talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

246

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: Google Cloud Next '25 ×
session
by Kaushik Bhandankar (Google Cloud) , Chee Kin Loh (Centre for Strategic Infocomm Technologies) , Rohan Grover (Google Cloud)

Organizations with strict data residency requirements often struggle to leverage AI and the latest in cloud innovations on-premises. Learn how to architect gen AI optimized applications for success using LLMs, cloud infrastructure, and data on-premises without compromising on data sovereignty, security, or latency in this technical deep dive session.

Get a guided, hands-on experience with Google Cloud’s flagship cloud security solution. Learn how to detect cloud misconfigurations, find active threats, and use Security Command Center’s virtual red teaming to identify high-risk toxic combinations and attack paths that expose high-value cloud resources. Then see how to take action on security issues with built-in response capabilities. Learn why Security Command Center is the best security solution for Google Cloud environments.

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

Get equipped with the knowledge and resources to effectively position Google Cloud Security offerings within the market and build a thriving service-oriented business. Learn how to leverage Google Cloud's cutting-edge security solutions that seamlessly integrate with Google Cloud Platform (GCP) and Google Cloud Workspace (GWS) to differentiate your offerings and win in the market. Walk away with a clear understanding of the latest trends in security, strategies for building a thriving pratice.

eBPF has revolutionized Kubernetes networking. Cilium, the leading eBPF-based container networking interface (CNI), is now emerging as a standard on major cloud providers like Google Kubernetes Engine (GKE). It provides superior scalability, security, and observability compared to traditional CNIs. eBPF also powers Hubble for network & security insights and Tetragon for runtime security enforcement. Find out how to leverage these tools to get the most out of your GKE cluster.

Code assist tools are transforming software development, enhancing productivity with intelligent suggestions and automation. Yet they also pose challenges in ensuring code security, managing observability, and addressing risks from automation. Join experts from Google Cloud, Datadog, GitLab, Harness, and Snyk in a dynamic panel as they explore the potential of code assist tools and share strategies to mitigate risks, safeguard workflows, and maximize the impact of these tools in today’s fast-paced development landscape.

This talk explores a comprehensive key management strategy designed to safeguard your critical assets, now and in the future. We’ll focus on the foundation of modern key management, evolving cloud hardware security offerings, sovereign key management, and cloud key management. By combining the strengths of advanced hardware security module (HSM) technology, sovereign key management principles, and the flexibility of cloud environments, organizations can build a robust and future-proof security posture.

Mandiant has observed that organizations continue to lack visibility into cloud threats and fail to enable the logs required for effective incident detection and response. This session provides guidance for building a cloud logging and detection strategy, based on lessons learned from Mandiant’s incident response engagements. You’ll learn about incident case studies that show how cloud logging gaps can lead to undetected attacker activity and ineffective investigations.

Model Armor is designed to protect your organization’s AI applications from security and safety risks. In this session, we’ll explore how Model Armor acts as a crucial layer of defense, screening both prompts and responses to identify and mitigate threats such as prompt injections, sensitive data leakage, and offensive content. Whether you’re a developer looking to implement AI safety or a professional interested in better visibility into AI applications, Model Armor offers comprehensive yet flexible security across all of your large language model (LLM) applications.

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

Unlocking insights often requires data collaboration between different organizations, which raises important questions about privacy and data security. Learn how Google and one of our customers use confidential computing solutions to apply new approaches to data security, isolation, and transparency – all through the use of Confidential Computing and Trusted Execution Environments (TEEs). TEEs can transform privacy obligations into real-world, technical solutions that enable businesses of all sizes to thrive while respecting people’s privacy.

Businesses and public sector organizations are transitioning away from legacy digital workplace solutions to enhance productivity and collaboration, optimize IT costs and workload, and better mitigate security and compliance risks with modern, secure-by-design architecture and controls. Join this session to discover how organizations of all sizes have transformed their organization’s collaboration and improved the security posture with Google Workspace and leading identity and device management solutions from Okta, Omnissa, and JumpCloud.

Balancing developer agility with security compliance is a key challenge in AI-driven, cloud-native development. Learn how Docker and Google Cloud integrate security into every phase of the software lifecycle—enabling teams to build, test, and deploy AI features and applications with confidence. Embed security in developer workflows, enhance supply chain integrity with SLSA provenance and SBOM attestations, and leverage trusted content on seamless workflows with Google Cloud.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Join GXO's SVP of Data/AI/ML, Ramin Rastin, and Senior Director of Data, Americo, as they share their remarkable journey of implementing Generative AI and Vertex AI within their organization. Discover how GXO leveraged Google Cloud's cutting-edge technology to achieve significant scalability and efficiency gains, enhance business operations, and improve user experience. In this session, you'll learn how GXO: Scaled rapidly: Deployed 15-20 AI-powered assistants within the first six months of 2025, each reducing workloads by 40-60%. Enhanced flexibility: Developed a Generic Chat Assistant mid-project to adapt to evolving business needs. Improved accessibility: Created an intuitive user interface for all users, regardless of technical expertise. Centralized control: Implemented an Admin Page with role-based access control for enhanced security and governance.

Enhance your team's Google SecOps proficiency with our hands-on lab. Learn to leverage the alert graph for streamlined triage, in-depth investigations, and optimized YARA-L rule modification. This workshop equips analysts with skills to efficiently manage alerts, improve detection accuracy, and strengthen your security posture. Drive operational efficiency and reduce response times. Ideal for security analysts seeking to maximize their Google SecOps expertise.

Architect and deploy secure cross-cloud networks with confidence. This session delivers expert guidance on designing and deploying Google Cloud’s Cross-Cloud Network security solutions to help protect against a wide range of network threats, including exploits, malware, DDoS, data exfiltration, and more. Discover best practices for configuring Cloud NGFW, Cloud Armor, and Secure Web Proxy (Cloud SWP) to address critical security concerns and build a resilient cloud infrastructure.

session
by Ed Olson-Morgan (Marsh McLennan) , Swarup Pogalur (Wells Fargo) , Geir Sjurseth (Google Cloud) , Antony Arul (Google Cloud)

Organizations are racing to deploy generative AI solutions built on large language models (LLMs), but struggle with management, security, and scalability. Apigee is here to help. Join us to discover how the latest Apigee updates enable you to manage and scale gen AI at the enterprise level. Learn from Google’s own experience and our work with leading customers to address the challenges of productionizing gen AI.