talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

246

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: Google Cloud Next '25 ×

Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.

In this hands-on lab, you'll learn how to create a cross-region HTTP(S) load balancer that intelligently distributes traffic to instances in multiple regions. By setting up four Compute Engine instances across two regions, you'll configure the load balancer to ensure seamless traffic routing to the right instance. This lab will help you optimize application performance, improve availability, and enhance fault tolerance across geographically distributed systems.

If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.

In the ongoing battle against cyberthreats, AI can unlock new levels of efficiency, accuracy, and proactive defense. In this session, a Google Security Operations customer will delve into practical use cases where AI is already delivering tangible benefits to security teams. We’ll also introduce new capabilities designed to automatically triage and analyze alerts. Join us to learn how you can put Gemini to work to enable more precise threat detection and faster incident response in your environment.

session
by Nitin Garg (Google Cloud) , Ian Mortimer (Pexip) , Matthias Rosker (SAP) , Matt Garr (Google Cloud) , Michael Clark (Palo Alto Networks)

Navigating the complex world of compliance can be daunting. Join us to discover how to simplify your compliance journey on Google Cloud, enabling you to build at scale while meeting stringent industry regulations with ease.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

We will delve into the practical applications of AI-assisted coding within a large organization, highlighting the specific ways Ulta Beauty's developers are utilizing Gemini Code Assist to streamline workflows. Understand how Ulta successfully gained buy-in from both management and engineering teams by demonstrating the tool's value and addressing potential concerns. Learn about Ulta's thoughtful approach to integrating new AI technologies while prioritizing security, responsible usage, and alignment with existing development processes. 

session
by Prashant Kumar (Google Cloud) , Prateek Jain (Google Cloud) , Ram P (Google Cloud) , Henry Tze (Virgin Media)

Level up your cloud security with Google Cloud’s next-generation identity and access management (IAM). This session explores how modern cloud IAM capabilities – including next-gen unified access policies, fine-grained access control, privileged access management, and policy intelligence – can improve your cloud security posture. Join us to learn how to streamline access, enforce consistent policies, and proactively mitigate risks in today’s dynamic cloud landscape.

Gain valuable insights into how working with Google Cloud's security offerings can boost your success in this rapidly growing market. Learn about our go-to-market strategy and existing sales plays. Additionally, discover security-specific programs and incentives available only to Google Cloud partners. Our available resources and trainings in positioning, selling, and deploying Google Cloud Security products will help up-skill your team and maximize your profitability with Google Cloud.

Geographical redundancy is a key pillar of a resilient data architecture. With BigQuery cross-region dataset replication and managed disaster recovery, you can ensure your mission-critical apps remain available even in the unlikely event of a region-level infrastructure outage. Learn how this built-in capability protects your data and workloads against regional outages and ensures uninterrupted data access for your organization.

Choosing the right cloud infrastructure can make or break your business strategy. Join us in this enlightening session to explore how tech-savvy individuals and enterprises alike have done the math and chosen AMD EPYC™-powered Google Cloud instances. We’ll dive into real-world customer success stories and showcase the latest virtual machines from Google Cloud and AMD. Discover how these cutting-edge products can help you deploy innovative AI applications that drive business growth, while ensuring cost and energy efficiency.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

Transforming your cloud security means understanding that traditional application security (AppSec) almost never effectively prevents risk, cloud posture is too complex to manage, cloud runtime protection is sparsely deployed, and the security operations center (SOC) doesn’t have the visibility, AI, and automation for real-time response. Join us to learn how to remediate your cloud exposures in minutes, not weeks, using real-time AI-powered risk reduction, investigation, and response – all fueled by unified data and advanced automation. See the future of fast, intelligent, scalable cloud security.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

In this hands-on lab, you’ll learn the fundamentals of networking in Google Cloud and how it differs from traditional on-premises setups. You'll build a network with three subnetworks and gain practical experience in creating firewall rules. Learn how to apply these rules using instance tags to control access across your environment. By the end of the session, you'll be equipped with the foundational knowledge to manage and secure Google Cloud networks effectively.

If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!

Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

Default service accounts in Google Cloud have been an area of interest for threat actors. Cloud administrators can sometimes grant unintentionally broad permissions through this mechanism to their workloads, such as virtual machines and Kubernetes clusters. In this talk, we will discuss the role of default service accounts in Google Cloud Compute Engine (GCE) and Google Cloud Kubernetes Engine (GKE), and best practices for managing and securing them.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

session
by H. E. Dr. Mohamed Al Kuwaiti (UAE) , Steph Hay (Google Cloud) , Peter Bailey (Google Cloud) , Sandra Joyce (Google Cloud) , Matt Rowe (Lloyd's of London)

It's time to ditch ineffective, reactive security approaches. The unique synergy between frontline threat intelligence and AI will usher in a new era of preemptive security protection that enables organizations to operate with confidence in the AI era. In this spotlight, leaders from Google and Mandiant will share our insight into the security landscape and showcase the latest innovations you can use to make Google part of your security team. We’ll demonstrate new agentic security capabilities that can help you prevent threats, eliminate toil, and empower your talent. And you’ll hear from leaders in the public and private sector who have adopted our solutions to transform their security programs.