5 ways to maintain, enforce and enhance your cyber security compliance levels

Presented by

Kai Vaksdal, Compliance Product Manager for Europe at Check Point

About this talk

In 2019 we witnessed a record number of data breaches with employees and client's information stolen in enormous quantities. More than 90% of UK data breaches were due to human error. And, according to Check Point’s Cyber Security Report in 2020: •>80% of companies had unused or expired rules •77% of corporates had not fully documented their firewall rules •75% of corporates had not implemented anti-spoofing measures Join Kai Vaksdal, Compliance Product Manager for Europe at Check Point on 1st September to learn how to: - Detect incorrect configurations - Monitor policy changes - Translate complex regulatory requirements into actionable best practices - Boost your security levels - Get the best from your Check Point environment Why you should attend: Many Check Point customers already have the Compliance Blade included in their management, but have not activated it and are not benefitting from its best practices. Equally, most Check Point customers have a level of misconfiguration which the Compliance Blade can detect and help you to correct. Register and raise your security level across your entire Check Point environment with a dynamic solution that monitors your security infrastructure, gateways, blades, policies, and configuration settings in real-time.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (344)
Subscribers (51875)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.