talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

246

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: Google Cloud Next '25 ×

Join us as we reveal how the AURA AI Suite—AURA-SECURE, AURA-FLEX, and AURA-OMNI—is transforming enterprise AI. Experience bespoke conversational solutions for both structured and unstructured data. Discover how private GPT models secure sensitive information and dynamic insights boost productivity, decision-making, and customer engagement. Plus, see how Google Cloud services like Vertex AI, BigQuery, and Kubernetes ensure seamless integration, accelerated performance, and robust security.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Legacy productivity solutions are not designed to enable real-time, AI-assisted teamwork and reduce security and reliability risks. Join us to discover how a secure enterprise browser, a cloud-first OS, and cloud-first productivity apps can not only make your teams more collaborative and effective but also reduce the IT workload, software costs, and security risks. You’ll learn about Google’s approach, explore customer success stories, and discuss strategies to help your organization begin the journey.

session
by Tarah Lewis (Google Cloud) , Chris Morales (Netenrich) , Jonas Kelley (Google Cloud)

Transitioning from their existing threat intelligence providers to Google Threat Intelligence is a priority for many organizations, especially those leveraging VirusTotal and Mandiant offerings. Join Jonas Kelley, Google Security Sales Leader, as he moderates a conversation with Tarah Lewis, Google Security Architect, and Chris Morales, Netenrich CISO. Discover how to assess your readiness, overcome common migration challenges, and transition quickly and seamlessly to enhance your security posture with Google’s comprehensive threat intelligence.

Revolutionize your business with Intel and Google Cloud. Discover the power of Intel Xeon-based instances and Intel’s software optimizations for unparalleled efficiency and performance. Lower your total cost of ownership with Intel Trust Domain Extensions (TDX) for secure computing.​ Unlock the potential of AI with Intel Advanced Matrix Extensions (AMX) and optimize your software stack. Transform your infrastructure, engage with industry leaders, and gain insights to stay ahead in a rapidly evolving market.​

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

IAM and cloud resource posture are at the core of your security infrastructure and fundamental to cloud adoption. Google Cloud's IAM and Org Policy are evolving, enabling frictionless experiences for admins, developers and security practitioners. Our innovative platform helps you implement robust and comprehensive security controls across the enterprise with AI-enabled features for agility in your operations. Join this demo-packed session to learn about the latest innovations in IAM, access risk, cloud governance, and Gemini-powered assistance.

Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.

session
by Taylor Long (Mandiant Threat Intelligence Services) , Camille Singleton (United Healthcare Group) , Jason Tuininga (Mandiant Threat Intelligence Services)

A cyber threat profile should guide your proactive security strategy. It should point out the threats targeting you, the tools they’ll use against you, and the tactics they’ll use in an attack. Join Mandiant experts as they share how they conduct and develop cyber threat profiles. Designed for security leaders and practitioners, this session explains how to build a proactive strategy with the threat profile as the foundation.

Google Cloud’s Cross-Cloud Network delivers powerful, AI-powered network security to protect your cloud infrastructure from a wide variety of network threats. This session showcases the latest innovations, including advanced malware protection, domain name system [DNS) security, data loss prevention, network security posture controls, DDoS protection, web application protection, and a cloud-first mechanism to easily integrate third-party network security services.

This session explores how cloud-native security, powered by Google Cloud, enables organizations to streamline operations, reduce complexity, and achieve better security outcomes with a lean team. Join us for a customer success story, partner insights, and a lively panel discussion featuring industry experts on building a future-proof Security Operations Center (SOC) with limited resources.

Get a guided, hands-on experience with Google Cloud’s flagship cloud security solution. Learn how to detect cloud misconfigurations, find active threats, and use Security Command Center’s virtual red teaming to identify high-risk toxic combinations and attack paths that expose high-value cloud resources. Then see how to take action on security issues with built-in response capabilities. Learn why Security Command Center is the best security solution for Google Cloud environments.

session
by Davide Corda (Intesa Sanpaolo) , John Bottega (Enterprise Data Management Council) , Lu Yang (Google Cloud) , Art Kaluza (ANZ Bank) , Sanjay Krishnamurthi (Google Cloud)

Discover strategies for transforming your data and AI landscape by making governance a competitive advantage. Learn from industry executives on how to establish robust governance frameworks, ensuring confidence and control in your data and AI initiatives, and gain actionable insights to position your organization for successful AI-driven innovation.

Ever wonder how Google Cloud supports billions of daily users worldwide? Dive into the world of Google’s cloud regions, global expansion, and data centers. This session unveils the innovative technology behind these modern marvels and the operational expertise that keeps them humming. Learn about our cutting-edge efficiency and state-of-the-art security. Discover how innovation and sustainability is key to our design and how you can apply Google’s best practices to your own infrastructure.

Google Workspace customers are switching to Google Chat and Google Meet, AI-first collaboration tools that seamlessly integrate with the Workspace apps you use every day. Learn how they migrated from costly point solutions to enhance collaboration, improve data security, reduce costs, and unlock new levels of team productivity with Gemini.

Securing AI applications demands a full life cycle approach. Palo Alto Networks integrates AI Runtime Security and AI Security Posture Management (AI-SPM) to protect your workloads from development to runtime. Gain inline data protection, prevent model misuse, and stop zero-day threats with centralized security policies and real-time threat detection. Discover how to automate security, reduce risk, and safeguard sensitive data while enabling innovation in your AI ecosystems.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

AI agents are revolutionizing organizations by embedding AI into workflows, delivering autonomous outcomes. While this offers opportunities, it also introduces risks. To mitigate these, we must implement agent-specific controls. AI is a powerful security tool, enabling resilience & optimization at scale. Discover how Accenture’s Security AI Engineering practice is developing modular blueprints to rapidly integrate AI & agentic capabilities, accelerating security operations, bridging tooling gaps, & enhancing critical infrastructure resilience.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.