talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

170

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: Google Cloud Next '24 ×

In this session, Fortinet and Google Cloud will jointly present on how Fortinet's AI-powered security solution integrated with Google Cloud's native security services can help organizations make better informed decisions, rapidly respond to threats, and save time on even the most complex tasks. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

When building an application in the cloud one must be mindful of all the integrations, governance, security, and manageability aspects. In this session, Devoteam experts will share how they support Google Cloud customers by designing and implementing a self-improving and self-healing architecture using an event-driven observability solution that provides well-governed self-service for developers. Telemetries are collected from multiple sources, such as hybrid cloud and on-premise applications.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Default service accounts provide the flexibility to get started, but often have excess permissions when used in production. How do we find a balance between ease of use for developers and the security demands in production environments? This session covers the common pitfalls that can occur with default service accounts, how to move beyond default service accounts and use custom IAM roles to follow the principle of least privilege, and how to automate alerts to balance the needs of developers and security teams.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Productivity suites that store corporate email and documents such as Google Workspace are an obvious target for cyberattacks. In this session, we’ll demonstrate how to detect, respond, and best secure your Google Workspace environment using the Google’s Chronicle Security Operations platform. Get in on this session if you’re a security professional who is serious about taking Google Workspace security to the next level.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

OT environments were traditionally isolated for security to limit attack vectors and associated risks, but the benefits of connectivity are eroding this approach. As a result, new security solutions are essential to manage the risks and leverage the benefits of connected OT systems. Landis+Gyr, a provider of Utility OT solutions, is adopting a SaaS model hosted on Google Cloud. This change required careful security considerations to meet customer, regulatory, and company standards. This fireside chat will explore these security measures, the challenges of cloud adoption in isolated environments, and the thoughts on future requirements for secure cloud-connected OT. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Elastic on Google Cloud allows you to modernize your AI-powered search experiences, predictively find and resolve problems, and protect against cyber threats. Learn how to derive actionable intelligence through AI-driven insights to get the most out of your data and infrastructure using the Elastic AI Assistants for Observability and Security. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Learn how “Supply-chain Levels for Software Artifacts” when combined with “Graph for Understanding Artifact Composition” and “Software Bill of Materials” will help you defend against supply-chain attacks, guarantee artifact integrity, expose transitive dependencies, identify software security position, and visualize the dependency graphs. This Deloitte session will cover SLSA maturity models using Google Cloud core services such as Cloud Build, Software Delivery Shield, Container Scanning API to integrate guardrails into development lifecycle.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

As the sprawling web of applications continues to expand, platform engineers today are grappling with ever-increasing security, reliability, and productivity challenges. Join our experts in this session to learn how AI-assisted automation can help platform engineers standardize API creation, automate spec generation and reviews, ensure comprehensive visibility across all enterprise APIs, enforce consistent security standards, and unlock new revenue streams.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Experience the transformation. Learn how Gemini for Google Cloud uses AI to effortlessly manage Google Cloud. Get help with design, deployment, troubleshooting, and optimization directly within Google Cloud Console. Accelerate complex tasks, boost productivity, and stay focused on core business value. Gemini for Google Cloud offers goal-driven design, guided operations, and tailored optimizations, all with enterprise-grade security and privacy.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

With cyber threats on the rise, the browser should serve as a key piece of an enterprise’s security posture. Join us to hear how you can use Chrome Enterprise’s cloud management console and JAMF to create a secure enterprise browsing experience for your organization. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Learn from a panel of leading security companies about why they build customer SaaS on Google Cloud, and how they’re partnering with Google to use generative AI to drive transformational change in the industry.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

session
by Jonathan Wentz (Charles Schwab, & Co.) , Steffen Kreis (Commerzbank AG) , Florin Stingaciu (Google Cloud) , Sri B (Google Cloud)

As attackers get creative, organizations need to employ a defense-in-depth approach to mitigate data exfiltration risks and reduce the rising cost of a breach. Join us to hear from Charles Schwab, and Commerzbank on their security journey to mitigate these risks, and learn more about the Google Cloud platform security technologies, including VPC Service Controls and Organization Restrictions, and how they can be deployed to effectively address different threat vectors. Lastly, you’ll also hear from us on our latest innovation in this area, with a sneak peak at a new policy type.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

OpenTelemetry has become the standardized way of gaining visibility into application activity. There's a golden opportunity for security teams to work with wider IT organizations to leverage the benefits of improved observability, in modern environments based on GKE clusters. We'll look at combining data from the application layer with the other layers of a modern cloud native stack to get deep visibility into activity and show how this enhanced observability can improve everyone's security.

We'll look at combining data from the application layer with the other layers of a modern cloud native stack to get deep visibility into activity and show how this enhanced observability can improve everyone's security! By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Use Google Cloud products to create architecture designs that are highly secure and robust. To protect your sensitive data and maintain trust with stakeholders, building a highly secure infrastructure is imperative to ensure the overall security and stability of an organization's digital presence. Attend the session to gain insights into the elements encompassed in a secure architectural framework with cloud native tools. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Explore the revolutionary Isolator tool developed by Google Cloud Consulting, enabling secure collaboration on AI projects involving sensitive data. Understand the Zero Trust architecture behind this solution and how it integrates Google's core security products for a safe collaborative environment. Gain insights into practical applications with a focus on maintaining data integrity. Join us for this Mini Talk at 'Meet the Experts, hosted by Google Cloud Consulting' at Expo. Seating is limited and on a first-come, first served basis; standing areas are available.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

In this session we’ll create an Apigee proxy that will talk to our containerized workload on Google Cloud Run and Google Cloud SQL, where our business logic will be stored. We’ll explore Apigee capabilities like security and monetization, and build developer resources. We will also cover the concept of “treating your APIs as products.”

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

AppSec and Cloud teams have an opportunity to connect where they’re truly joined together and able to accelerate under a single, unified platform. This Palo Alto Networks cloud security session will show how to simultaneously enhance security and automation, reduce the attack surface, and lower both your team’s mean time to detection (MTTD) and mean time to resolution (MTTR) using Prisma Cloud best-of-breed capabilities in visibility, threat detection, compliance, and DevOps, from Code to Cloud.

By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Learn how Google Workspace identity and access management partners Okta and JumpCloud help customers like Winsupply and Unicity migrate off Microsoft 365 and onto Workspace to transform their collaboration capabilities while maintaining a robust security posture.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Discover how to leverage Chrome Enterprise to apply built-in security measures, including data-loss prevention and context-aware access controls, plus the latest product announcements. You’ll leave with actionable best practices, and tips to safeguard your corporate data and empower your team.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Gemini in VSCode and JetBrains integrated development environments can unlock significant improvements in software delivery and security. In this session, you’ll learn how to harness the power of Code Transformations to streamline multiple tasks of the software development lifecycle, such as code optimization or troubleshooting. You’ll also learn how Commerzbank has been leveraging AI to accelerate its software delivery velocity and code quality/security.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.