talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

2078

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

2078 activities · Newest first

Learn how a team of developers built a serverless toolkit with Cloud Run to simplify application development and deployment. This session shares best practices from Shopify for creating a robust toolkit that empowers developers to seamlessly ship serverless applications while integrating with essential Google Cloud services and adhering to security best practices. Discover how to enhance scalability, reduce toil, and boost productivity.

The size and volume of internet-based attacks continues to grow exponentially. From DDoS, bad bots, and fraud to data exfiltration and infrastructure vulnerabilities to new generative AI-specific attacks, having strong defense in depth for your internet-facing workloads is critical to keep services running and protect sensitive data. Come learn about the latest innovations from Google Cloud’s Cross-Cloud Network to protect workloads hosted in any cloud, on-premises, or colocation facility. Updates will cover Google Cloud Armor, reCAPTCHA Enterprise, Model Armor, and Apigee.

session
by Jonathan Flack (US Air Force Research Lab) , Rahul Ravulur (Google Cloud) , Hunter Downey (SAP NS2) , Ganesh Janakiraman (Broadcom) , Jordan Sembower (Google Cloud)

Organizations in the public sector are driving incredible transformation with the help of Google Cloud. In this session, you’ll learn how Assured Workloads, one of Google Cloud’s modern cloud solutions, allows public sector customers to easily run regulated workloads on our public cloud infrastructure. And you’ll learn how your organization can address various compliance regimes, such as Criminal Justice Information Services (CJIS), Federal Risk and Authorization Management Program (FedRAMP), International Traffic in Arms Regulations (ITAR), and more.

Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.

Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.

In this hands-on lab, you'll learn how to create a cross-region HTTP(S) load balancer that intelligently distributes traffic to instances in multiple regions. By setting up four Compute Engine instances across two regions, you'll configure the load balancer to ensure seamless traffic routing to the right instance. This lab will help you optimize application performance, improve availability, and enhance fault tolerance across geographically distributed systems.

If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.

In the ongoing battle against cyberthreats, AI can unlock new levels of efficiency, accuracy, and proactive defense. In this session, a Google Security Operations customer will delve into practical use cases where AI is already delivering tangible benefits to security teams. We’ll also introduce new capabilities designed to automatically triage and analyze alerts. Join us to learn how you can put Gemini to work to enable more precise threat detection and faster incident response in your environment.

session
by Nitin Garg (Google Cloud) , Ian Mortimer (Pexip) , Matthias Rosker (SAP) , Matt Garr (Google Cloud) , Michael Clark (Palo Alto Networks)

Navigating the complex world of compliance can be daunting. Join us to discover how to simplify your compliance journey on Google Cloud, enabling you to build at scale while meeting stringent industry regulations with ease.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

We will delve into the practical applications of AI-assisted coding within a large organization, highlighting the specific ways Ulta Beauty's developers are utilizing Gemini Code Assist to streamline workflows. Understand how Ulta successfully gained buy-in from both management and engineering teams by demonstrating the tool's value and addressing potential concerns. Learn about Ulta's thoughtful approach to integrating new AI technologies while prioritizing security, responsible usage, and alignment with existing development processes. 

session
by Prashant Kumar (Google Cloud) , Prateek Jain (Google Cloud) , Ram P (Google Cloud) , Henry Tze (Virgin Media)

Level up your cloud security with Google Cloud’s next-generation identity and access management (IAM). This session explores how modern cloud IAM capabilities – including next-gen unified access policies, fine-grained access control, privileged access management, and policy intelligence – can improve your cloud security posture. Join us to learn how to streamline access, enforce consistent policies, and proactively mitigate risks in today’s dynamic cloud landscape.

Gain valuable insights into how working with Google Cloud's security offerings can boost your success in this rapidly growing market. Learn about our go-to-market strategy and existing sales plays. Additionally, discover security-specific programs and incentives available only to Google Cloud partners. Our available resources and trainings in positioning, selling, and deploying Google Cloud Security products will help up-skill your team and maximize your profitability with Google Cloud.

Geographical redundancy is a key pillar of a resilient data architecture. With BigQuery cross-region dataset replication and managed disaster recovery, you can ensure your mission-critical apps remain available even in the unlikely event of a region-level infrastructure outage. Learn how this built-in capability protects your data and workloads against regional outages and ensures uninterrupted data access for your organization.

Choosing the right cloud infrastructure can make or break your business strategy. Join us in this enlightening session to explore how tech-savvy individuals and enterprises alike have done the math and chosen AMD EPYC™-powered Google Cloud instances. We’ll dive into real-world customer success stories and showcase the latest virtual machines from Google Cloud and AMD. Discover how these cutting-edge products can help you deploy innovative AI applications that drive business growth, while ensuring cost and energy efficiency.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

Transforming your cloud security means understanding that traditional application security (AppSec) almost never effectively prevents risk, cloud posture is too complex to manage, cloud runtime protection is sparsely deployed, and the security operations center (SOC) doesn’t have the visibility, AI, and automation for real-time response. Join us to learn how to remediate your cloud exposures in minutes, not weeks, using real-time AI-powered risk reduction, investigation, and response – all fueled by unified data and advanced automation. See the future of fast, intelligent, scalable cloud security.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

In this hands-on lab, you’ll learn the fundamentals of networking in Google Cloud and how it differs from traditional on-premises setups. You'll build a network with three subnetworks and gain practical experience in creating firewall rules. Learn how to apply these rules using instance tags to control access across your environment. By the end of the session, you'll be equipped with the foundational knowledge to manage and secure Google Cloud networks effectively.

If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!