Datasheet | Quantum SD-WAN | Check Point Software

Wednesday, Aug 7

Enhancing Cloud Security: Preventing Zero-Day Attacks with Modernized Web Application Firewalls

Speaker: Marlon Chung

In an era where cloud-native applications drive modern enterprises, the threat of zero-day attacks looms large. Traditional defenses often fail against these sophisticated threats. This session delves into how modernized Web Application Firewalls (WAFs) within Cloud Native Application Protection Platforms (CNAPP) can thwart zero-day exploits. Learn about cutting-edge features like machine learning-driven anomaly detection, automated threat intelligence, and adaptive security policies. Join us to gain essential insights and stay ahead of the curve in a rapidly changing threat landscape.

How to Train Your AI Co-Pilot

Speaker: Jeff Pricher

AI sits at the heart of Check Point's innovation efforts. Join us and explore our captivating journey building and teaching cyber security AI products — a process that goes beyond mere programming. AI products aren't just built; they are innovations that we must 'raise', akin to nurturing a child to maturity. Join us and gain glimpse into the groundbreaking work happening in our AI cybersecurity labs.

Is Your Company a No Phishing Zone? How to Stay Ahead with AI

Speaker: George Panagou

A well-disguised phishing email can deceive anyone. AI-generated phishing emails are complicating and worsening the situation. Not only do cyber security professionals need to leverage AI-powered tools to prevent the latest phishing threats, but they also need to know how to evaluate the effectiveness of AI-powered tooling. This session will cover all of that and more. Plus, get a sneak-preview of emerging GenAI-based phishing simulation technology.

Trends in the Cyber Threat Landscape

Speaker: Pete Nicoletti

Check Point’s dedicated research team presents cyber threat trends that were observed during the first half of 2024.

Thursday, Aug 8

Key Architecture Factors in Choosing a SASE Solution

Speaker: Rui Lopes

Secure Access Service Edge (SASE) solutions come in different shapes and architectures. Understanding the advantages and limitations of the different options is key when choosing a solution to meet your needs.

Expertise-as-a-Service in a Vendor-agnostic Environment

Speaker: Dana Berman

Discover how Check Point's Infinity Global Services helps companies enhance their security with innovative offering for risk and strategy, professional services, incident response, training programs, and managed security.

Windows MSHTML Platform Spoofing Vulnerability, CVE-2024-38112

Speaker: Pete Nicoletti

Check Point’s research team discovered a new vulnerability being exploited by cyber criminals. Learn about the threat and how it is being weaponized.

Read More