat Prevention
                        19. Check Point Infinity - Multi vector security
                        20. EndPoint Cloud Management & Operations
                        21. HLS & SandBlast Now
                        22. Threat Hunting
                        23. SandBlast Agent for MAC
                        24. Securing the future - Sandblast for Educational
                        25. Security management on the Cloud

                        9:10 - 10:30
                        Cyber Talk Keynotes

                        1) Welcome
                        2) Gil Shwed Keynote – Cyber Security for 2020 – Gil Shwed, Founder & CEO
                        3) Cyber Security Gut Check: Good is Not Good Enough – Avi Rembaum, VP, Security Solutions
                        4) How Do We Protect Our Own Cloud Infrastructure? - Sharon Schusheim, VP, Information Systems

                        1) A Hacker’s Mind Exposed – FREAKY CLOWN
                        2) Age of Things – Gen VI Security - Itai Greenberg, VP, Product Management + Oded Gonda, VP, Technology & Innovation
                        3) Incident Response Cloudy War Stories – Dan Wiley, Head of Incident Response
                        4) IoT and Nano Security Unraveled - Yariv Fishman, Head of Product Management, Cloud Security

                        1) Automating Security orchestration & recovery with Check Point & BackBox – Pascal Verardo, Network Research Belgium + Rafi Zvi, CEO BackBox
                        2) The Cyber Risk Paradox - Thierry Karsenti, VP, engineering EMEA
                        3) Check Point 2019 Innovations, Roadmap & Vision – Dorit Dor, VP, Products
                        4)Ask Me Anything with Dorit Dor and R&D

                        12:00 - 16:00
                        Expo

                        Explore the latest solutions with live demonstrations by Check Point and our partners + 20x20 Cyber Innovation Competition + Cyber Range Competition

                        Securing your Cloud
                        13:30 - 14:00 -- 1) AWS & Azure IaaS Architecture Blueprint – Javier Hijas + Sameer Vasanghapuram., Cloud Architect AWS
                        14:00 - 14:30 -- 2) Securing SaaS Applications– The Pragmatic Approach- Noa Katz
                        14:30 - 15:00 -- 3) Who’s Responsible for Your Cloud Security? – Lessons Learned – Chris Beckett
                        15:00 - 15:30 -- 4) Lift & Shift vs. Cloud Native – Peter SandKujil

                        Cyber Security Innovations
                        13:30 - 14:00 -- 1) Secure the Virtual Cloud Network Against Advanced Threats with VMware NSX and Check Point – Scott Sloan, Director Global Technology Partners + Brad Bock Senior Product Marketing Manager VMware
                        14:00 - 14:30 -- 2) Preventing Attacks on Mobile Devices – James Alliband
                        14:30 - 15:00 -- 3) Security at Hyperscale – Derek Middlemiss
                        15:00 - 15:30 -- 4) Humans are your weakest link. Protecting against social engineering with Infinity– Magnus Skold

                        Security Automation & Orchestration
                        13:30 - 14:00 -- 1) Intelligent Automation for Security Operations – Rafi Zvi CTO and Co-Founder, BackBox
                        14:00 - 14:30 -- 2) How to prevent attacks before they strike- Elad Goldenberg
                        14:30 - 15:00 -- 3) API Best Practices with Check Point – Jim Oqvist
                        15:00 - 15:30 -- 4) Orchestrating Gateway Operations – Best Practices – Valeri Loukine

                        Hackers Exposed
                        13:30 - 14:00 -- 1) CPR - What the Hack? - Richard Clayton, Product Manager, Security Research
                        14:00 - 14:30 -- 2) Domestic Kitten Unravelling ISIS Espionage – Lotem Finchelstein
                        14:30 - 15:00 -- 3) Why Mobile Adware Is Our Concern – Elena Root
                        15:00 - 15:30 -- 4) Silivaccine – Inside North Korea’s Anti-Virus – Mark Lechtik

                        CheckMates Community Use-Cases
                        13:30 - 14:00 -- 1) Geo Policy - Your Secret Weapon for Increased Security and Gateway Performance-Timothy Hall, Founder, Shadow Peak Inc
                        14:00 - 14:30 -- 2)VSX performance optimization – Kaspars Zibarts, IP Security Consultant, Scania
                        14:30 - 15:00 -- 3) Threat-Modeling Off-The-Shelf Security Products – Robert Graham, Cyber Security Architect
                        15:00 - 15:30 -- 5)CheckMates in 10 moves – Shahar Grober, Security Engineer, Grand City Property

                        Technology Innovation Labs
                        1. SandBlast Network + Web Threat Extraction
                        2. Securing EndPoints with SandBlast Agent
                        3. Mobile Security 3.0
                        4. CloudGuard & Dome9
                        5. Securing Clouds with CloudGuard SaaS
                        6. Container Security with CloudGuard IaaS (Private)
                        7. Securing Public Clouds
                        8. SD-WAN Security
                        9. Latest Innovation with ThreatGuard
                        10. SecaaS, TELCO & Virtualization and DevOps
                        11. ICS + SCADA Security
                        12. Latest on Security Management - R80.20
                        13. DEVOPS - Automation & Orchestration - R80.20
                        14. Device operations-simplified!
                        15. MAESTRO - Scalable platform - Demo!
                        16. SMB Security
                        17. R80.20 Best practices - Use cases
                        18. Automated Tailored Threat Prevention
                        19. Check Point Infinity - Multi vector security
                        20. EndPoint Cloud Management & Operations
                        21. HLS & SandBlast Now
                        22. Threat Hunting
                        23. SandBlast Agent for MAC
                        24. Securing the future - Sandblast for Educational
                        25. Security management on the Cloud

                        Hands-on Labs
                        1. New R80.20 SmartEvent
                        2. SandBlast Network + Agent
                        3. Private Cloud (Cisco ACI, Vmware NSX)
                        4. Check Point Infinity
                        5. Security Management & Automation R820.10 - DevOps

                        9:05 - 10:25
                        Cyber Talk Keynotes

                        1) Cloudy with a Chance of a Breach - Peter SandKujil, Head of Security Solutions, Engineering, Europe
                        2)Predicating the Unpredictable - Orli Gan Head of Products, Threat Prevention
                        3) Cybercrime & the Geo-political impact- Eward Driehuis Chief Research Officer, SecureLink
                        4) Hacking Like a Disney Villain - Maya Horowitz, Director, Threat Intelligence & Research
                        5) Microsoft Azure Keynote - Roger Halbheer, Chief Security Advisor Microsoft
                        6) Customer Awards Ceremony

                        1) Hackers Exposed – Gen VI Threats Under the Microscope – Oded Vanunu, Head of Products Vulnerability Research + Yaniv Balmas, Head of Security Research
                        2) AI Innovations in Cyber Security – Neatsun, VP, Threat Prevention + Eddie Doyle, Cyber Security Evangelist
                        3) CloudGuard Dome9 and Check Point’s CloudGuard Family – Zohar Alon, Head of Cloud Product Line
                        4) 20X20 Cyber Innovation winner

                        12:00 - 16:00
                        Expo

                        Explore the latest solutions with live demonstrations by Check Point and our partners + 20x20 Cyber Innovation Competition + Cyber Range Competition

                        Securing your Cloud
                        13:30 - 14:00 -- 1) DevOps and Security – Friends or Foes? – Reuven Harrison, CTO & CO-Founder, Tufin Technologies
                        14:00 - 14:30 -- 2) Docker & Containers: How to Contain it Securely – Amir Kaushansky
                        15:00 - 15:30 -- 3) SEE SPOT SECURE - Continuous Cloud Compliance and Security Simplified with Dome9 – Grant Asplund
                        15:30 - 16:00 -- 4) Kick-‘ass Cloud Security: Architecting Robust Security and Compliance Across Your ’-as-a-Service Footprint – David Gubiani

                        Cyber Security Innovations
                        13:30 - 14:00 -- 1) The Final Frontier Beyond Your Perimeter – Protecting Devices Securing Data – Christine Schoenig
                        14:00 - 14:30 -- 2) SD-WAN and Branch Office Security – Unique Challenges & Effective Approaches – Nils Ujma
                        15:00 - 15:30 -- 3) Transforming Your Endpoints From the Weakest Link to the Strongest Defense – Christian Sandberg
                        15:30 - 16:00 -- 4) Threat Hunting with SandBlast NOW – Nir Naaman + Tami Leiderfarb

                        Security Automation & Orchestration
                        13:30 - 14:00 -- 1) Automate Everything – The Future of Security Automation – Jim Oqvist
                        14:00 - 14:30 -- 2) Security for DevOps – No Humans Necessary – Dana Traversie
                        15:00 - 15:30 -- 3) Finding the Breach in a Haystack – Live Demo – Dedi Shindler
                        15:30 - 16:00 -- 4) SMB Security – Unique Challenges & Effective Approaches – Sunny Gil

                        Hackers Exposed
                        13:30 - 14:00 -- 1) Hacking Drones & Spreading Fake News via WhatsApp – Roman Zaikin
                        14:00 - 14:30 -- 2) Nexus Zeta – Adi Ikan
                        15:00 - 15:30 -- 3) Turning the Enemy against himself – Raman Ladutska
                        15:30 - 16:00 -- 4) Olympic Destroyer – The Games of Malware – Michael Abramzon

                        CheckMates Community Use-Cases
                        13:30 - 14:00 -- 1) Security Policy Design – The LEGO® Principle – Danny Jung, CTO, Electronic Service Center
                        14:00 - 14:30 -- 2) Securing the Mobile Workforce in a Mobile Word – how Asystel protects enterprises with SandBlast Mobile – Maurizio Guardassoni, Director of Mobile and Security, Asystel + Jeremy Kaye, Head of Mobile Security, Check Point
                        15:00 - 15:30 -- 3) Data center migration - Moving from Appliances to virtualization-Shay Rozov, Head of IT, EZBob Ltd
                        15:30 - 16:00 -- 5) Check Point for a new security administrator in a company. How Check Point can help you to save money and show your value for business-Evgeniy Olkov-TS Solution

                        Technology Innovation Labs
                        1. SandBlast Network + Web Threat Extraction
                        2. Securing EndPoints with SandBlast Agent
                        3. Mobile Security 3.0
                        4. CloudGuard & Dome9
                        5. Securing Clouds with CloudGuard SaaS
                        6. Container Security with CloudGuard IaaS (Private)
                        7. Securing Public Clouds
                        8. SD-WAN Security
                        9. Latest Innovation with ThreatGuard
                        10. SecaaS, TELCO & Virtualization and DevOps
                        11. ICS + SCADA Security
                        12. Latest on Security Management - R80.20
                        13. DEVOPS - Automation & Orchestration - R80.20
                        14. Device operations-simplified!
                        15. MAESTRO - Scalable platform - Demo!
                        16. SMB Security
                        17. R80.20 Best practices - Use cases
                        18. Automated Tailored Threat Prevention
                        19. Check Point Infinity - Multi vector security
                        20. EndPoint Cloud Management & Operations
                        21. HLS & SandBlast Now
                        22. Threat Hunting
                        23. SandBlast Agent for MAC
                        24. Securing the future - Sandblast for Educational
                        25. Security management on the Cloud

                        Hands-on Labs
                        1. New R80.20 SmartEvent
                        2. SandBlast Network + Agent
                        3. Private Cloud (Cisco ACI, Vmware NSX)
                        4. Check Point Infinity
                        5. Security Management & Automation R820.10 - DevOps

                        9:00 - 12:00
                        Sessions for Partners

                        1) Welcome
                        2) Partnering for Success! - Dan Yerushalmi, Chief Customer Officer + Frank Rauch, Head of Worldwide Channel
                        3) Taking the gloves off in 2019 - Peter Alexander, Chief Marketing Officer
                        4) Partner Awards
                        5) Coffee Break and Networking
                        6) Winning Through Innovation - Moti Sagey, Head of Strategic Marketing & Intelligence
                        7) Leveraging Emerging Products to Over Achieve Your Quota – Nathan Shuchami, VP, Emerging Products

                        13:30 - 16:10
                        Breakouts: Sales and Technical

                        Sales A
                        1) Understanding the Infinity Total Protection Value Preposition - Eran Orzel, Head of Strategic Sales and Partnerships
                        2) New Customers - Leveraging Partner Program - Yifat Bavli, Sales Enablement Manager + Aviel Katz, Head of Partner Alliance
                        3) How to sell CloudGuard with Customer Centric Approach - Yariv Fishman, Head of Product Management, Cloud Security + Zohar Alon, Head of Cloud Product Line
                        4) Replicating Success with Customer Win Cases - Amit Sharon, Head of Customer Community


                        Sales B
                        1) Replicating Success with Customer Win Cases - Amit Sharon, Head of Customer Community
                        2) Understanding the Infinity Total Protection Value Preposition - Eran Orzel, Head of Strategic Sales and Partnerships
                        3) New Customers - Leveraging Partner Program - Yifat Bavli, Sales Enablement Manager + Aviel Katz, Head of Partner Alliance
                        4) How to sell CloudGuard with Customer Centric Approach - Yariv Fishman, Head of Product Management, Cloud Security + Zohar Alon, Head of Cloud Product Line


                        Sales C
                        1) How to sell CloudGuard with Customer Centric Approach - Yariv Fishman, Head of Product Management, Cloud Security + Zohar Alon, Head of Cloud Product Line
                        2) Replicating Success with Customer Win Cases - Amit Sharon, Head of Customer Community
                        3) Understanding the Infinity Total Protection Value Preposition - Eran Orzel, Head of Strategic Sales and Partnerships
                        4) New Customers - Leveraging Partner Program - Yifat Bavli, Sales Enablement Manager + Aviel Katz, Head of Partner Alliance

                        Sales D
                        1) New Customers - Leveraging Partner Program - Yifat Bavli, Sales Enablement Manager + Aviel Katz, Head of Partner Alliance
                        2) How to sell CloudGuard with Customer Centric Approach - Yariv Fishman, Head of Product Management, Cloud Security
                        3) Replicating Success with Customer Win Cases - Amit Sharon, Head of Customer Community
                        4) Understanding the Infinity Total Protection Value Preposition - Eran Orzel, Head of Strategic Sales and Partnerships

                        SE 1
                        1) How to Whiteboard the Gen V Story - Peter Sandkuijl, Head of Security Solutions, Engineering, Europe
                        2) How to Win EVERY POC! - Asher Harosh, Group Manager
                        3) Maximize the Value of Technical Sales Tools - Yael Haker, Customer Success and Pre-Sales Tools Manager
                        4) Dive Deep into Competitive Analysis - Mor Manor, Competitive Intelligence Lead Analyst

                        SE 2
                        1) Dive Deep into Competitive Analysis - Mor Manor, Competitive Intelligence Lead Analyst
                        2) How to Whiteboard the Gen V Story - Peter Sandkuijl, Head of Security Solutions, Engineering, Europe
                        3) How to Win EVERY POC! - Asher Harosh, Group Manager
                        4) Maximize the Value of Technical Sales Tools - Yael Haker, Customer Success and Pre-Sales Tools Manager

                        SE 3
                        1) Maximize the Value of Technical Sales Tools - Yael Haker, Customer Success and Pre-Sales Tools Manager
                        2) Dive Deep into Competitive Analysis - Mor Manor, Competitive Intelligence Lead Analyst
                        3) How to Whiteboard the Gen V Story - Peter Sandkuijl, Head of Security Solutions, Engineering, Europe
                        4) How to Win EVERY POC! - Asher Harosh, Group Manager

                        SE 4
                        1) How to Win EVERY POC! - Asher Harosh, Group Manager
                        2) Maximize the Value of Technical Sales Tools - Yael Haker, Customer Success and Pre-Sales Tools Manager
                        3) Dive Deep into Competitive Analysis - Mor Manor, Competitive Intelligence Lead Analyst
                        4) How to Whiteboard the Gen V Story - Peter Sandkuijl, Head of Security Solutions, Engineering, Europe

                        Pricing

                        Customers
                        $1490
                        • Two Day Event
                        • All General Sessions
                        • All Breakout Sessions
                        • CPX Expo Pass
                        • Welcome Reception
                        • Training with additional cost
                        Register
                        Partners
                        $1590
                        • Three Day Event
                        • All General Sessions
                        • All Breakout Sessions
                        • CPX Expo Pass
                        • Welcome Reception
                        • Training with additional cost
                        Register
                        Hotels for Customers
                        Courtyard by Marriott Wien Messe - $220 per night
                        25 hours hotel- $175 per night
                        Motel One Wien Prater- $115 per night (Messe convention Center)
                        Hotels for Partners
                        Hilton Vienna Danube Waterfront - $200 per night
                        Motel One Wien Prater- $115 per night (Messe convention Center)

                        FAQ

                        Registration

                        Who should attend?

                        CPX 360 delivers several conference tracks of vital interest for professionals in many cyber security and business roles. The Cyber Talk keynotes track  is perfect for C-level executives and other policy makers. Patterned after TED sessions, Cyber Talks bring together top cyber security experts who identify today’s unprecedented security challenges as they discuss cyber security priorities, trends and innovations. The Architect, Prevent and Manage tracks provide the best and most practical ways to secure your organization. Cyber Security engineers, architects, administrators and geeks will benefit greatly from the Customer Community Use Cases track as well as the Technology Innovation and Hands-on Labs to test drive our latest technology.

                        Why should I attend?

                        Understanding the current state of cyber security has never been more important for sustaining normal operations and preventing data breaches that can prove catastrophic to organizations of all types. CPX 360 brings together the world’s elite cyber security experts to give you the latest trends in threats and the strategies and technologies needed to prevent damage from cyber attacks.

                        How do I register?

                        Follow this link to register for the February 18-21 conference to be held at Messe Vienna, Austria.

                        May I register on-site?

                        No. To ensure sufficient seating for all sessions and events, all attendees must preregister online for the conference.

                        May more than one person from the same company attend the Check Point Experience 360 Conference?

                        Yes, but each person must register individually.

                        Will I receive a receipt for my registration?

                        Yes, you will receive a receipt for your registration from Check Point approximately two weeks after the event.

                        How do I book a hotel room?

                        If you registered for a package that includes a hotel room, Check Point will reserve a hotel room on your behalf for the nights of February 18-20 (for customers) and 18-21 (for partners). A separate hotel confirmation number will be provided to you (this is different from the CPX2019 registration confirmation number you receive). If you chose to register without a hotel room, lodging reservations are wholly your responsibility.

                        Co-op

                        Can I use Co-op funds to attend the event?

                        Yes. If you pre-register for the event pass, partners and distributors can use co-op for this event for each employee and end user that you wish to sponsor excluding hotel.

                        The fee will be directly discounted at the time you or your customer registers. No additional reimbursements apply, so no claims are required in 2019. There is no limit to the number of end user guests that a Check Point partner or distributor can sponsor through Co-op.

                        Can I use co-op to cover conference expenses beyond the approved allowance?

                        No.

                        Do I need to open a co-op project for the approved allowance?

                        No. Please enter the co-op sponsoring partner’s name and email address on the “Preferences” page during online registration so that you get the appropriate allowance.

                        Do I need to file a claim after the event?

                        No. Since no additional reimbursements apply, no claims are required.

                        I have questions about my registration with co-op. How can I follow up?

                        Please contact coop@checkpoint.com.

                        Other Questions

                        What is the dress code?

                        The dress code is business casual.

                        How do I get information on exhibits and sponsorships?

                        Learn more about CPX 360 sponsorship opportunities – contact Demi Battaglia.

                        What if I still have unanswered questions about the Check Point Experience 360 Conference?

                        If you have questions about the conference, please email cpx360.europe@checkpoint.com.

                        What is the Check Point Experience Conference cancellation policy?

                        Conference cancellations received up to two weeks prior to the event are fully refundable. No refunds will be made less than two weeks before the first day of the event. To be eligible for a refund, cancellations must be submitted to cpx360.europe@checkpoint.com. Refunds will be issued within 30 days of the conference.

                        Note: Hotel cancellations are subject to respective hotel cancellation policy.

                        Earn CPE Credits

                        We are pleased to announce that Check Point is partnering with the following world-class cyber security certification vendors to provide CPX 360 attendees the opportunity to gain Continuing Professional Education (CPE) credits.

                        • (ISC)2
                        • GIAC
                        • EC Council
                        • CompTIA


                        How to Obtain CPE Credits

                        • After attending CPX 360, you will receive a digital badge of attendance from Check Point (example shown below)
                          • (ISC)2 – Please send your (ISC)² Member ID# with the badge to CPE@checkpoint.com
                          • GIAC, EC Council, CompTIA – Please visit the certification vendor website and provide them the link to the CPX digital badge as proof of attendance

                        If you have any questions, please contact us at cpe@checkpoint.com.

                        Location

                        • Messe Wien, Entrance D
                        • Trabrennstraße 7, 1020 Wien, Austria
                        • U-Bahn station: KRIEAU
                        • Tel: +43 1 727200