This session explores how higher education organizations are leveraging AI to transform education, research, and student outcomes. Leaders from public sector and higher education institutions will share strategies for harnessing AI to educate the next generation of leaders, while addressing data privacy, security, and ethical considerations.
talk-data.com
Topic
interest-security
202
tagged
Activity Trend
This hands-on lab provides a foundational understanding of Google Cloud Virtual Private Cloud (VPC) networks. You'll learn to create and manage VPC networks, configure subnets, and implement robust firewall rules. By exploring these core networking concepts, you'll gain the practical skills to build secure and scalable network architectures within the Google Cloud environment.
If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!
Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.
Hear from Steve Banick, VP of Enterprise IT Service and Enablement for Telus, about how their organization is modernizing security with Chrome Enterprise Premium. Telus is strengthening its endpoint security by bringing data and threat protections to employees right in the web browser, and supporting secure access for its employees globally.
Meet with a Google Cloud Security expert to discuss your specific security needs and discover how our solutions can help. Plus, you can grab a complimentary copy of the “Defenders Advantage” book and a cup of coffee while you’re there.
Tired of jumping from tool to tool to bring your organization's ambitious ideas to life? Seeking an AI-powered ecosystem where your team can thrive at every phase of the development journey? We’ve got you covered. Beyond the IDE, GitHub is your personalized end-to-end platform. Join us to learn how to streamline and accelerate your workflows, no matter the enterprise need.
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
Innovating with AI and achieving digital sovereignty are not mutually exclusive. Google Workspace with Gemini is uniquely equipped to help customers leverage AI tools whilst keeping their IP private, meeting regulatory requirements and maintaining resilience against current and future attack vectors. Discover customer strategies for navigating the complexities of digital sovereignty and unlock the full potential of your organization.
Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!
Europe is leading the way in data sovereignty, privacy, and sovereign AI. Learn how Google Sovereign Cloud products, including the Trusted Partner Cloud by S3NS, empower European organizations to innovate while upholding these values. Discover how these products provide a secure and compliant environment for businesses to leverage the full potential of cloud technology. We’ll explore how the Trusted Partner Cloud, built with S3NS, meets France’s SecNumCloud regulations.
Building and maintaining detection rules is the cornerstone of any high-performing security operations function, but it’s often easier said than done. Join us for an in-depth exploration of detections in Google Security Operations (Google SecOps) and learn how it empowers detection teams to stay ahead of threats – from curated detections delivered out of the box by Google SecOps to address the latest threats, to building custom rules using entity graphs, AI, and the wealth of functions and context provided by Google SecOps.
The world of data security and privacy is changing. Quantum computing threatens traditional encryption, but you can stay ahead. Learn how to protect your AI and machine learning (ML) models and your sensitive data with cutting-edge techniques and tools like Gemini. This session covers end-to-end privacy, confidential computing with Google Cloud, navigating the post-quantum cryptography (PQC) landscape, the challenges and opportunities of PQC, and how Google Cloud is preparing you for the future.
Connect with other security professionals in our Birds of a Feather sessions. Dive into lively discussions with peers and Google Cloud experts on key security topics, including identity and access management, network security, multicloud monitoring, and more.
Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.
Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.
Bad actors are sneaky, slippery, and getting smarter all the time. However, businesses now have a powerful new defense. Advances in AI offer opportunities to arm developers with information and tools to help mitigate risks. Join us as we share perspectives on design, considerations, and challenges when deploying AI to enhance security and improve efficiencies for developers.
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
Want to deploy generative AI across your organization but not sure how to keep your sensitive data secure and compliant? Join this session to hear from industry practitioners and Google experts about the best practices and lessons learned when embarking on this journey. We will demo how you can use built-in controls to identify sensitive data in your organization and restrict access to it and share insights, admin control recommendations, and lived customer experiences.
Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.
Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.
CNAPP has always been about protecting cloud applications, and with the rise in automation and AI-scaled attacks, incidents in the cloud are unfolding faster than ever. AI-powered Cloud Detection and Response (CDR) has emerged to help teams stop cloud attacks faster than ever. Join us to learn how Palo Alto Networks is transforming security operations with a unified platform built on a single agent for cloud and endpoint security,offering best in class runtime protection.Detect, investigate, and shut down cloud attacks faster with Precision AI.
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
Empower your team to build insightful dashboards in Google SecOps. This hands-on lab provides skills to create compelling visualizations from diverse data sources, including UDM events and detections. Learn to modify dashboards, build custom charts, leverage calculations, and tell impactful security stories. Ideal for content creators who need to communicate complex security data to leadership and stakeholders. Enhance your SecOps reporting and decision-making in this hands-on session.