talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

246

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: Google Cloud Next '25 ×

Building and maintaining detection rules is the cornerstone of any high-performing security operations function, but it’s often easier said than done. Join us for an in-depth exploration of detections in Google Security Operations (Google SecOps) and learn how it empowers detection teams to stay ahead of threats – from curated detections delivered out of the box by Google SecOps to address the latest threats, to building custom rules using entity graphs, AI, and the wealth of functions and context provided by Google SecOps.

Even cloud security experts can struggle with application and data compliance. Discover how Security Command Center is simplifying cloud compliance by bringing together configuration, monitoring, and evidence generation. Learn how a unified cloud compliance solution can make it easy to apply prebuilt and custom compliance frameworks, check compliance status with a centralized dashboard, and automatically generate audit reports to prove compliance.

As organizations increasingly adopt cloud technologies, threat actors have adapted their tactics to exploit vulnerabilities within cloud environments. This threat briefing explores the methods employed by malicious actors to compromise cloud services, including the exploitation of misconfigurations, weaknesses in identity and access management, and shared resources. Attendees will learn how the threat landscape is shifting and how to be more proactive by understanding how the tactics, techniques, and procedures are evolving.

The Defender’s Advantage model from Mandiant illustrates the cyber defense capabilities required to actively resist attacks and minimize the impact of a compromise. Partnering with UnitedHealth Group, we leveraged the Defender’s Advantage model to focus on continuous improvement, operationalize threat intelligence, reduce the attack surface, and implement a security validation program. We’ll share case studies and lessons learned about how we developed each of these programs to transform and enhance the organization’s cyber defense capabilities.

AI is revolutionizing observability. Learn about Cloud SQL AI-powered Database Insights and how it can help you optimize your queries and boost database performance. We’ll dive deep into the new Insights capabilities for MySQL, PostgreSQL, and SQL Server, including the Gemini-powered chat agent. Learn how to troubleshoot those tricky database performance issues and get practical tips to improve the performance of your applications.

Organizations are facing sophisticated and growing cyberthreats from commercially driven ransomware groups and state-sponsored adversaries that legacy productivity solutions struggle to defend against. Learn how Google’s multilayered approach – AI threat defenses, a reduced attack surface, and built-in security controls in Google Workspace, Chrome Enterprise, and ChromeOS – can effectively combat the most prevalent cyberthreats and block malicious actors from gaining access to your data and disrupting your business.

This session dives into the latest advancements in securing and managing your Cloud Run workloads at enterprise scale. Join us to learn about new features and techniques to meet the highest security standards, strategies for managing large-scale deployments, and solutions to common issues like IP exhaustion. Plus, one of our customers will share their firsthand experience managing a massive fleet of Cloud Run workloads.

In this session, we’ll explore how you can manage human and nonhuman identities on Google Cloud. We’ll discuss how these identities are defined, managed, and used to secure access to resources, and we’ll cover topics such as cryptographic managed workload identities, identity federation, and flexible identity onboarding options on Google Cloud.

According to Andreessen Horowitz, 93% of Fortune 500 companies surveyed currently use three or more AI model providers, and now AI agents will proliferate and become standard. With the massive shift in enterprise AI adoption and the pace of change, enterprises need to modernize their network and security to unlock the value that AI generates and keep pace with rapid changes. Learn how to make your network and security AI-ready, plus discover new innovations to reduce infrastructure costs, improve user experience, enable faster developer velocity, and protect your AI infrastructure from new security threats.

Discover the power of Google Cloud instances running on the latest Intel Xeon processors. This course will introduce you to Intel’s optimization tools, designed to help you manage and optimize your infrastructure with unmatched efficiency and performance. Learn how to leverage these cutting-edge technologies to enhance your cloud computing capabilities and drive your business forward.​

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Learn how LG AI Research uses Google Cloud AI Hypercomputer to build their EXAONE family of LLMs and innovative Agentic AI experiences based the models. EXAONE 3.5, class of bilingual models that can learn and understand both Korean and English, recorded world-class performance in Korean. The collaboration between LG AI Research and Google Cloud enabled LG to significantly enhance model performance, reduce inference time, and improve resource efficiency through Google Cloud's easy-to-use scalable infrastructure

In this hands-on lab, you’ll learn the fundamentals of networking in Google Cloud and how it differs from traditional on-premises setups. You'll build a network with three subnetworks and gain practical experience in creating firewall rules. Learn how to apply these rules using instance tags to control access across your environment. By the end of the session, you'll be equipped with the foundational knowledge to manage and secure Google Cloud networks effectively.

If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

AI application growth brings security challenges, especially in multi-tenant environments. This talk explores access control issues in agentic workflows, using Google's Reasoning Engine. We'll cover limitations of current methods, user/agent identity interplay, data isolation, and secure delegation to LLMs. Future solutions include fine-grained access control and secure identity propagation. Learn to design secure, scalable AI workflows.

Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.

Cross-Cloud Network, built on Google’s planet-scale network, has transformed how organizations connect and secure workloads, users, and data across hybrid and multicloud networks. It simplifies complexity, strengthens security, and helps deliver faster business outcomes. Join this session to learn about new innovations in 2025 with the Cross-Cloud Network that allow you to secure and optimize AI and machine learning (ML) workloads, connect global enterprises, expand network security to cover all threat vectors as you connect distributed multicloud apps, and deliver web and media workloads.

Often, cloud risks fly under the radar because organizations don’t know they have sensitive data lurking in their environment. This creates a treasure trove for attackers, particularly when it comes to high-value AI training data. In this talk, we’ll discuss how sensitive data discovery and content understanding can help reduce security and privacy risks, safeguard AI development and deployment, and drive business momentum – especially in analytics and AI.

As a cloud security professional, you are responsible for protecting your valuable cloud data. This technical session demonstrates how Security Command Center can help you automatically discover your cloud data assets, pinpoint which datasets may be at risk, define and implement the right posture controls to protect data and manage access, and provide your team with real-time alerting of data security violations. Get ready to prevent breaches, reduce insider risk, and meet compliance requirements.

Learn how Chrome Enterprise Premium can help you stay ahead of the curve in today’s ever-evolving threat landscape. In this session, we’ll dive deep into new browser-based capabilities, such as proactive data loss prevention with advanced data masking, enhanced employee phishing protection, and scaled threat prevention with Google Threat Intelligence.