talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

2078

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

2078 activities · Newest first

This talk will focus on understanding what CNAPP is and its major pillars for cloud infrastructure and application security. Explore why a ״shift-right״ security approach and runtime insights are crucial for dynamic, modern cloud-native security that effectively consolidates Devs, Sec & Ops contextual analysis from runtime to code. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Deploy ARM and Intel Copilot and PCs with one unified approach

Enterprises face deployment challenges as ARM-based Copilot+ PCs enter corporate environments alongside traditional Intel devices. Managing mixed architectures often means separate tools, increasing complexity and risk. This demo shows unified deployment across Intel, AMD and ARM delivering identical builds. Watch Windows 11 deploy live to these platforms, maintaining security and compliance. Learn how OneDeploy's multi-architecture approach future-proofs your device deployment strategy.

Get a guided, hands-on experience with Google Cloud’s flagship cloud security solution. Learn how to detect cloud misconfigurations, find active threats, and use Security Command Center’s virtual red teaming to identify high-risk toxic combinations and attack paths that expose high-value cloud resources. Then see how to take action on security issues with built-in response capabilities. Learn why Security Command Center is the best security solution for Google Cloud environments.

Elastic on Google Cloud allows you to modernize your AI-powered search experiences, predictively find and resolve problems, and protect against cyber threats. Learn how to derive actionable intelligence through AI-driven insights to get the most out of your data and infrastructure using the Elastic AI Assistants for Observability and Security. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Elevate DevEx 2.0 with continuous security across the SDLC

DevEx 2.0 means giving developers guardrails that accelerate delivery instead of slowing it. This session shows how continuous security integrates with Azure and GitHub pipelines. You’ll see IDE coaching and SAST at commit. With Microsoft Copilot and Azure OpenAI using GPT-5, developers can cut through false positives and receive actionable fixes directly in the code. Builds include SBOM generation, container scans, and dependency checks. Staging environments add DAST and API testing.

Enable modern Zero Trust

DNS plays a critical role in a Zero Trust security strategy by helping enforce granular access controls and reduce broad network exposure. With over 63% of organizations adopting Zero Trust, it's recognized as an industry best practice to limit access strictly to necessary resources. This session explores why DNS should be a foundational element of your Zero Trust architecture and highlights how Microsoft has implemented Zero Trust DNS protections on Windows 11 devices.

Experience real-world impact and scalable success across industries

AI and intelligent agents are no longer future promises — they’re transforming industries today. Hear real-world stories of organizations accelerating software development, enhancing every stage of the process, and redefining customer engagement. Discover Insight’s AI framework for adopting and scaling these capabilities with security, speed, and confidence — and get practical guidance to move from experimentation to measurable impact.

Fraud prevention is a significant challenge for a platform like Deliveroo and this talk is all about how data science can help. I’ll talk about some of the key fraudulent behaviours we try to tackle and dive into the tricky parts – balancing stringent fraud prevention measures with a seamless user experience and the inherent difficulty in establishing ground truth for fraudulent behaviours.

From blind spots to breakthroughs: Cloud AI security challenges

Cloud AI platforms introduce new business challenges for security teams: attackers exploit east-west traffic, encrypted communications, and limited visibility to move laterally and exfiltrate sensitive data undetected. These blind spots create long-term risk, eroding trust and threatening compliance. In this session, we will discuss the key security problems organizations must address in protecting AI workloads, share Check Point’s recommended approach to mitigating these risks.

Experience the transformation. Learn how Gemini for Google Cloud uses AI to effortlessly manage Google Cloud. Get help with design, deployment, troubleshooting, and optimization directly within Google Cloud Console. Accelerate complex tasks, boost productivity, and stay focused on core business value. Gemini for Google Cloud offers goal-driven design, guided operations, and tailored optimizations, all with enterprise-grade security and privacy.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Kevin A. “KAM” McGrail KAM will start with a foundation on what Artificial Intelligence is, its impact on the CIA security model, & a quick history lesson about AI-Enabled cyberattacks. He will then discuss other problems including discussing AI policy & the new Shadow IT threat AI tools present. Finally, Kevin will discuss a few key solutions including using his signature, "Think Evil" process for cybersecurity. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Inside Microsoft Agent 365

See how the new Microsoft Agent 365 extends the infrastructure used for managing people to managing agents. We’ll explain what Agent 365 is, how it works, and how it’s managed. With Agent 365 every agent gets​ a unique identity​, access to productivity tools in Microsoft 365, systems and data for context. IT gets​ total observability and visibility​, along with control, security and governance.

Level up Microsoft security for insider threats

Maximize the value of Microsoft Defender and Entra ID with OpenText™ Core Threat Detection and Response. Learn how behavior-based analytics complement your existing tools to unmask elusive threats (e.g. insider, novel, advanced persistent), streamline investigations, and reduce noise—no tuning or rule-writing required. See how you can do more with the telemetry you already trust.

This lecture delves into the evolution from LLMOps to GenOps, showcasing how the GenOps solution revolutionizes Generative AI with its cutting-edge security and governance framework powered by Google Cloud. It highlights the necessity of continuous security throughout the AI lifecycle and the strategic integration of ethical guidelines and compliance measures, ensuring safe, compliant, and efficient AI operations. By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.