talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

246

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: Google Cloud Next '25 ×

The world of data security and privacy is changing. Quantum computing threatens traditional encryption, but you can stay ahead. Learn how to protect your AI and machine learning (ML) models and your sensitive data with cutting-edge techniques and tools like Gemini. This session covers end-to-end privacy, confidential computing with Google Cloud, navigating the post-quantum cryptography (PQC) landscape, the challenges and opportunities of PQC, and how Google Cloud is preparing you for the future.

Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.

Explore how AI agents and assistants are transforming Software Logistics, bringing intelligence to cloud application delivery. This session demonstrates practical applications of AI in deployment automation, configuration management, and runtime optimization. Discover how Platform Engineers leverage AI to create more efficient delivery systems. Learn design strategies from automated security scanning to intelligent deployment decisions, and how to integrate these capabilities into your existing platform engineering practices.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

Bad actors are sneaky, slippery, and getting smarter all the time. However, businesses now have a powerful new defense. Advances in AI offer opportunities to arm developers with information and tools to help mitigate risks. Join us as we share perspectives on design, considerations, and challenges when deploying AI to enhance security and improve efficiencies for developers.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Generative AI is revolutionizing app development, demanding a robust network architecture capable of supporting distributed, cross-cloud deployments. This session dives into the essential networking strategies for building and deploying these next-generation applications. Discover new technologies to establish secure, reliable, and high-performance connectivity spanning Google Cloud, multicloud, and hybrid networks. Explore how to seamlessly integrate service-centric architectures to accelerate developer velocity without compromising security.

Generative AI enables you to build amazing new apps, but you may also have concerns. Will it be too complex or too expensive, or will it create security risks? Fortunately, building good gen AI apps has become much easier in the past year, in large part due to updated capabilities within databases. We’ll learn how Google Cloud databases handle key AI technologies like vector search, retrieval-augmented generation (RAG), and orchestration, helping you bridge the gap between general-purpose AI models and your business-specific data. We’ll dive into some fun application examples to see how they were built and how you can use the same techniques in your apps.

Want to deploy generative AI across your organization but not sure how to keep your sensitive data secure and compliant? Join this session to hear from industry practitioners and Google experts about the best practices and lessons learned when embarking on this journey. We will demo how you can use built-in controls to identify sensitive data in your organization and restrict access to it and share insights, admin control recommendations, and lived customer experiences.

Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.

This talk explores IAM Deny's ability to enforce security at scale, drawing from hands-on experience with major enterprise customers. Learn to craft effective Deny policies, manage exceptions, and integrate Org Policies for a multi-layered security approach. Master the Policy Troubleshooter to efficiently resolve access issues. Move beyond simple "allow" rules, embrace the power of least privilege, and transform your Google Cloud security posture with IAM Deny.

Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.

CNAPP has always been about protecting cloud applications, and with the rise in automation and AI-scaled attacks, incidents in the cloud are unfolding faster than ever. AI-powered Cloud Detection and Response (CDR) has emerged to help teams stop cloud attacks faster than ever. Join us to learn how Palo Alto Networks is transforming security operations with a unified platform built on a single agent for cloud and endpoint security,offering best in class runtime protection.Detect, investigate, and shut down cloud attacks faster with Precision AI.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Empower your team to build insightful dashboards in Google SecOps. This hands-on lab provides skills to create compelling visualizations from diverse data sources, including UDM events and detections. Learn to modify dashboards, build custom charts, leverage calculations, and tell impactful security stories. Ideal for content creators who need to communicate complex security data to leadership and stakeholders. Enhance your SecOps reporting and decision-making in this hands-on session.

Explore how to design a customer service chatbot that prioritizes privacy and security using a multi-agent system and Gemini. We’ll cover the benefits of multi-agent architecture and share 10 best practices to safeguard user data and privacy. Experience a live demo that illustrates agent collaboration and external tool integration in action. Don’t miss this session to see how Gemini can help you deliver a secure, customer-friendly chatbot solution.

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

Generative AI is revolutionizing mainframe modernization, enabling organizations like the Air Force to achieve unprecedented speed and efficiency. Google's Mainframe Modernization tool leverages AI to analyze legacy code, identify modernization pathways, and accelerate the transition to modern architectures. This allows the Air Force to reduce costs, improve security, and maintain a competitive edge. Join this session to learn how Gen AI can help future-proof your own organization.

Simplify database management with Database Center. This generative AI-powered solution provides a centralized view of your entire database fleet, helping you monitor availability, security, compliance, and data protection. In this session, you’ll learn how to easily detect performance issues, visualize granular metrics, and get AI-powered recommendations for optimization. You’ll also discover how customers are streamlining their database operations and boosting efficiency with Database Center.

Driven by tectonic shifts and rapid innovation, the era we’re in has been dubbed by many as “the great SIEM migration” because organizations are reevaluating their legacy SIEMs and moving to modern SecOps platforms. In this expert panel, organizations will share insights and best practices from their own SIEM migration journeys.

Security Command Center is the must-have risk management solution for Google Cloud. In this session, you’ll learn how to use Security Command Center to proactively manage threats, posture, data, and identities, and how to respond to security events to protect your entire cloud footprint.