Even if your cloud infrastructure is configured securely, how can you make sure cloud applications do not introduce vulnerabilities? This technical session for cloud security professionals focuses on shift-left security practices, including the latest strategies for building secure applications, achieving code-to-cloud traceability of code-related issues, and getting AI-generated remediations that make it easy for application development teams to fix issues at the source.
talk-data.com
Topic
Cyber Security
246
tagged
Activity Trend
Top Events
Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.
Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.
Meet with a Google Cloud Security expert to discuss your specific security needs and discover how our solutions can help. Plus, you can grab a complimentary copy of the “Defenders Advantage” book and a cup of coffee while you’re there.
Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!
Discover how Elastic Cloud Serverless and Google Vertex AI empower the creation of AI-driven search applications with effortless scalability. This session explores Elastic's intuitive serverless architecture and dynamic scaling, integrating with Google Vertex AI to create world class search experiences. Learn how this powerful partnership simplifies deployments and accelerates innovation for modern search, observability, and security workloads.
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
Connect with other security professionals in our Birds of a Feather sessions. Dive into lively discussions with peers and Google Cloud experts on key security topics, including identity and access management, network security, multicloud monitoring, and more.
Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.
Experience the future of AI with Google Cloud! Speak with customers who are building innovative AI solutions and learn directly from them. This experience offers a real-world look into "how we built it" discussions, giving you the chance to explore the possibilities. See detailed schedule of each timeblock here.
Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.
Join us for an exclusive session where Cotality (CoreLogic) reveals its groundbreaking journey of cloud transformation with Cognizant and Google Cloud. Gain insights into the strategies that drove major achievements, including significant cost reductions, heightened security, and rapid innovation. Discover the pivotal roles of the Neuro Business Process Application and Google Geomatica in revolutionizing their operations. Don’t miss this opportunity to learn how leading-edge technology can elevate your organization’s efficiency and success.
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
Deliver, protect, and scale immersive web, media, generative AI and API experiences with the Google Cloud global frontend as part of our Cross-Cloud Network for backend infrastructure running in any cloud or on-premises. Learn about new innovations providing consistent global performance to improve user experience; advanced protection to help stop DDoS, web, API, and gen AI attacks; scalable traffic control for traffic spikes and scale; edge programmability to allow customizations and integrations; and automation to enable end-to-end deployment automation.
The Wisconsin Department of Workforce Development (DWD) is spearheading a groundbreaking digital transformation to enhance services for employers and job seekers. Through an innovative partnership with SADA and Google Cloud, the Wisconsin DWD is building a modern, secure, and user-friendly employer portal designed to streamline processes and increase accessibility. Join the Wisconsin DWD, SADA, and Google as they share insights into this transformation and explore key industry trends shaping the future of digital innovation in the public sector.
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
With rising complexity, increasing data volumes, and ever-changing threats, it’s imperative to adopt a threat-driven approach to security operations. This session explores how Google’s security products infuse threat intelligence to help organizations understand the threats that matter most to them, and ensure that they have the detections and security controls to successfully mitigate those threats. We’ll explore real-life scenarios of actual discovered threats and show how organizations can hunt, detect, and contain them.
Discover how organizations are transforming into AI-applied companies. Explore strategies for optimizing, improving, and innovating GCP operations. Learn from a holistic approach to integrating GenAI, ML, and DataOps and the capabilities enabled for GCP strategy. Explore enhancements in serverless tech, automation, and security. Don't miss out on this opportunity to be inspired and informed.
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
As AI reshapes the way we think about trust and security, GitHub is leading the charge in transforming application security. Join Brittany O’Shea, GitHub Sr. Director of Product Management, as she showcases how AI-driven advancements are revolutionizing detection, prevention, and remediation. Discover how these innovations empower developers to build secure, high-quality software by embedding security as a default, dramatically improving the nature of application security for the better.
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
Learn how a team of developers built a serverless toolkit with Cloud Run to simplify application development and deployment. This session shares best practices from Shopify for creating a robust toolkit that empowers developers to seamlessly ship serverless applications while integrating with essential Google Cloud services and adhering to security best practices. Discover how to enhance scalability, reduce toil, and boost productivity.
The size and volume of internet-based attacks continues to grow exponentially. From DDoS, bad bots, and fraud to data exfiltration and infrastructure vulnerabilities to new generative AI-specific attacks, having strong defense in depth for your internet-facing workloads is critical to keep services running and protect sensitive data. Come learn about the latest innovations from Google Cloud’s Cross-Cloud Network to protect workloads hosted in any cloud, on-premises, or colocation facility. Updates will cover Google Cloud Armor, reCAPTCHA Enterprise, Model Armor, and Apigee.
Organizations in the public sector are driving incredible transformation with the help of Google Cloud. In this session, you’ll learn how Assured Workloads, one of Google Cloud’s modern cloud solutions, allows public sector customers to easily run regulated workloads on our public cloud infrastructure. And you’ll learn how your organization can address various compliance regimes, such as Criminal Justice Information Services (CJIS), Federal Risk and Authorization Management Program (FedRAMP), International Traffic in Arms Regulations (ITAR), and more.
Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.