talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

246

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: Google Cloud Next '25 ×

Discover how Target modernized its MLOps workflows using Ray and Vertex AI to build scalable ML applications.  This session will cover key strategies for optimizing model performance, ensuring security and compliance, and fostering collaboration between data science and platform teams. Whether you’re looking to streamline model deployment, enhance data access, or improve infrastructure management in a hybrid setup, this session provides practical insights and guidance for integrating Ray and Vertex AI into your MLOps roadmap.

This talk explores the practical challenges and solutions of a global car manufacturer's SOC modernization. We'll move beyond theory to examine their use-case driven approach, focusing on Agile Methodology for rapid progress, Threat-Centric Design to guide security, "SOC as Code" for automation, and SOAR Playbooks for incident response. We'll share insights on optimizing log ingestion, building threat profiles, and "shifting left" by integrating security earlier in development. Additionally, we'll discuss organizational restructuring and balancing transformative change with incremental improvements. This session offers valuable lessons for security professionals modernizing their SOC in a large-scale enterprise.

It feels like there’s a new advancement happening in AI every day – but how do these discoveries go from their nascent state in the research lab to full-scale enterprise deployment?  And how do we ensure that these new tools and capabilities remain secure? Our panelists will explore this cycle of innovation – the iterative process of curiosity-driven research, practical application, and real-world impact of AI and machine learning. We'll examine practical case studies and underscore the transformative power AI has in the realm of security.  

Topics will include: 

  • How Google connects AI research with real-world solutions for some of the largest enterprises in the world
  • Google Cloud’s AI roadmap
  • Cybersecurity considerations for emerging AI tools

APIs dominate the web, accounting for the majority of all internet traffic. And more AI means more APIs, because they act as an important mechanism to move data into and out of AI applications, AI agents, and large language models (LLMs). So how can you make sure all of these APIs are secure? In this session, we’ll take you through OWASP’s top 10 API and LLM security risks, and show you how to mitigate these risks using Google Cloud’s security portfolio, including Apigee, Model Armor, Cloud Armor, Google Security Operations, and Security Command Center.

Navigating the complex world of compliance can be daunting. Join us to discover how to simplify your compliance journey on Google Cloud, enabling you to build at scale while meeting stringent industry regulations with ease.

This Session is hosted by a Google Cloud Next Sponsor.Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

In this hands-on lab, you'll learn how to create a cross-region HTTP(S) load balancer that intelligently distributes traffic to instances in multiple regions. By setting up four Compute Engine instances across two regions, you'll configure the load balancer to ensure seamless traffic routing to the right instance. This lab will help you optimize application performance, improve availability, and enhance fault tolerance across geographically distributed systems.

If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!

Discover how Apigee and Advanced API Security can help you stay protected from OWASP Top 10 API Security risks, and how to adopt a layered API security approach using Apigee and Cloud Armor together. You’ll also see how Apigee can send API security incident information to Google SecOps for centralized triage and correlation, and serve as an enforcement point for Model Armor to sanitize prompts and responses for LLMs fronted by APIs.

This demo highlights the latest innovations in Cloud Network Security covering network threat protection, network security posture controls, DDoS, web application protection, network privacy, and new mechanisms to integrate 3rd party Network Security services.

Discover how our intelligence-driven and AI-powered security operations platform, Google SecOps, combines Google’s hyper-scale infrastructure along with unparalleled visibility and understanding of cyber adversaries to enable security teams to uncover the latest cyber threats in near real-time, and surface the right context to investigate, and respond with speed and precision.

Experience how you can get ahead of the latest threats with Google Threat Intelligence. Know who’s targeting you and focus on the most relevant threats to your organization by understanding the threat actors and their ever changing tactics, techniques, and procedures (TTPs). Leverage these insights to proactively set your defenses, hunt efficiently, and respond to new and novel threats in minutes.

Learn how Google Workspace can help protect organizations from cyber threats and data loss with built-in threat defenses and zero trust security controls while supporting compliance and digital sovereignty needs. Check out our latest capabilities including AI classification for Google Drive, Gmail data loss prevention (DLP) with labels, client-side encryption (CSE) and more!

Discover how Mandiant leverages its hand-on experience with unparalleled threat intelligence and incident response to help organizations like yours tackle their top cloud security challenges. Mandiant helps organizations defend against the latest threats and prepare to respond to compromise—ultimately building confidence and advancing cyber defense capabilities.