Hi [[ session.user.profile.firstName ]]

*Thai* Securing your Cloud with Confidence

Introduction to Cloud Security Blueprint we will share the basic concepts (Shared Responsibility model, Zero Trust) as well as the advanced challenges that must be addressed by a modern cloud security architecture.

Those challenges include increased attack surfaces, diminished visibility, dynamic and ephemeral workloads, automated DevOps processes, excessive privileges, and multiple cloud environments.

Webinar will be presented in Thai
Recorded Apr 23 2020 78 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Supoj Aram-ekkalarb & Prachachart Stapornnanon
Presentation preview: *Thai* Securing your Cloud with Confidence

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Hybrid Cloud Blueprint Nov 4 2020 3:30 am UTC 45 mins
    Richard Cove, Cloud Security Architect
    Cloud security architecture should, wherever possible, leverage cloud infrastructure design characteristics in order to achieve immutable security. Implementing the Cloud blueprint 2.0 gives you the following benefits:
    •Advanced security for networks as well as data, compute, messaging, and identity attack vectors.
    •Systematic separation of all traffic flows (to, from, and within cloud environments).
    •Segmentation by application or service and micro-segmentation of hosts running within the same segment or remotely.
    •Cultivating agility for DevOps and lines of business without compromising the corporate security posture.
    •Automation, efficiency, and elasticity in order to keep up with the velocity of business, while reducing risky human errors and misconfigurations by embedding security into code.
    •A platform-agnostic, borderless architecture in which security policies can be enforced consistently across all environments.
  • Securing your Most Critical Assets in 2020 and Beyond Oct 28 2020 2:30 am UTC 45 mins
    Tony Jarvis, Threat Prevention Architect, APAC
    We’ve witnessed changes in where and how employees go about their work due to the ongoing COVID-19 pandemic. Organisations are realising that this situation is not temporary and they don’t expect their entire workforce to return to the office any time soon. This means those on-premises corporate controls aren’t keeping their workforce protected when they’re working remotely.

    Learn how enterprises can secure their most critical assets wherever they may be and be fully protected for tomorrow. We will share three real world case studies on how these organisations solve the endpoint security issues facing them.
  • Over 400 Vulnerabilities in Qualcomm's chip - Are you at Risk? Recorded: Sep 15 2020 36 mins
    Isaac Dvir, Director, Mobile Security & Prakash Bhaskaradass, Director, Threat Prevention (APAC)
    A new Check Point Research reveals more than 400 vulnerable pieces of code in one of Qualcomm Technologies DSP chips, which are embedded into over 40% of the mobile phone market.

    Is your mobile workforce protected? Is your corporate data secure? What is a DSP and how did we reveal these vulnerabilities?

    Get the full story on our live webinar.
  • Optimizing SD-WAN Security for Cloud-first enterprises Recorded: Sep 8 2020 60 mins
    Gary Gardiner, Head of Security Engineering (APJ) & Dean Vaughan, Vice President (APJ), Silver Peak
    The rapid adoption of SaaS applications is prompting network administrators to re-evaluate their enterprise WAN infrastructure and services. As enterprises increasingly adopt a cloud-first architecture and directly connect branch office workers to SaaS services, new security risks and cyber threats are becoming a concern.

    Enterprises now need a solution that can intelligently and securely optimize branch office SD-WAN internet connections to the cloud, addressing these new network security challenges.

    We have invited our technology partner, Silver Peak, to join us in this webinar to share how their Unity EdgeConnect SD-WAN edge platform complements our cloud-hosted security service to deliver a secure SD-WAN experience.
  • Cybersecurity in the Age of IoT Recorded: Aug 20 2020 54 mins
    Ashwin Ram, Cyber Security Evangelist
    A recent industry study reveals: 67% of enterprises have experienced an IoT security incident. From smart TV’s, IP cameras, and smart elevators, to hospital infusion pumps and industrial PLC controllers, IoT and OT (Operational Technology) devices are inherently vulnerable and easy to hack.

    In this webinar, we will show you how to minimize your exposure to the IoT cyber-risk and prevent the next cyberattack.
  • Coronavirus: The Day After Preparing For The Next Global Crisis Recorded: Aug 18 2020 52 mins
    Ashwin Ram, Cyber Security Evangelist, Office of the CTO, Check Point
    Some called the COVID-19 pandemic the "global crisis of the century", leaving enterprises scrambling to ready their infrastructure for remote work in a short time. Cyber criminals have likewise calibrated their attack approaches to adapt to the new IT landscape.

    Join EliteCISOs and Check Point at this EliteKnowledge session to learn how the Coronavirus pandemic have changed the cyber security landscape and learn how cyber criminals are changing the way they work.

    You will get to hear from Ashwin Ram, Check Point's Cyber Security Evangelist, who will also share with you the best practices to secure your everything in this "new normal".
  • Mitigating Cyber Threats in the "New Normal" Recorded: Aug 12 2020 63 mins
    Ashwin Ram, Check Point | Sharon Shitrit and Yaron Azerual, Radware
    Now that we are moving towards a ‘new normal’ of lock-downs lifting in parts of the world, organizations need to close off security gaps and secure networks with a holistic, end-to-end security architecture.

    Join our Cyber Security Evangelist, Ashwin Ram, in this webinar to hear about the latest cyber threats that Check Point Research have uncovered in the recent days and the technologies that will help you mitigate threats on your network and endpoints.

    You will also hear from our Technology Partner, Radware, on how Check Point and Radware are working together to help you mitigate DDOS attacks and combat threats using SSL inspection. You will be hearing from Sharon Shitrit, Director of Product Management and Yaron Azerual, Product Manager from Radware
  • Increasing efficiency & compliance with security policy automation Recorded: Aug 7 2020 52 mins
    Henry Pea, Director, Security Engineering (APAC) and Gary Gardiner, Head of Security Engineering (APJ)
    Consolidating all aspects of your security environment to enable seamless security management is never easy task. Tufin compliments Check Point’s vision through comprehensive visibility and automation as the key drivers to enforcing a unified security policy across the organization and enabling agile delivery of innovations, allowing customers all over the world to remove impediments for digital innovation via consolidation.

    Join us in this webinar to review common use cases of enhanced security and compliance, and learn how you can:
    • Reduce attack surface for malicious attack through comprehensive visibility and reduction of misconfigurations on your network devices
    • Expedite and expand your Check Point deployments by reducing misconfiguration errors as well as efficient change management
    • Deliver continuous and pro-active compliance through interactive unified security policy matrix and effective ‘what-if’ analysis
    • Ace your audits through detail records of business reasoning as well as identification of authorized and unauthorized changes

    If you're unable to attend this live webinar, you may still register to receive a link after the webinar to watch the session on-demand any time.
  • Coronavirus: The Day After Preparing For The Next Global Crisis Recorded: Aug 6 2020 53 mins
    Ashwin Ram, Cyber Security Evangelist, Office of the CTO, Check Point
    Some called the COVID-19 pandemic the "global crisis of the century", leaving enterprises scrambling to ready their infrastructure for remote work in a short time. Cyber criminals have likewise calibrated their attack approaches to adapt to the new IT landscape.

    Join EliteCISOs and Check Point at this EliteKnowledge session to learn how the Coronavirus pandemic have changed the cyber security landscape and learn how cyber criminals are changing the way they work.

    You will get to hear from Ashwin Ram, Check Point's Cyber Security Evangelist, who will also share with you the best practices to secure your everything in this "new normal".
  • Secure your Cloud : Trends and Strategies Recorded: Aug 6 2020 59 mins
    Ashwin Ram, Cyber Security Evangelist
    Today more than 90% of enterprises use some type of cloud service, with some enterprises using three to four cloud providers, on average. And although embracing digital transformation opens new business opportunities, the growing migration to public cloud environments has led to an increase in cyber-attacks.

    In 2019 cloud-related attacks and breaches made even more headlines and it is expected this trend will continue to grow in 2020.

    In this webinar, Ashwin Ram, Cyber Security Evangelist, will cover recent trends and highlight some of the advancements made in fending off threats and turning security into an enabler force in enterprise digital transformation.
  • Sự đột phá về Giải Pháp An Ninh Thông Tin Recorded: Jul 23 2020 39 mins
    Khiem Bui - Security Engineer, Vietnam
    Nhiều cuộc tấn công mạng đã gia tăng trong sự bùng phát dịch coronavirus hiện nay. Những nhân viên làm việc từ xa đã trở thành những mục tiêu dễ dàng của những tin tặc và các doanh nghiệp đã chú trọng hơn những vấn đề an ninh mạng trong những thời khắc khó khăn này.
    • Giải pháp an ninh giúp ngăn chặn và bảo vệ các cuộc tấn công mạng khi chúng xảy ra
    • Khả năng mở rộng giải pháp an ninh theo nhu cầu của doanh nghiệp để đáp ứng sự phát triển nhanh chóng của mạng lưới Công nghệ Thông tin
    • Hợp nhất giải pháp an ninh để đẩy mạnh các hoạt động và giảm chi phí
    Hãy tham gia hội thảo trực tuyến này để tìm hiểu Check Point có thể giúp bạn như thế nào để Đạt được Sự đột phá về an ninh mạng trước những vấn đề này.
  • Improving Mobile Security: what companies need to know Recorded: Jul 23 2020 40 mins
    Ishan Sharma, Regional Threat Prevention Security Expert
    The growing need for data mobility and corporate devices makes it vital for companies to implement cybersecurity strategies that are adapted to new scenarios and challenges. According to a recent Check Point report, almost 30% businesses suffer from cyber attacks caused by the security compromise of a mobile device. Organizations can no longer ignore the risk posed by mobile devices.

    In this webinar, we will talk about latest attack vectors used by cyber criminals to breach enterprise mobile devices and how organizations can avoid potential security breaches.
  • Cyber Security in the New Normal: Arming Organizations for Battle Recorded: Jul 21 2020 28 mins
    Dan Wiley, Head of Incident Response, Check Point
    During the first six months of 2020, Check Point’s Incident Response Team has seen a two-fold increase in attacks on organizations over 2019. There were several common themes: attacks that attempted to extort monies from individuals receiving government aid; political groups on both the right and left targeted specific businesses and individuals whose policies they disagreed with; and the most prevalent kind of attacks were on the remote access systems of Check Point customers.

    In this session, we’ll examine these trends and how organizations are arming themselves during for battle during the New Normal.
  • Defending Financial Institutions Against Nation State Attacks Recorded: Jul 21 2020 29 mins
    Isaac Dvir, Research & Development Director, Check Point
    With 90 percent of all cyber crimes beginning with some form of a phishing attack, it’s no surprise that mobile devices used by employees of financial services organizations and their customers have become easy targets. Infected mobile apps and zero-day malware steal sensitive data on employees’ devices and transmit it to command-and-control servers operated by nation states and other threat actors.

    In this session we’ll discuss how nation states conduct sophisticated mobile network attacks on financial services organizations and the kind of mobile security solution that’s needed to defend against them.
  • Securing Office 365 and Transforming Government Agencies Into No Phishing Zones Recorded: Jul 21 2020 31 mins
    Ran Schwartz, Product Manager, Check Point
    Government agencies hold treasure troves of especially attractive state and personal information for threat actors. The ubiquitous nature of email makes these systems vulnerable and a prime attack vector. The transition from on-premise Exchange servers to cloud email systems has further compounded the rate of attacks as hackers target workers’ email credentials and use them to design highly effective phishing campaigns. The Office 365 environments of government agencies are especially susceptible to these kinds of attacks.

    In this session we’ll show how sophisticated attacks on Office 365 can be blocked using state-of-the-art threat prevention solutions that help put an end to phishing attacks.
  • Protecting ICS and Critical Infrastructure in Manufacturing Recorded: Jul 21 2020 31 mins
    Aviv Abramovich, Head of Security Services, Check Point
    Targeted attacks against industrial control systems (ICS) and manufacturing systems increased by 2,000% in 2019, often involving nation states using ransomware to damage critical systems. Here’s the reason why: Protecting ICS and manufacturing systems against cyber attacks is more challenging than ever as organizations embrace Industry 4.0, a model that embraces a combination of traditional manufacturing and industrial IT practices with the latest smart technologies. The increasing connectivity of industrial control systems and the convergence of OT and IT networks expands the attack surface of industrial manufacturing.

    In this session we’ll look at several kinds of attacks, and how Check Point’s ICS security solution minimizes risk exposure across IT and OT environments, block attacks before they reach critical assets.
  • Do You Trust Your Medical Devices? Recorded: Jul 21 2020 30 mins
    Itzik Feiglevitch, IoT Senior Product Manager, Check Point
    Internet-connected medical devices have revolutionized the way hospitals operate and deliver significant value. But connected medical devices also pose tremendous cyber security risks. These widely deployed devices are highly vulnerable, frequently left unpatched, and easily hacked. Since traditional IT security solutions were not designed to secure medical devices, it's time for a new approach.

    In this session we’ll show several kinds of attacks and how vulnerable hospital devices and the networks on which they reside can be protected.
  • Phone, Wallet, Keys - overview of mobile threats in the financial industry Recorded: Jul 21 2020 28 mins
    Aviran Hazum, Analysis and Response Team Leader, Check Point
    Adam Sandler rapped about the needs of a modern man. "Phone, Wallet, Keys" - that's everything a man needs.

    Even if during the song this statement was debunked by Adam Sandler himself, it's indisputably true for malicious actors on the mobile front.

    YOUR phone, YOUR wallet, YOUR keys - that's all that matters to them, and they are going to stop at nothing until they get their hands on as many of those as possible.
    In this talk, I will provide an overview of the latest and leading financial threats of the mobile front, describe their methods of distribution, their functionality, and most importantly, their impact on their victims.
  • ViciousPanda and APT’s: How to leverage a Pandemic Recorded: Jul 21 2020 25 mins
    Michael Abramzon, Threat Intelligence Analysis Team Leader, Check Point
    This session will cover recent cyber-attacks by APT groups, exploiting public interest and fear of the COVID-19 virus, in order to deliver backdoors to target organizations.

    The review will be followed by a deep dive into the ViciousPanda campaign against the Mongolian public sector, uncovered by Check Point Research.
  • Tales From The Crypt - Stories from Check Point Incident Response Team Recorded: Jul 21 2020 25 mins
    Ray Schippers, Incident Response Team Manager (APAC), Check Point
    The Check Point Incident Response has been working with manufacturing customers around the world to prepare for and respond to cyber attacks. The recent wave of ransomware attacks that cripple production systems and the state sponsored cyber attacks are impacting manufacturing organisations around the world, including many in the Asia Pacific region.

    Raymond Schippers, APAC operations manager for the Incident Response Team, will discuss how organisations can prevent these kinds of incidents from happening to them and critical lessons learnt from responding to hundreds of incidents this year alone.
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: *Thai* Securing your Cloud with Confidence
  • Live at: Apr 23 2020 3:00 am
  • Presented by: Supoj Aram-ekkalarb & Prachachart Stapornnanon
  • From:
Your email has been sent.
or close