talk-data.com talk-data.com

Topic

interest-security

202

tagged

Activity Trend

161 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: Google Cloud Next '25 ×

Presenting “one network,” a novel approach to simplify service integration and increase compliance across heterogeneous environments. Learn how using open source proxies provides a policy-oriented network architecture for consistent policy enforcement, service assembly, and secure-by-default deployments. One network also provides role separation across DevOps, SecOps, site reliability engineers, and app developers, streamlining operations and increasing efficiency. Attend this session to discover how one network can transform your approach to service delivery.

Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.

As attackers get more creative, organizations need to take a defense-in-depth approach to mitigate data exfiltration risks and reduce their attack surface. Join us in this session to learn about some of the most common attack vectors that can lead to data exfiltration, and discover which Google Cloud security controls can help foil these attacks.

Join Google Cloud’s leading security experts along with security leaders from leading enterprise companies to discuss cybersecurity challenges in the age of generative AI. In this live panel discussion, learn how clever cybercriminals are weaponizing this revolutionary technology to launch mind-blowing attacks. We’ll dive headfirst into the latest tricks, from AI-fueled attacks to autonomous hacking tools that operate with chilling efficiency. Discover how companies are fighting back with cutting-edge defenses with tales directly from security practitioners, including solutions from leading security ISVs (independent software vendors). By the end of this session, you’ll have the knowledge you need to outsmart the bad guys and protect your digital kingdom – today and tomorrow.

Security is often referred to as a big data problem, and the growing volume, variety, and nuance of security telemetry requires more sophistication and control than ever before. This session dives into the new data pipeline management capabilities of Google Security Operations. We’ll show how you can improve the way you route, reduce, redact, enrich, and transform security data to manage scale, reduce costs, satisfy compliance mandates, and, most importantly, drive better security outcomes.

With great power comes great responsibility – and the need for confidentiality. This talk explores how confidential computing technology can act as a powerful shield for your AI deployments. We’ll show how Confidential Computing and confidential accelerators safeguard sensitive data and algorithms, even during processing, to ensure that your AI workloads remain protected throughout their life cycle.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Running performance-intensive services at scale while meeting the rigorous security and compliance requirements of some of the most demanding public and private sector organizations presents many interesting challenges. In this talk, you will hear how Pexip, a leading video technology provider, works to build, operate, and protect their global technology platform with the help of Google Cloud security solutions.

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

In this session, Fortinet and Google Cloud will jointly present on how Fortinet's AI-powered security solution integrated with Google Cloud's native security services can help organizations make better informed decisions, rapidly respond to threats, and save time on even the most complex tasks.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

As the volume and value of data in cloud surges, defending it is an ever increasing challenge. In 2022, 94% of cloud tenants were targeted every month, and 62% are successfully compromised. A focus on preventing breaches is no longer sufficient – data must be defensible, even after a compromise. This session explores how to expand your cybersecurity strategy, enabling you to control risk, recover quickly and safely in the event of an incident, and ensure your Google Cloud data and business stand resilient against cyberattacks.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Gain unprecedented visibility into AI applications and threats with Palo Alto Networks AI-Runtime, now easily deployed with Google Packet Mirroring/Intercept. This session reveals how this powerful combination analyzes network traffic to discover both legitimate and malicious uses of AI, enabling proactive threat detection and rapid response. Learn how to simplify deployment, improve security posture, and stay ahead of the evolving AI threat landscape.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.

Introducing Google’s next-generation global network that powers Google Cloud and our multibillion user apps like Search, YouTube, Google Maps, and more. Learn about the groundbreaking technologies and the design principles of "exponential scalability,” “beyond-NINEs reliability,” “fine-grained programmability”, and “from automation to autonomy” that have guided our next-generation architecture. Discover how you can leverage these innovations to transform your enterprise connectivity and respond to the dramatic demands of AI–powered services.

Cybersecurity threats are escalating rapidly. How can lean IT teams effectively defend against sophisticated attacks given the complex threat landscape? This session explores how Google Cloud empowers your team with advanced threat detection, vulnerability management, and incident response capabilities, enabling you to protect your organization and stay ahead of the curve.

Data sharing is essential for driving innovation in the enterprise, but ensuring security and compliance can be challenging. Join us learn from Google, LiveRamp, and Levi's about how the unified and tightly integrated data governance capabilities of BigQuery can simplify data discovery, governance, and secure sharing. Discover how to build, share, and monetize data products with robust security and compliance, while fostering a data-driven culture across your organization.

Learn how Google Cloud is transforming data and AI governance with the latest governance and catalog innovations built directly into BigQuery. Unify metadata across platforms, boost discoverability, and accelerate insights with robust governance and security features. Discover how AI-powered insights, centralized governance, and integrated policy management can help improve data quality, track lineage, and manage access control, fostering trust and transparency in your data and AI initiatives.

Google Cloud helps you build a strong layered defense with a robust set of access controls and policies. In this session you will learn how you can effectively use Google Cloud security guardrails specifically Organization Policies to achieve a strong security posture, leverage Google Cloud Policy Intelligence capabilities to effectively scale this posture across your organization. We’ll also share how Google Cloud makes it easy for you to start securely in the cloud with our security baseline capabilities. 

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

The key to maintaining a strong cloud security posture is to build from the start on a robust foundation of baseline security controls. This session delves into how Google Cloud’s Security Foundation and shared fate operating model provide prescriptive guidance for securing your infrastructure, applications, and data across various cloud adoption journeys. We’ll explore how Google Cloud’s Risk Protection Program helps you ensure your business remains resilient in the face of ever-evolving cyber risks.