talk-data.com talk-data.com

Topic

interest-security

202

tagged

Activity Trend

161 peak/qtr
2020-Q1 2026-Q1

Activities

202 activities · Newest first

This talk explores the practical challenges and solutions of a global car manufacturer's SOC modernization. We'll move beyond theory to examine their use-case driven approach, focusing on Agile Methodology for rapid progress, Threat-Centric Design to guide security, "SOC as Code" for automation, and SOAR Playbooks for incident response. We'll share insights on optimizing log ingestion, building threat profiles, and "shifting left" by integrating security earlier in development. Additionally, we'll discuss organizational restructuring and balancing transformative change with incremental improvements. This session offers valuable lessons for security professionals modernizing their SOC in a large-scale enterprise.

APIs dominate the web, accounting for the majority of all internet traffic. And more AI means more APIs, because they act as an important mechanism to move data into and out of AI applications, AI agents, and large language models (LLMs). So how can you make sure all of these APIs are secure? In this session, we’ll take you through OWASP’s top 10 API and LLM security risks, and show you how to mitigate these risks using Google Cloud’s security portfolio, including Apigee, Model Armor, Cloud Armor, Google Security Operations, and Security Command Center.

Navigating the complex world of compliance can be daunting. Join us to discover how to simplify your compliance journey on Google Cloud, enabling you to build at scale while meeting stringent industry regulations with ease.

This Session is hosted by a Google Cloud Next Sponsor.Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

In this hands-on lab, you'll learn how to create a cross-region HTTP(S) load balancer that intelligently distributes traffic to instances in multiple regions. By setting up four Compute Engine instances across two regions, you'll configure the load balancer to ensure seamless traffic routing to the right instance. This lab will help you optimize application performance, improve availability, and enhance fault tolerance across geographically distributed systems.

If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!

Discover how Apigee and Advanced API Security can help you stay protected from OWASP Top 10 API Security risks, and how to adopt a layered API security approach using Apigee and Cloud Armor together. You’ll also see how Apigee can send API security incident information to Google SecOps for centralized triage and correlation, and serve as an enforcement point for Model Armor to sanitize prompts and responses for LLMs fronted by APIs.

Experience how you can get ahead of the latest threats with Google Threat Intelligence. Know who’s targeting you and focus on the most relevant threats to your organization by understanding the threat actors and their ever changing tactics, techniques, and procedures (TTPs). Leverage these insights to proactively set your defenses, hunt efficiently, and respond to new and novel threats in minutes.

Learn how Google Workspace can help protect organizations from cyber threats and data loss with built-in threat defenses and zero trust security controls while supporting compliance and digital sovereignty needs. Check out our latest capabilities including AI classification for Google Drive, Gmail data loss prevention (DLP) with labels, client-side encryption (CSE) and more!

Discover how Mandiant leverages its hand-on experience with unparalleled threat intelligence and incident response to help organizations like yours tackle their top cloud security challenges. Mandiant helps organizations defend against the latest threats and prepare to respond to compromise—ultimately building confidence and advancing cyber defense capabilities.

In this demo, see how reCAPTCHA protects your website and mobile apps against bots, account takeovers, and fraudulent transactions. Powered by Google-scale fraud intelligence telemetry from trillions of transactions, billions of users and devices, and millions of websites. Learn how Web Risk protects your business and users from unsafe websites with real-time threat intelligence. Leveraging Google's vast threat intelligence network and advanced machine learning and AI, Web Risk scans over 10 billion URLs and files daily, identifying and classifying malicious content with exceptional accuracy.

Stop by to find out why Chrome is the most trusted enterprise browser, meeting the secure enterprise browsing needs of today’s workforce. Chrome protects and empowers hundreds of millions of workers every day. By giving organizations the ability to configure the security levels that are the right fit across their organization, Chrome keeps users safe and productive.