Hi [[ session.user.profile.firstName ]]

Contact tracing apps - do the benefits outweigh the risks?

Countries such as Singapore and Australia are in the progress of rolling out contact tracing apps in light of the COVID-19 pandemic. Google and Apple have also recently announced a partnership to develop contact tracing technology.

How do contact tracing apps/technology work and how is the approach different between apps/technologies?

Join Tony Jarvis in this webinar to understand the risks involved and what you should look out for when you download these apps. Tony will also be sharing tips on how you can retain your privacy when using these apps.
Recorded May 12 2020 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tony Jarvis, CTO (APAC), Check Point Software Technologies
Presentation preview: Contact tracing apps - do the benefits outweigh the risks?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • What’s lurking in your cloud environment? May 18 2021 4:00 am UTC 45 mins
    Sammo Li | Regional Cloud Security Architect, Greater China
    With the shift to the cloud, businesses are also shifting their responsibility; relying on traditional SIEM solutions and analytics tools to understand their cloud activities. But analyzing cloud big data is not an easy task, and existing solutions provide only limited visibility with no context to shed light on malicious cloud activity.

    In this webinar, Check Point Regional Cloud Security Architect, Sammo Li, will share the latest Cloud Intelligence and threat hunting techniques to stop advanced attacks by using CloudGuard.
  • Securing Mailboxes and Productivity Apps with Harmony Email & Office Recorded: May 5 2021 36 mins
    Bruce Chai | Head of Threat Prevention (SEAK)
    The final part of the Harmony series. Email is the most fundamental tool for business collaboration these days, and as such it is also one of the most exploited attack vectors. With huge surges in phishing and ransomware attacks, it is essential that no malicious email reaches your employees. Find out how Harmony Email & Office can help you ensure your users remain productive while securing their email and productivity apps environment from all imminent threats.
  • Defending against the Dangerous Wave of Mobile Threats Recorded: Apr 23 2021 37 mins
    Satyakam Jyotiprakash | Head of Sales for Harmony Business, India/SAARC
    These days, your employees are increasingly accessing sensitive corporate assets from their smartphones, so business data is constantly exposed to potential data breaches.
    IDC predicts that by 2024 mobile workers will account for nearly 60% of the total U.S. workforce.

    At the same time, the attacks are on the rise. 46% of organizations had at least one employee download a malicious mobile application, which threatens their networks and data in 2020.
    Mobile Threat Defense (MTD) solutions must now play a critical role in addressing those challenges.

    Join our live webinar on 23 April to learn how Harmony Mobile, the industry-leading MTD solution, delivers complete mobile security that is friendly to both security admins and employees.

    Session highlights:
    • Top mobile threats to the enterprise in 2020 discovered by Check Point Research
    • Key considerations for choosing the right MTD solution
    • Harmony Mobile in action-live demo covering multiple use cases and new features
  • The Cloud Compliance: Simplest way to fulfil your compliance needs Recorded: Apr 14 2021 24 mins
    Sherman Chow | Cloud Security Regional Sales Director, Greater China
    Securing your data with security compliance

    Over 90 % of data in the world today was created in the last 2 years, and any information stored digitally needs to be protected.

    Nowadays, more and more organizations have moved their data to the cloud environment, and at the same time, they have to meet different industry compliance standards and requirements.

    Lack of visibility, the dynamic nature of the cloud and lack of certainty regarding the location of the payload, all make compliance a challenging task.

    Come and join our webinar to understand how Check Point CloudGuard CSPM solution helps you provide real-time scores of the compliance level, re-conform the compliance with auto-remediation features, and to fulfil the compliance requirement in the simplest way.
  • The Revolution in Web Security: Keep Remote Workers Safe and Productive Recorded: Apr 7 2021 47 mins
    Kendal Cole | Threat Prevention Business Manager, Australia and New Zealand
    Threat actors have stepped-up their activity to prey on remote workers, who may not be as careful of what they click while they browse the internet from their homes. In the second quarter of 2020 alone there was a 3,900% increase in phishing attacks.

    Join Check Point Threat Prevention Business Manager, Kendal Cole, to learn how the web security landscape has evolved and how remote workers can securely browse the internet and remain productive. You’ll learn:

    • The three major threats impacting internet browsing
    • The limitations of traditional web security solutions
    • How Harmony Browse provides secure, fast and private web browsing
  • Modern Endpoint Protection - Best Practices to Secure Endpoints in 2021 Recorded: Mar 24 2021 61 mins
    Kendal Cole | Threat Prevention Business Manager, Australia and New Zealand
    The accelerated shift to work from home has turned endpoint devices into one of the organization's biggest vulnerabilities, making complete endpoint protection a necessity.
    In late 2020, nearly half of all ransomware incidents involved the threat of releasing data stolen from the target organization. On average, a new organization becomes a victim of ransomware every 10 seconds worldwide.

    Join our live webinar on March 24 to learn how Harmony Endpoint provides complete endpoint protection while keeping remote workers productive.
    During this live session we’ll cover:
    • Most notable cyber threats to the endpoint in 2020 identified by Check Point Research
    • Top principles of the modern endpoint protection
    • A demo of all the Harmony Endpoint capabilities around anti-ransomware, threat hunting, and EDR
  • 진화하는 APT 위협에 대한 차세대 ATP 대응 전략 Recorded: Mar 16 2021 52 mins
    구자만 | 상무,체크포인트코리아 & 한승수 | 이사, 체크포인트코리아
    최근 APT 공격 및 랜섬웨어 등 다양한 위협들은 샌드박스 우회 공격 등 진화에 진보를 거듭하면서 기업 및 기관들의 정보보호 대응 체계를 무력화시키고 있습니다. 이에 체크포인트 등 글로벌 보안 리더들은 Threat Intelligence, Threat Hunt, AI 등을 활용하여 APT 대응 기술을 발전 시키고 있으며, Global SOC를 활용한 실시간 대응 전략을 추구하고 있는 추세입니다.
    특히 APT 공격을 단일 샌드박스 솔루션만으로 대응하는 전략에서 벗어나, Network, EndPoint, Cloud 등 전방위적인 Collaborate Defense 전략으로 변화하고 있습니다.

    2021년 체크포인트에서는 AI, Real-time Prevention, 전방위 대응을 위한 차세대 ATP(Advanced Threat Prevention) 전략을 통하여 기업 및 기관의 정보보호 수준을 높일 수 있는 방안을 제시하고 있습니다.

    이 온 디맨드 웨비나에서 Check Point가 수상 경력에 빛나는 Quantum, Harmony 및 Cloud 솔루션을 어떻게 확장하여 환경을 보호하는지 확인할 수 있습니다.
  • Industry Insight: Cybersecurity in Healthcare Recorded: Mar 11 2021 64 mins
    Harwin Angeles | Regional Threat Prevention Security Expert, Singapore
    The Healthcare industry is no longer just focusing on providing quality patientcare today. With digital transformation in Healthcare accelerated by COVID-19, it is observed that the Healthcare industry is now more exposed to cyber attacks. The recently published Check Point Security Report 2021 reported a 45% increase in cyber attacks on Healthcare sector worldwide in the last quarter of 2020.

    In this session, we will look at the top attacks and challenges faced by Healthcare sector and what can be done to better secure themselves from these hackers.
  • Powered by Innovation: A Modern Approach to Application Security Recorded: Feb 25 2021 20 mins
    Yaffa Finkelstein | AppSec Product Marketing Manager, Global
    Modern cloud applications are agile and scale up and evolve extremely fast. They demand a modern approach to security which must be consolidated within a unified platform in order for security organizations to regain control over their environment. In this session, we will look at some use cases for web application and API protection and see practical examples of the use of CloudGuard’s automated application security powered by AI.
  • 귀사의 클라우드 환경과 기업 네트워크 보안을 지키는지 알아보세요 Recorded: Feb 18 2021 36 mins
    한승수 | 체크포인트 코리아
    체크포인트 분석팀에서 다년간 활용하여 관제를 제공하던 툴을 소개 드립니다. 체크포인트 Infinity SOC를 통해 네트워크, 클라우드, 엔드포인트, 모바일, IoT 등에 유입되는 이벤트의 상관관계 분석, 심각도 등 공격 별 대응 우선순위를 제공해 드립니다
  • 체크포인트 엔드포인트 솔루션 Recorded: Feb 18 2021 41 mins
    김광수 차장 | 체크포인트 코리아
    체크포인트 엔드포인트 솔루션을 통한 알려진공격, Zero-day 공격, 디스크 탈취, 컴플라이언스 위배등 통합 엔드포인트 위협대응 전략 소개 드립니다.
  • Cybersecurity In The New Normal: Good Enough Is No Longer Enough Recorded: Feb 9 2021 39 mins
    Govil Rajpal | Regional Threat Prevention Security Expert , India & Saarc
    To stay ahead of threats, organizations must be proactive and leave no part of their attack surface unprotected or unmonitored, or they risk becoming the next victim of sophisticated, targeted attacks.

    With a 50% increase in daily ransomware attacks across the globe, it’s a necessity to have complete endpoint protection against all imminent threats, including malicious files, phishing, data leakage and more.
  • DevSecOps on Cloud: Can You Have Both Security and Agility? Recorded: Jan 27 2021 35 mins
    Jayden Aung, Regional Cloud Security Architect (ASEAN)
    Organizations are moving away from monolithic application towards microservices architectures and many organizations find themselves migrating their workloads to serverless compute platforms. These platforms are 100% managed by cloud service providers, but are they truly 100% secure?

    In this webinar, Jayden Aung, Regional Cloud Security Architect (ASEAN), will discuss how we can effectively and continuously secure serverless applications in CICD pipelines and when they are at runtime, using shift-left mindset and zero trust security model. This is where we put “Sec” in DevOps.
  • 체크포인트 최신 SW(R81 & R80.40) 소개 Recorded: Jan 21 2021 44 mins
    한승수 | 체크포인트 코리아
    체크포인트의 최신 SW에 추가된 기능들의 리뷰를 통해 체크포인트 네트워크 보안 전략에 대한 이해를 제공합니다
  • Protecting the new Normal, security which follows you Recorded: Nov 25 2020 33 mins
    Bruce Chai, Head of Threat Prevention (SEA)
    90% of cyber attacks start with a phishing email, yet as more organisations move into cloud hosted email services such as Office 365 and G Suite, they continue to depend on the default security solution that came bundled with their subscription. This often leads to disastrous consequences.

    Join us to understand how CloudGuard SaaS can help secure not only your email but also the other services offered with your productivity suite of choice.
  • Outsourcing of Cloud Operations = Cloud Security Nirvana? Recorded: Nov 18 2020 37 mins
    Ashish Tandon, Cloud Security Sales Specialist
    As organizations embark on cloud transformation, outsourcing of cloud operations to managed service providers (MSPs) brings in several advantages of skills, scale and support. What role should organizations play in ensuring the security of their cloud environments, given they have most likely outsourced because of lack of in-house skills? What are the tools and resources available to organizations that can help them define the security standards for their cloud as well as mechanisms to enforce these standards?

    Join us to learn how a Cloud Security Posture Management solution like Check Point CloudGuard can help achieve this goal.
  • Prevention First - 2020 Endpoint Security Crisis Recorded: Nov 11 2020 32 mins
    Kendal Cole, Threat Prevention Sales Manager
    With the rapid adoption of work from home stemming from the global pandemic, endpoints must be equipped to fend for themselves, beyond the layers of security usually afforded within a protected network. News pages are filled with various security breaches, from account takeover via phishing, data compromise via malware, and company-wide outages caused by ransomware.

    Join us as we present SandBlast Agent - a comprehensive endpoint security management platform, designed with a “prevention first” approach which uniquely addresses the present endpoint security crisis.
  • Hybrid Cloud Blueprint Recorded: Nov 4 2020 27 mins
    Richard Cove, Cloud Security Architect
    Cloud security architecture should, wherever possible, leverage cloud infrastructure design characteristics in order to achieve immutable security. Implementing the Cloud blueprint 2.0 gives you the following benefits:
    •Advanced security for networks as well as data, compute, messaging, and identity attack vectors.
    •Systematic separation of all traffic flows (to, from, and within cloud environments).
    •Segmentation by application or service and micro-segmentation of hosts running within the same segment or remotely.
    •Cultivating agility for DevOps and lines of business without compromising the corporate security posture.
    •Automation, efficiency, and elasticity in order to keep up with the velocity of business, while reducing risky human errors and misconfigurations by embedding security into code.
    •A platform-agnostic, borderless architecture in which security policies can be enforced consistently across all environments.
  • Securing your Most Critical Assets in 2020 and Beyond Recorded: Oct 28 2020 31 mins
    Tony Jarvis, Threat Prevention Architect, APAC
    We’ve witnessed changes in where and how employees go about their work due to the ongoing COVID-19 pandemic. Organisations are realising that this situation is not temporary and they don’t expect their entire workforce to return to the office any time soon. This means those on-premises corporate controls aren’t keeping their workforce protected when they’re working remotely.

    Learn how enterprises can secure their most critical assets wherever they may be and be fully protected for tomorrow. We will share three real world case studies on how these organisations solve the endpoint security issues facing them.
  • Over 400 Vulnerabilities in Qualcomm's chip - Are you at Risk? Recorded: Sep 15 2020 36 mins
    Isaac Dvir, Director, Mobile Security & Prakash Bhaskaradass, Director, Threat Prevention (APAC)
    A new Check Point Research reveals more than 400 vulnerable pieces of code in one of Qualcomm Technologies DSP chips, which are embedded into over 40% of the mobile phone market.

    Is your mobile workforce protected? Is your corporate data secure? What is a DSP and how did we reveal these vulnerabilities?

    Get the full story on our live webinar.
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Contact tracing apps - do the benefits outweigh the risks?
  • Live at: May 12 2020 6:00 am
  • Presented by: Tony Jarvis, CTO (APAC), Check Point Software Technologies
  • From:
Your email has been sent.
or close