Hi [[ session.user.profile.firstName ]]

Zeroing-in to Zero Trust security

Zero Trust is no longer just a concept. Over 52% of organizations have already started redesigning their security infrastructures based on the Zero Trust Security model, with 18% planning to start in the coming year. However, keeping your business data protected in a “perimeter everywhere” environment requires more than just a “patchwork” security architecture. Join this session to learn about Check Point’s practical, holistic approach to Zero Trust implementation, based on single consolidated security architecture, Check Point Infinity.
Recorded Apr 6 2020 31 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Gary Gardiner
Presentation preview: Zeroing-in to Zero Trust security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Embracing security in a post-COVID world Jun 23 2020 6:00 am UTC 60 mins
    Tony Jarvis, CTO (APAC), Check Point Software Technologies
    Companies such as Twitter and Shopify have announced plans to allow their employees to work from home permanently, while many organisations around the world are toying with the idea as well.

    Whether your office is planning to reopen in the near future or allowing your employees to work from home in the longer term, you'll need to ensure you have an adequate cyber security architecture to cater to the post-COVID world.

    Join Tony Jarvis, our Chief Technology Officer (APAC), in this webinar as he talks about his predictions on post-COVID attack trends, how devices such as laptops and mobile devices returning to the workplace can pose a security threat, as well as the longer term security recommendations for companies intending to allow remote work for an extended time.

    If you have any questions on supporting remote work or preparing your security setup for the return of the workforce to the office, feel free bring them along for Tony to answer them during the Q&A session at the end of the webinar.
  • A full body check-up for your IT Infrastructure - where do you start? Jun 16 2020 6:00 am UTC 60 mins
    Clement Lee, Security Architect, Check Point Software Technologies
    Cyber security problems seldom jump out at you the way normal IT issues do. How would you know if your security set up is keeping up with times?

    Join this webinar to find out the 5 most common security pitfalls in enterprise IT and how the recommended approach when analysing your IT infrastructure for security gaps. Our Security Architect, Clement Lee, will also be sharing with you some stories (may not be for the faint hearted!) from his experiences conducting security check-ups for enterprises.

    At the end of the webinar, you will walk away with a security check-up check list to help you making sure you've covered everything in your check-up.
  • Best Practices for Integrating Security and DevOps Jun 11 2020 6:00 am UTC 63 mins
    Dean Houari , APAC Head of Sec Ops and Ashwin Ram, Cyber Security Evangelist
    Security is no longer an add-on in the new DevSecOps world. Rather, it must be implemented and tested early on. According to Ponemon’s Costs and Consequences of Gaps in Vulnerability Response study, the average annual organization spending on vulnerability management reached $1.4 million in 2019. To implement security from the earliest stages of the development cycle, it can minimize the likelihood for vulnerability remediation in the production stage.

    In this session, Dean Houari , APAC Head of Sec Ops and Ashwin Ram, Cyber Security Evangelist will share the challenges in applying security into DevOps environments and how Check Point 's unique automated full lifecycle security platform can secure your modern day applications.

    Topics Covered:
    • How Developers work and their challenges?
    • How to build security in from the start ?
    • Live Q&A
  • Cybersecurity in the Age of IoT Jun 9 2020 6:00 am UTC 54 mins
    Ashwin Ram, Cyber Security Evangelist
    A recent industry study reveals: 67% of enterprises have experienced an IoT security incident. From smart TV’s, IP cameras, and smart elevators, to hospital infusion pumps and industrial PLC controllers, IoT and OT (Operational Technology) devices are inherently vulnerable and easy to hack.

    In this live webinar, we will show you how to minimize your exposure to the IoT cyber-risk and prevent the next cyberattack.
  • SD-WAN Security: Best-of-Breed or Unified Approach? (APAC PM) Jun 2 2020 10:00 am UTC 30 mins
    Nils Ujma, Solution Architect
    As enterprises move their branch applications to the cloud, they are adopting Software Defined Wide Area Networking (SD-WAN) for better application performance by intelligently and efficiently routing traffic directly to the internet without passing it through the data center.

    But this needs to happen without compromising security. This talk will address how using both application performance and security can be assured without one compromising the other.
  • It ain't done till it's automated. Security at the speed of DevOps (APAC PM) Jun 2 2020 9:15 am UTC 30 mins
    Dean Houari, Head of DevSecOps (APAC)
    Amidst the growing buzz for shift-left developer centric security methods, this session will highlight the need for a common ground between security and DevOps and offer guidance on how to build in security without impeding agility.
  • Hybrid Cloud Blueprint: Best Practice for Designing Secure Cloud (APAC PM) Live 30 mins
    Richard Cove, Cloud Security Architect
    Protecting you from you is the #1 challenge in the age of SDE - Software Defined Everything. Using public clouds for enterprise data centers is now mainstream; the advantages are significant and the gained agility indisputable.

    However, the number of services and options being offered is daunting. And with these choices come consequences; one misconfiguration can put your entire organization at risk…or worse.

    Join this session to learn the best practices to providing advanced threat prevention security for applications and data in private, public, and hybrid clouds.
  • Your Journey to the Cloud – The Secure Way (APAC PM) Recorded: Jun 2 2020 29 mins
    Gary Gardiner, Head of Security Engineering (APJ)
    In 2020 cloud-related attacks and breaches made even more headlines and companies realized they needed to get their act together.

    So they started to abandon homegrown open-source security tools and focused on consolidated cloud-based threat prevention frameworks offering complete coverage to cloud-related attacks. Going into 2020 & 2021, we're seeing this trend grow as more cloud-related technologies are gaining great security from the industry with specific answers to security challenges of containers, Kubernetes environments, and serverless workloads. In this session, we will cover recent trends and highlight some of the advancements made in fending off threats and turning security into an enabler force in enterprise digital transformation.
  • Cloud Threat Landscape: Recent findings from Check Point Research (APAC PM) Recorded: Jun 2 2020 27 mins
    Smit Kotadiya, Security Evangelist
    In the digital transformation era, cloud computing plays an integral role. Scalability, flexibility, agility and automation sound like magical words that make us more productive and innovative once we embrace cloud platforms and utilize cloud applications.

    But, how secure are these platforms and apps?

    This session reveals Check Point Research (CPR) latest cloud related findings. From a fraudulent wire transfer initiated through an email compromised on a cloud app to a vulnerability within a public cloud infrastructure, CPR analysis the latest risks and threat landscape of public cloud. The session will also include global threat intelligence stats related to COVID-19 and public cloud.
  • Meet the Experts – Ask Us Anything! Recorded: Jun 2 2020 45 mins
    Gary Gardiner, Head of SE (APJ) & Doug Farndale, MD (Growth Technologies)
    Meet our cloud security experts and evangelists, share your top cloud security challenges and hear their responses.
  • SD-WAN Security: Best-of-Breed or Unified Approach? (APAC AM) Recorded: Jun 2 2020 26 mins
    Nils Ujma, Solution Architect
    As enterprises move their branch applications to the cloud, they are adopting Software Defined Wide Area Networking (SD-WAN) for better application performance by intelligently and efficiently routing traffic directly to the internet without passing it through the data center.

    But this needs to happen without compromising security. This talk will address how using both application performance and security can be assured without one compromising the other.
  • It ain't done till it's automated. Security at the speed of DevOps (APAC AM) Recorded: Jun 2 2020 33 mins
    Dean Houari, Head of DevSecOps (APAC)
    Amidst the growing buzz for shift-left developer centric security methods, this session will highlight the need for a common ground between security and DevOps and offer guidance on how to build in security without impeding agility.
  • Hybrid Cloud Blueprint: Best Practices for Designing Secure Cloud Deployments AM Recorded: Jun 2 2020 30 mins
    Richard Cove, Cloud Security Architect
    Protecting you from you is the #1 challenge in the age of SDE - Software Defined Everything. Using public clouds for enterprise data centers is now mainstream; the advantages are significant and the gained agility indisputable.

    However, the number of services and options being offered is daunting. And with these choices come consequences; one misconfiguration can put your entire organization at risk…or worse.

    Join this session to learn the best practices to providing advanced threat prevention security for applications and data in private, public, and hybrid clouds.

    APAC Edition
  • Your Journey to the Cloud – The Secure Way (APAC AM) Recorded: Jun 2 2020 24 mins
    Gary Gardiner, Head of Security Engineering (APJ)
    "In 2020 cloud-related attacks and breaches made even more headlines and companies realized they needed to get their act together.

    So they started to abandon homegrown open-source security tools and focused on consolidated cloud-based threat prevention frameworks offering complete coverage to cloud-related attacks. Going into 2020 & 2021, we're seeing this trend grow as more cloud-related technologies are gaining great security from the industry with specific answers to security challenges of containers, Kubernetes environments, and serverless workloads. In this session, we will cover recent trends and highlight some of the advancements made in fending off threats and turning security into an enabler force in enterprise digital transformation."
  • Cloud Threat Landscape: Recent findings from Check Point Research (APAC AM) Recorded: Jun 2 2020 27 mins
    Ashwin Ram, Cyber Security Evangelist
    "In the digital transformation era, cloud computing plays an integral role. Scalability, flexibility, agility and automation sound like magical words that make us more productive and innovative once we embrace cloud platforms and utilize cloud applications.

    But, how secure are these platforms and apps?

    This session reveals Check Point Research (CPR) latest cloud related findings. From a fraudulent wire transfer initiated through an email compromised on a cloud app to a vulnerability within a public cloud infrastructure, CPR analysis the latest risks and threat landscape of public cloud. The session will also include global threat intelligence stats related to COVID-19 and public cloud."
  • Devops Security in Action: Container and Kubernetes Recorded: May 28 2020 88 mins
    Dean Houari , APAC Head of Sec Ops & Ashwin Ram, Cyber Security Evangelist
    Understanding the architecture of containers and Kubernetes and how to secure your containers and Kubernetes Clusters with Check Point CloudGuard.

    In this live session, Dean Houari , APAC Head of Sec Ops and Ashwin Ram, Cyber Security Evangelist will show how to secure containers and Kubernetes from Build to Runtime at CICD speed

    Area Covered:
    • Checkout Code
    • Run Unit Tests
    • Dockerize App
    • Push dockerized app to Docker Registry
    • Deply the dockerized app on K8s
    • Workload security and more
  • Supercharge Your Security Operations Recorded: May 26 2020 67 mins
    Oren Koren, Technical Product Manager & Ran Ish Shalom, Product Manager
    Check Point’s Infinity SOC is designed to address the key challenges faced by SOC teams. Check Point Infinity SOC provides advanced innovative tools that enable security teams to effectively and efficiently prevent, detect and respond to threats by addressing 3 key areas:
    • Automatic detection and response
    • Powerful and actionable threat intelligence
    • Innovative threat hunting

    Key speakers: Oren Koren and Ran Ish Shalom
  • Work From Home - What do you need to know? Recorded: May 20 2020 58 mins
    Tony Jarvis, CTO (APAC), Check Point Software Technologies
    Countries around the world are stepping up on social distancing measures. Companies are forced to implement remote working practices in a very short time and cyber criminals are waiting to cash-in on this sudden increase of workers working outside the office network perimeter.

    Are your existing work-from-home setup safe and what are the cyber threats you need to be on the lookout for?

    Join Tony Jarvis in this webinar to learn how organisations can adapt to remote working, the longer term trends and the tools we need to be productive (and safe).

    ---------------------------------------------------

    Our Speaker

    Tony Jarvis | Chief Technology Officer, APAC | Check Point

    With over a decade’s experience in the IT industry, Tony has held senior roles as both a network and cyber security professional. Originally from Australia, he has been based in Singapore since 2008. Over the course of his career, he has advised clients within the telecommunications, ICT consulting, financial services and IT industries. This experience allows him to apply a broad perspective to today’s security challenges. As Chief Strategist at Check Point, Tony provides thought leadership regarding the current threat landscape and the challenges this poses for businesses. He is a strong advocate of preventative controls as part of a multi-layered security strategy, focusing on APTs, zero days, and advanced malware.
  • IaC for your Check Point IaaS Recorded: May 20 2020 47 mins
    Richard Cove, Cloud Security Architect, Check Point Software Technologies
    Join our Cloud Security Architect, Richard Cove, as he demonstrate the use of the Check Point Blueprint to have a complete working transit gateway environment in AWS set-up in about 30 minutes from scratch.

    You will also learn how the Check Point Security gateways get deployed and scaled on demand as the load grows. Github repositories will be supplied so you can try this yourself at home.

    Richard will conduct a live demo of how to setup a complete secured hub and spoke environment in AWS in 30 minutes using Terraform and setting up a complete environment in AWS with CloudGuard IaaS.
  • Raising your security level with security compliance (Session 2) Recorded: May 15 2020 43 mins
    Alex Chong, Head of GRC (APAC), Check Point Software Technologies
    Raise your security level across your entire Check Point environment with a dynamic solution that monitors your security infrastructure, gateways, blades, policies, and configuration settings in real time.

    During this webinar, Alex Chong, Head of GRC (APAC), will show you how you can use Security Compliance - which applies 300+ best practices - to identify incorrect configurations of your settings.

    Compliance Blade is used, among other tools, to monitor policies in real time and sends you instant notifications and guidance for remediation.

    As such, Compliance Blade also translates thousands of regulatory requirements into best practices for actionable security.

    Agenda:
    • Short introduction of Gen V
    • Insight into SmartEvent
    • Compliance Blade
    o Detection of incorrect configurations
    o Monitoring policy changes
    o Translation of complex regulatory requirements into best practices

    Don't miss out on this opportunity and register today for our webinar
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Zeroing-in to Zero Trust security
  • Live at: Apr 6 2020 3:00 am
  • Presented by: Gary Gardiner
  • From:
Your email has been sent.
or close