On the heels of its successful Check Point Experience 360 global cyber security summits (CPX 360), Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally, today announced regional versions of the conference in nine major North American metro areas. Customers and partners are invited to join Check Point executives and security architects for a day-long experience including keynotes, presentations and hands-on sessions focused on preventing the large-scale, multi-vector, mega attacks that define fifth generation (“Gen V”) cyber-attacks.
Topics to be addressed include up-to-the-minute threat intelligence, IoT, cloud, zero-touch automation, incident response war stories and more. In addition to these TED-style “Cyber Talk” presentations, attendees will also participate in hands-on demonstrations of Check Point’s leading security solutions, network with their peers, and celebrate alongside the region’s cyber security elite.
The following CPX events are now open for registration:
- Minneapolis – May 2
- New York City – May 17
- Montreal – May 30
Additional CPX events in National Harbor, Md., Denver, Los Angeles, San Francisco, Seattle, Chicago, Atlanta, and Mexico City are scheduled; exact dates to be announced soon.
“Due to the overwhelmingly positive feedback from attendees at our recent CPX360 conferences in Barcelona, Las Vegas and Bangkok, we have decided to bring those experiences directly to our valued customers’ and partners’ in their local markets,” said Peter Alexander, chief marketing officer at Check Point. “Our goal is to build deeper, more valuable relationships among all stakeholders by providing more opportunities for hands-on learning and face-to-face engagements.”
Check Point customers and partners interested in attending a CPX event in their respective metro area may register via https://www.checkpoint.com/events/.
Media interested in attending a CPX event should contact PR at firstname.lastname@example.org.
Follow Check Point via:
Check Point Blog: http://blog.checkpoint.com/