Enhance your team's Google SecOps proficiency with our hands-on lab. Learn to leverage the alert graph for streamlined triage, in-depth investigations, and optimized YARA-L rule modification. This workshop equips analysts with skills to efficiently manage alerts, improve detection accuracy, and strengthen your security posture. Drive operational efficiency and reduce response times. Ideal for security analysts seeking to maximize their Google SecOps expertise.
talk-data.com
Topic
Cyber Security
2078
tagged
Activity Trend
Top Events
Architect and deploy secure cross-cloud networks with confidence. This session delivers expert guidance on designing and deploying Google Cloud’s Cross-Cloud Network security solutions to help protect against a wide range of network threats, including exploits, malware, DDoS, data exfiltration, and more. Discover best practices for configuring Cloud NGFW, Cloud Armor, and Secure Web Proxy (Cloud SWP) to address critical security concerns and build a resilient cloud infrastructure.
Organizations are racing to deploy generative AI solutions built on large language models (LLMs), but struggle with management, security, and scalability. Apigee is here to help. Join us to discover how the latest Apigee updates enable you to manage and scale gen AI at the enterprise level. Learn from Google’s own experience and our work with leading customers to address the challenges of productionizing gen AI.
Building and maintaining detection rules is the cornerstone of any high-performing security operations function, but it’s often easier said than done. Join us for an in-depth exploration of detections in Google Security Operations (Google SecOps) and learn how it empowers detection teams to stay ahead of threats – from curated detections delivered out of the box by Google SecOps to address the latest threats, to building custom rules using entity graphs, AI, and the wealth of functions and context provided by Google SecOps.
Even cloud security experts can struggle with application and data compliance. Discover how Security Command Center is simplifying cloud compliance by bringing together configuration, monitoring, and evidence generation. Learn how a unified cloud compliance solution can make it easy to apply prebuilt and custom compliance frameworks, check compliance status with a centralized dashboard, and automatically generate audit reports to prove compliance.
As organizations increasingly adopt cloud technologies, threat actors have adapted their tactics to exploit vulnerabilities within cloud environments. This threat briefing explores the methods employed by malicious actors to compromise cloud services, including the exploitation of misconfigurations, weaknesses in identity and access management, and shared resources. Attendees will learn how the threat landscape is shifting and how to be more proactive by understanding how the tactics, techniques, and procedures are evolving.
The Defender’s Advantage model from Mandiant illustrates the cyber defense capabilities required to actively resist attacks and minimize the impact of a compromise. Partnering with UnitedHealth Group, we leveraged the Defender’s Advantage model to focus on continuous improvement, operationalize threat intelligence, reduce the attack surface, and implement a security validation program. We’ll share case studies and lessons learned about how we developed each of these programs to transform and enhance the organization’s cyber defense capabilities.
AI is revolutionizing observability. Learn about Cloud SQL AI-powered Database Insights and how it can help you optimize your queries and boost database performance. We’ll dive deep into the new Insights capabilities for MySQL, PostgreSQL, and SQL Server, including the Gemini-powered chat agent. Learn how to troubleshoot those tricky database performance issues and get practical tips to improve the performance of your applications.
Organizations are facing sophisticated and growing cyberthreats from commercially driven ransomware groups and state-sponsored adversaries that legacy productivity solutions struggle to defend against. Learn how Google’s multilayered approach – AI threat defenses, a reduced attack surface, and built-in security controls in Google Workspace, Chrome Enterprise, and ChromeOS – can effectively combat the most prevalent cyberthreats and block malicious actors from gaining access to your data and disrupting your business.
This session dives into the latest advancements in securing and managing your Cloud Run workloads at enterprise scale. Join us to learn about new features and techniques to meet the highest security standards, strategies for managing large-scale deployments, and solutions to common issues like IP exhaustion. Plus, one of our customers will share their firsthand experience managing a massive fleet of Cloud Run workloads.
In this session, we’ll explore how you can manage human and nonhuman identities on Google Cloud. We’ll discuss how these identities are defined, managed, and used to secure access to resources, and we’ll cover topics such as cryptographic managed workload identities, identity federation, and flexible identity onboarding options on Google Cloud.
According to Andreessen Horowitz, 93% of Fortune 500 companies surveyed currently use three or more AI model providers, and now AI agents will proliferate and become standard. With the massive shift in enterprise AI adoption and the pace of change, enterprises need to modernize their network and security to unlock the value that AI generates and keep pace with rapid changes. Learn how to make your network and security AI-ready, plus discover new innovations to reduce infrastructure costs, improve user experience, enable faster developer velocity, and protect your AI infrastructure from new security threats.
Discover the power of Google Cloud instances running on the latest Intel Xeon processors. This course will introduce you to Intel’s optimization tools, designed to help you manage and optimize your infrastructure with unmatched efficiency and performance. Learn how to leverage these cutting-edge technologies to enhance your cloud computing capabilities and drive your business forward.
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
Learn how LG AI Research uses Google Cloud AI Hypercomputer to build their EXAONE family of LLMs and innovative Agentic AI experiences based the models. EXAONE 3.5, class of bilingual models that can learn and understand both Korean and English, recorded world-class performance in Korean. The collaboration between LG AI Research and Google Cloud enabled LG to significantly enhance model performance, reduce inference time, and improve resource efficiency through Google Cloud's easy-to-use scalable infrastructure
In this hands-on lab, you’ll learn the fundamentals of networking in Google Cloud and how it differs from traditional on-premises setups. You'll build a network with three subnetworks and gain practical experience in creating firewall rules. Learn how to apply these rules using instance tags to control access across your environment. By the end of the session, you'll be equipped with the foundational knowledge to manage and secure Google Cloud networks effectively.
If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!
Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!
AI application growth brings security challenges, especially in multi-tenant environments. This talk explores access control issues in agentic workflows, using Google's Reasoning Engine. We'll cover limitations of current methods, user/agent identity interplay, data isolation, and secure delegation to LLMs. Future solutions include fine-grained access control and secure identity propagation. Learn to design secure, scalable AI workflows.
Connect with other security professionals in our Birds of a Feather sessions. Dive into lively discussions with peers and Google Cloud experts on key security topics, including identity and access management, network security, multicloud monitoring, and more.
Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.