2019 CPX 360 Content 2019 CPX 360 Agenda Content survey It’s your chance to shape the CPX 360 agenda.Please share with us your feedback and ideas by answering the questions below and for your chance to win Apple Air Pods! OK Question Title * 1. Please describe your relationship to Check Point I am a Check Point Customer I am a Check Point Partner I am a Check Point Employee I am a Check Point Prospect Other (please specify) OK Question Title * 2. What would be the top 5 reasons for you to attend CPX 360 To learn about Check Point 2019 roadmap To hear from fellow CISO on security challenges and priorities, research, trends and innovations To hear on the latest GEN VI threats from cyber security research To explore the day to day best practices and operations of Check Point products To learn first-hand about real use-cases from other customers To engage direct with R&D in the technology innovation labs To test drive Check Point latest technology through our hands-on Lab with a step by step cook books To learn how to prevent threats in cloud, mobile, network and endpoints To hear about the increasingly complex cyber threat landscape To explore Check Point’s innovative technology To network with like minded peers To see the latest technology solutions and demonstrations from Check Point and our Technology Partners Other (please specify) OK Question Title * 3. What are the top 10 topics you want to learn about? Blockchain & crypto currency security Security for DevOps How hackers think Security Automation Can you really Prevent Attacks ? Healthcare Security Education & K12 Security Mobile Security Incident Response war stories Telco Security Use of AI in cyber security Gen VI threats and solutions IoT Security Cloud Security SCADA security Retail Security Security as code SaaS security Threat Intelligence & Threat Hunting Best Practices with Check Point CISO Best Practices GDPR compliance and pragmatic approaches to comply Fintech Security API with Check Point Defeating advanced threats and zero days Carrier grade security platforms Cyber Security Threat landscape Endpoint Security How to explain cyber security to the board Blueprints for Securing IaaS (AWS, Azure, Cisco ACI, VMware...) Other (please specify) OK Question Title * 4. What are the top 5 Check Point products you are most interested to learn more about? VSX Anti Bot SW blade SandBlast Agent SandBlast Mobile ZoneAlarm SmartEvent ThreatCloud Identity awareness SW blade Private Threat Cloud R80.20 Capsule Cloud, Docs, Workspace IPS SW blade DLP SW blade Compliance SW blade Smart-1 Appliance Cluster XL CloudGuard SaaS Multi Domain Security Management AV SW blade Mobile Access Blade SandBlast Network CloudGuard IaaS DDoS Protector URL Filtering SW blade Other (please specify) OK Question Title * 5. What are the top 3 Fun activities you will most likely participate in 5K run Scavenger hunt Cyber range (Blue team , Red Team) Geek Village workshops ( lockpick, crypto , Capture the flag) Gaming arcade Capture the Flag hacking game Other (please specify) OK Question Title * 6. Please share any other ideas to make CPX 360 a great event OK Question Title * 7. Enter your email for your chance to win Apple Airpods OK DONE