talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

246

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: Google Cloud Next '25 ×

In this demo, see how reCAPTCHA protects your website and mobile apps against bots, account takeovers, and fraudulent transactions. Powered by Google-scale fraud intelligence telemetry from trillions of transactions, billions of users and devices, and millions of websites. Learn how Web Risk protects your business and users from unsafe websites with real-time threat intelligence. Leveraging Google's vast threat intelligence network and advanced machine learning and AI, Web Risk scans over 10 billion URLs and files daily, identifying and classifying malicious content with exceptional accuracy.

Stop by to find out why Chrome is the most trusted enterprise browser, meeting the secure enterprise browsing needs of today’s workforce. Chrome protects and empowers hundreds of millions of workers every day. By giving organizations the ability to configure the security levels that are the right fit across their organization, Chrome keeps users safe and productive.

See how Security Command Center (SCC) delivers the best cloud security for Google Cloud. The demo will highlight how SCC uses virtual red teaming to proactively find critical cloud risks. Discover how SCC integrates world-class threat intelligence from Mandiant and provides comprehensive AI Protection to secure AI workloads, models, and data. Experience how SCC responds to high-risk issues and improves your cloud security posture.

Get a guided, hands-on experience with Google Cloud’s flagship cloud security solution. Learn how to detect cloud misconfigurations, find active threats, and use Security Command Center’s virtual red teaming to identify high-risk toxic combinations and attack paths that expose high-value cloud resources. Then see how to take action on security issues with built-in response capabilities. Learn why Security Command Center is the best security solution for Google Cloud environments.

Building and maintaining detection rules is the cornerstone of any high-performing security operations function, but it’s often easier said than done. Join us for an in-depth exploration of detections in Google Security Operations (Google SecOps) and learn how it empowers detection teams to stay ahead of threats – from curated detections delivered out of the box by Google SecOps to address the latest threats, to building custom rules using entity graphs, AI, and the wealth of functions and context provided by Google SecOps.

In this hands-on lab, you’ll learn the fundamentals of networking in Google Cloud and how it differs from traditional on-premises setups. You'll build a network with three subnetworks and gain practical experience in creating firewall rules. Learn how to apply these rules using instance tags to control access across your environment. By the end of the session, you'll be equipped with the foundational knowledge to manage and secure Google Cloud networks effectively.

If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!

Google Workspace customers are switching to Google Chat and Google Meet, AI-first collaboration tools that seamlessly integrate with the Workspace apps you use every day. Learn how they migrated from costly point solutions to enhance collaboration, improve data security, reduce costs, and unlock new levels of team productivity with Gemini.

Want to deploy generative AI across your organization but not sure how to keep your sensitive data secure and compliant? Join this session to hear from industry practitioners and Google experts about the best practices and lessons learned when embarking on this journey. We will demo how you can use built-in controls to identify sensitive data in your organization and restrict access to it and share insights, admin control recommendations, and lived customer experiences.

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.

Even cloud security experts can struggle with application and data compliance. Discover how Security Command Center is simplifying cloud compliance by bringing together configuration, monitoring, and evidence generation. Learn how a unified cloud compliance solution can make it easy to apply prebuilt and custom compliance frameworks, check compliance status with a centralized dashboard, and automatically generate audit reports to prove compliance.