talk-data.com talk-data.com

Event

Google Cloud Next '24

2024-04-09 Google Cloud Next Visit website ↗

Activities tracked

170

Google Cloud Next Conference (24)

Filtering by: Cyber Security ×

Sessions & talks

Showing 1–25 of 170 · Newest first

Search within this event →

Building Secure GenAI Applications

2024-04-11
demo
Averi Kitsch (Google)

Retrieval Augmented Generation (RAG) is a powerful technique to provide real time, domain-specific context to the LLM to improve accuracy of responses. RAG doesn't require the addition of sensitive data to the model, but still requires application developers to address security and privacy of user and company data. In this session, you will learn about security implications of RAG workloads and how to architect your applications to handle user identity and to control data access.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

A java developer walks into a serverless bar

2024-04-11
session

In this session, we'll dive into deploying Java apps using Google Cloud's serverless platform. Designed for Java developers, it offers practical insights into consideration, challenges, tips and tricks for deploying JVM applications in Serverless platforms. We’ll also cover other best practices across different part of the application lifecycle, such as CI/CD pipelines, security, and observability. Through interactive demos, learn to build, secure, and monitor Java applications efficiently.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Ensure the health of cloud resources: How to address software vulnerabilities and identity risk

2024-04-11
session
Rahul Gupta (Google Cloud) , Aakashi Kapoor (Google Cloud) , Tim Wingerter (Google Cloud)

Which software vulnerabilities in my cloud environment pose the greatest risk, and how do I fix them quickly? What’s the best way to prevent over-permissioned identities from leading to unauthorized cloud access? Join this technical session and learn how new vulnerability response and cloud identity and entitlement management capabilities in Security Command Center can help strengthen your overall risk posture.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Transform your SAP workload with Google Cloud

2024-04-11
session
Alex Joseph (Google Cloud) , Lalit Patil (SAP Enterprise Cloud Services) , Mike Eacrett (Google Cloud) , Mangesh Dabaki (Google Cloud) , Souvik Choudhury (Google Cloud)

Plan, migrate, and deploy your mission-critical SAP workloads on Google Cloud’s highly available, secure, and scalable certified infrastructure. In this technical session, learn how our customers use SAP-specific tools and infrastructure to improve availability, performance, and security based on proven best practices. Post-deployment, learn how customers use Google Cloud’s SAP-optimized workload management tools to ensure smooth, efficient operations of and continuously high availability for their SAP applications.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

AI anywhere: How to build generative AI applications on-premises with Google Distributed Cloud

2024-04-11
session
Sanjay Jacob (Google Cloud) , Atul Setlur (Google Cloud) , Chris Powell (NT Concepts) , Tein Heik Seow (CSIT)

This session offers a hands-on guide to building your first generative AI application within the secure and controlled infrastructure of Google Distributed Cloud Hosted. Explore the potential of generative AI while ensuring data security and meeting compliance requirements in air-gapped settings.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Elevate your cloud security with Google Cloud and industry-leading security providers

2024-04-11
session
Preston Hogue (Google Cloud) , Sriya Potham (Wiz) , Steve Wilson (Exabeam) , Matt McLimans (Palo Alto Networks)

Cyberattacks are rising, and businesses need to protect themselves in the cloud. In this session, we’ll discuss the latest trends in cloud security and how businesses can integrate security services in the cloud to mitigate risks. We’ll also hear from a panel of cybersecurity experts from Exabeam and Palo Alto Networks whose expertise and services will optimize your security posture, drive business value, and keep you ahead of emerging threats. Tap into a wealth of cybersecurity knowledge to get the most out of your investment.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

How Apigee tailors ML models to improve precision in detecting API abuse

2024-04-11
demo
Shelly Hershkovitz (Google Cloud)

API attacks are on the rise, threatening your applications and sensitive data. Apigee's Advanced API Security helps detect API abuses with machine learning models training on a corpus of traffic from Google’s services like YouTube. Join us in this session to learn how Apigee customizes these models for each customer to improve precision in detecting malicious activity.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Identify Application Vulnerabilities with Security Command Center

2024-04-11
session
Sean Lubbers (Google Cloud)

Web Security Scanner identifies security vulnerabilities in your App Engine, Google Kubernetes Engine (GKE), and Compute Engine web applications. This service crawls your application, following all links within the scope of your starting URLs, and attempts to exercise as many user inputs and event handlers as possible. It can automatically scan and detect four common vulnerabilities, including cross-site-scripting (XSS), flash injection, mixed content (HTTP in HTTPS), and outdated/insecure libraries. In this spotlight lab, you will use Web Security Scanner—one of Security Command Center's built-in services—to scan a Python Flask application for vulnerabilities.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

How IHG Hotels modernize through a Teradata to BigQuery migration

2024-04-11
demo
Anup Prasad (Cognizant) , Barbara Liesenfelt (IHG Hotels & Resorts)

IHG Hotels & Resorts, managing 6,500+ hotels across 19 brands, faced data challenges amidst rapid growth. Cognizant & Google Cloud helped modernize their infrastructure. Using Data Fusion & migration tools, 320TB of data moved from Teradata to BigQuery, enabling scalability, security, and advanced analytics. This laid the foundation for IHG's future growth and empowers data-driven decision-making. Please note: seating is limited and on a first-come, first served basis; standing areas are available. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Designing cloud native user security in the Cross-cloud Network

2024-04-11
session
Victor Moreno (Google Cloud) , Brian Fahs (Google Cloud) , Chris Muir (Priceline) , Tom Briggs (Priceline) , Manisha Gupta (Google Cloud)

This session discusses how to secure user-to-application communications in a multicloud environment using Google’s Cross-Cloud Network cloud-first integration of Secure Access Service Edge (SASE) solutions. We will discuss how the cloud-first integration of Secure Service Edge (SSE) stacks optimizes the performance, effectiveness, and operations of the stack, and illustrate this with a demo. We will study a customer design for a multi-regional multicloud deployment securing users accessing public and private applications from any location.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Serverless security like a pro

2024-04-11
session
Guillaume BLAQUIERE (Carrefour)

Serverless is a new paradigm – and sometimes a scary one when it’s disruptive. We'll cover all the security aspects of a traditional web application about network routing, public exposure, secret management, and more. In this session you’ll learn how to increase your security posture in a serverless environment and will be able to apply its implementation in your next serverless application.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Top seven security strategies to thrive in a multi-cloud landscape

2024-04-11
session
Shijimol A K (Google Cloud)

Feeling overwhelmed by multicloud security? Ditch the complexity and attend this fast-paced session for a refreshing perspective. Learn seven powerful multicloud security strategies in this session that touch on the usage of built-in guardrails, security of data across realms, choosing the right tools, automation of security processes, risk and threat assessments, and enabling your cloud team with the right skill set. You’ll leave with some actionable steps that you can take to ensure security of multicloud deployments.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

LLMOps to GenOps: Your Roadmap to Secure, Compliant Generative AI

2024-04-11
session
Brian Ray (Eviden)

This lecture delves into the evolution from LLMOps to GenOps, showcasing how the GenOps solution revolutionizes Generative AI with its cutting-edge security and governance framework powered by Google Cloud. It highlights the necessity of continuous security throughout the AI lifecycle and the strategic integration of ethical guidelines and compliance measures, ensuring safe, compliant, and efficient AI operations. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Demystifying CNAPP: End-to-End Cloud Infrastructure & App Security

2024-04-11
session
Joshua Burgin (Upwind)

This talk will focus on understanding what CNAPP is and its major pillars for cloud infrastructure and application security. Explore why a ״shift-right״ security approach and runtime insights are crucial for dynamic, modern cloud-native security that effectively consolidates Devs, Sec & Ops contextual analysis from runtime to code. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

BigQuery's multimodal data foundation for the Gemini era

2024-04-11
session
Shane Glass (Google Cloud) , Sachin Gopalakrishna Menon (Priceline) , Gaurav Saxena (Google Cloud)

In the era of multimodal generative AI, a unified governance-focused data platform powered by Gemini becomes paramount. Join this session to learn how BigQuery fuels your data and AI lifecycle from training to inference, by unifying structured and unstructured data such as text, images and audio, while encompassing security and governance. Learn how Priceline is using BigQuery and Vertex AI to reinvent customer experiences and lead the industry in data and AI innovation.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Cloud's key management services: Unlock the secrets

2024-04-11
session
Cole Kincaid (Test) , Brad Meador (Google Cloud)

Explore the latest advances in Cloud's key management services. You’ll see demos focusing on data protection services that help meet our customers’ most stringent data security, privacy, and compliance needs, including the latest release of AutoPilot, HSM, and more.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

How Thales enables data sovereignty in Google Workspace

2024-04-11
session
Todd Moore (Thales) , Johney Burke (Google Cloud)
LLM

Learn how Thales, a leader in global data security, has partnered with Google Workspace to help organizations across the world maintain granular data control and localized encryption to meet stringent regional and industry requirements around data privacy and sovereignty. Thales and Google will share how organizations can leverage Gemini and Google Workspace apps while keeping their sensitive data private.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Migrate enterprise-grade workloads to Cloud SQL for SQL Server

2024-04-11
session
Mohamed Kabiruddin (Google Cloud) , Nitin Shingate (GoodRx) , Erez Alsheich (Google Cloud)
SQL

More customers are moving their critical workloads to Cloud SQL for SQL Server to take advantage of built-in high availability, data protection, security, and integration with other Google Cloud services. In this session, we’ll explore new capabilities that make it easier than ever to manage and scale your SQL Server databases with Cloud SQL, and we’ll dig into how to minimize downtime during migration using the Database Migration Service.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Secure your Cloud journey with effortless protection from Palo Alto Networks & Google Cloud

2024-04-11
demo
Nicolas Bédard (Google Cloud) , Matt McLimans (Palo Alto Networks)

Unlock the full potential of your cloud journey without sacrificing security. This session showcases the latest network security innovation from Palo Alto Networks and Google Cloud, designed to elevate your cloud security posture with unmatched ease of use. Join us and discover the next generation of Google Cloud network firewall protection. Watch a solution overview and customer use-case discussion on an offering that provides a cloud-first, easy to deploy operation, powered by Palo Alto Networks’ threat prevention technologies. Please note: seating is limited and on a first-come, first served basis; standing areas are available. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

How to Understand and Protect Against AI-Enabled Cyberattacks

2024-04-11
session
Kevin McGrail (Dito)

Kevin A. “KAM” McGrail KAM will start with a foundation on what Artificial Intelligence is, its impact on the CIA security model, & a quick history lesson about AI-Enabled cyberattacks. He will then discuss other problems including discussing AI policy & the new Shadow IT threat AI tools present. Finally, Kevin will discuss a few key solutions including using his signature, "Think Evil" process for cybersecurity. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Unleash the Power of Generative AI to Secure Cloud Workloads with Fortinet and Google Cloud

2024-04-11
session
Ali Bidabadi (Fortinet) , Susaant Kondapaneni (Google Cloud)

In this session, Fortinet and Google Cloud will jointly present on how Fortinet's AI-powered security solution integrated with Google Cloud's native security services can help organizations make better informed decisions, rapidly respond to threats, and save time on even the most complex tasks. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Devoteam presents a proactive observability ecosystem hybrid multicloud

2024-04-11
session
Fahd Ekadioin (Google Cloud) , Payam Ebrahimi (Devoteam G Cloud) , Rania Mohamed (Google Cloud)

When building an application in the cloud one must be mindful of all the integrations, governance, security, and manageability aspects. In this session, Devoteam experts will share how they support Google Cloud customers by designing and implementing a self-improving and self-healing architecture using an event-driven observability solution that provides well-governed self-service for developers. Telemetries are collected from multiple sources, such as hybrid cloud and on-premise applications.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Least privilege: Move beyond default service accounts

2024-04-11
session
Ian Lewis (Google Cloud)

Default service accounts provide the flexibility to get started, but often have excess permissions when used in production. How do we find a balance between ease of use for developers and the security demands in production environments? This session covers the common pitfalls that can occur with default service accounts, how to move beyond default service accounts and use custom IAM roles to follow the principle of least privilege, and how to automate alerts to balance the needs of developers and security teams.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Preventing, detecting, and responding to Workspace threats with Chronicle Security Operations

2024-04-11
session
Bhoomika Goyal (Google Cloud) , Ryan White (Google Cloud)

Productivity suites that store corporate email and documents such as Google Workspace are an obvious target for cyberattacks. In this session, we’ll demonstrate how to detect, respond, and best secure your Google Workspace environment using the Google’s Chronicle Security Operations platform. Get in on this session if you’re a security professional who is serious about taking Google Workspace security to the next level.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Cloud and OT, a match made in Heaven?

2024-04-11
session
Todd Wiedman (Landis+Gyr)

OT environments were traditionally isolated for security to limit attack vectors and associated risks, but the benefits of connectivity are eroding this approach. As a result, new security solutions are essential to manage the risks and leverage the benefits of connected OT systems. Landis+Gyr, a provider of Utility OT solutions, is adopting a SaaS model hosted on Google Cloud. This change required careful security considerations to meet customer, regulatory, and company standards. This fireside chat will explore these security measures, the challenges of cloud adoption in isolated environments, and the thoughts on future requirements for secure cloud-connected OT. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.