Discover how Target modernized its MLOps workflows using Ray and Vertex AI to build scalable ML applications. This session will cover key strategies for optimizing model performance, ensuring security and compliance, and fostering collaboration between data science and platform teams. Whether you’re looking to streamline model deployment, enhance data access, or improve infrastructure management in a hybrid setup, this session provides practical insights and guidance for integrating Ray and Vertex AI into your MLOps roadmap.
talk-data.com
Topic
Cyber Security
246
tagged
Activity Trend
Top Events
This talk explores the practical challenges and solutions of a global car manufacturer's SOC modernization. We'll move beyond theory to examine their use-case driven approach, focusing on Agile Methodology for rapid progress, Threat-Centric Design to guide security, "SOC as Code" for automation, and SOAR Playbooks for incident response. We'll share insights on optimizing log ingestion, building threat profiles, and "shifting left" by integrating security earlier in development. Additionally, we'll discuss organizational restructuring and balancing transformative change with incremental improvements. This session offers valuable lessons for security professionals modernizing their SOC in a large-scale enterprise.
It feels like there’s a new advancement happening in AI every day – but how do these discoveries go from their nascent state in the research lab to full-scale enterprise deployment? And how do we ensure that these new tools and capabilities remain secure? Our panelists will explore this cycle of innovation – the iterative process of curiosity-driven research, practical application, and real-world impact of AI and machine learning. We'll examine practical case studies and underscore the transformative power AI has in the realm of security.
Topics will include:
- How Google connects AI research with real-world solutions for some of the largest enterprises in the world
- Google Cloud’s AI roadmap
- Cybersecurity considerations for emerging AI tools
APIs dominate the web, accounting for the majority of all internet traffic. And more AI means more APIs, because they act as an important mechanism to move data into and out of AI applications, AI agents, and large language models (LLMs). So how can you make sure all of these APIs are secure? In this session, we’ll take you through OWASP’s top 10 API and LLM security risks, and show you how to mitigate these risks using Google Cloud’s security portfolio, including Apigee, Model Armor, Cloud Armor, Google Security Operations, and Security Command Center.
Learn about key security features and practices to help you build and deploy agents securely using Vertex AI.
Chat with a Mandiant expert about services to help you use AI securely, assess AI for vulnerabilities, red team, and use AI to help defend against cyberattacks.
Navigating the complex world of compliance can be daunting. Join us to discover how to simplify your compliance journey on Google Cloud, enabling you to build at scale while meeting stringent industry regulations with ease.
This Session is hosted by a Google Cloud Next Sponsor.Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
In this hands-on lab, you'll learn how to create a cross-region HTTP(S) load balancer that intelligently distributes traffic to instances in multiple regions. By setting up four Compute Engine instances across two regions, you'll configure the load balancer to ensure seamless traffic routing to the right instance. This lab will help you optimize application performance, improve availability, and enhance fault tolerance across geographically distributed systems.
If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!
Discover how Apigee and Advanced API Security can help you stay protected from OWASP Top 10 API Security risks, and how to adopt a layered API security approach using Apigee and Cloud Armor together. You’ll also see how Apigee can send API security incident information to Google SecOps for centralized triage and correlation, and serve as an enforcement point for Model Armor to sanitize prompts and responses for LLMs fronted by APIs.
Simplify your compliance journey on Google Cloud. This demo showcases how to build at scale while meeting stringent compliance and regulations. Explore tools and strategies that streamline compliance processes, reducing complexity and enabling you to focus on innovation.
This demo highlights the latest innovations in Cloud Network Security covering network threat protection, network security posture controls, DDoS, web application protection, network privacy, and new mechanisms to integrate 3rd party Network Security services.
Explore how Google Cloud provides built-in secure controls to help you maintain a strong cloud security posture. See in action how Google Cloud’s Security Foundation recommended products help address most common cloud adoption use cases, including infrastructure modernization, securing AI workloads, data analytics, and application modernization.
Protect your sensitive data in the cloud. This demo explores how to discover, classify, and redact sensitive information like PII and PHI across your cloud footprint using Google Sensitive Data Protection. See how to leverage encryption, key management, and confidential computing to further secure your data in transit, at rest, and in use.
Sign up for the online Google Community focused on security and get a free gift--while supplies last.
Discover how our intelligence-driven and AI-powered security operations platform, Google SecOps, combines Google’s hyper-scale infrastructure along with unparalleled visibility and understanding of cyber adversaries to enable security teams to uncover the latest cyber threats in near real-time, and surface the right context to investigate, and respond with speed and precision.
Experience how you can get ahead of the latest threats with Google Threat Intelligence. Know who’s targeting you and focus on the most relevant threats to your organization by understanding the threat actors and their ever changing tactics, techniques, and procedures (TTPs). Leverage these insights to proactively set your defenses, hunt efficiently, and respond to new and novel threats in minutes.
Make Google part of your security team.
Learn how Google Workspace can help protect organizations from cyber threats and data loss with built-in threat defenses and zero trust security controls while supporting compliance and digital sovereignty needs. Check out our latest capabilities including AI classification for Google Drive, Gmail data loss prevention (DLP) with labels, client-side encryption (CSE) and more!
Cloud IAM is critical to your security infrastructure, and fundamental to cloud adoption. In this demo, you can learn how Google Cloud’s next generation IAM leverages AI across the full stack of IAM, policy management, and access to help you easily and correctly implement security controls that protect your users, infrastructure, data, and application.
Discover how Mandiant leverages its hand-on experience with unparalleled threat intelligence and incident response to help organizations like yours tackle their top cloud security challenges. Mandiant helps organizations defend against the latest threats and prepare to respond to compromise—ultimately building confidence and advancing cyber defense capabilities.