talk-data.com talk-data.com

Topic

interest-security

202

tagged

Activity Trend

161 peak/qtr
2020-Q1 2026-Q1

Activities

202 activities · Newest first

Explore how to design a customer service chatbot that prioritizes privacy and security using a multi-agent system and Gemini. We’ll cover the benefits of multi-agent architecture and share 10 best practices to safeguard user data and privacy. Experience a live demo that illustrates agent collaboration and external tool integration in action. Don’t miss this session to see how Gemini can help you deliver a secure, customer-friendly chatbot solution.

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

Driven by tectonic shifts and rapid innovation, the era we’re in has been dubbed by many as “the great SIEM migration” because organizations are reevaluating their legacy SIEMs and moving to modern SecOps platforms. In this expert panel, organizations will share insights and best practices from their own SIEM migration journeys.

Security Command Center is the must-have risk management solution for Google Cloud. In this session, you’ll learn how to use Security Command Center to proactively manage threats, posture, data, and identities, and how to respond to security events to protect your entire cloud footprint.

Transitioning from their existing threat intelligence providers to Google Threat Intelligence is a priority for many organizations, especially those leveraging VirusTotal and Mandiant offerings. Join Jonas Kelley, Google Security Sales Leader, as he moderates a conversation with Tarah Lewis, Google Security Architect, and Chris Morales, Netenrich CISO. Discover how to assess your readiness, overcome common migration challenges, and transition quickly and seamlessly to enhance your security posture with Google’s comprehensive threat intelligence.

Revolutionize your business with Intel and Google Cloud. Discover the power of Intel Xeon-based instances and Intel’s software optimizations for unparalleled efficiency and performance. Lower your total cost of ownership with Intel Trust Domain Extensions (TDX) for secure computing.​ Unlock the potential of AI with Intel Advanced Matrix Extensions (AMX) and optimize your software stack. Transform your infrastructure, engage with industry leaders, and gain insights to stay ahead in a rapidly evolving market.​

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

IAM and cloud resource posture are at the core of your security infrastructure and fundamental to cloud adoption. Google Cloud's IAM and Org Policy are evolving, enabling frictionless experiences for admins, developers and security practitioners. Our innovative platform helps you implement robust and comprehensive security controls across the enterprise with AI-enabled features for agility in your operations. Join this demo-packed session to learn about the latest innovations in IAM, access risk, cloud governance, and Gemini-powered assistance.

Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.

session
by Taylor Long (Mandiant Threat Intelligence Services) , Camille Singleton (United Healthcare Group) , Jason Tuininga (Mandiant Threat Intelligence Services)

A cyber threat profile should guide your proactive security strategy. It should point out the threats targeting you, the tools they’ll use against you, and the tactics they’ll use in an attack. Join Mandiant experts as they share how they conduct and develop cyber threat profiles. Designed for security leaders and practitioners, this session explains how to build a proactive strategy with the threat profile as the foundation.

Google Cloud’s Cross-Cloud Network delivers powerful, AI-powered network security to protect your cloud infrastructure from a wide variety of network threats. This session showcases the latest innovations, including advanced malware protection, domain name system [DNS) security, data loss prevention, network security posture controls, DDoS protection, web application protection, and a cloud-first mechanism to easily integrate third-party network security services.

This session explores how cloud-native security, powered by Google Cloud, enables organizations to streamline operations, reduce complexity, and achieve better security outcomes with a lean team. Join us for a customer success story, partner insights, and a lively panel discussion featuring industry experts on building a future-proof Security Operations Center (SOC) with limited resources.

Get a guided, hands-on experience with Google Cloud’s flagship cloud security solution. Learn how to detect cloud misconfigurations, find active threats, and use Security Command Center’s virtual red teaming to identify high-risk toxic combinations and attack paths that expose high-value cloud resources. Then see how to take action on security issues with built-in response capabilities. Learn why Security Command Center is the best security solution for Google Cloud environments.

session
by Davide Corda (Intesa Sanpaolo) , John Bottega (Enterprise Data Management Council) , Lu Yang (Google Cloud) , Art Kaluza (ANZ Bank) , Sanjay Krishnamurthi (Google Cloud)

Discover strategies for transforming your data and AI landscape by making governance a competitive advantage. Learn from industry executives on how to establish robust governance frameworks, ensuring confidence and control in your data and AI initiatives, and gain actionable insights to position your organization for successful AI-driven innovation.

Ever wonder how Google Cloud supports billions of daily users worldwide? Dive into the world of Google’s cloud regions, global expansion, and data centers. This session unveils the innovative technology behind these modern marvels and the operational expertise that keeps them humming. Learn about our cutting-edge efficiency and state-of-the-art security. Discover how innovation and sustainability is key to our design and how you can apply Google’s best practices to your own infrastructure.

Securing AI applications demands a full life cycle approach. Palo Alto Networks integrates AI Runtime Security and AI Security Posture Management (AI-SPM) to protect your workloads from development to runtime. Gain inline data protection, prevent model misuse, and stop zero-day threats with centralized security policies and real-time threat detection. Discover how to automate security, reduce risk, and safeguard sensitive data while enabling innovation in your AI ecosystems.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

AI agents are revolutionizing organizations by embedding AI into workflows, delivering autonomous outcomes. While this offers opportunities, it also introduces risks. To mitigate these, we must implement agent-specific controls. AI is a powerful security tool, enabling resilience & optimization at scale. Discover how Accenture’s Security AI Engineering practice is developing modular blueprints to rapidly integrate AI & agentic capabilities, accelerating security operations, bridging tooling gaps, & enhancing critical infrastructure resilience.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.