talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

170

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: Google Cloud Next '24 ×

Retrieval Augmented Generation (RAG) is a powerful technique to provide real time, domain-specific context to the LLM to improve accuracy of responses. RAG doesn't require the addition of sensitive data to the model, but still requires application developers to address security and privacy of user and company data. In this session, you will learn about security implications of RAG workloads and how to architect your applications to handle user identity and to control data access.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

In this session, we'll dive into deploying Java apps using Google Cloud's serverless platform. Designed for Java developers, it offers practical insights into consideration, challenges, tips and tricks for deploying JVM applications in Serverless platforms. We’ll also cover other best practices across different part of the application lifecycle, such as CI/CD pipelines, security, and observability. Through interactive demos, learn to build, secure, and monitor Java applications efficiently.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Which software vulnerabilities in my cloud environment pose the greatest risk, and how do I fix them quickly? What’s the best way to prevent over-permissioned identities from leading to unauthorized cloud access? Join this technical session and learn how new vulnerability response and cloud identity and entitlement management capabilities in Security Command Center can help strengthen your overall risk posture.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

session
by Mike Eacrett (Google Cloud) , Lalit Patil (SAP) , Souvik Choudhury (Google Cloud) , Alex Joseph (Google Cloud) , Mangesh Dabaki (Google Cloud)

Plan, migrate, and deploy your mission-critical SAP workloads on Google Cloud’s highly available, secure, and scalable certified infrastructure. In this technical session, learn how our customers use SAP-specific tools and infrastructure to improve availability, performance, and security based on proven best practices. Post-deployment, learn how customers use Google Cloud’s SAP-optimized workload management tools to ensure smooth, efficient operations of and continuously high availability for their SAP applications.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

This session offers a hands-on guide to building your first generative AI application within the secure and controlled infrastructure of Google Distributed Cloud Hosted. Explore the potential of generative AI while ensuring data security and meeting compliance requirements in air-gapped settings.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Cyberattacks are rising, and businesses need to protect themselves in the cloud. In this session, we’ll discuss the latest trends in cloud security and how businesses can integrate security services in the cloud to mitigate risks. We’ll also hear from a panel of cybersecurity experts from Exabeam and Palo Alto Networks whose expertise and services will optimize your security posture, drive business value, and keep you ahead of emerging threats. Tap into a wealth of cybersecurity knowledge to get the most out of your investment.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

API attacks are on the rise, threatening your applications and sensitive data. Apigee's Advanced API Security helps detect API abuses with machine learning models training on a corpus of traffic from Google’s services like YouTube. Join us in this session to learn how Apigee customizes these models for each customer to improve precision in detecting malicious activity.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Web Security Scanner identifies security vulnerabilities in your App Engine, Google Kubernetes Engine (GKE), and Compute Engine web applications. This service crawls your application, following all links within the scope of your starting URLs, and attempts to exercise as many user inputs and event handlers as possible. It can automatically scan and detect four common vulnerabilities, including cross-site-scripting (XSS), flash injection, mixed content (HTTP in HTTPS), and outdated/insecure libraries. In this spotlight lab, you will use Web Security Scanner—one of Security Command Center's built-in services—to scan a Python Flask application for vulnerabilities.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

IHG Hotels & Resorts, managing 6,500+ hotels across 19 brands, faced data challenges amidst rapid growth. Cognizant & Google Cloud helped modernize their infrastructure. Using Data Fusion & migration tools, 320TB of data moved from Teradata to BigQuery, enabling scalability, security, and advanced analytics. This laid the foundation for IHG's future growth and empowers data-driven decision-making. Please note: seating is limited and on a first-come, first served basis; standing areas are available. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

session
by Brian Fahs (Google Cloud) , Chris Muir (Priceline) , Tom Briggs (Priceline) , Victor Moreno (Google Cloud) , Manisha Gupta (Google Cloud)

This session discusses how to secure user-to-application communications in a multicloud environment using Google’s Cross-Cloud Network cloud-first integration of Secure Access Service Edge (SASE) solutions. We will discuss how the cloud-first integration of Secure Service Edge (SSE) stacks optimizes the performance, effectiveness, and operations of the stack, and illustrate this with a demo. We will study a customer design for a multi-regional multicloud deployment securing users accessing public and private applications from any location.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Serverless is a new paradigm – and sometimes a scary one when it’s disruptive. We'll cover all the security aspects of a traditional web application about network routing, public exposure, secret management, and more. In this session you’ll learn how to increase your security posture in a serverless environment and will be able to apply its implementation in your next serverless application.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Feeling overwhelmed by multicloud security? Ditch the complexity and attend this fast-paced session for a refreshing perspective. Learn seven powerful multicloud security strategies in this session that touch on the usage of built-in guardrails, security of data across realms, choosing the right tools, automation of security processes, risk and threat assessments, and enabling your cloud team with the right skill set. You’ll leave with some actionable steps that you can take to ensure security of multicloud deployments.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

This lecture delves into the evolution from LLMOps to GenOps, showcasing how the GenOps solution revolutionizes Generative AI with its cutting-edge security and governance framework powered by Google Cloud. It highlights the necessity of continuous security throughout the AI lifecycle and the strategic integration of ethical guidelines and compliance measures, ensuring safe, compliant, and efficient AI operations. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

This talk will focus on understanding what CNAPP is and its major pillars for cloud infrastructure and application security. Explore why a ״shift-right״ security approach and runtime insights are crucial for dynamic, modern cloud-native security that effectively consolidates Devs, Sec & Ops contextual analysis from runtime to code. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

In the era of multimodal generative AI, a unified governance-focused data platform powered by Gemini becomes paramount. Join this session to learn how BigQuery fuels your data and AI lifecycle from training to inference, by unifying structured and unstructured data such as text, images and audio, while encompassing security and governance. Learn how Priceline is using BigQuery and Vertex AI to reinvent customer experiences and lead the industry in data and AI innovation.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Explore the latest advances in Cloud's key management services. You’ll see demos focusing on data protection services that help meet our customers’ most stringent data security, privacy, and compliance needs, including the latest release of AutoPilot, HSM, and more.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Learn how Thales, a leader in global data security, has partnered with Google Workspace to help organizations across the world maintain granular data control and localized encryption to meet stringent regional and industry requirements around data privacy and sovereignty. Thales and Google will share how organizations can leverage Gemini and Google Workspace apps while keeping their sensitive data private.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

More customers are moving their critical workloads to Cloud SQL for SQL Server to take advantage of built-in high availability, data protection, security, and integration with other Google Cloud services. In this session, we’ll explore new capabilities that make it easier than ever to manage and scale your SQL Server databases with Cloud SQL, and we’ll dig into how to minimize downtime during migration using the Database Migration Service.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Unlock the full potential of your cloud journey without sacrificing security. This session showcases the latest network security innovation from Palo Alto Networks and Google Cloud, designed to elevate your cloud security posture with unmatched ease of use. Join us and discover the next generation of Google Cloud network firewall protection. Watch a solution overview and customer use-case discussion on an offering that provides a cloud-first, easy to deploy operation, powered by Palo Alto Networks’ threat prevention technologies. Please note: seating is limited and on a first-come, first served basis; standing areas are available. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Kevin A. “KAM” McGrail KAM will start with a foundation on what Artificial Intelligence is, its impact on the CIA security model, & a quick history lesson about AI-Enabled cyberattacks. He will then discuss other problems including discussing AI policy & the new Shadow IT threat AI tools present. Finally, Kevin will discuss a few key solutions including using his signature, "Think Evil" process for cybersecurity. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.