talk-data.com talk-data.com

Topic

interest-security

202

tagged

Activity Trend

161 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: Google Cloud Next '25 ×

Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

Default service accounts in Google Cloud have been an area of interest for threat actors. Cloud administrators can sometimes grant unintentionally broad permissions through this mechanism to their workloads, such as virtual machines and Kubernetes clusters. In this talk, we will discuss the role of default service accounts in Google Cloud Compute Engine (GCE) and Google Cloud Kubernetes Engine (GKE), and best practices for managing and securing them.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

session
by H. E. Dr. Mohamed Al Kuwaiti (UAE) , Steph Hay (Google Cloud) , Peter Bailey (Google Cloud) , Sandra Joyce (Google Cloud) , Matt Rowe (Lloyd's of London)

It's time to ditch ineffective, reactive security approaches. The unique synergy between frontline threat intelligence and AI will usher in a new era of preemptive security protection that enables organizations to operate with confidence in the AI era. In this spotlight, leaders from Google and Mandiant will share our insight into the security landscape and showcase the latest innovations you can use to make Google part of your security team. We’ll demonstrate new agentic security capabilities that can help you prevent threats, eliminate toil, and empower your talent. And you’ll hear from leaders in the public and private sector who have adopted our solutions to transform their security programs. 

Join us to explore the dynamic partnership between Google Cloud and CrowdStrike, combining cutting-edge technology and world-class cybersecurity. Learn how our collaboration drives AI innovations to secure enterprises and power digital transformation. Discover CrowdStrike's adversary-first approach, delivering unmatched breach prevention and safeguarding critical cloud environments amid a complex threat landscape. Join us to see how these industry leaders are redefining cloud security and AI-driven resilience.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

As government customers are evaluating ways to modernize legacy infrastructure and tools to address needs and challenges combined with a IT security threat landscape more intense than ever; technology partners combining AI and security solutions are becoming vitally important. Carahsoft, Google Public Sector and Palo Alto Networks partner to bring best of breed technology systems to public sector customers. Join us to learn more about how you can leverage better together solutions to drive positive outcomes within the public sector ecosystem.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

This hands-on lab equips you with the practical skills to create and optimize secure, high-throughput VPN connections within the Google Cloud environment. You'll learn to establish secure IPsec Virtual Private Network (VPN) tunnels between Google Cloud and external networks, including techniques for distributing traffic across multiple tunnels to maximize bandwidth. Through hands-on exercises, including VPN creation, configuration, and performance testing using iperf, you'll gain the confidence to design and implement robust and scalable VPN solutions for your specific needs.

If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

session
by Ron Bushar (Google) , Reid Novotny (National Guard Bureau) , Derek Law (United States Space Force (USSF)) , Maria Lipana (California Cybersecurity Integration Center (Cal-CSIC))

Explore how infrastructure, data analytics, cybersecurity, and intelligence at the edge converge to support mission-critical operations on the frontlines. Hear from public sector agencies about how they’re applying technology to their mission to protect and defend our nation.

Granting users the minimum level of access and permissions needed to perform their jobs can reduce the attack surface area of your cloud environment. Learn how Security Command Center integrates cloud infrastructure entitlement management (CIEM) to help you understand which users have access to which cloud resources, get machine learning (ML)-generated recommendations to reduce unnecessary permissions, and accelerate responses to identity-driven vulnerabilities.

Imagine never writing another detection rule, manually creating postures, or remediating common findings. These are the toilsome workflows security teams deal with today that AI promises to offload, thanks to agentic capabilities. When infused through existing tooling, agentic AI will fundamentally change how security teams work, freeing teams to focus on complex issues while reducing time to detect and respond. Join this session to learn how agentic AI is transforming the user experience and driving security outcomes for modern enterprises.

session
by Omar ElAhdan (Google Cloud) , Jeremy Koppen (Google Cloud) , Scott Lashway (Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C)

Cyberattacks are escalating, with healthcare facing devastating ransomware attacks in 2024. Attackers exploit vulnerabilities to cause chaos, disrupting critical services. Effective defense requires a comprehensive approach, including technical solutions, legal preparedness, and robust incident response. This talk provides actionable insights for building resilience against evolving cyberthreats.

Discover how Google’s interconnected ecosystem of Google Cloud platform and specialty solutions can address the needs and challenges of resource-constrained IT teams. We’ll delve into practical use cases and demonstrate how Google Cloud’s specialized business intelligence platform (Looker) and security solutions (Google Security Operations, Mandiant) can help your business improve efficiency and reduce costs while improving your security posture.

In a world where speed and innovation are paramount, bolting on security after deployment is no longer an option. In this Spotlight, experts from Palo Alto Networks and Google Cloud will dive into the future of AI security through practical experiences faced by customers to address today and tomorrow's most pressing challenges in AI adoption—Shadow AI, data governance complexities, and the evolving threat landscape to AI applications. Discover how a Secure by Design approach, with security embedded across AI initiatives from inception, ensures resilience, scalability, and trust. Don't miss this opportunity to gain actionable insights for accelerating your AI journey securely.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

New AI workloads in the enterprise can create new and novel security exposures. In this session, you’ll learn directly from our Mandiant team about what they are seeing in this new AI-driven world. And we’ll share how Google Cloud AI protection capabilities can help protect your workloads against the most sophisticated threats. We’ll guide you through how you can protect your data, models, applications, and infrastructure throughout the AI life cycle.

Achieve compliant collaboration with Google Workspace and Gemini for Google Workspace. This session explores how Google's suite of tools can help regulated customers meet their compliance needs with rigorous industry certifications (HIPAA, SOC, ISO). In addition, customers will share how using Workspace helps them to meet new executive orders and regulatory requirements to retain government and defense customers at a lower cost and with ease.

Google Cloud’s Sensitive Data Protection service is a highly effective capability that can discover and classify sensitive data in your environment, helping to prevent data leakage. But it also has features useful to developers to minimize the exposure of confidential customer information when handling large volumes of sensitive data. By taking advantage of Sensitive Data Protection transformation techniques, you can de-identify sensitive information in a dataset through redaction, replacement, masking, tokenization, bucketing, date shifting, and time extraction. Developers retain the ability to test applications using functional data while still meeting security requirements put in place to protect customer information. By using pseudonymization, which is reversible and provides an easier path for troubleshooting, developers will have a more useful dataset for functional testing than they would if they used data anonymization. In this talk, you’ll learn how to use the Cloud Data Loss Prevention API (DLP API) of Sensitive Data Protection to inspect data for sensitive information and build an automated data transformation pipeline to create de-identified copies of your dataset.

In this hands-on lab, you'll learn how to create a cross-region HTTP(S) load balancer that intelligently distributes traffic to instances in multiple regions. By setting up four Compute Engine instances across two regions, you'll configure the load balancer to ensure seamless traffic routing to the right instance. This lab will help you optimize application performance, improve availability, and enhance fault tolerance across geographically distributed systems.

If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!

Discover why Chubb, Munich Re, and Beazley, global leaders in cyber insurance, have partnered with Google Cloud to enhance the Risk Protection Program. Learn about our shared vision for added cyber insurance and how it translates to stronger protection and greater peace of mind for your business.