talk-data.com talk-data.com

Event

Google Cloud Next '25

2025-04-09 Google Cloud Next Visit website ↗

Activities tracked

180

Google Cloud Next Conference (25)

Filtering by: Cyber Security ×

Sessions & talks

Showing 51–75 of 180 · Newest first

Search within this event →

Security Sandbox: ThreatSpace

2025-04-10
expo-experience

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

Mission: Scalable – Elastic Cloud Serverless Meets Vertex AI

2025-04-10
session
George Kobar (Elastic)

Discover how Elastic Cloud Serverless and Google Vertex AI empower the creation of AI-driven search applications with effortless scalability. This session explores Elastic's intuitive serverless architecture and dynamic scaling, integrating with Google Vertex AI to create world class search experiences. Learn how this powerful partnership simplifies deployments and accelerates innovation for modern search, observability, and security workloads.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Security Situation Room: Birds of a feather sessions

2025-04-10
expo-experience

Connect with other security professionals in our Birds of a Feather sessions. Dive into lively discussions with peers and Google Cloud experts on key security topics, including identity and access management, network security, multicloud monitoring, and more.

Security Sandbox: Capture the flag

2025-04-10
expo-experience

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

Cotality's (CoreLogic) cloud transformation with Cognizant and Google

2025-04-10
session
Jeff Henry (CoreLogic) , Matthew Kjernes (CoreLogic) , Sedwin Vadukut (CoreLogic)

Join us for an exclusive session where Cotality (CoreLogic) reveals its groundbreaking journey of cloud transformation with Cognizant and Google Cloud. Gain insights into the strategies that drove major achievements, including significant cost reductions, heightened security, and rapid innovation. Discover the pivotal roles of the Neuro Business Process Application and Google Geomatica in revolutionizing their operations. Don’t miss this opportunity to learn how leading-edge technology can elevate your organization’s efficiency and success.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Ready, threat, go! Unlock the power of threat-driven security operations

2025-04-10
session
Chris Corde (Google Cloud) , Paul Beverley-Paddock (Deloitte) , Caroline Honeycombe (Deloitte) , Nicole Oppenheim (Google Cloud)

With rising complexity, increasing data volumes, and ever-changing threats, it’s imperative to adopt a threat-driven approach to security operations. This session explores how Google’s security products infuse threat intelligence to help organizations understand the threats that matter most to them, and ensure that they have the detections and security controls to successfully mitigate those threats. We’ll explore real-life scenarios of actual discovered threats and show how organizations can hunt, detect, and contain them.

Strategy to transform Data and AIML landscape of large telecom

2025-04-10
session
Rajeev Arora (HCLTech) , Atul Jain (Verizon)

Discover how organizations are transforming into AI-applied companies. Explore strategies for optimizing, improving, and innovating GCP operations. Learn from a holistic approach to integrating GenAI, ML, and DataOps and the capabilities enabled for GCP strategy. Explore enhancements in serverless tech, automation, and security. Don't miss out on this opportunity to be inspired and informed.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

The code revolution: How AI is transforming secure software development

2025-04-10
session
Brittany O'Shea (GitHub)

As AI reshapes the way we think about trust and security, GitHub is leading the charge in transforming application security. Join Brittany O’Shea, GitHub Sr. Director of Product Management, as she showcases how AI-driven advancements are revolutionizing detection, prevention, and remediation. Discover how these innovations empower developers to build secure, high-quality software by embedding security as a default, dramatically improving the nature of application security for the better.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Build a serverless toolkit: Empower developers with Cloud Run

2025-04-10
session
Nathan Faber-Good (Shopify) , Daniel Steuernol (Shopify) , Owen Cummings (Shopify) , Ayrat Khayretdinov (Google Cloud)

Learn how a team of developers built a serverless toolkit with Cloud Run to simplify application development and deployment. This session shares best practices from Shopify for creating a robust toolkit that empowers developers to seamlessly ship serverless applications while integrating with essential Google Cloud services and adhering to security best practices. Discover how to enhance scalability, reduce toil, and boost productivity.

Security Situation Room: Security tabletop workshop

2025-04-10
expo-experience

Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.

Security Sandbox: ThreatSpace

2025-04-10
expo-experience

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

Security Situation Room: Birds of a feather sessions

2025-04-10
expo-experience

Connect with other security professionals in our Birds of a Feather sessions. Dive into lively discussions with peers and Google Cloud experts on key security topics, including identity and access management, network security, multicloud monitoring, and more.

Accelerate security incident response with Gemini

2025-04-10
session
Alexander Pabst (Allianz SE) , Payal Chakravarty (Google Cloud) , Spencer Lichtenstein (Google Cloud)

In the ongoing battle against cyberthreats, AI can unlock new levels of efficiency, accuracy, and proactive defense. In this session, a Google Security Operations customer will delve into practical use cases where AI is already delivering tangible benefits to security teams. We’ll also introduce new capabilities designed to automatically triage and analyze alerts. Join us to learn how you can put Gemini to work to enable more precise threat detection and faster incident response in your environment.

Gaining buy-in: A guide to successful AI integration in development

2025-04-10
session
Nate Avery (Google Cloud) , Cedric Yao (Google Cloud) , Braydon Vaughan (Ulta)

We will delve into the practical applications of AI-assisted coding within a large organization, highlighting the specific ways Ulta Beauty's developers are utilizing Gemini Code Assist to streamline workflows. Understand how Ulta successfully gained buy-in from both management and engineering teams by demonstrating the tool's value and addressing potential concerns. Learn about Ulta's thoughtful approach to integrating new AI technologies while prioritizing security, responsible usage, and alignment with existing development processes. 

Next-gen access management: A modern and secure approach

2025-04-10
session
Prashant Kumar (Google Cloud) , Prateek Jain (Google Cloud) , Ram P (Google Cloud) , Henry Tze (Virgin Media)

Level up your cloud security with Google Cloud’s next-generation identity and access management (IAM). This session explores how modern cloud IAM capabilities – including next-gen unified access policies, fine-grained access control, privileged access management, and policy intelligence – can improve your cloud security posture. Join us to learn how to streamline access, enforce consistent policies, and proactively mitigate risks in today’s dynamic cloud landscape.

Partnering for Success: A Guide to Google Cloud Security Resources

2025-04-10
session
Simone Bender (Google Cloud) , Anne-Sophie Mayos (Google Cloud)

Gain valuable insights into how working with Google Cloud's security offerings can boost your success in this rapidly growing market. Learn about our go-to-market strategy and existing sales plays. Additionally, discover security-specific programs and incentives available only to Google Cloud partners. Our available resources and trainings in positioning, selling, and deploying Google Cloud Security products will help up-skill your team and maximize your profitability with Google Cloud.

Migrating Cassandra to Cloud Spanner for large workloads

2025-04-10
session
Shashank Agarwal (Google)

How to successfully migrate petabyte-scale of Cassandra clusters to Spanner without requiring code changes. The use case addresses various lifecycle aspects, including IaC, containerization, gradual migration, performance testing, security, centralized observability and multi-region operations. 

Security Sandbox: Capture the flag

2025-04-10
expo-experience

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

Unifying code, cloud, and SOC with AI for real-time cloud security

2025-04-10
session
Orion Cassetto (Palo Alto Networks)

Transforming your cloud security means understanding that traditional application security (AppSec) almost never effectively prevents risk, cloud posture is too complex to manage, cloud runtime protection is sparsely deployed, and the security operations center (SOC) doesn’t have the visibility, AI, and automation for real-time response. Join us to learn how to remediate your cloud exposures in minutes, not weeks, using real-time AI-powered risk reduction, investigation, and response – all fueled by unified data and advanced automation. See the future of fast, intelligent, scalable cloud security.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Security Situation Room: Security tabletop workshop

2025-04-10
expo-experience

Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.

Security Sandbox: ThreatSpace

2025-04-10
expo-experience

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

What​​’s next for security professionals

2025-04-10
session
H. E. Dr. Mohamed Al Kuwaiti (UAE) , Steph Hay (Google Cloud) , Peter Bailey (Google Cloud) , Sandra Joyce (Google Cloud) , Matt Rowe (Lloyd's of London)

It's time to ditch ineffective, reactive security approaches. The unique synergy between frontline threat intelligence and AI will usher in a new era of preemptive security protection that enables organizations to operate with confidence in the AI era. In this spotlight, leaders from Google and Mandiant will share our insight into the security landscape and showcase the latest innovations you can use to make Google part of your security team. We’ll demonstrate new agentic security capabilities that can help you prevent threats, eliminate toil, and empower your talent. And you’ll hear from leaders in the public and private sector who have adopted our solutions to transform their security programs. 

Security Situation Room: Birds of a feather sessions

2025-04-10
expo-experience

Connect with other security professionals in our Birds of a Feather sessions. Dive into lively discussions with peers and Google Cloud experts on key security topics, including identity and access management, network security, multicloud monitoring, and more.

AI, Adversaries, and Alliances: How Google Cloud and CrowdStrike Stop Breaches

2025-04-10
session
Cody Queen (CrowdStrike Inc.)

Join us to explore the dynamic partnership between Google Cloud and CrowdStrike, combining cutting-edge technology and world-class cybersecurity. Learn how our collaboration drives AI innovations to secure enterprises and power digital transformation. Discover CrowdStrike's adversary-first approach, delivering unmatched breach prevention and safeguarding critical cloud environments amid a complex threat landscape. Join us to see how these industry leaders are redefining cloud security and AI-driven resilience.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Better Together: Secure AI for Public Sector

2025-04-10
session
Lauren Park (Palo Alto Networks) , Josh Dries (Google)

As government customers are evaluating ways to modernize legacy infrastructure and tools to address needs and challenges combined with a IT security threat landscape more intense than ever; technology partners combining AI and security solutions are becoming vitally important. Carahsoft, Google Public Sector and Palo Alto Networks partner to bring best of breed technology systems to public sector customers. Join us to learn more about how you can leverage better together solutions to drive positive outcomes within the public sector ecosystem.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.