Hi [[ session.user.profile.firstName ]]

New Year, New Cloud

To say 2020 was unpredictable is an understatement. The proliferation of remote workers, rapid acceleration of cloud applications and deployments, and the resulting breaches from hackers trying to capitalize on security gaps were unprecedented. What will unfold in 2021 is still unknown, but we are better prepared on how to address and adapt to the changes. Learn how leading organizations are tackling this paradigm shift and developing strategies to improve their visibility, prevent threats, and quickly develop new cloud applications with precision and efficiency.
Recorded Dec 7 2020 37 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Maya Levine, Cloud Technical Engineer, Greg Pepper, Cloud Security Architect and Gustavo Coronel, Cloud Security Architect
Presentation preview: New Year, New Cloud
  • Channel
  • Channel profile
  • How to Shift Left with Check Point CloudGuard and Hashicorp Consul Feb 25 2021 5:00 pm UTC 60 mins
    John Gou, Check Point Cloud Alliance Architect & Nathan Pearce, Hashicorp Solutions Engineer Specialist
    Learn from how to leverage the latest tools to enhance security for cloud microservices while automating development processes.
  • Secure Third Party Access - It's Time for Zero Trust Feb 10 2021 5:00 pm UTC 60 mins
    Noa Zilberman, Jacob Lee, Eytan Segal, Mor Ahuvia, Russel Schafer
    How do you secure remote third party access while keeping your private apps private?

    Internally hosted resources harboring sensitive PII or intellectual property may reside anywhere, from your on-premises data center to public cloud services such as AWS, Azure or GCP. Third parties accessing these resources pose an additional risk, expanding your attack surface to contractors, vendors, resellers and partners.

    To add to the complexity, third parties' devices are not managed by IT and may require only temporary access credentials.

    Join the webinar to learn how to:

    • Implement zero trust security principles for third party remote access
    • Leverage a transparent software-defined perimeter to increase security
    • Lower setup and maintenance overheads using a clientless, cloud-based service
    • Maintain compliance by removing the need to install VPN clients

    Can’t make this time? Join the webinar on 10th February at 9am London | 10am Paris | 5pm HKT: https://www.brighttalk.com/webcast/16731/464595
  • Secure Third Party Access - It's Time for Zero Trust Feb 10 2021 9:00 am UTC 60 mins
    Etyan Segal, Noa Zilberman, Jacob Lee, Russ Schafer, Mor Ahuvia
    How do you secure remote third party access while keeping your private apps private?

    Internally hosted resources harboring sensitive PII or intellectual property may reside anywhere, from your on-premises data center to public cloud services such as AWS, Azure or GCP. Third parties accessing these resources pose an additional risk, expanding your attack surface to contractors, vendors, resellers and partners.

    To add to the complexity, third parties' devices are not managed by IT and may require only temporary access credentials.

    Join the webinar to learn how to:

    • Implement zero trust security principles for third party remote access
    • Leverage a transparent software-defined perimeter to increase security
    • Lower setup and maintenance overheads using a clientless, cloud-based service
    • Maintain compliance by removing the need to install VPN clients

    Can’t make this time? Join the webinar on 10th February at 9am Pacific Time | 12pm ET: https://www.brighttalk.com/webcast/16731/464593
  • Branching Out: Integrated Security from Branch to Cloud Recorded: Jan 14 2021 61 mins
    Check Point, Aruba, Silver Peak & HPE Pointnext Services teams
    Join Check Point, Aruba, Silver Peak and HPE Pointnext Services to learn how to deploy and secure your SD-WAN environments.

    By 2023, 90% of enterprises will rely on the cloud for branch and remote connections. While this improves efficiency in many ways, it also increases the security exposure and risk as these connections are no longer protected by centralized data center security.

    To address these challenges, Check Point has partnered with Aruba, and also with Silver Peak to provide integrated and secure SD-WAN solutions for organizations of all sizes. These integrated solutions provide:

    • Continuously updated security
    • Simplified deployment capability
    • Automation that enhances agility
    • Validated interoperability

    Webinar start: 8 am GMT
  • An Azure Journey: How Gas South Enabled Secure and Scalable Remote Access Recorded: Jan 7 2021 69 mins
    Wayne Meyer (Microsoft) and Rajiv Thomas (Gas South)
    Join Wayne Meyer (Microsoft) and Rajiv Thomas (Gas South) who’ll discuss how Gas South securely migrated to Azure over a weekend, enabling scalable remote access for their workforce at the start of the COVID-19 lockdown.
  • Preventing Attacks on IoT Networks and Devices Recorded: Jan 5 2021 39 mins
    Itzik Feiglevitch, Senior Product Manager – Cyber Security, Cloud, IoT and Networking
    Cybercriminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 63% of enterprises, 92% of industrial organizations, and 82% of health care organizations use IoT, almost every company is exposed. Unfortunately, connecting IoT devices to the network extends the attack surface providing more entry points for hackers.

    Join the webinar to learn how to prevent IoT cyber attacks by:
    • Exposing all IoT security risks across IT and OT networks
    • Easily creating policies to secure thousands of IoT devices
    • Preventing both network-based and device-level attacks
  • More endpoints, more challenges. How to make sure your security keeps up Recorded: Dec 22 2020 42 mins
    Arzu Hajiyeva, Beyond the Perimeter Security Sales Manager @ Check Point
    Today more than ever, endpoint security plays a critical role in enabling your remote workforce. Cybersecurity attacks often start at endpoints, such as workstations or mobile devices then pivot to critical data sources on servers.

    Join us for a 45-minute session delivered by our UK Threat Prevention team. During this session, you will learn how to:
    - Transform your endpoints from the weakest link to the strongest defence
    - Protect the remote workforce from today's complex threat landscape
    - Automate 90% of attack detection, investigation, and remediation tasks
    - Access all the endpoint protection you need in a single, efficient and cost-effective solution
  • Building a Secure FinTech Community in Scotland Recorded: Dec 21 2020 116 mins
    Nicola Anderson, Strategic Development Director @FinTech Scotland
    There are roughly 1,300 cyber-attacks a week targeting the local Fintech startups and large financial institutions.

    In fact, 25 percent of all malware attacks are aimed at banks and other financial services organizations – surpassing all other industries.

    Join a dedicated event delivered by FinTech Scotland and its cybersecurity strategic partner, Check Point, to discover the latest threats and technologies available to support the FinTech Scotland community during unprecedented times.

    Introductions – Building a Secure FinTech Community in Scotland
    Nicola Anderson, Strategic Development Director @FinTech Scotland
    Mark McMeekin, Major Account Manager @Check Point Scotland

    Top Cybersecurity Threats to Watch out for in 2021
    Neomi Rona, Threat Intelligence Analyst @Check Point

    Achieve Cloud Security that you can See, Manage and Trust
    Chris Beckett, Technical Account Manager EMEA @Check Point

    Beyond The Perimeter Security
    Arzu Hajiyeva, Solutions Manager @Check Point

    Zero Trust Access For Today’s Enterprises
    Noa Zilberman, co-founder of the cybersecurity startup Odo
    Tom Kendrick, Solutions Engineer @Check Point

    Enabling Fintech Startups
    Lewis Jeffreys, Corporate Account Manager @Check Point Scotland

    Q&As
  • Protecting Cloud Assets from DDoS Threats Recorded: Dec 15 2020 55 mins
    Pascal Geenens, Eyal Arazi, Ezer Goshen
    While DDoS is frequently perceived to be a network problem that is not relevant for the public cloud, in practice DDoS attacks continue to be a problem in public cloud environments, and in particular in multi-cloud and hybrid-cloud settings. This session will discuss the challenges in DDoS protection in the public cloud, explain the limits of using the native controls of public cloud vendors, and highlight how Check Point's cloud DDoS security provides better protection and better management for cloud environments.
  • North Korea, Cyber, and the Role of International Law Recorded: Dec 15 2020 43 mins
    Professor Sean Watts and Professor Rob Barnsby, United States Military Academy | Eddie Doyle, Check Point Software
    Remember when Sony was hacked by North Korea back in 2014? This event had tremendous implications regarding international law and cyber security.

    Professor Sean Watts & Professor Rob Barnsby, of the United States Military Academy, Judge Advocate General’s (JAG) School at West Point discuss how international law is needed as a foundation before governments can intercede on corporations' behalf. Government is working to protect private enterprise, but corporations must meet them in the middle. It's a trust issue.

    Sign up for the webinar today to get a perspective from two West Point Academy professors on how governments and corporations can best work together in improving cyber security.
  • Protecting Cloud Assets from DDoS Threats Recorded: Dec 15 2020 54 mins
    Pascal Geenens, Eyal Arazi, Ezer Goshen
    While DDoS is frequently perceived to be a network problem that is not relevant for the public cloud, in practice DDoS attacks continue to be a problem in public cloud environments, and in particular in multi-cloud and hybrid-cloud settings. This session will discuss the challenges in DDoS protection in the public cloud, explain the limits of using the native controls of public cloud vendors, and highlight how Check Point's cloud DDoS security provides better protection and better management for cloud environments.
  • Securely Connect Remote Users with Clientless Zero Trust Corporate Access Recorded: Dec 10 2020 56 mins
    Etyan Segal, Noa Zilberman
    In the new normal, working environments are no longer defined by fixed network perimeters. As organizations shift employees to work remotely, they may overlook critical security aspects, significantly increasing their exposure to cyberattacks.

    Check Point Zero Trust Corporate Access is cloud-based, clientless SASE technology, that redefines remote access by delivering the easiest way to deploy zero trust corporate access, so the right user has least privileged access to the right resource, in the right role, at the right time, from any device to any internal enterprise application.

    Join the webinar on December 10th to learn how to:
    • Implement a zero trust architecture with least privileged access to internal apps
    • Secure access for diverse roles including users, admins, DevOps and 3rd parties
    • Deploy clientless ZTNA-as-a-service within minutes from the cloud

    Can't make this time? Join our EMEA/APAC session on Dec 10th at 9am GMT / 5pm Singapore Standard Time.
  • Securely Connect Remote Users with Clientless Zero Trust Corporate Access Recorded: Dec 10 2020 54 mins
    Etyan Segal, Noa Zilberman
    IIn the new normal, working environments are no longer defined by fixed network perimeters. As organizations shift employees to work remotely, they may overlook critical security aspects, significantly increasing their exposure to cyberattacks.

    Check Point Zero Trust Corporate Access is cloud-based, clientless SASE technology, that redefines remote access by delivering the easiest way to deploy zero trust corporate access, so the right user has least privileged access to the right resource, in the right role, at the right time, from any device to any internal enterprise application.

    Join the webinar on December 10th to learn how to:
    • Implement a zero trust architecture with least privileged access to internal apps
    • Secure access for diverse roles including users, admins, DevOps and 3rd parties
    • Deploy clientless ZTNA-as-a-service within minutes from the cloud

    Can't make this time? Join our Americas session on Dec 10th at 9am PT / 11am ET: https://www.brighttalk.com/webcast/16731/454996
  • End-to-End Autonomic Closed-Loop Security Management & Control for 5G Networks Recorded: Dec 8 2020 91 mins
    Dr. Ranganai Chaparadza, Dr. Tayeb Ben Meriem, Dr. Muslim Elkotob, Chris Federico, Javier Padilla
    The Webinar presents a Generic Framework for End-to-End (E2E) Autonomic (Closed-Loop) Security Assurance across 5G Network Segments, Slices, and even across Network Operators that is targeted for Standardization in ETSI based on a 5G PoC Project carried out by Industry Players and Checkpoint. The Webinar also presents how to achieve E2E Automated and Self-Adaptive Security Policy Management and Control (powered by Artificial Intelligence Models), based on the Framework. Steps to standardize the Generic Framework in ETSI will also be discussed.
  • New Year, New Cloud Recorded: Dec 7 2020 37 mins
    Maya Levine, Cloud Technical Engineer, Greg Pepper, Cloud Security Architect and Gustavo Coronel, Cloud Security Architect
    To say 2020 was unpredictable is an understatement. The proliferation of remote workers, rapid acceleration of cloud applications and deployments, and the resulting breaches from hackers trying to capitalize on security gaps were unprecedented. What will unfold in 2021 is still unknown, but we are better prepared on how to address and adapt to the changes. Learn how leading organizations are tackling this paradigm shift and developing strategies to improve their visibility, prevent threats, and quickly develop new cloud applications with precision and efficiency.
  • Architecture Best Practices for VMware NSX Security Recorded: Dec 3 2020 66 mins
    Richard Cove, Cloud Security Architect at Check Point
    CloudGuard Network Security for VMware NSX-T delivers industry-leading multi-layered defenses for multi-cloud architectures, allowing to protect North-South and East-West traffic with different use cases with their reference architectures.

    Learn about:
    • How the integration of CloudGuard with VMware NSX-T 2.5 and 3.0 provides advanced threat prevention and automated cloud network security.
    • Use cases, architecture diagrams, and best practices for securing SDDCs, with real customer examples.
    • Zero-Trust driven approach to build a comprehensive VMware NSX security strategy
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: New Year, New Cloud
  • Live at: Dec 7 2020 9:00 pm
  • Presented by: Maya Levine, Cloud Technical Engineer, Greg Pepper, Cloud Security Architect and Gustavo Coronel, Cloud Security Architect
  • From:
Your email has been sent.
or close