Hi [[ session.user.profile.firstName ]]

The History, Evolution and Future of Social Engineering

Throughout history people have been taking advantage of others through different (some more sophisticated than others) social engineering techniques that exploit the human nature and its inherent vulnerabilities.

In this webinar, Maya Horowitz, Check Point's VP Research, will take you through some of the most shocking social engineering scams in history, all the way to social engineering in emails, and where it's headed in the near future.

Join us in a fascinating journey through time and hear the stories that truly show how humans can be incredibly smart and sophisticated on one hand, and insanely easy to manipulate on the other.
Recorded Aug 3 2021 30 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Maya Horowitz
Presentation preview: The History, Evolution and Future of Social Engineering
  • Channel
  • Channel profile
  • Innovations that Transform Hybrid Data Center, Networking and Cloud Security Nov 23 2021 5:00 pm UTC 38 mins
    Aviv Abramovich - Head of Security Services Product Management
    While the pandemic boosts the digital transformation, organizations should not underestimate its potential risks in that journey. With the new normal of working from home, the distribution of applications across the data center and cloud, the increased need for collaboration tools, the proliferation of IoT & endpoint devices, and growth in network traffic, attack vectors expand and expose organizations to the 6th generation of cyber-attacks.

    Join this webinar to learn how Check Point products and innovative solutions prevent cyber attacks across the data center, network, cloud, branch SD-WAN, IoT, endpoint, and mobile devices with a consolidated security architecture.

    Speakers:
    Aviv Abramovich - Head of Security Services Product Management, Check Point
    Russell Schafer - Head of Product Marketing, Security Platforms, Check Point
  • Transform your Data Center with Quantum Hyperscale Network Security Nov 16 2021 5:00 pm UTC 43 mins
    Michael Greenberg, Product Marketing Manager, Quantum and Yaron Weiler and Guy Israeli, Product Management, Quantum
    It is no secret, our networks and data centers have changed as we know it: network traffic is growing, users are remote and applications are distributed everywhere. Now is the time to cloudify our networks and data centers where scalability on demand, cost-efficiency and simple operations are all that matters.

    Join us to hear from the experts and learn how to enable your data center to operate like the cloud with:

    • Enhanced and embedded security
    • Broader and elastic bandwidth
    • Modularity and simplification
    • Improved resiliency
    • Automation and orchestration
  • Blocking Sophisticated Attacks with the Power of AI Nov 11 2021 4:00 pm UTC 26 mins
    Yaniv Shechtman, Head of Product Management -Threat Prevention, Check Point Software Technologies
    The threat landscape in 2021 shows a significant increase in sophisticated attack vectors such as ransomware, phishing, supply-chain, SW vulnerabilities exploits, and others. In this session, we will cover some examples of these vectors, and explain how security solutions can stay ahead of the attackers and their ever-evolving tactics by using the power of AI.
  • What is ThreatCloud and how does it work? Nov 9 2021 5:00 pm UTC 30 mins
    Yaniv Shechtman
    When your perimeter is everywhere and attacks keep advancing, your business needs accurate prevention.

    When you are using Check Point to secure your business, you gain accurate prevention against the most advanced attacks through the power of ThreatCloud.

    ThreatCloud, the brain behind all of Check Point’s products, combines the latest AI technologies with big data threat intelligence to prevent the most advanced attacks while reducing false positives, keeping your business safe and productive.

    Join the webinar to learn how ThreatCloud drives the most accurate verdict and the engines that make it all possible.
  • What is ThreatCloud and how does it work? Nov 9 2021 8:00 am UTC 30 mins
    Yaniv Shechtman
    **Register for the Americas session here: https://www.brighttalk.com/webcast/16731/511219

    When your perimeter is everywhere and attacks keep advancing, your business needs accurate prevention.

    When you are using Check Point to secure your business, you gain accurate prevention against the most advanced attacks through the power of ThreatCloud.

    ThreatCloud, the brain behind all of Check Point’s products, combines the latest AI technologies with big data threat intelligence to prevent the most advanced attacks while reducing false positives, keeping your business safe and productive.

    Join the webinar to learn how ThreatCloud drives the most accurate verdict and the engines that make it all possible.
  • Prevent Cyber Attacks through AI-Driven Threat Prevention & Security Management Nov 4 2021 4:00 pm UTC 30 mins
    Guy Israeli, Product Manager- Security Services, Check Point
    Ransomware, zero-day and supply chain security threats have become more sophisticated, so automated threat prevention and security policy orchestration will be the key to protecting your enterprise from the expanding threat landscape.

    Check Point's Quantum Cyber Security Platform is the industry's most advanced AI & ML-driven network security threat prevention and security management software. In 2020, R81 introduced the first Autonomous Threat Prevention system with 60+ AI & ML threat prevention engines for complete protection against zero-day threats.

    With support from the Check Point ThreatCloud global threat intelligence database, your enterprise network security is automatically updated to protect against the latest threats.

    Join the session to learn how Check Point's Cyber Security Platform with automated threat prevention and security management can protect your enterprise.
  • Hyperscale Network Security for the Post-Pandemic Era: Dealing with the unknown Oct 21 2021 8:30 am UTC 30 mins
    Tom Kendrick, EMEA Security Evangelist @Check Point
    A massive network traffic growth and changing business requirements can be a network security nightmare.
    It is no secret that appliances can’t scale to meet unpredictable traffic peaks, while upgrades take time and resources to acquire, configure, tune, and operate. So, what are the next steps in order for you to deal with the unknown in the coming years?

    Join a coffee break talk to:
    - Prepare for changes and meet the needs of the most demanding environments
    - Fully utilize all hardware resources and manage multiple logical gateways based on a single system for maximum efficiency
    - Learn with use case examples how you can seamlessly provision and add more resources, to build a robust and scalable distributed system

    First 100 UK IT specialists guests attendees to receive a Welcome Hyperscale IT gift box.
  • Innovations that Transform Hybrid Data Center, Networking, and Cloud Security Oct 20 2021 8:00 am UTC 38 mins
    Yaron Weiler - Product Management, Check Point | Russ Shafer - Head of Product Marketing, Security Platforms, Check Point
    While the pandemic boosts the digital transformation, organizations should not underestimate its potential risks in that journey. With the new normal of working from home, the distribution of applications across the data center and cloud, the increased need for collaboration tools, the proliferation of IoT & endpoint devices, and growth in network traffic, attack vectors expand and expose organizations to the 6th generation of cyber-attacks.

    Join this webinar to learn how Check Point products and innovative solutions prevent cyber attacks across the data center, network, cloud, branch SD-WAN, IoT, endpoint, and mobile devices with a consolidated security architecture.
  • How to get started with SASE – Top Three Use Cases Recorded: Sep 29 2021 26 mins
    Jacob Lee, Humza Ismaiel
    Looking to secure your remote workforce *faster*? SASE security delivered from the cloud can help.

    Learn how to implement ZTNA-as-a-service and Secure Web Gateway as-a-service for these top use cases:

    • BYOD and Contractors – Deploy user-friendly clientless remote access, with no agent required
    • DevOps Access - Simplify cloud operations with tag-based management, PAM and SSO
    • Secure Internet Access – Ensure secure browsing for remote employees

    In this session, you’ll discover how to:

    • Offer users a breezy access experience
    • Synch users with your current identity provider
    • Enforce granular policies at the app, command and query level
    • Gain full visibility into user activity post-login

    Get your questions answered in this live demo and Q&A.

    Can't make this time?
    For APAC sessions, go here: https://www.brighttalk.com/webcast/16731/502287

    Explore other 30-minute SASE Expert Sessions below:

    Case Study - How Check Point secures internet access for its remote employees
    Watch replay of Weds. 8th Sept session
    https://www.brighttalk.com/webcast/16731/502225

    ZTNA in 15 Minutes for Employees & Contractors
    Watch replay of Weds. 18th August session
    https://www.brighttalk.com/webcast/16731/502279
  • How to get started with SASE – Top Three Use Cases Recorded: Sep 29 2021 34 mins
    Jacob Lee, Manish Upadhaya
    Looking to secure your remote workforce *faster*? SASE security delivered from the cloud can help.

    Learn how to implement ZTNA-as-a-service and Secure Web Gateway as-a-service for these top use cases:

    • BYOD and Contractors – Deploy user-friendly clientless remote access, with no agent required
    • DevOps Access - Simplify cloud operations with tag-based management, PAM and SSO
    • Secure Internet Access – Ensure secure browsing for remote employees

    In this session, you’ll discover how to:

    • Offer users a breezy access experience
    • Synch users with your current identity provider
    • Enforce granular policies at the app, command and query level
    • Gain full visibility into user activity post-login

    Get your questions answered in this live demo and Q&A.

    Can't make this time? For the AMER/EMEA session, go here: https://www.brighttalk.com/webcast/16731/502226

    Explore other 30-minute SASE Expert Sessions below:

    Case Study: How Check Point secures internet access for its remote employees
    Watch replay of Weds. 8th Sept session
    https://www.brighttalk.com/webcast/16731/502283

    ZTNA in 15 Minutes for Employees & Contractors
    Watch replay of Weds. 18th August session
    https://www.brighttalk.com/webcast/16731/502279
  • Segurança e economia na Jornada para Nuvem! Recorded: Sep 28 2021 53 mins
    Sebastiao Miranda | Cloud Security Sales at Check Point
    A transformação digital e a adoção da cloud já são assuntos recorrentes entre as empresas, mas como fazer a jornada pra nuvem de forma segura, possibilitando maior retorno nos investimentos? A Solo Network e a Check Point podem lhe ajudar!

    Queremos convidar você para este bate-papo que terá a presença do Sebastiao Miranda, especialista da Check Point.

    Principais assuntos:
    • Estudo da Check Point em parceria com a Forrester Consulting sobre o Impacto Econômico Total sobre a Segurança de Rede.

    • Saber mais sobre o estudo baseado em entrevistas com um cliente Check Point CloudGuard e Azure - uma grande empresa de saúde com sede nos EUA com receita anual de mais de US$ 10 bilhões.

    • Entender sobre o ROI com a migração de workloads para o Microsoft Azure;

    • Chat ao vivo de perguntas e respostas com especialistas da Check Point e Solo Network sobre a transformação digital e a melhor forma de proteger sua jornada na nuvem.

    Participe deste grande encontro e aproveite para tirar todas as suas dúvidas! Faça já a sua inscrição!
  • Kubernetes, Containers and the Road to Cloud Native Recorded: Sep 23 2021 50 mins
    Yuval Shchory, Head of Product Management, Cloud Security
    As cloud environments grow and evolve, security professionals are being challenged with decreased visibility, increased complexity and larger more sophisticated security threats.

    Join us as we explore how to fully automate cloud security in a fragmented, microservices environment, with centralized posture management, threat prevention and visibility from build through runtime. Learn how to ensure container and serverless function security through the application lifecycle, across any public cloud.
  • Kubernetes, Containers and the Road to Cloud Native Recorded: Sep 23 2021 49 mins
    Yuval Shchory, Head of Product Management, Cloud Security
    As cloud environments grow and evolve, security professionals are challenged with decreased visibility, increased complexity, and dealing with larger, more sophisticated security threats.

    Join us as we explore how to fully automate cloud security in a fragmented, microservices environment, with centralized posture management, threat prevention, and visibility from build through runtime. Learn how to ensure container and serverless function security through the application lifecycle, across any public cloud.
  • The State of Cybersecurity: Public Sector 2021 Recorded: Sep 23 2021 61 mins
    David Brown, High Speed Two | Ian Porteous, Check Point | Patrick Keane, Bracknell Forest Council | Vebz Panchal, Microsoft
    Did you know that organisations from the Government and Military Sector in UK&I faced an average of 352 weekly cyber-attacks in mid-2021, while those in Education and Research faced no less than 571 weekly attacks? This is a 34% and 43% increase respectively from the previous year. As those in Higher Education, Public Transportation, Government, and the NHS are in the midst of their digital transformation journeys, cybercriminals are eager to take advantage of digital growing pains.

    Public sectors are attractive targets to cybercriminals because they keep a wealth of information on citizen activity and government operations. As remote and hybrid working becomes the norm for many, public sectors are struggling with pre-existing vulnerabilities and outdated cyber security systems. But what can those in the public sector do to keep themselves safe while on their digital transformation journey?

    Join this panel discussion to hear insights from Public Sector security leaders and learn more about:

    - Public Sector cybersecurity threats and trends in 2021 and beyond
    - Digital transformation in the Public Sector, and the associated cyber risks
    - Key tools to secure your sensitive data and critical infrastructure
    - Lessons learned and best practices to strengthen the security of your endpoints, networks, and cloud environments

    Panel Speakers:
    - David Brown, Head of Information Management at High Speed Two
    - Ian Porteous, Regional Director, Security Engineering UK&I at Check Point
    - Patrick Keane, Former Head of IT at London Borough & CIO at Bracknell Forest Council
    - Vebz Panchal, Senior Architect, Azure Cloud & AI, CTO Office at Microsoft
  • Protecting Healthcare Organizations from DDoS Threats - Before, During and After Recorded: Sep 23 2021 19 mins
    Etienne Lopez, Debra Price (Radware)
    IT’S INEVITABLE! Somewhere, at some point, you will be the target of a DDoS attack. At just the beginning of this year we saw approximately 2.9M DDoS attacks, an increase of 31% since 2020. DDoS attacks are a nightmare for healthcare organizations as they flood the network with malicious traffic which can bring critical applications down, prevent patients from accessing services, or even expose private patient information. The good news, however, is that there is plenty to be done about it. While you can’t predict when an attack will happen, we will help by providing some security best practices you can implement to allow you to minimize the impact of the attack, recovery quickly, and ensure it doesn’t happen again.

    Join us in this discussion to learn how you can protect your healthcare organization against DDoS attacks.
  • Comment sécuriser vos applications modernes avec CloudGuard Workload ? Recorded: Sep 22 2021 61 mins
    Frederic Hérault, Security Engineer
    Participez au webinar " Comment sécuriser vos applications modernes avec CloudGuard Workload" le Mercredi 22 Septembre 2021 à 11h00.

    Avec le cloud, de nouveaux challenges émergent : notre façon de penser l'applicatif se modernise, et l'automatisation devient un indispensable pour maintenir les architectures.

    C'est dans ce cadre que Check Point présente une solution permettant de sécuriser ces architecture Serverless, sur base de containers ou comment s’intégrer dans le pipeline CI/CD en analysant les images utilisées et le code applicatif.

    Inscrivez-vous dès aujourd'hui pour en savoir plus sur les principaux challenges de sécurité auxquelles elle répond :

    - Protection des containers
    - Protection des fonctions Serverless
    - Scan des images des containers
    - Scan des Templates IAC (Infrastructure As Code – Ansible ou Terraform)
    - Scan du code source

    Ne manquez pas l'occasion de redéfinir votre vision de la sécurité des applications modernes.

    A bientôt,

    Check Point Software France
  • It's Zero Trust Time - Simplify and secure application remote access! Recorded: Sep 21 2021 29 mins
    Ady Ringrose | Humza Ismaiel
    Join the webinar to learn how to:

    • Implement zero trust security principles for third party remote access
    • Leverage a transparent software-defined perimeter to increase security
    • Lower setup and maintenance overheads using a clientless, cloud-based service
    • Maintain compliance by removing the need to install VPN clients
  • How to Prepare for Ransomware Attacks Recorded: Sep 14 2021 62 mins
    Jeff Schwartz, VP of Security Engineering; Rich Comber, Head of Threat Prevention Engineering; Aaron Rose, Security Architect
    In the last 12 months, ransomware attacks surged by 93% with a devastating impact on businesses and industries worldwide.

    In today’s hybrid IT environment, preventing ransomware attacks seems like an impossible feat. But is it?

    Join us, on September 14th for a live session, where we’ll cover the latest ransomware trends and how Check Point can help you protect your organization from falling victim to sophisticated ransomware attacks.

    Key Highlights:
    - Insights into the recent evolution of ransomware with tactics like “Triple Extortion”
    - How to protect your organization from ransomware attacks with Check Point Harmony Endpoint
    - In-action demo of our latest anti-ransomware capabilities
  • Case study -- How Check Point secures internet access for its remote employees Recorded: Sep 8 2021 35 mins
    Manish Upadhaya - SASE Lead for APAC, Humza Ismaiel - SASE Security Architect, EMEA
    Learn how Check Point secures its own employees as they work remotely with Harmony Connect Internet Access.

    • 100% SaaS delivered – 15 mins setup
    • Secure Web Gateway (SWG) and FWaaS
    • URL Filtering and Granular Application Control
    • Data loss prevention
    • Advanced threat prevention and sandboxing

    Get your questions answered in this live demo and Q&A.

    Can't make this time? For APAC sessions, go here: https://www.brighttalk.com/webcast/16731/502283

    Explore other 30-minute Expert Sessions below:

    How to get started with Zero Trust Network Access – Top Three Use Cases
    Weds. 29th Sept, 4pm London | 8am Pacific | 11am Eastern
    https://www.brighttalk.com/webcast/16731/502226

    ZTNA in 15 Minutes for Employees & Contractors
    Watch replay of Weds. 18th August session
    https://www.brighttalk.com/webcast/16731/501736
  • Case study -- How Check Point secures internet access for its remote employees Recorded: Sep 8 2021 35 mins
    Manish Upadhaya, Humza Ismaiel
    Learn how Check Point secures its own employees as they work remotely with Harmony Connect Internet Access.

    • 100% SaaS delivered – 15 mins setup
    • Secure Web Gateway (SWG) and FWaaS
    • URL Filtering and Granular Application Control
    • Data loss prevention
    • Advanced threat prevention and sandboxing

    Get your questions answered in this live demo and Q&A.

    Can't make this time?
    For AMER/EMEA sessions, go here: https://www.brighttalk.com/webcast/16731/502225

    Explore other 30-minute Zero Trust Expert Sessions below:

    How to get started with Zero Trust Network Access – Top Three Use Cases
    Weds. 29th Sept, 10am Singapore | 11am Tokyo | 12pm Sydney
    https://www.brighttalk.com/webcast/16731/502287

    ZTNA in 15 Minutes for Employees & Contractors
    Watch replay of Weds. 18th August session:
    https://www.brighttalk.com/webcast/16731/502279
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The History, Evolution and Future of Social Engineering
  • Live at: Aug 3 2021 3:00 pm
  • Presented by: Maya Horowitz
  • From:
Your email has been sent.
or close