Hi [[ session.user.profile.firstName ]]

Hacking the Brain

The ability to implant thoughts and manipulate a person’s behavior may be closer than we believe.
Professor Moran Cerf, Neuroscientist and Business Professor at the Kellogg School of Management, at Northwestern University (and a former hacker), will discuss how advances in artificial intelligence (AI) could be used to control human thoughts.

This month, Talking iTech with Eddie Doyle will interview Prof. Cerf to discuss how:
• Neuroscience can be used to change human behavior
• AI is affecting our futures
• We can program ourselves for success? Or program others for failure?

Shocking as it may seem, hacking brains to “embed” thoughts and ideas into our mind may have already been here? Nation-states using cyber warfare to influence outcomes, such as impacting democratic elections, is just one example.
Join us in September to see where Science Fiction meets a new reality.
Recorded Sep 29 2020 79 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Moran Cerf, Neuroscientist & Business Professor @Northwestern University I Eddie Doyle, Global Security Strategist
Presentation preview: Hacking the Brain
  • Channel
  • Channel profile
  • Architecture Best Practices for VMware NSX Security Nov 12 2020 10:00 am UTC 75 mins
    John-Patrick Edwards, Global Security Architect at Check Point
    CloudGuard Network Security for VMware NSX-T delivers industry-leading multi-layered defenses for multi-cloud architectures, allowing to protect North-South and East-West traffic with different use cases with their reference architectures.

    Learn about:
    • How the integration of CloudGuard with VMware NSX-T 2.5 and 3.0 provides advanced threat prevention and automated cloud network security.
    • Use cases, architecture diagrams, and best practices for securing SDDCs, with real customer examples.
    • Zero-Trust driven approach to build a comprehensive VMware NSX security strategy
  • Architecture Best Practices for VMware NSX Security Oct 29 2020 6:00 pm UTC 75 mins
    Elier Cruz, Global Security Architect at Check Point
    CloudGuard Network Security for VMware NSX-T delivers industry-leading multi-layered defenses for multi-cloud architectures, allowing to protect North-South and East-West traffic with different use cases with their reference architectures.

    Learn about:
    • How the integration of CloudGuard with VMware NSX-T 2.5 and 3.0 provides advanced threat prevention and automated cloud network security.
    • Use cases, architecture diagrams, and best practices for securing SDDCs, with real customer examples.
    • Zero-Trust driven approach to build a comprehensive VMware NSX security strategy
  • Best Practices for Managing Cyber Risk Oct 20 2020 3:00 pm UTC 30 mins
    Dominic Saebeler, Risk & Police Management Expert, University of Illinois | Eddie Doyle, Global Security Strategist
    Dodging every single cyber incident is impossible, but a well-governed cyber security strategy will enable you to manage technological risks within an acceptable margin. The more you know about risks, risk management, reporting and analytics, the stronger the prevention strategies and defense mechanisms you'll put in place.

    In this talk, Dominic Saebeler, Policy & Risk Management expert at the University of Illinois, will share how he leads teams through collaborative efforts to identify and solve problems at the intersection of technology, research, data privacy, regulation, compliance and cybersecurity policies.

    Dominic will discuss:
    • The most dangerous risks to your cyber security
    • Top strategies to ultimately mitigate risk
    • Effective cyber security policies you should implement in your organization

    Click the "ATTEND" button above to reserve your seat.
  • The next decade: opportunity in uncertain times Oct 13 2020 3:00 pm UTC 60 mins
    Yahli Admati, a leading futurist and strategist
    Despite the cataclysmic events of 2020, Yahli Admati, a leading futurist and strategist is optimistic. Over the next decade, she envisions opportunities with technological innovations creating a brighter future.

    Join Yahli Admati in the next episode of Talking iTech with Eddie Doyle series as they discuss key technology capabilities fueled by artificial intelligence (AI). Topics to be discussed include:

    • Medical advancements, including the speed up of coronavirus gen editing
    • Rapid transformation of micro to megatrend predictions
    • Major advancements with industrial and service robots
    • A new quantum computing paradigm for the future

    Yahli Admati has worked with senior executives from such diverse companies as Cadbury’s, Citibank, Coca-Cola, Colgate-Palmolive, L’OREAL, Nestle, Orange, among others.

    This must-attend webinar event offers vital implications for everyone.
  • What Every CISO Must Know About Compliance in 2020 Oct 6 2020 3:00 pm UTC 30 mins
    Jenny Boneva, Vice President of ISACA Sofia Chapter | Eddie Doyle, Global Security Strategist
    Cyber security compliance isn't easy. With ever-evolving privacy and security regulations, many organizations find it difficult to maintain an acceptable compliance posture. How do you adapt to future legislation and achieve ongoing compliance?

    In this episode, Eddie Doyle will interview Jenny Boneva, who serves as Vice President of ISACA's 'SheLeadsTech' in Bulgaria. SC magazine has named Jenny Boneva as one of Europe’s 50 most influential women in cyber security.

    Jenny will discuss:
    • The current state of privacy law, including GDPR
    • The growing role of women in cyber security
    • Best practices for managing risk in 2020

    Click the "ATTEND" button above to reserve your seat.
  • Hacking the Brain Recorded: Sep 29 2020 79 mins
    Moran Cerf, Neuroscientist & Business Professor @Northwestern University I Eddie Doyle, Global Security Strategist
    The ability to implant thoughts and manipulate a person’s behavior may be closer than we believe.
    Professor Moran Cerf, Neuroscientist and Business Professor at the Kellogg School of Management, at Northwestern University (and a former hacker), will discuss how advances in artificial intelligence (AI) could be used to control human thoughts.

    This month, Talking iTech with Eddie Doyle will interview Prof. Cerf to discuss how:
    • Neuroscience can be used to change human behavior
    • AI is affecting our futures
    • We can program ourselves for success? Or program others for failure?

    Shocking as it may seem, hacking brains to “embed” thoughts and ideas into our mind may have already been here? Nation-states using cyber warfare to influence outcomes, such as impacting democratic elections, is just one example.
    Join us in September to see where Science Fiction meets a new reality.
  • Unveiling the Top Cloud Security Trends for 2021 Recorded: Sep 24 2020 59 mins
    Stuart Green, Cloud Security Architect at Check Point
    Did you know that 68% of enterprises today regard the misconfiguration of assets in the cloud as one of the biggest contributors to cloud security threats? In fact, 75% of enterprises are either very concerned or extremely concerned about how secure they are in the cloud.

    Join our talk around the findings of our most recent Cloud Security Report, to discover what over 650 cyber-security professionals had to say about the current state of cloud security, including:
    • Today's biggest cloud security threats
    • Cloud migration security concerns and barriers
    • Key features to consider when evaluating cloud security solutions
    • Strategies they are adopting to address their modern multi-cloud environments
  • Public Sector: Navigating the post-coronavirus world with a strong cyber-defence Recorded: Sep 17 2020 18 mins
    Eddie Doyle, Cyber Security Evangelist Check Point Software Technologies
    Public Sector Talk: Covid-19 not only caused a health pandemic but a cybercrime pandemic too. Its effects have dramatically changed the way Public Sector works, and these changes are here to stay.
    The accelerated pace of digital transformation, remote access infrastructure, the drastic move to the cloud have already gotten the attention of cybercriminals. The dramatic changes in your organisation’s infrastructure present a unique opportunity to assess your security investments. Are you really getting what you need? Are there areas you’ve overlooked?
  • Erratic Times, Solid Security. Navigating Cloud Native Security in 2020 Recorded: Sep 15 2020 42 mins
    Trisha Paine, Head of Cloud Product Marketing and Programs & Jonathan Maresky, Product Marketing Manager
    2020 has been a year of firsts for organizations as they had to expedite the expansion of their cloud infrastructure to meet the requirements of their overnight remote workforce. The proliferation of new cloud applications, the numbers of workers connecting remoting, and the security gaps from this overnight transformation, resulted in 91% of organizations stating they experienced an increase in cyber-attacks. But what were those biggest threats, and how are organizations shifting their approach to address them now, and in the future.

    In this webinar, we will uncover:
    o Findings from the 2020 Cloud Security Report,
    o The current threats plaguing organizations, and
    o Strategies they are adopting to address their modern multi-cloud environments.
  • What Every CISO Must Know About the Law and Cyber Security Recorded: Sep 15 2020 35 mins
    Daniel Garrie, Co-Founder at Law and Forensics | Eddie Doyle, Global Security Strategist at Check Point
    While preventing a breach should be a top concern for organizations, it's also important to prepare for the legal ramifications in case a breach does occur. Research shows that breach related legal costs can you tens or even hundreds of millions of dollars in consumer class action suits and settlements. So what can you do to mitigate the potential damage?

    In this talk, you will learn practical tips concerning how CISOs can keep their companies safe from litigation fallout in the wake of cyber crime. You'll also learn the latest on current cyber-related court cases.

    Our host Eddie Doyle will speak with Daniel Garrie, Co-Founder at Law and Forensics, who is an expert in the latest cyber security, legal, and forensic issues.

    Click the "ATTEND" button above to reserve your spot now!
  • Check Point Best Practices for a Secure Migration to AWS Recorded: Sep 10 2020 77 mins
    Matthieu Bouthors, Security Solutions Architect at AWS and Gonzalo Rocamador, Cloud Security Architect at Check Point
    To fully embrace the cloud, businesses need to understand where the balance of responsibilities lie between protecting the cloud infrastructure (which is the responsibility of AWS) and protecting the data that resides in the cloud (which is the responsibility of the customer). This is what AWS refers to as the shared responsibility model.

    Join this webinar co-hosted by Check Point and AWS for best practices on how to build a secure cloud deployment.

    Learn about:
    • AWS infrastructure and security capabilities.
    • Check Point's cloud security blueprint, which helps customers design secure cloud architectures.
    • How CloudGuard cloud security solutions can help AWS customers meet their shared responsibility requirements.

    We will also have surprise announcements and offers during the webinar!
  • Value preservation, lessons from the Florentine Banker attack Recorded: Sep 10 2020 55 mins
    Aseel Kayal (Malware Analyst @ Check Point Software) and Dr. Rois Ni Thuama (Head of Cyber Governance @ Red Sift)
    Join Dr. Rois Ni Thuama, Head of Cyber Governance at Red Sift
    and our threat expert Aseel Kayal as they unravel the story on The Florentine Banker attack and shed light on how sophisticated Business Email Compromise attacks take place.

    You will:

    - Enjoy a deep dive breakdown of how bad actors were able to steal over one million pounds in the Florentine Banker attack
    - Discover the legal implications for decision makers who fall victim to similar attacks including FCA censure, fines and the case for shareholder class actions
    - Discuss the importance of value preservation and how firms can easily avoid similar attacks in the future
  • Check Point Infinity Architektur Recorded: Sep 8 2020 27 mins
    Mirko Kürten, Strategic Sales Manager, Check Point
    In unserem Check Point Infinity Webinar am 8. September 2020 um 11:00 Uhr zeigt Ihnen Mirko Kürten, Strategic Sales Manager von Check Point, wie der Weg zur ganzheitlichen Absicherung Ihres Unternehmens aussieht. Mit Infinity haben Sie eine All-In-One Cyber Sicherheitsarchitektur für PCs, Netzwerke, Cloud und mobile Geräte kombiniert mit Echtzeitprävention und herausragenden Management.
  • SASE Securely Connects Remote and Branch Users to the Cloud Recorded: Sep 3 2020 64 mins
    Russ Schafer, Head of Product Marketing, Security Platforms
    Today’s enterprises are hyper-distributed, with applications residing everywhere including traditional datacenters, cloud data centers or accessed as cloud services, like Office 365.

    Branches are now bypassing data center security and connecting to local internet providers to reduce application latency and costs.

    Remote User connectivity is the new normal, so enterprises need to use zero trust access controls to support network connectivity at anytime from anywhere.

    The only way to secure a distributed enterprise is with distributed security. How do you do that without losing control? Check Point Secure Access Service Edge (SASE) is the solution.

    Join the webinar on September 3rd to learn more. Can't join this session? Please join us for another session on September 3rd at 9 am London | 10 am Paris | 4 pm HKT: https://bit.ly/3gVFkpe
  • SASE Securely Connects Remote and Branch Users to the Cloud Recorded: Sep 3 2020 70 mins
    Russ Schafer, Head of Product Marketing, Security Platforms
    Today’s enterprises are hyper-distributed, with applications residing everywhere including traditional datacenters, cloud data centers or accessed as cloud services, like Office 365.

    Branches are now bypassing data center security and connecting to local internet providers to reduce application latency and costs.

    Remote User connectivity is the new normal, so enterprises need to use zero trust access controls to support network connectivity at anytime from anywhere.

    The only way to secure a distributed enterprise is with distributed security. How do you do that without losing control? Check Point Secure Access Service Edge (SASE) is the solution.

    Join the webinar on September 3rd to learn more. Can't join this session? Please join another session on September 3rd at 9 am PT | 12 pm ET: https://bit.ly/3h6CzRO
  • How the US Government Combats Cyber Threats Recorded: Sep 1 2020 36 mins
    Michael Balboni, Founder, Redland Strategies | Eddie Doyle, Global Security Strategist, Check Point Software
    What is the role of government in developing cyber security policies? How much responsibility does the private sector have in defending against cyber attacks? Listen to what Eddie Doyle and Michael Balboni, President of Redland Strategies, former Senator and advisor to Homeland Security, have to say about this topic and more.

    In this talk, you'll learn:
    • What government agencies are currently doing to tackle cyber security
    • The challenges of protecting critical infrastructure and how to best secure it
    • Recommendations for CISOs on how to deal with risk in cyber security
  • 5 ways to maintain, enforce and enhance your cyber security compliance levels Recorded: Sep 1 2020 38 mins
    Kai Vaksdal, Compliance Product Manager for Europe at Check Point
    In 2019 we witnessed a record number of data breaches with employees and client's information stolen in enormous quantities. More than 90% of UK data breaches were due to human error.
    And, according to Check Point’s Cyber Security Report in 2020:
    •>80% of companies had unused or expired rules
    •77% of corporates had not fully documented their firewall rules
    •75% of corporates had not implemented anti-spoofing measures

    Join Kai Vaksdal, Compliance Product Manager for Europe at Check Point on 1st September to learn how to:
    - Detect incorrect configurations
    - Monitor policy changes
    - Translate complex regulatory requirements into actionable best practices
    - Boost your security levels
    - Get the best from your Check Point environment

    Why you should attend:

    Many Check Point customers already have the Compliance Blade included in their management, but have not activated it and are not benefitting from its best practices. Equally, most Check Point customers have a level of misconfiguration which the Compliance Blade can detect and help you to correct.

    Register and raise your security level across your entire Check Point environment with a dynamic solution that monitors your security infrastructure, gateways, blades, policies, and configuration settings in real-time.
  • Humans are the Weakest Link – Corona Edition Recorded: Aug 17 2020 44 mins
    Brian Linder, Threat Prevention Expert
    In this session you'll get up to speed and current on:

    - How humans are our weakest link in Corona times, in the new "Work From Anywhere" normal
    - Cybersecurity “blind spots” which may have been revealed, or further disguised in Corona times
    - Peek into the minds of a global Cyber research powerhouse and understand how it can benefit your security strategy
    - Implications of a potential cyber “pandemic” on a different order of magnitude mirroring the biological pandemic
  • Over 400 Vulnerabilities in Qualcomm's chip - Are you at Risk? Recorded: Aug 13 2020 63 mins
    Jonathan Shimonovich
    For the EMEA/APAC session: https://www.brighttalk.com/webcast/16731/431231

    A new Check Point Research reveals more than 400 vulnerable pieces of code in one of Qualcomm Technologies DSP chips, which are imbedded into over 40% of the mobile phone market.

    Is your mobile workforce protected? Is your corporate data secure? What is a DSP and how did we reveal these vulnerabilities?

    Get the full story on our live webinar.
  • Preventing Cyber Attacks on Industrial OT Networks and ICS Assets Recorded: Aug 13 2020 60 mins
    Mati Epstein, Head of ICS Sales, Check Point Software & Emanuel Salmona, VP of Global Partnerships, Claroty
    Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 92% of industrial organizations use IoT, many organizations are exposed.

    A range of IoT devices are connected to corporate networks, which extends the attack surface, providing more entry points for hackers.

    Join the webinar to learn how to prevent industrial-related cyber attacks by:

    •Exposing all IoT security risks across Industrial and OT networks
    •Easily creating zero trust policies to secure thousands of IoT devices
    •Enforcing multi-layered protections at the network and device levels

    Can't make this session? Please join us for another session on August 13th at 9 am London | 11 am Paris | 4 pm HKT: https://bit.ly/2DTcG9L
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Hacking the Brain
  • Live at: Sep 29 2020 3:00 pm
  • Presented by: Moran Cerf, Neuroscientist & Business Professor @Northwestern University I Eddie Doyle, Global Security Strategist
  • From:
Your email has been sent.
or close