talk-data.com talk-data.com

Event

Google Cloud Next '25

2025-04-09 Google Cloud Next Visit website ↗

Activities tracked

180

Google Cloud Next Conference (25)

Filtering by: Cyber Security ×

Sessions & talks

Showing 26–50 of 180 · Newest first

Search within this event →

Security Sandbox: Capture the flag

2025-04-11
expo-experience

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

Strengthen data privacy: Multiparty confidential collaboration at scale

2025-04-11
session
Chanda Patel (Google) , Olivier Richaud (Symphony) , Rene Kolga (Google Cloud)

Unlocking insights often requires data collaboration between different organizations, which raises important questions about privacy and data security. Learn how Google and one of our customers use confidential computing solutions to apply new approaches to data security, isolation, and transparency – all through the use of Confidential Computing and Trusted Execution Environments (TEEs). TEEs can transform privacy obligations into real-world, technical solutions that enable businesses of all sizes to thrive while respecting people’s privacy.

The unsustainable status quo of legacy IT: Secure identity and device management

2025-04-11
session
Hemant Sahani (Omnissa) , Dor Fledel (Okta) , Joel Rennich (JumpCloud) , Cameron Wallin (Google) , Brett Robson (Atlassian)

Businesses and public sector organizations are transitioning away from legacy digital workplace solutions to enhance productivity and collaboration, optimize IT costs and workload, and better mitigate security and compliance risks with modern, secure-by-design architecture and controls. Join this session to discover how organizations of all sizes have transformed their organization’s collaboration and improved the security posture with Google Workspace and leading identity and device management solutions from Okta, Omnissa, and JumpCloud.

Innovate fearlessly: Secure, AI-ready with Docker & Google Cloud

2025-04-11
session
Britney Blodget (Docker)

Balancing developer agility with security compliance is a key challenge in AI-driven, cloud-native development. Learn how Docker and Google Cloud integrate security into every phase of the software lifecycle—enabling teams to build, test, and deploy AI features and applications with confidence. Embed security in developer workflows, enhance supply chain integrity with SLSA provenance and SBOM attestations, and leverage trusted content on seamless workflows with Google Cloud.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Generative AI in action: The GXO story

2025-04-11
session
Ramin Rastin (GXO) , Americo Rodriguez (GXO) , Nitin Soni (Google)

Join GXO's SVP of Data/AI/ML, Ramin Rastin, and Senior Director of Data, Americo, as they share their remarkable journey of implementing Generative AI and Vertex AI within their organization. Discover how GXO leveraged Google Cloud's cutting-edge technology to achieve significant scalability and efficiency gains, enhance business operations, and improve user experience. In this session, you'll learn how GXO: Scaled rapidly: Deployed 15-20 AI-powered assistants within the first six months of 2025, each reducing workloads by 40-60%. Enhanced flexibility: Developed a Generic Chat Assistant mid-project to adapt to evolving business needs. Improved accessibility: Created an intuitive user interface for all users, regardless of technical expertise. Centralized control: Implemented an Admin Page with role-based access control for enhanced security and governance.

Visualizing alerts with Google SecOps

2025-04-11
session

Enhance your team's Google SecOps proficiency with our hands-on lab. Learn to leverage the alert graph for streamlined triage, in-depth investigations, and optimized YARA-L rule modification. This workshop equips analysts with skills to efficiently manage alerts, improve detection accuracy, and strengthen your security posture. Drive operational efficiency and reduce response times. Ideal for security analysts seeking to maximize their Google SecOps expertise.

Best practices for designing and deploying Cross-Cloud network security

2025-04-11
session
Pradosh Mohapatra (Google Cloud) , Sid Shibiraj (Google Cloud) , Abiram Subramanian (DBS Bank) , Mahen Yerasi (Charles Schwab)

Architect and deploy secure cross-cloud networks with confidence. This session delivers expert guidance on designing and deploying Google Cloud’s Cross-Cloud Network security solutions to help protect against a wide range of network threats, including exploits, malware, DDoS, data exfiltration, and more. Discover best practices for configuring Cloud NGFW, Cloud Armor, and Secure Web Proxy (Cloud SWP) to address critical security concerns and build a resilient cloud infrastructure.

Enterprise-ready gen AI with Apigee

2025-04-11
session
Ed Olson-Morgan (Marsh McLennan) , Swarup Pogalur (Wells Fargo) , Geir Sjurseth (Google Cloud) , Antony Arul (Google Cloud)

Organizations are racing to deploy generative AI solutions built on large language models (LLMs), but struggle with management, security, and scalability. Apigee is here to help. Join us to discover how the latest Apigee updates enable you to manage and scale gen AI at the enterprise level. Learn from Google’s own experience and our work with leading customers to address the challenges of productionizing gen AI.

Modern detection engineering with Google SecOps

2025-04-11
session
David French (Google Cloud) , John Stoner (Google Cloud)

Building and maintaining detection rules is the cornerstone of any high-performing security operations function, but it’s often easier said than done. Join us for an in-depth exploration of detections in Google Security Operations (Google SecOps) and learn how it empowers detection teams to stay ahead of threats – from curated detections delivered out of the box by Google SecOps to address the latest threats, to building custom rules using entity graphs, AI, and the wealth of functions and context provided by Google SecOps.

Simplify compliance in the cloud

2025-04-11
session
Florian Rodeit (Deutsche Börse) , Deep Bhattacharjee (Google Cloud) , Surabhi Jain (Google Cloud)

Even cloud security experts can struggle with application and data compliance. Discover how Security Command Center is simplifying cloud compliance by bringing together configuration, monitoring, and evidence generation. Learn how a unified cloud compliance solution can make it easy to apply prebuilt and custom compliance frameworks, check compliance status with a centralized dashboard, and automatically generate audit reports to prove compliance.

Achieve the defender’s advantage: Real-world case studies

2025-04-11
session
Emily Cranston (Google Cloud) , Tim Crothers (UHG)

The Defender’s Advantage model from Mandiant illustrates the cyber defense capabilities required to actively resist attacks and minimize the impact of a compromise. Partnering with UnitedHealth Group, we leveraged the Defender’s Advantage model to focus on continuous improvement, operationalize threat intelligence, reduce the attack surface, and implement a security validation program. We’ll share case studies and lessons learned about how we developed each of these programs to transform and enhance the organization’s cyber defense capabilities.

Combat emerging cyberthreats with Google Workspace and Chrome

2025-04-11
session
Girija Narlikar (Google) , Adam Nerell (HumanaAB) , Anu Yamunan (Google Cloud)

Organizations are facing sophisticated and growing cyberthreats from commercially driven ransomware groups and state-sponsored adversaries that legacy productivity solutions struggle to defend against. Learn how Google’s multilayered approach – AI threat defenses, a reduced attack surface, and built-in security controls in Google Workspace, Chrome Enterprise, and ChromeOS – can effectively combat the most prevalent cyberthreats and block malicious actors from gaining access to your data and disrupting your business.

Enterprise-grade security and scale for serverless workloads with Cloud Run

2025-04-11
session
Thomas Shafer (Google Cloud) , Tejas Cherukara (ANZ Bank) , Xiaowen Xin (Google Cloud)

This session dives into the latest advancements in securing and managing your Cloud Run workloads at enterprise scale. Join us to learn about new features and techniques to meet the highest security standards, strategies for managing large-scale deployments, and solutions to common issues like IP exhaustion. Plus, one of our customers will share their firsthand experience managing a massive fleet of Cloud Run workloads.

Human and nonhuman identities as the bedrock for cloud security

2025-04-11
session
Shaun Liu (Google Cloud) , Ravi Shah (Google Cloud) , Sai Kommareddy (Yahoo) , Henry Avetisyan (Yahoo)

In this session, we’ll explore how you can manage human and nonhuman identities on Google Cloud. We’ll discuss how these identities are defined, managed, and used to secure access to resources, and we’ll cover topics such as cryptographic managed workload identities, identity federation, and flexible identity onboarding options on Google Cloud.

Secure and optimize AI and ML workloads with the Cross-Cloud Network

2025-04-11
session
DP Ayyadevara (Google Cloud) , Bola Malek (Baseten) , Vaibhav Katkade (Google Cloud)

According to Andreessen Horowitz, 93% of Fortune 500 companies surveyed currently use three or more AI model providers, and now AI agents will proliferate and become standard. With the massive shift in enterprise AI adoption and the pace of change, enterprises need to modernize their network and security to unlock the value that AI generates and keep pace with rapid changes. Learn how to make your network and security AI-ready, plus discover new innovations to reduce infrastructure costs, improve user experience, enable faster developer velocity, and protect your AI infrastructure from new security threats.

Security Sandbox: ThreatSpace

2025-04-10
expo-experience

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

Adding Agentic Aware Security

2025-04-10
session
John DeMartino (Google)

AI application growth brings security challenges, especially in multi-tenant environments. This talk explores access control issues in agentic workflows, using Google's Reasoning Engine. We'll cover limitations of current methods, user/agent identity interplay, data isolation, and secure delegation to LLMs. Future solutions include fine-grained access control and secure identity propagation. Learn to design secure, scalable AI workflows.

Security Situation Room: Birds of a feather sessions

2025-04-10
expo-experience

Connect with other security professionals in our Birds of a Feather sessions. Dive into lively discussions with peers and Google Cloud experts on key security topics, including identity and access management, network security, multicloud monitoring, and more.

Connect, secure, and simplify with new Cross-Cloud Network innovations

2025-04-10
session
Muninder Sambi (Google Cloud) , Anna Berenberg (Google Cloud)

Cross-Cloud Network, built on Google’s planet-scale network, has transformed how organizations connect and secure workloads, users, and data across hybrid and multicloud networks. It simplifies complexity, strengthens security, and helps deliver faster business outcomes. Join this session to learn about new innovations in 2025 with the Cross-Cloud Network that allow you to secure and optimize AI and machine learning (ML) workloads, connect global enterprises, expand network security to cover all threat vectors as you connect distributed multicloud apps, and deliver web and media workloads.

Eliminate your weak spots: Discover and protect sensitive data

2025-04-10
session
Scott Ellis (Google Cloud) , Jordanna Chord (Google Cloud) , Nathaniel Kaufman (StrataPrime)

Often, cloud risks fly under the radar because organizations don’t know they have sensitive data lurking in their environment. This creates a treasure trove for attackers, particularly when it comes to high-value AI training data. In this talk, we’ll discuss how sensitive data discovery and content understanding can help reduce security and privacy risks, safeguard AI development and deployment, and drive business momentum – especially in analytics and AI.

Protect your cloud data with Security Command Center

2025-04-10
session
Deepavali Bhagwat (Google Cloud) , Christian Gorke (Deutsche Börse) , Harsha Alapati (Google Cloud)

As a cloud security professional, you are responsible for protecting your valuable cloud data. This technical session demonstrates how Security Command Center can help you automatically discover your cloud data assets, pinpoint which datasets may be at risk, define and implement the right posture controls to protect data and manage access, and provide your team with real-time alerting of data security violations. Get ready to prevent breaches, reduce insider risk, and meet compliance requirements.

Secure from code to cloud with Security Command Center

2025-04-10
session
Rahul Gupta (Google Cloud) , Mansi Bakshi (Google Cloud) , Vaishali Someshwar (Ericsson On-Demand Network Services) , David Schott (Snyk)

Even if your cloud infrastructure is configured securely, how can you make sure cloud applications do not introduce vulnerabilities? This technical session for cloud security professionals focuses on shift-left security practices, including the latest strategies for building secure applications, achieving code-to-cloud traceability of code-related issues, and getting AI-generated remediations that make it easy for application development teams to fix issues at the source.

Security Sandbox: Capture the flag

2025-04-10
expo-experience

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

Security Situation Room: Security tabletop workshop

2025-04-10
expo-experience

Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.

Mandiant cafe: Meet the expert

2025-04-10
expo-experience

Meet with a Google Cloud Security expert to discuss your specific security needs and discover how our solutions can help. Plus, you can grab a complimentary copy of the “Defenders Advantage” book and a cup of coffee while you’re there.