talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

170

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: Google Cloud Next '24 ×

Move on from “keeping the lights on!” Discover how customers increased their pace of innovation and built the business case migrating to Google Cloud‘s managed databases. Learn from real-world case studies showing quantifiable gains in productivity, cost optimization, and enhanced security. Calculate the return on investment of modernizing using managed databases and leverage Google Cloud‘s support and investment programs. Leave with compelling business case for managed databases and learn more about Google Cloud‘s migration cost abatement programs.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Good intelligence goes further than data analysis, it’s actionable. With a strong intelligence-led security strategy you may be able to limit the impact of incidents and respond quickly. Without a strategy you may just have to pick up the pieces and start from scratch. Join Holly as she shares trade-craft and “learning moments” as a cyber threat intelligence professional. She will share how she and her team use threat intelligence to convey issues to stakeholders effectively, how it has guided successful actions with a few near misses, and key learnings she has experienced along the way. Please note: seating is limited and on a first-come, first served basis; standing areas are available

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Get the inside story of CME Group's successful digital and security transformation journey, directly from the company's CIO and CISO. This high-value session will review challenges, learnings, and winning strategies, making it a must-attend for organizations contemplating their own move to a secure multicloud hybrid environment.

By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Imagine a world where your focus is solely on crafting exceptional services for your customers, while Google handles the heavy lifting of security, scale, and reliability - enter Cloud Service Mesh. We've melded Anthos Service Mesh's Istio-powered capabilities with Traffic Director's Google-scale and deep network integration, creating a globally scalable, fully managed, enterprise-grade Cloud Service Mesh (CSM). A proverbial best of both worlds. CSM enables you to rapidly deliver secure, scalable, and reliable applications to your customers.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Classic VDI infrastructure has many limitations that negatively impact developer satisfaction & productivity. Join this talk to learn more about how Xebia helps clients modernizing and empowering their developers with Cloud Workstations providing features such as customized machine-types, faster builds, pre-configured tools & faster tests while requiring advanced enterprise security features such as vulnerability management, advanced data-exfiltration & data-protection controls, encrypted disks & Zero Trust.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Proactively defend your organization's cloud network with Google Cloud's machine learning-powered zero-trust architecture. This demo-packed session reveals the latest Cloud next-generation firewall (NGFW), Secure Web Proxy and Cloud Armor enhancements, partner integrations, and real-world use cases. Learn to neutralize unauthorized access, sensitive data loss, and other cloud attack vectors across public and hybrid cloud environments.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

In the face of unprecedented technological change and security threats, TD is unlocking business velocity through cloud transformation. Expecting more from its cloud provider, Google Cloud’s shared fate model has helped TD accelerate its transformation with peace of mind. Learn how TD is building out a next-generation computer, data, and generative AI platform designed to expand its business capabilities, create a next generation user experience, drive innovation, and enhance the bank’s security posture.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

As organizations increasingly adopt cloud technologies, their ecosystems often become more complex and therefore more challenging to manage. In this session, we will discuss the journey of adopting observability practices to effectively monitor and manage ever changing cloud environments.

We will explore the key elements of observability - spanning infrastructure, applications, and users, while maintaining security and controlling costs. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Learn how Snap detects and prevents data loss by deploying Chrome Enterprise with native data protection controls. We’ll cover why a secure enterprise browser is a strategic asset to security teams and how Snap is using Chrome Enterprise to generate and enforce Chrome data classification and protection to protect content accessed, downloaded, uploaded, or printed via Chrome Enterprise. Please note: seating is limited and on a first-come, first served basis; standing areas are available

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

session
by Ganesh Chilakapati (Google) , Simon Goldsmith (OVO) , Luke Camery (Google Cloud) , Jeremy Gibbons (Air Liquide) , Soren Thomassen (United Nations Population Fund (UNFPA))

Curious to understand how Gemini in Gmail, Google Drive, and other Google Workspace apps can ground their generated responses based on your documents and emails while keeping your organization’s data private? Still have questions about what Gemini does and does not do with your data? Join this session to get answers to your questions, learn more about the built-in privacy and security controls in Gemini for Google Workspace, and understand how your organization can achieve digital sovereignty with Sovereign Controls.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

The democratization of AI has accelerated the development and deployment of powerful machine learning models. While this trend offers immense potential, it also raises critical concerns about security, privacy, and responsible AI governance. Join this session to learn how enterprises are using the Vertex AI platform to safely enable their organizations to build, customize, and use AI at scale.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Sonatype’s State of Software Supply Chain report recorded a 650% year-over-year increase in software supply chain attacks in 2021. With increasing security breaches classified as software supply chain attacks over the last few years, it’s vital to keep your software supply chain secure. Join this discussion with Google Cloud and executives from industry-leading independent software vendors in the Developer tools ecosystem. They’ll cover what's trending at the intersection of DevOps, Security, and generative AI and understand best practices to secure your software delivery by building an AI-powered end-to-end secure software supply chain.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Any new technology brings potential new risks, and generative AI is no exception. In this session, we will cut through the FUD around gen AI deployments - helping you understand the real risks, both existing and novel, with deploying AI systems in the cloud. We’ll also provide a framework for how to support the safe use of AI in your organization, so that security, privacy, and risk concerns, real and imagined, can be addressed effectively without slowing business velocity.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

The rapidly evolving cyberthreat landscape requires all organizations to be vigilant about their digital interactions and to take a proactive approach to cybersecurity. In this session, we’ll share how automatic defenses powered by Google AI in Gmail, Google Drive, and across Google Workspace protect your organization from various external threats, including new enhancements and best practices to help you build the best security posture for your organization. And our customers will share how they use Workspace to keep their organizations safe from cyberattacks.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

In today's rapidly evolving threat landscape, organizations need intelligent security solutions powered by AI. This session will explore how Palo Alto Networks and Google Cloud combine to deliver innovative security solutions that leverage the power of AI to protect your business initiatives at scale. Join us as we dive into our approach, highlighting key collaborations, solution benefits, and the real-world use-cases for customers.

By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Use Google Cloud products to create architecture designs that are highly secure and robust. To protect your sensitive data and maintain trust with stakeholders, building a highly secure infrastructure is imperative to ensure the overall security and stability of an organization's digital presence. Attend the session to gain insights into the elements encompassed in a secure architectural framework with cloud native tools. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Cloud-native applications can be complex, but securing them shouldn’t be. Learn how CrowdStrike Falcon Cloud Security enables DevOps and SecOps to discover weak spots in their container images, prevent malicious behavior on Kubernetes clusters, visualize sensitive data flows, and discover misconfigurations across all of their cloud accounts. This session is for anyone responsible for application or cloud security. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

The cybersecurity landscape continues to shift, with significant changes from a risk, regulatory, and technology perspective. Board members, business leaders, CIOs and CISOs will need to understand the impacts of these changes and adjust their strategies and operations. In this session, Google leaders will share our up-to-date perspective on what leaders need to know about current cyber threats, addressing evolving global regulation around security incidents, and the essential role AI will play in helping defend our organizations.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Personal transformation came first, then technology innovation followed. Top women leaders who serve on boards, make investment decisions, and lead companies, share insights about their own personal strength building that broke barriers and inspired action to move forward boldly toward innovation with the diversity needed to advance technology, security, and careers. Hear the way groundbreaking leaders shatter norms, embrace diversity, and create and evaluate innovation for security.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Want to hear about the latest security and digital sovereignty capabilities in Google Workspace? Curious to know how we are leveraging AI to keep your users and data safe? We will show you how the digital sovereignty and privacy capabilities in Workspace can help keep your most sensitive data confidential and compliant. You will also learn how the built-in zero trust and data protection controls can make it easier for your teams to manage access and prevent data loss. Please note: seating is limited and on a first-come, first served basis; standing areas are available

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.