talk-data.com talk-data.com

Event

Google Cloud Next '25

2025-04-09 Google Cloud Next Visit website ↗

Activities tracked

202

Google Cloud Next Conference (25)

Filtering by: interest-security ×

Sessions & talks

Showing 76–100 of 202 · Newest first

Search within this event →

Enterprise resilience with BigQuery: Cross-region disaster recovery

2025-04-10
session
Jaliya Ekanayake (Google Cloud) , Bhavdeep Singh (Charles Schwab) , Rohit Ray (Google Cloud)

Geographical redundancy is a key pillar of a resilient data architecture. With BigQuery cross-region dataset replication and managed disaster recovery, you can ensure your mission-critical apps remain available even in the unlikely event of a region-level infrastructure outage. Learn how this built-in capability protects your data and workloads against regional outages and ensures uninterrupted data access for your organization.

Maximize ROI across industries with AMD on Google Cloud

2025-04-10
session
Suresh Andani (AMD) , Nav Kankani (Uber)

Choosing the right cloud infrastructure can make or break your business strategy. Join us in this enlightening session to explore how tech-savvy individuals and enterprises alike have done the math and chosen AMD EPYC™-powered Google Cloud instances. We’ll dive into real-world customer success stories and showcase the latest virtual machines from Google Cloud and AMD. Discover how these cutting-edge products can help you deploy innovative AI applications that drive business growth, while ensuring cost and energy efficiency.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Security Sandbox: Capture the flag

2025-04-10
expo-experience

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

Unifying code, cloud, and SOC with AI for real-time cloud security

2025-04-10
session
Orion Cassetto (Palo Alto Networks)

Transforming your cloud security means understanding that traditional application security (AppSec) almost never effectively prevents risk, cloud posture is too complex to manage, cloud runtime protection is sparsely deployed, and the security operations center (SOC) doesn’t have the visibility, AI, and automation for real-time response. Join us to learn how to remediate your cloud exposures in minutes, not weeks, using real-time AI-powered risk reduction, investigation, and response – all fueled by unified data and advanced automation. See the future of fast, intelligent, scalable cloud security.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Networking 101

2025-04-10
session

In this hands-on lab, you’ll learn the fundamentals of networking in Google Cloud and how it differs from traditional on-premises setups. You'll build a network with three subnetworks and gain practical experience in creating firewall rules. Learn how to apply these rules using instance tags to control access across your environment. By the end of the session, you'll be equipped with the foundational knowledge to manage and secure Google Cloud networks effectively.

If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!

Security Situation Room: Security tabletop workshop

2025-04-10
expo-experience

Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.

Security Sandbox: ThreatSpace

2025-04-10
expo-experience

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

Exploring and securing Google Cloud default service accounts: Deep dive and real-world adoption trends

2025-04-10
session

Default service accounts in Google Cloud have been an area of interest for threat actors. Cloud administrators can sometimes grant unintentionally broad permissions through this mechanism to their workloads, such as virtual machines and Kubernetes clusters. In this talk, we will discuss the role of default service accounts in Google Cloud Compute Engine (GCE) and Google Cloud Kubernetes Engine (GKE), and best practices for managing and securing them.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

What​​’s next for security professionals

2025-04-10
session
H. E. Dr. Mohamed Al Kuwaiti (UAE) , Steph Hay (Google Cloud) , Peter Bailey (Google Cloud) , Sandra Joyce (Google Cloud) , Matt Rowe (Lloyd's of London)

It's time to ditch ineffective, reactive security approaches. The unique synergy between frontline threat intelligence and AI will usher in a new era of preemptive security protection that enables organizations to operate with confidence in the AI era. In this spotlight, leaders from Google and Mandiant will share our insight into the security landscape and showcase the latest innovations you can use to make Google part of your security team. We’ll demonstrate new agentic security capabilities that can help you prevent threats, eliminate toil, and empower your talent. And you’ll hear from leaders in the public and private sector who have adopted our solutions to transform their security programs. 

Security Situation Room: Birds of a feather sessions

2025-04-10
expo-experience

Connect with other security professionals in our Birds of a Feather sessions. Dive into lively discussions with peers and Google Cloud experts on key security topics, including identity and access management, network security, multicloud monitoring, and more.

AI, Adversaries, and Alliances: How Google Cloud and CrowdStrike Stop Breaches

2025-04-10
session
Cody Queen (CrowdStrike Inc.)

Join us to explore the dynamic partnership between Google Cloud and CrowdStrike, combining cutting-edge technology and world-class cybersecurity. Learn how our collaboration drives AI innovations to secure enterprises and power digital transformation. Discover CrowdStrike's adversary-first approach, delivering unmatched breach prevention and safeguarding critical cloud environments amid a complex threat landscape. Join us to see how these industry leaders are redefining cloud security and AI-driven resilience.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Better Together: Secure AI for Public Sector

2025-04-10
session
Lauren Park (Palo Alto Networks) , Josh Dries (Google)

As government customers are evaluating ways to modernize legacy infrastructure and tools to address needs and challenges combined with a IT security threat landscape more intense than ever; technology partners combining AI and security solutions are becoming vitally important. Carahsoft, Google Public Sector and Palo Alto Networks partner to bring best of breed technology systems to public sector customers. Join us to learn more about how you can leverage better together solutions to drive positive outcomes within the public sector ecosystem.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Building a high-throughput virtual private network

2025-04-10
session

This hands-on lab equips you with the practical skills to create and optimize secure, high-throughput VPN connections within the Google Cloud environment. You'll learn to establish secure IPsec Virtual Private Network (VPN) tunnels between Google Cloud and external networks, including techniques for distributing traffic across multiple tunnels to maximize bandwidth. Through hands-on exercises, including VPN creation, configuration, and performance testing using iperf, you'll gain the confidence to design and implement robust and scalable VPN solutions for your specific needs.

If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!

Security Sandbox: Capture the flag

2025-04-10
expo-experience

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

On the frontlines: Protecting, serving, and defending

2025-04-10
session
Ron Bushar (Google) , Reid Novotny (National Guard Bureau) , Derek Law (United States Space Force (USSF)) , Maria Lipana (California Cybersecurity Integration Center (Cal-CSIC))

Explore how infrastructure, data analytics, cybersecurity, and intelligence at the edge converge to support mission-critical operations on the frontlines. Hear from public sector agencies about how they’re applying technology to their mission to protect and defend our nation.

Reduce the attack surface of your cloud with advanced identity management

2025-04-10
session
Bharath Sivaraman (Google Cloud) , Nanxi Chen (Snap) , Sowmya Karmali (Google Cloud)

Granting users the minimum level of access and permissions needed to perform their jobs can reduce the attack surface area of your cloud environment. Learn how Security Command Center integrates cloud infrastructure entitlement management (CIEM) to help you understand which users have access to which cloud resources, get machine learning (ML)-generated recommendations to reduce unnecessary permissions, and accelerate responses to identity-driven vulnerabilities.

Security agents: Revolutionize cyber defense with AI

2025-04-10
session
Steph Hay (Google Cloud) , Nav Jagpal (Google Cloud)

Imagine never writing another detection rule, manually creating postures, or remediating common findings. These are the toilsome workflows security teams deal with today that AI promises to offload, thanks to agentic capabilities. When infused through existing tooling, agentic AI will fundamentally change how security teams work, freeing teams to focus on complex issues while reducing time to detect and respond. Join this session to learn how agentic AI is transforming the user experience and driving security outcomes for modern enterprises.

Tales of cloud compromise: Lessons from recent Mandiant investigations

2025-04-10
session
Omar ElAhdan (Google Cloud) , Jeremy Koppen (Google Cloud) , Scott Lashway (Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C)

Cyberattacks are escalating, with healthcare facing devastating ransomware attacks in 2024. Attackers exploit vulnerabilities to cause chaos, disrupting critical services. Effective defense requires a comprehensive approach, including technical solutions, legal preparedness, and robust incident response. This talk provides actionable insights for building resilience against evolving cyberthreats.

Empower growth: Data and security solutions for small and medium businesses

2025-04-10
session
Alex Hammond (Ascendium Education Group) , Maria Menendez (Data Intelligence) , Sharon Prosser (Google Cloud) , John Zur (Tactacam)

Discover how Google’s interconnected ecosystem of Google Cloud platform and specialty solutions can address the needs and challenges of resource-constrained IT teams. We’ll delve into practical use cases and demonstrate how Google Cloud’s specialized business intelligence platform (Looker) and security solutions (Google Security Operations, Mandiant) can help your business improve efficiency and reduce costs while improving your security posture.

Secure by design for AI applications and agents

2025-04-10
session
Jason Roberts (Palo Alto Networks) , Munish Khetrapal (Palo Alto Networks) , Joshua Haslett (Google Cloud) , Mike Buratowski (Home Depot)

In a world where speed and innovation are paramount, bolting on security after deployment is no longer an option. In this Spotlight, experts from Palo Alto Networks and Google Cloud will dive into the future of AI security through practical experiences faced by customers to address today and tomorrow's most pressing challenges in AI adoption—Shadow AI, data governance complexities, and the evolving threat landscape to AI applications. Discover how a Secure by Design approach, with security embedded across AI initiatives from inception, ensures resilience, scalability, and trust. Don't miss this opportunity to gain actionable insights for accelerating your AI journey securely.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Secure your AI deployments from creation to consumption

2025-04-10
session
Jurgen Kutscher (Google Cloud) , Archana Ramamoorthy (Google Cloud) , Guilherme Bedin (Globo)

New AI workloads in the enterprise can create new and novel security exposures. In this session, you’ll learn directly from our Mandiant team about what they are seeing in this new AI-driven world. And we’ll share how Google Cloud AI protection capabilities can help protect your workloads against the most sophisticated threats. We’ll guide you through how you can protect your data, models, applications, and infrastructure throughout the AI life cycle.

Google Workspace: Secure and compliant collaboration for regulated industries

2025-04-10
session
Michael Brenzel (StackIT) , Johney Burke (Google Cloud) , Josef Wahby-Brehmer (Accenture GmbH) , Mitch Christow (Google) , Todd Moore (Thales)
LLM

Achieve compliant collaboration with Google Workspace and Gemini for Google Workspace. This session explores how Google's suite of tools can help regulated customers meet their compliance needs with rigorous industry certifications (HIPAA, SOC, ISO). In addition, customers will share how using Workspace helps them to meet new executive orders and regulatory requirements to retain government and defense customers at a lower cost and with ease.

Best-kept security secrets: How Sensitive Data Protection can support developer testing

2025-04-10
session
Aron Eidelman (Google Cloud) , Devon Beanish (Google Cloud)
API

Google Cloud’s Sensitive Data Protection service is a highly effective capability that can discover and classify sensitive data in your environment, helping to prevent data leakage. But it also has features useful to developers to minimize the exposure of confidential customer information when handling large volumes of sensitive data. By taking advantage of Sensitive Data Protection transformation techniques, you can de-identify sensitive information in a dataset through redaction, replacement, masking, tokenization, bucketing, date shifting, and time extraction. Developers retain the ability to test applications using functional data while still meeting security requirements put in place to protect customer information. By using pseudonymization, which is reversible and provides an easier path for troubleshooting, developers will have a more useful dataset for functional testing than they would if they used data anonymization. In this talk, you’ll learn how to use the Cloud Data Loss Prevention API (DLP API) of Sensitive Data Protection to inspect data for sensitive information and build an automated data transformation pipeline to create de-identified copies of your dataset.

Creating cross-region load balancing

2025-04-10
session

In this hands-on lab, you'll learn how to create a cross-region HTTP(S) load balancer that intelligently distributes traffic to instances in multiple regions. By setting up four Compute Engine instances across two regions, you'll configure the load balancer to ensure seamless traffic routing to the right instance. This lab will help you optimize application performance, improve availability, and enhance fault tolerance across geographically distributed systems.

If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!

Enabling Shared Fate: Cyber insurance innovation from Chubb, Munich Re, and Beazley

2025-04-10
session
Monica Shokrai (Google Cloud) , Matthew Prevost (Chubb Cyber) , Robert Parisi (Munich Re)

Discover why Chubb, Munich Re, and Beazley, global leaders in cyber insurance, have partnered with Google Cloud to enhance the Risk Protection Program. Learn about our shared vision for added cyber insurance and how it translates to stronger protection and greater peace of mind for your business.