Learn how to become a security leader and influence product development, even without direct authority. This session provides practical strategies for cybersecurity professionals to build credibility and drive collaboration to achieve security goals.
talk-data.com
Speaker
Aakashi Kapoor
3
talks
Filter by Event / Source
Talks & appearances
3 activities · Newest first
Google Cloud helps you build a strong layered defense with a robust set of access controls and policies. In this session you will learn how you can effectively use Google Cloud security guardrails specifically Organization Policies to achieve a strong security posture, leverage Google Cloud Policy Intelligence capabilities to effectively scale this posture across your organization. We’ll also share how Google Cloud makes it easy for you to start securely in the cloud with our security baseline capabilities.
Which software vulnerabilities in my cloud environment pose the greatest risk, and how do I fix them quickly? What’s the best way to prevent over-permissioned identities from leading to unauthorized cloud access? Join this technical session and learn how new vulnerability response and cloud identity and entitlement management capabilities in Security Command Center can help strengthen your overall risk posture.
Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.