Connect with other security professionals in our Birds of a Feather sessions. Dive into lively discussions with peers and Google Cloud experts on key security topics, including identity and access management, network security, multicloud monitoring, and more.
talk-data.com
Topic
Cyber Security
246
tagged
Activity Trend
Top Events
Join us to explore the dynamic partnership between Google Cloud and CrowdStrike, combining cutting-edge technology and world-class cybersecurity. Learn how our collaboration drives AI innovations to secure enterprises and power digital transformation. Discover CrowdStrike's adversary-first approach, delivering unmatched breach prevention and safeguarding critical cloud environments amid a complex threat landscape. Join us to see how these industry leaders are redefining cloud security and AI-driven resilience.
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
As government customers are evaluating ways to modernize legacy infrastructure and tools to address needs and challenges combined with a IT security threat landscape more intense than ever; technology partners combining AI and security solutions are becoming vitally important. Carahsoft, Google Public Sector and Palo Alto Networks partner to bring best of breed technology systems to public sector customers. Join us to learn more about how you can leverage better together solutions to drive positive outcomes within the public sector ecosystem.
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
This hands-on lab equips you with the practical skills to create and optimize secure, high-throughput VPN connections within the Google Cloud environment. You'll learn to establish secure IPsec Virtual Private Network (VPN) tunnels between Google Cloud and external networks, including techniques for distributing traffic across multiple tunnels to maximize bandwidth. Through hands-on exercises, including VPN creation, configuration, and performance testing using iperf, you'll gain the confidence to design and implement robust and scalable VPN solutions for your specific needs.
If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!
Priceline is on a path to take their cloud network to the next level. Architects from Priceline will share their drivers, objectives and practical experience of taking a phased approach to a Northstar architecture based on Google's Cross-cloud Network. Learn how Priceline is migrating their entire network security stack to Google Cloud, evolving their VPC networking to a policy-centric model and streamlining connectivity to other Cloud Service Providers while gaining operational efficiencies, higher reliability and a favorable TCO.
Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.
What’s step one for protecting cloud-native applications? CSPM, CWPP, CIEM, DSPM or CNAPP? Get beyond acronyms and learn how to improve your security quickly and simply by understanding security findings in context — workloads, infrastructure, identities, network, sensitive data — and then prioritizing risks that matter most. Join this session to see how a unified platform empowers multiple stakeholders to drive identity-driven visibility, risk prioritization, and remediation across complex cloud and hybrid environments.
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
Explore how infrastructure, data analytics, cybersecurity, and intelligence at the edge converge to support mission-critical operations on the frontlines. Hear from public sector agencies about how they’re applying technology to their mission to protect and defend our nation.
Granting users the minimum level of access and permissions needed to perform their jobs can reduce the attack surface area of your cloud environment. Learn how Security Command Center integrates cloud infrastructure entitlement management (CIEM) to help you understand which users have access to which cloud resources, get machine learning (ML)-generated recommendations to reduce unnecessary permissions, and accelerate responses to identity-driven vulnerabilities.
Imagine never writing another detection rule, manually creating postures, or remediating common findings. These are the toilsome workflows security teams deal with today that AI promises to offload, thanks to agentic capabilities. When infused through existing tooling, agentic AI will fundamentally change how security teams work, freeing teams to focus on complex issues while reducing time to detect and respond. Join this session to learn how agentic AI is transforming the user experience and driving security outcomes for modern enterprises.
Cyberattacks are escalating, with healthcare facing devastating ransomware attacks in 2024. Attackers exploit vulnerabilities to cause chaos, disrupting critical services. Effective defense requires a comprehensive approach, including technical solutions, legal preparedness, and robust incident response. This talk provides actionable insights for building resilience against evolving cyberthreats.
Discover how Google’s interconnected ecosystem of Google Cloud platform and specialty solutions can address the needs and challenges of resource-constrained IT teams. We’ll delve into practical use cases and demonstrate how Google Cloud’s specialized business intelligence platform (Looker) and security solutions (Google Security Operations, Mandiant) can help your business improve efficiency and reduce costs while improving your security posture.
Edge computing is becoming increasingly important in the retail industry's digital transformation as it enables innovative customer experiences. As retailers deploy more edge applications and services, securing these environments becomes critical. GDC-Connected extends Google Cloud's infrastructure and services to the edge, offering a robust platform.
This talk will provide you with the knowledge and tools to strengthen your GDC-Connected environment's security through practical demonstrations and real-world examples.
In a world where speed and innovation are paramount, bolting on security after deployment is no longer an option. In this Spotlight, experts from Palo Alto Networks and Google Cloud will dive into the future of AI security through practical experiences faced by customers to address today and tomorrow's most pressing challenges in AI adoption—Shadow AI, data governance complexities, and the evolving threat landscape to AI applications. Discover how a Secure by Design approach, with security embedded across AI initiatives from inception, ensures resilience, scalability, and trust. Don't miss this opportunity to gain actionable insights for accelerating your AI journey securely.
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
Learn how to become a security leader and influence product development, even without direct authority. This session provides practical strategies for cybersecurity professionals to build credibility and drive collaboration to achieve security goals.
Google Cloud’s Contact Center as a Service (CCaaS) solution has powerful capabilities to modernize and transform contact centers. Learn about the unique features, including co-browse for visual agent assistance and multimodal interactions for seamless customer journeys across channels like voice, chat, and email. The session will also cover integrated quality management (QM) and workforce management (WFM) tools for optimizing agent performance and scheduling, and a robust security architecture featuring VPC Service Controls.
New AI workloads in the enterprise can create new and novel security exposures. In this session, you’ll learn directly from our Mandiant team about what they are seeing in this new AI-driven world. And we’ll share how Google Cloud AI protection capabilities can help protect your workloads against the most sophisticated threats. We’ll guide you through how you can protect your data, models, applications, and infrastructure throughout the AI life cycle.
Achieve compliant collaboration with Google Workspace and Gemini for Google Workspace. This session explores how Google's suite of tools can help regulated customers meet their compliance needs with rigorous industry certifications (HIPAA, SOC, ISO). In addition, customers will share how using Workspace helps them to meet new executive orders and regulatory requirements to retain government and defense customers at a lower cost and with ease.
Maximize performance with innovations in Compute Engine. Come learn about the latest innovations and portfolio additions from Compute Engine. Learn about new virtual machines (VMs) that are purpose-built to deliver leadership performance for all your workloads, including AI and machine learning (ML), databases, enterprise applications, and network and security compliances. Understand how to pick the right VM. We’ll cover product capabilities, best practices, and announce exciting new products targeted at making it easy for you to operate your Compute Engine environment.
Google Cloud’s Sensitive Data Protection service is a highly effective capability that can discover and classify sensitive data in your environment, helping to prevent data leakage. But it also has features useful to developers to minimize the exposure of confidential customer information when handling large volumes of sensitive data. By taking advantage of Sensitive Data Protection transformation techniques, you can de-identify sensitive information in a dataset through redaction, replacement, masking, tokenization, bucketing, date shifting, and time extraction. Developers retain the ability to test applications using functional data while still meeting security requirements put in place to protect customer information. By using pseudonymization, which is reversible and provides an easier path for troubleshooting, developers will have a more useful dataset for functional testing than they would if they used data anonymization. In this talk, you’ll learn how to use the Cloud Data Loss Prevention API (DLP API) of Sensitive Data Protection to inspect data for sensitive information and build an automated data transformation pipeline to create de-identified copies of your dataset.