2020 CPX360 Content 2020 CPX 360 Agenda Content survey It’s your chance to shape the CPX 360 agenda.Please share with us your feedback and ideas by answering the questions below and for your chance to win Apple Air Pods! OK Question Title * 1. Please describe your relationship to Check Point I am a Check Point Customer I am a Check Point Partner/Distributor I am a Check Point Employee I am a Check Point Prospect Other (please specify) OK Question Title * 2. What would be the top 5 reasons for you to attend CPX 360 To hear on the latest GEN VI threats from cyber security research To learn how to prevent threats in cloud, mobile, network, IoT and endpoints To engage directly with R&D in the technology innovation labs To learn about Check Point 2020 roadmap To explore the day to day best practices and operations of Check Point products To hear from fellow CISO on security challenges and priorities, research, trends and innovations To learn first-hand about real use-cases from other customers To hear about the increasingly complex cyber threat landscape To explore Check Point’s innovative technology To network with like minded peers To test drive Check Point latest technology through our hands-on Lab with a step by step cook books To see the latest technology solutions and demonstrations from Check Point and our Technology Partners Other (please specify) OK Question Title * 3. What are the top 10 topics you want to learn about? GDPR compliance and pragmatic approaches to comply SaaS security Mobile Security Healthcare Security SCADA security Security Automation Threat Intelligence & Threat Hunting Incident Response war stories Fintech & BlockChain Security Cyber Security Threat landscape Gen VI threats and solutions How hackers think Defeating advanced threats and zero days Best Practices with Check Point Carrier grade security platforms Security Orchestration Automation and Response (SOAR) API with Check Point Security for DevOps Use of AI in cyber security SD-WAN security Security as code Can you really Prevent Attacks ? Zero Trust Security Blueprints for Securing IaaS (AWS, Azure, Cisco ACI, VMware...) Cloud Security How to explain cyber security to the board Telco Security Retail Security CISO Best Practices Education & K12 Security IoT Security Blockchain & crypto currency security CASB Endpoint Security Cloud Security Posture Management Other (please specify) OK Question Title * 4. What breakout track you would most likely attend? (choose 4) Hackers Exposed Check Point Research CheckMates community best practices Cloud security best practices workshops Best practices workshops Securing your cloud Cyber Security Innovations Security Orchestration & Automation IoT security CISO dedicated track Other (please specify) OK Question Title * 5. What are the top 5 Check Point products you are most interested to learn more about? AV SW blade CloudGuard IaaS ZoneAlarm URL Filtering SW blade VSX ClusterXL DLP SW blade CloudGuard Log.ic ThreatCloud DDoS Protector CloudGuard NSaaS Smart-1 Appliance Anti Bot SW blade SandBlast Network IPS SW blade SandBlast Agent SmartEvent CloudGuard Dome9 Multi-Domain Security Management CloudGuard SaaS Mobile Access Blade R80.30 Identity Awareness SW blade Compliance SW blade SandBlast Mobile Capsule Docs, Workspace Sandblast Now Maestro Other (please specify) OK Question Title * 6. What are the top 3 Fun activities you will most likely participate in 5K run Cyber Range (Blue team , Red Team) Geek Village workshops ( lockpick, crypto, Capture the flag) Gaming arcade Capture the Flag hacking game Other (please specify) OK Question Title * 7. Please share any other ideas to make CPX 360 a great event OK Question Title * 8. Enter your email for your chance to win Apple Airpods OK DONE