FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session...
-
Upload
nguyenkien -
Category
Documents
-
view
223 -
download
4
Transcript of FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session...
1 ©2017 Check Point Software Technologies Ltd. ©2017 Check Point Software Technologies Ltd.
2017 June 22 Kazutoshi Hayashi
Checkpoint Roadmap and Highlight 20min. Moment of truth
FEEDBACK OF CPX2017
[Protected] Distribution or modification is subject to approval
2 ©2017 Check Point Software Technologies Ltd.
Infinity
CXP について
サマリー
Checkpointのロードマップ(ドリットのセッション)
CPX 開催中のHOTトピックス
AGENDA
3 ©2017 Check Point Software Technologies Ltd. ©2017 Check Point Software Technologies Ltd.
CPX 2017 Feed Back of CPX THE FUTURE OF CYBER SECURITY
[Protected] Distribution or modification is subject to approval
4 ©2017 Check Point Software Technologies Ltd.
CPX 2017 MILANO
5 ©2017 Check Point Software Technologies Ltd. Infinity
今年はEUROPEはITALY MILANOで開催
6 ©2017 Check Point Software Technologies Ltd. Infinity
PICTURE GALLALY
7 ©2017 Check Point Software Technologies Ltd. Infinity
CPX AGENDA
8 ©2017 Check Point Software Technologies Ltd. Infinity
主要なるトピックスのご紹介(CPX AGENDA) Cyber Talks
Topic Speaker Abstract
Welcome to the Future of Cyber Security
Gil Shwed We are all living in a connected world which is affecting every aspect of our lives.
Founder and CEO In the past couple of years, we have been discussing implications of a technology and digital-driven world (i.e.) cloud, mobile, advanced threats.
Check Point Software Technologies Today, we are seeing some of our worst predictions shaping into real life.
So why are businesses not protecting themselves and instead keep making excuses?
In today’s world, business need security that meet their business needs.
Gil Shwed's discussion defines the pillars of security that businesses should adopt, based on their actual business needs.
Gil Shwed & Marius Nacht Interview @ 2017 CPX Milan
Gil Shwed Gil Shwed & Marius Nacht Interview @ 2017 CPX Milan Founder and CEO
Check Point Software Technologies
Marius Nacht Co-Founder and Chairman
Cyber Security in the Era of Exponential Technology
Amnon Bar-Lev We are in an extraordinary time in human history. Thanks to innovative and disruptive technologies we live longer, healthier and more educated than ever before. While technologies such as cloud computing, mobile and Internet of Things open up new opportunities, they are, in many cases, the biggest barriers for adoption due to cyber security concerns. How do you innovate, inspire and compete while remaining secure? In his inspiring session, Amnon Bar-Lev shares the Check Point vision on how organizations can keep focus on innovating while being secured with a security architecture that is one step ahead.
President Check Point Software Technologies
9 ©2017 Check Point Software Technologies Ltd. Infinity
主要なるトピックスのご紹介(CPX AGENDA) Topic Speaker Abstract
Seeing is Believing: Hacking the Smartphone
Michael Shaulov Join this exciting live demo to see first-hand how easy it is to hack any smartphone today. In this session Michael Shaulov will demonstrate live hacking of a smartphone, the risks and possible mitigations for the new Achilles heel of enterprises today and tomorrow.
Head of Product Management and Product Marketing, Mobile
Check Point Software Technologies
Surviving the Ransomware Plague
Orli Gan Ransomware reached epidemic proportions in 2016. Organizations of all sizes and sectors fell victim to malware that locked down, encrypted – and in some cases threatened to destroy – critical systems and data. How would you avoid becoming tomorrow’s headline? How can businesses continue to operate without disruption despite this looming threat? Learn how Check Point Anti-Ransomware technology protects against every type of ransomware attack, ensuring continuous access to your data
Head of Products, Threat Prevention
Check Point Software Technologies
Check Point Latest Announcements
Gabi Reish Check Point Infinity announcement VP, Product Management and Product Marketing
Check Point Software Technologies
Choosing the Right Security Architecture
Moti Sagey When it comes to choosing the right security architecture & security vendor, what does it take to win your trust? In this session Moti Sagey will cover three key pillars the security solution must possess to win in a highly competitive environment: Uncompromised Security, Everywhere Architecture and Operational Efficiency. Moti will share pragmatic tips to unveil the true efficacy of the solution with zero marketing "fluffy claims".
Head of Strategic Marketing & Intelligence
Check Point Software Technologies
10 ©2017 Check Point Software Technologies Ltd. Infinity
主要なるトピックスのご紹介(CPX AGENDA) Topic Speaker Abstract
Moving to the Public Cloud, Securely - FireChat with AWS & Azure
Peter Alexander More than 70% of the organizations are committed to a cloud strategy in 2017.
CMO Businesses are moving their applications to the Cloud to gain more agility and efficiencies.
Check Point Software Technologies At the same time, Cloud security remains their top concern.
Customers are looking for solution to secure their data and applications from modern threat targeting their shared, connected and agile cloud environment.
Join us for a fireside chat with top leaders from AWS, Azure and learn about their perspectives and recommendations for security best practices in the cloud.
Shedding Light on the Dark Web
Avi Rembaum (Las Vegas and Milan) The dark web is quickly evolving into a marketplace of information and tools that the hackers and adversaries use to breach company networks. The question we face as an industry is how to leverage an awareness of information for sale in the dark web to improve corporate security architectures. This session showcase real examples of data in the dark web and suggest pragmatic tips to mitigate future attacks.
Vice President, Security Solutions Neatsun Ziv (Las Vegas)
VP, Threat Prevention Check Point Software Technologies
What To Do When It Happens to You - Check Point Incident Response
Daniel Wiley Based on real world experiences of helping customers, this candid discussion will focus on ensuring that your organization is prepared when a breach occurs in your network. The discussion will provide real world examples of what works and what does not work and provides a framework on how to center your organizations security strategy to face any incident head on.
Head of Incident Response Check Point Software Technologies
IoT Hacking - Live Oded Vanunu Ready or not, the Internet of things (IoT) is here. No longer a buzz word, it continues to grow at an unprecedented pace for years to come and is expected to reach over 25 billion connected devices by 2020. Most IoT devices, apps, and infrastructure were developed without security in mind and have already been exploited on major hacking campaigns in the past two years & will continue to be the main targets for hackers. Are organizations ready to protect themselves? What are the key vulnerable points? In this session Oded Vanunu enters into the Hacker mind to exploit IoT devices. Oded will also share insights on possible mitigations for these threats
Head of Products Vulnerability Research
Check Point Software Technologies
11 ©2017 Check Point Software Technologies Ltd. Infinity
主要なるトピックスのご紹介(CPX AGENDA) Topic Speaker Abstract
Life Inside the Cloud Brian Linder The era of cloud is upon us; firms of all sizes and in all walks of life are looking to leverage the agility and elasticity of cloud. But cloud carries a totally new and unique set of security challenges. In this informative and entertaining session, you will take away five key tenants of cloud security, along with an accompanying set of recommendations on best practices securing hybrid cloud deployments. Brian Linder will share a healthy dose of a real-life experience with an actual Check Point customer use case securing their complex hybrid cloud deployment.
Datacenter Sales Manager, Eastern US
Check Point Software Technologies
Safe Journey to the Cloud Itai Greenberg The era of cloud is upon us; firms of all sizes and in all walks of life are looking to leverage the agility and elasticity of cloud. But cloud carries a totally new and unique set of security challenges. In this session, you will take away five key tenants of cloud security, along with an accompanying set of recommendations on best practices securing hybrid cloud deployments.
Head of Cloud Security Check Point Software Technologies
External Speakers Moving to the Public Cloud, Securely - FireChat with AWS & Azure
Amazon AWS , Microsoft Azure More than 70% of the organizations are committed to a cloud strategy in 2017.
Businesses are moving their applications to the Cloud to gain more agility and efficiencies. At the same time, Cloud security remains their top concern.
Customers are looking for solution to secure their data and applications from modern threat targeting their shared, connected and agile cloud environment.
Join us for a fireside chat with top leaders from AWS, Azure and learn about their perspectives and recommendations for security best practices in the cloud.
How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real incident in which Deutsche Telekom was able to detect and prevent a specific cyber-attack. Describing the kill chain in laymen terms, how the attack was mitigated and the lessons learned.
Senior Vice President, Solution Sales & Consulting
Deutsche Telekom Group
12 ©2017 Check Point Software Technologies Ltd. Infinity
主要なるトピックスのご紹介(CPX AGENDA) Topic Speaker Abstract
We Make Jeans; How Hard Can That Be?
Steve Zalewski This talk will present some of the business challenges, learnings and roadmaps from a security perspective to protect the global Levi Brand Chief Security Architect
Levi Strauss & Co.
Keeping it Simple Luke Beeson Presenting key guidance and directions related to the main needs of security architecture for 2017; how it must follow the business needs - and first and foremost - be simple and efficient to operate. Vice President of Security
British Telecom
The Evolving Role of the CISO in a Post Breach Organization
Joey Smith In this session CISO Joey Smith will discuss understanding the importance of compliance and security and how they are very different. Additionally he will review many of the personal leanings that he has gained from his experience as a CISO responsible for maturing an Information Security program.
CISO
Schnuck Markets
Simple Security Is Your Best Bet
Patrick Woods This thought-provoking session will challenge current models in cyber security management and architecture that suggest that complex problems demand complex solutions. Instead, it is a simplified approach, keeping users and senior leadership engaged while leveraging key partnerships that will prepare organizations to combat the cyber threats of today and tomorrow
CISO
Missouri State Highway Patrol
CISO... What's Next? Geremy Benkirane When managing and controlling information systems and data risks leads to the data controlling the business. Chief Information Security Officer
Exane SA
13 ©2017 Check Point Software Technologies Ltd. Infinity
SPEAKERS
14 ©2017 Check Point Software Technologies Ltd. Infinity
CPX さまざまなシーン
15 ©2017 Check Point Software Technologies Ltd. ©2017 Check Point Software Technologies Ltd.
Defeat Cyber Extortion
蔓延するランサムウェアを防御
[Protected] Distribution or modification is subject to approval
CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME
WIN WITH CYBER EXTORTION
ENJOYING THE RANSOMWARE PLAGUE
ダークサイドからの見方 VIEW FROM DARK-SIDE
CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME
Cyber Crime S O F T W A R E T E C H N O L O G I E S
L T D
2016年 なんとすばらしい年だったでしょう
MORE Innovation MORE
Product Lines
MORE Revenues
MORE Customers
MORE Press
Coverage
[Protected] Distribution or modification is subject to approval
CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME
Cyber Crime S O F T W A R E T E C H N O L O G I E S
L T D
メディアの露出も盛況でした!
MORE Press
Coverage
[Protected] Distribution or modification is subject to approval
CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME
Cyber Crime S O F T W A R E T E C H N O L O G I E S
L T D
CYBER CRIME STRATEGY IN THE OLD DAYS…
SPAM WORMS
KEYLOGGERS
BANKING TROJANS
BOTNETS
Credit card details
Medical records
Financial data
Intellectual property
Monetizing breached data is COMPLICATED and RISKY
より良い方法があります…
[Protected] Distribution or modification is subject to approval
CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME
Cyber Crime S O F T W A R E T E C H N O L O G I E S
L T D
RANSOMWARE DATAは持ち主に返そう!
[Protected] Distribution or modification is subject to approval
CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME
Cyber Crime S O F T W A R E T E C H N O L O G I E S
L T D
THE CYBER CRIME のポートフォリオ
LOW RISK
REVENUE POTENTIAL
Spam Worms
Keyloggers
Banking Trojans
Botnets
Click Fraud
DDoS
RANSOMWARE
Minimize risk Maximize revenues
CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME
Cyber Crime S O F T W A R E T E C H N O L O G I E S
L T D
40% Install base 70%
of POCs bought our service
$1 Billion paid in 2016*
*according to FBI estimates
2016: 数値から見たRANSOMWARE
[Protected] Distribution or modification is subject to approval
CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME
Cyber Crime S O F T W A R E T E C H N O L O G I E S
L T D
変化がありました!
デリバリーメカニズム 1 重要なデータを対象に 2 支払い方式 3
CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME
Cyber Crime S O F T W A R E T E C H N O L O G I E S
L T D
RISK FREE PAYMENTS* 支払いの流れをトレースしにくい 顧客からのDirect online payment 支払いやすい(High motivation to pay)
The true power of BITCOIN *in the modern world
CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME
Cyber Crime S O F T W A R E T E C H N O L O G I E S
L T D
24X7 Hotline
Advanced Ticketing System
Tiered Support
EXCELLENCE IN CUSTOMER CARE
支払いのためのサービスは万全です!
26 ©2017 Check Point Software Technologies Ltd.
IT’S TIME TO DEFEAT CYBER EXTORTION!
CHECK POINT ANTI RANSOMWARE
[Protected] Distribution or modification is subject to approval
27 ©2017 Check Point Software Technologies Ltd.
CHECK POINT ANTI RANSOMWARE INCLUDED with SandBlast Agent
もっともずるがしこい
ZERO-DAY ransomware もSTOP!
暗号化されたデータもリカバリー
[Protected] Distribution or modification is subject to approval
28 ©2017 Check Point Software Technologies Ltd.
HOW ANTI-RANSOMWARE WORKS (アンチランサムウェアの動き)
ONGOING UPON DETECTION
BEHAVIORAL ANALYSIS(挙動解析)
常にRansomeware特有の挙動をモニターしています
DATA SNAPSHOTS
継続的に直近に作成されたファイルをバックアップ
QUARANTINE(隔離)
攻撃を停止させ、攻撃のすべての要素を隔離
RESTORE
暗号化されてしまったファイルをリストア
ANALYZE(解析)
攻撃の詳細情報を分析するためのフォレンシック分析を開始します。
RANSOMWARE PROTECTION IS ON
[Protected] Distribution or modification is subject to approval
29 ©2017 Check Point Software Technologies Ltd.
HOW ANTI-RANSOMWARE WORKS(DEMO)
[Protected] Distribution or modification is subject to approval
30 ©2017 Check Point Software Technologies Ltd.
| 6 months | Over 200 daily samples |
ANTI RANSOMWARE EFFECTIVENESS アンチランサムウェアの有効性 Tested with only Anti-Ransomware technology active
No AV signatures, No Anti-Bot, No Sandbox
99.3% NET CATCH RATE
*In real life you don’t have to turn those other protections off [Protected] Distribution or modification is subject to approval
もちろん! WANNA CRYもしっかりキャッチしました!
31 ©2017 Check Point Software Technologies Ltd.
Anti-Ransomware
Anti-Bot
Threat Emulation
Threat Extraction
Zero Phishing
Anti-Virus
IPS 多層防御
[Protected] Distribution or modification is subject to approval
32 ©2017 Check Point Software Technologies Ltd.
これで CYBER 恐喝も終わり!
Now with
ANTI RANSOMWARE
[Protected] Distribution or modification is subject to approval
33 ©2017 Check Point Software Technologies Ltd. ©2017 Check Point Software Technologies Ltd.
Dorit のセッションより
CHECKPOINT ROADMAP
[Protected] Distribution or modification is subject to approval
34 ©2017 Check Point Software Technologies Ltd. Infinity
CHECKPOINT ROADMAP
35 ©2017 Check Point Software Technologies Ltd. Infinity
CHECKPOINT ROADMAP
36 ©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval
CPX 2018 2018
CP最大のSecurity プレゼンテーション
エンドユーザー同士のコミュニケーション
CP ブレインとダイレクトに情報交換
最新の動向とテクノロジーを目の前で
37 ©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval
CPX 2018 2018
是非、次回のCPX
お客様とともに体感ください!
38 ©2017 Check Point Software Technologies Ltd. ©2017 Check Point Software Technologies Ltd.
THANK YOU
[Protected] Distribution or modification is subject to approval