Hi [[ session.user.profile.firstName ]]

Creating Essential Cyber Policies During the Pandemic

Cyber security policies are crucial to preventing costly data breaches and cyber threats. However, many policies were written before COVID-19. Now, our entire work culture has changed: remote work has become the new norm, and companies have accelerated their digital transformation efforts. Are your security policies up to date? Are you following current best practices?

In this talk, you’ll learn the most effective cyber security policies for the new normal, backed by data from the ESI ThoughtLab survey of over 1,000 CISOs.
Recorded Aug 11 2020 41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Larry Clinton, ISA | Jason Harrell, DTCC | Robert Falzon, Check Point | Eddie Doyle, Check Point
Presentation preview: Creating Essential Cyber Policies During the Pandemic
  • Channel
  • Channel profile
  • Preventing Cyber Attacks on OT Networks and Industrial Control Systems May 26 2021 7:00 pm UTC 30 mins
    Mati Epstein, Head of Industrial Control Systems at Check Point Software Technologies
    During the past few months, cyberattacks have increased against Operational Technology (OT) networks and Industrial Control Systems (ICS). Recent targets include a natural gas facility, water facilities, and steel manufacturers. Given the fact that critical infrastructure such as utilities, energy suppliers, and manufacturing facilities are exposed and at risk, it is essential to implement effective security in order to reduce the attack surface of these ICS and OT networks. Join Mati Epstein, Head of Industrial Control Systems at Check Point Software Technologies for insight on the realities surrounding today's vulnerabilities and how companies can protect their critical infrastructure without impacting operations going forward.
  • The ROI of Cloud Security with Microsoft and Check Point (Spanish) May 13 2021 3:00 pm UTC 75 mins
    TBD
    Cloud network security is a key foundational layer to protect customers’ cloud migration and cloud assets.
    Check Point commissioned Forrester Consulting to conduct a Total Economic Impact study on Check Point CloudGuard Network Security and found that in addition to CloudGuard securing hybrid-cloud assets, it also provided a 169% return on investment over 3 years.
    Join this webinar to:
    • Learn more about the study which was based on interviews with a CloudGuard and Azure customer – a large US-based healthcare company with over $10B annual revenue.
    • Understand the ROI of migrating workloads to Azure
    • Participate in a fireside chat and Q&A with Microsoft and Check Point execs in Latin America around Digital Transformation and how best to secure your cloud journey
  • The ROI of Cloud Security with Microsoft and Check Point (Portuguese) May 13 2021 1:00 pm UTC 75 mins
    TBD
    Cloud network security is a key foundational layer to protect customers’ cloud migration and cloud assets.
    Check Point commissioned Forrester Consulting to conduct a Total Economic Impact study on Check Point CloudGuard Network Security and found that in addition to CloudGuard securing hybrid-cloud assets, it also provided a 169% return on investment over 3 years.
    Join this webinar to:
    • Learn more about the study which was based on interviews with a CloudGuard and Azure customer – a large US-based healthcare company with over $10B annual revenue.
    • Understand the ROI of migrating workloads to Azure
    • Participate in a fireside chat and Q&A with Microsoft and Check Point execs in Latin America around Digital Transformation and how best to secure your cloud journey
  • Fully Managed SASE for Better ROI on Network Security - Check Point & Aryaka May 12 2021 4:00 pm UTC 60 mins
    Paul Liesenberg (Aryaka), Aviv Abramovich, Ad Attias, Russel Schafer (Check Point)
    With the shift to remote work and cloud, network architects and security leaders are rethinking their networking and security strategies, which also requires supporting branch offices worldwide.

    Secure Access Service Edge, or SASE solutions, combine networking and security services into a single solution delivered from the cloud, to offer:
    • Better performance and speed for users
    • Consistent policy enforcement across use cases
    • Improved agility to scale up and down
    • Reduced administration overheads

    Join SASE experts from Check Point and Aryaka to learn how you can accelerate ROI on your networking and network security efforts with a fully managed SASE deployment to:

    • Ensure fast, reliable access worldwide with SD-WAN networking-as-a-service
    • Protect branch office connections, with security delivered on-prem or in the cloud
    • Secure remote VPN access for employees working anywhere
    • Keep employees safe from phishing and malware sites
    • Reduce administration and infrastructure overheads
  • Fully Managed SASE for Better ROI on Network Security - Check Point & Aryaka May 12 2021 8:00 am UTC 60 mins
    Gokul Nair (Aryaka), Aviv Abramovich, Ad Attias, Mor Ahuvia (Check Point)
    With the shift to remote work and cloud, network architects and security leaders are rethinking their networking and security strategies, which also requires supporting branch offices worldwide.

    Secure Access Service Edge, or SASE solutions, combine networking and security services into a single solution delivered from the cloud, to offer:
    • Better performance and speed for users
    • Consistent policy enforcement across use cases
    • Improved agility to scale up and down
    • Reduced administration overheads

    Join SASE experts from Check Point and Aryaka to learn how you can accelerate ROI on your networking and network security efforts with a fully managed SASE deployment to:

    • Ensure fast, reliable access worldwide with SD-WAN networking-as-a-service
    • Protect branch office connections, with security delivered on-prem or in the cloud
    • Secure remote VPN access for employees working anywhere
    • Keep employees safe from phishing and malware sites
    • Reduce administration and infrastructure overheads
  • Automated Security Strategies to Prevent Top Cloud Threats Apr 29 2021 4:00 pm UTC 36 mins
    Maya Levine, Technical Engineer, Cloud Security
    Cloud is fundamentally changing how we need to be approaching cybersecurity. Digital transformation has pushed our organizations to adopt technologies that stretch beyond the traditional network boundaries. The attack techniques used against our organizations have transformed as well. Join Maya Levine in a review of the cybersecurity transformation that is occurring, the evolution of the threat landscape, and the new initiatives organizations must embrace to operate securely in the cloud.
  • As the Cyber World Turns: A Strategy for Improving Security Efficiency Apr 28 2021 6:00 pm UTC 60 mins
    Grant Asplund, Chief Security Evangelist, Check Point
    IT organizations must implement new controls to increase their security posture and defend against new threats like the SolarWinds Orion supply chain attack. But slowed economic growth and the push to secure systems from sophisticated new threats challenges many companies.

    These global market conditions underscore the importance of employing a consolidation strategy with a unified security architecture at its center that protects cloud, networks, endpoints, and mobile devices.

    Join Grant Asplund, chief security evangelist for Check Point Software, as he shares the building blocks for a consolidation strategy that:
    • Increases security efficiency with a unified security architecture
    • Improves your organization’s overall threat prevention profile
    • Eliminates complexity caused by managing disparate systems
    • Reduces total cost of ownership
  • Securing your VPC with Check Point and AWS Apr 28 2021 4:00 pm UTC 75 mins
    Check Point and AWS
    Securing your VPC with Check Point and AWS
  • As the Cyber World Turns: A Strategy to Increase Security Efficiency Apr 28 2021 9:00 am UTC 60 mins
    Grant Asplund, Chief Security Evangelist, Check Point
    Security practitioners understand the need to implement new controls that help their organizations' defend against the rising number of attacks and Fifth Generation threats like the SolarWinds Orion supply chain hack. But slowed economic growth and the push to secure systems from sophisticated new threats challenges many companies.

    These global market conditions underscore the importance of employing a consolidation strategy with a unified security architecture at its center that protects cloud, networks, endpoints, and mobile devices.

    Join Grant Asplund, chief security evangelist for Check Point Software Technologies, on Wednesday, April 28 as he shares the building blocks for putting in place a consolidation strategy that:
    • Increases security efficiency with a unified security architecture
    • Improves your organization’s overall threat prevention profile
    • Eliminates complexity caused by managing disparate systems
    • Reduces total cost of ownership
  • Secure Engineer Access to Cloud Workloads with Zero Trust Apr 27 2021 4:00 pm UTC 60 mins
    Noa Zilberman, former Co-Founder and Product Chief of Odo Security (acquired by Check Point), SASE Product Manager
    The effort of managing access to IT and production environments is growing exponentially with every new engineer, server and datacenter added to your infrastructure. As a result, developers are often given administrator privileges, which attackers can exploit to move laterally around your network.

    Learn how Zero Trust Network Access (ZTNA) can ensure smooth and secure access to production environments for DevOps and administrators using:

    • Built-in privileged Access Management
    • Instant cloud deployment, with no agents
    • Automated server onboarding (AWS)
    • Dynamic tag-based management
    • Full audit trail with optional session recordings

    Effortless security for your engineering environments is now at your fingertips.

    Join us for a firsthand look.

    Can't make this time? Join our EMEA and APAC session at 9am London | 11am Paris | 5pm Hong Kong by following this link: https://www.brighttalk.com/webcast/16731/476888
  • Secure Engineer Access to Cloud Workloads with Zero Trust Apr 27 2021 8:00 am UTC 60 mins
    Noa Zilberman, former Co-Founder and Product Chief of Odo Security (acquired by Check Point), SASE Product Manager
    The effort of managing access to IT and production environments is growing exponentially with every new engineer, server and datacenter added to your infrastructure. As a result, developers are often given administrator privileges, which attackers can exploit to move laterally around your network.

    Learn how Zero Trust Network Access (ZTNA) can ensure smooth and secure access to production environments for DevOps and administrators using:

    • Built-in privileged Access Management
    • Instant cloud deployment, with no agents
    • Automated server onboarding (AWS)
    • Dynamic tag-based management
    • Full audit trail with optional session recordings

    Effortless security for your engineering environments is now at your fingertips.

    Join us for a firsthand look.

    Can't make this time? Join our Americas webinar at 9am Pacific Time | 12pm noon Eastern Time by following this link: https://www.brighttalk.com/webcast/16731/476886
  • The New Era of Email Security: Biggest threats and best practices in 2021 Apr 21 2021 4:00 pm UTC 60 mins
    Eli Schmidt, Danielle Guetta - Product Management
    **Register to the EMEA & APAC session here: https://www.brighttalk.com/webcast/16731/473132

    Part 6 and final presentation in the Harmony series. Email is the most fundamental tool for business collaboration these days, and as such it is also one of the most exploited attack vectors. With huge surges in phishing and ransomware attacks, it is essential that no malicious email reaches your employees. Find out the latest threats and best practices, and how Harmony Email & Office can help you ensure your users remain productive while securing their email and productivity apps environment from all imminent threats.
  • The New Era of Email Security: Biggest threats and best practices in 2021 Apr 21 2021 8:00 am UTC 60 mins
    Eli Schmidt, Danielle Guetta - Product Management
    Part 6 and final presentation in the Harmony series. Email is the most fundamental tool for business collaboration these days, and as such it is also one of the most exploited attack vectors. With huge surges in phishing and ransomware attacks, it is essential that no malicious email reaches your employees. Find out the latest threats and best practices, and how Harmony Email & Office can help you ensure your users remain productive while securing their email and productivity apps environment from all imminent threats.
  • Streamlining Cloud Security Management Apr 20 2021 4:00 pm UTC 26 mins
    Trisha Paine, Head of Product Marketing Cloud Security, and Jake Walker, Security Architect at Check Point Software
    Take control of your multi-cloud environment with streamlined visibility, compliance and automation. Our security experts will share best practice strategies and tools organizations are using to manage and prevent threats to their multi-cloud environments.
  • Transform your Data Center with Quantum Hyperscale Network Security Apr 13 2021 4:00 pm UTC 60 mins
    Michael Greenberg, Product Marketing Manager, Quantum and Yaron Weiler and Guy Israeli, Product Management, Quantum
    It is no secret, our networks and data centers have changed as we know it: network traffic is growing, users are remote and applications are distributed everywhere. Now is the time to cloudify our networks and data centers where scalability on demand, cost-efficiency and simple operations are all that matters.

    Join us to hear from the experts and learn how to enable your data center to operate like the cloud with:

    • Enhanced and embedded security
    • Broader and elastic bandwidth
    • Modularity and simplification
    • Improved resiliency
    • Automation and orchestration
  • Transform your Data Center with Quantum Hyperscale Network Security Apr 13 2021 8:00 am UTC 60 mins
    Michael Greenberg, Product Marketing Manager, Quantum and Yaron Weiler and Guy Israeli, Product Management, Quantum
    It is no secret, our networks and data centers have changed as we know it: network traffic is growing, users are remote and applications are distributed everywhere. Now is the time to cloudify our networks and data centers where scalability on demand, cost-efficiency and simple operations are all that matters.

    Join us to hear from the experts and learn how to enable your data center to operate like the cloud with:

    • Enhanced and embedded security
    • Broader and elastic bandwidth
    • Modularity and simplification
    • Improved resiliency
    • Automation and orchestration
  • The ROI of Cloud Security with Microsoft and Check Point Recorded: Apr 8 2021 63 mins
    Shiri Hochhauser (Microsoft), Arnfinn Strand (Check Point), Jonathan Maresky (Check Point)
    Cloud network security is a key foundational layer to protect customers’ cloud migration and cloud assets.
    Check Point commissioned Forrester Consulting to conduct a Total Economic Impact study on Check Point CloudGuard Network Security and found that in addition to CloudGuard securing hybrid-cloud assets, it also provided a 169% return on investment over 3 years.
    Join this webinar to:
    • Learn more about the study which was based on interviews with a CloudGuard and Azure customer – a large US-based healthcare company with over $10B annual revenue.
    • Understand the ROI of migrating workloads to Azure
    • Participate in a fireside chat and Q&A with Microsoft and Check Point execs in EMEA around Digital Transformation and how best to secure your cloud journey
  • Harmony Mobile - Defending against the Dangerous Wave of Mobile Threats Recorded: Apr 7 2021 60 mins
    Augusto Morales (Security Architect, Threat Solutions - North America, Check Point Software)
    EMEA & APAC webinar registration - https://www.brighttalk.com/webcast/16731/473130

    These days, your employees are increasingly accessing sensitive corporate assets from their smartphones, so business data is constantly exposed to potential data breaches.
    IDC predicts that by 2024 mobile workers will account for nearly 60% of the total U.S. workforce.

    At the same time, the attacks are on the rise. 46% of organizations had at least one employee download a malicious mobile application, which threatens their networks and data in 2020.
    Mobile Threat Defense (MTD) solutions must now play a critical role in addressing those challenges.

    Join our live webinar to learn how Harmony Mobile, the industry-leading MTD solution, delivers complete mobile security that is friendly to both security admins and employees.

    Session highlights:
    • Top mobile threats to the enterprise in 2020 discovered by Check Point Research
    • Key considerations for choosing the right MTD solution
    • Harmony Mobile in action-live demo covering multiple use cases and new features
  • Harmony Mobile - Defending against the Dangerous Wave of Mobile Threats Recorded: Apr 7 2021 61 mins
    Yves Jonczyk
    Americas webinar registration - https://www.brighttalk.com/webcast/16731/473131

    These days, your employees are increasingly accessing sensitive corporate assets from their smartphones, so business data is constantly exposed to potential data breaches.
    IDC predicts that by 2024 mobile workers will account for nearly 60% of the total U.S. workforce.

    At the same time, the attacks are on the rise. 46% of organizations had at least one employee download a malicious mobile application, which threatens their networks and data in 2020.
    Mobile Threat Defense (MTD) solutions must now play a critical role in addressing those challenges.

    Join our live webinar to learn how Harmony Mobile, the industry-leading MTD solution, delivers complete mobile security that is friendly to both security admins and employees.

    Session highlights:
    • Top mobile threats to the enterprise in 2020 discovered by Check Point Research
    • Key considerations for choosing the right MTD solution
    • Harmony Mobile in action-live demo covering multiple use cases and new features
  • CHECK POINT INFINITY VISION XDR Recorded: Apr 6 2021 62 mins
    Xavier Duros, SE Manager France Kinnie André, Field Marketing Manager
    Participez au webinar Check Point INFINITY VISION XDR le Mardi 06 Avril 2021 à 14h00.

    Plateforme cloud qui permet aux équipes sécurité et aux analystes SOC d’exposer, d’investiguer et de bloquer les attaques plus rapidement, à l’intérieur et à l’extérieur du réseau d’entreprise.
    Expose les attaques furtives et procure des informations complémentaires sur les menaces, ainsi que des données de recherche uniques, directement issues de Check Point Research et ThreatCloud.
    Check Point Research utilise également cette plateforme dans son travail quotidien.
    La plateforme offre une solution révolutionnaire de détection d’incidents sans journal et basée sur l’IA, qui expose et corrige les menaces rapidement, avec une précision sans précédent, sur le réseau, le cloud, les EndPoints, les appareils mobiles et l’IoT.
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Creating Essential Cyber Policies During the Pandemic
  • Live at: Aug 11 2020 3:00 pm
  • Presented by: Larry Clinton, ISA | Jason Harrell, DTCC | Robert Falzon, Check Point | Eddie Doyle, Check Point
  • From:
Your email has been sent.
or close