talk-data.com
Topic
Cyber Security
2078
tagged
Activity Trend
Top Events
In this hands-on lab, you'll learn how to create a cross-region HTTP(S) load balancer that intelligently distributes traffic to instances in multiple regions. By setting up four Compute Engine instances across two regions, you'll configure the load balancer to ensure seamless traffic routing to the right instance. This lab will help you optimize application performance, improve availability, and enhance fault tolerance across geographically distributed systems.
If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!
In the era of AI-driven innovation, organizations need databases that are flexible and powerful while also being secure and scalable. This session explores how MongoDB empowers to rapidly build, deploy, and manage intelligent applications through the lens of a developer persona. Diving into our integrations with AI Foundry, Microsoft Sentinel, and Azure Landing Zones, we’ll showcase a complete developer journey—from prototype to production—while ensuring security, and operational excellence.
Discover how Apigee and Advanced API Security can help you stay protected from OWASP Top 10 API Security risks, and how to adopt a layered API security approach using Apigee and Cloud Armor together. You’ll also see how Apigee can send API security incident information to Google SecOps for centralized triage and correlation, and serve as an enforcement point for Model Armor to sanitize prompts and responses for LLMs fronted by APIs.
Simplify your compliance journey on Google Cloud. This demo showcases how to build at scale while meeting stringent compliance and regulations. Explore tools and strategies that streamline compliance processes, reducing complexity and enabling you to focus on innovation.
This demo highlights the latest innovations in Cloud Network Security covering network threat protection, network security posture controls, DDoS, web application protection, network privacy, and new mechanisms to integrate 3rd party Network Security services.
Explore how Google Cloud provides built-in secure controls to help you maintain a strong cloud security posture. See in action how Google Cloud’s Security Foundation recommended products help address most common cloud adoption use cases, including infrastructure modernization, securing AI workloads, data analytics, and application modernization.
Protect your sensitive data in the cloud. This demo explores how to discover, classify, and redact sensitive information like PII and PHI across your cloud footprint using Google Sensitive Data Protection. See how to leverage encryption, key management, and confidential computing to further secure your data in transit, at rest, and in use.
Sign up for the online Google Community focused on security and get a free gift--while supplies last.
Discover how our intelligence-driven and AI-powered security operations platform, Google SecOps, combines Google’s hyper-scale infrastructure along with unparalleled visibility and understanding of cyber adversaries to enable security teams to uncover the latest cyber threats in near real-time, and surface the right context to investigate, and respond with speed and precision.
Experience how you can get ahead of the latest threats with Google Threat Intelligence. Know who’s targeting you and focus on the most relevant threats to your organization by understanding the threat actors and their ever changing tactics, techniques, and procedures (TTPs). Leverage these insights to proactively set your defenses, hunt efficiently, and respond to new and novel threats in minutes.
Make Google part of your security team.
Learn how Google Workspace can help protect organizations from cyber threats and data loss with built-in threat defenses and zero trust security controls while supporting compliance and digital sovereignty needs. Check out our latest capabilities including AI classification for Google Drive, Gmail data loss prevention (DLP) with labels, client-side encryption (CSE) and more!
Cloud IAM is critical to your security infrastructure, and fundamental to cloud adoption. In this demo, you can learn how Google Cloud’s next generation IAM leverages AI across the full stack of IAM, policy management, and access to help you easily and correctly implement security controls that protect your users, infrastructure, data, and application.
Discover how Mandiant leverages its hand-on experience with unparalleled threat intelligence and incident response to help organizations like yours tackle their top cloud security challenges. Mandiant helps organizations defend against the latest threats and prepare to respond to compromise—ultimately building confidence and advancing cyber defense capabilities.
In this demo, see how reCAPTCHA protects your website and mobile apps against bots, account takeovers, and fraudulent transactions. Powered by Google-scale fraud intelligence telemetry from trillions of transactions, billions of users and devices, and millions of websites. Learn how Web Risk protects your business and users from unsafe websites with real-time threat intelligence. Leveraging Google's vast threat intelligence network and advanced machine learning and AI, Web Risk scans over 10 billion URLs and files daily, identifying and classifying malicious content with exceptional accuracy.
Stop by to find out why Chrome is the most trusted enterprise browser, meeting the secure enterprise browsing needs of today’s workforce. Chrome protects and empowers hundreds of millions of workers every day. By giving organizations the ability to configure the security levels that are the right fit across their organization, Chrome keeps users safe and productive.
See how Security Command Center (SCC) delivers the best cloud security for Google Cloud. The demo will highlight how SCC uses virtual red teaming to proactively find critical cloud risks. Discover how SCC integrates world-class threat intelligence from Mandiant and provides comprehensive AI Protection to secure AI workloads, models, and data. Experience how SCC responds to high-risk issues and improves your cloud security posture.