As the digital world becomes a bigger part of all of our lives, cyber criminals are becoming more prevalent and working together (including state-sponsored attacks) to wreak havoc on all of us, amplifying the global cyber security problem. This global problem heightens the need to work together, share threat intelligence, and align strategies to better protect the world.
For Check Point, being a Founding Member of the CTA has been instrumental in advancing the collective knowledge of this group, and protecting companies and users from our adversaries. Through the CTA, we are working with other leading cyber security vendors from around the world to make the world a safer place. It has been remarkable pooling our resources, sharing threat telemetry, and coordinating on major cyber incidents to properly inform and protect the public. Being a Board Member has also helped us impact the CTA’s plan with our fundamental value of making the world a safer place by focusing on prevention with shared, real-time and mission-critical intelligence. The growing cyber threat landscape cannot be solved by one individual or company, and we need to work together to battle the rising cyber threats across the world.
The CTA has allowed us to work with other leaders in the industry to better educate the public on the growing threats of cyber security. We have collaborated above and beyond on highly-publicized and devastating breaches such as Sunburst, the exploitation of Microsoft Exchange vulnerabilities and the Colonial Pipeline attack. We prioritize sharing the cyber kill chain and attacker techniques to prevent the same incident from affecting other organizations. We continue to believe in the CTA and the benefits to society as we all have the same goal to make the world a safer place.
The CTA is very global and has members throughout the world. As one of the largest technology companies in Israel, Check Point takes pride in sharing global threat data to make the world a safer place. The internet has allowed businesses to work and connect with anybody from around the world, highlighting the global threat landscape and what we need to do to prevent malicious cyber attacks.
We are particularly excited about the Algorithm and Intelligence Committee. This committee does an excellent job in bringing together all CTA members’ threat researchers and allows for us all to collaborate on large publicized cyberattacks and prevent any further damage.
Check Point is motivated to prevent a major cyberattack that could result in the loss of lives and/or severe damage to the economy. Our adversaries are becoming more sophisticated and cyber risks are growing. We need to work together and always stay one step ahead of our adversaries. As CTA continues to grow, we are looking forward to getting more members, expanding the organization’s global reach, and sharing more data. As the cloud becomes more compromised and targeted by malicious actors, we need more openness and stronger collaboration in attack responses via API and connected interfaces.
On a personal note, I have a passion for traveling the world and meeting new people. For fun, I love to solve riddles and puzzles. I also cherish spending time with my family and watching my children who are growing up so fast!
Dr. Dorit Dor serves as Chief Product Officer for Check Point Software Technologies. She manages all product definition and development functions for both the enterprise and consumer divisions of the Company. Dr. Dor’s core responsibilities include leading the company’s product management, R&D and QA initiatives from concept to delivery. Dr. Dor has been instrumental to the organization’s growth. She has been published in several influential scientific journals for her research on graph decomposition, median selection and geometric pattern matching in d-dimensional space. In 1993, she won the Israel National Defense Prize. Dr. Dor holds a Ph.D. and M.S degree in computer science from Tel-Aviv University, in addition to graduating cum laude for her Bachelor of Science degree.
Author: Dorit Dor
CTA Webinar – Adapt your defenses: there are enough DDoS attack vectors to fill a Periodic Table
Adversaries constantly innovate and explore new and more powerful DDoS attack methods, called vectors, creating [...]
CTA Webinar – In The Crosshairs – How Geopolitics Can Increase Your DDOS Risk
Disputes relating to politics, religion, and ideology are often at the root of attack campaigns intended to disrupt the online capabilities of governments, companies, communities [...]
CTA Board of Directors Spotlight: Jaya Baloo, Avast
CTA Board of Directors Spotlight: Jaya Baloo, CISO, Avast What inspired you to not only join, but also to help lead CTA? I was very inspired by the mission of CTA, because it’s so important that defenders cooperate. The best way to do that is to share rich and unique intelligence that can be enriched […]