talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

2078

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

2078 activities · Newest first

Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

Default service accounts in Google Cloud have been an area of interest for threat actors. Cloud administrators can sometimes grant unintentionally broad permissions through this mechanism to their workloads, such as virtual machines and Kubernetes clusters. In this talk, we will discuss the role of default service accounts in Google Cloud Compute Engine (GCE) and Google Cloud Kubernetes Engine (GKE), and best practices for managing and securing them.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

session
by H. E. Dr. Mohamed Al Kuwaiti (UAE) , Steph Hay (Google Cloud) , Peter Bailey (Google Cloud) , Sandra Joyce (Google Cloud) , Matt Rowe (Lloyd's of London)

It's time to ditch ineffective, reactive security approaches. The unique synergy between frontline threat intelligence and AI will usher in a new era of preemptive security protection that enables organizations to operate with confidence in the AI era. In this spotlight, leaders from Google and Mandiant will share our insight into the security landscape and showcase the latest innovations you can use to make Google part of your security team. We’ll demonstrate new agentic security capabilities that can help you prevent threats, eliminate toil, and empower your talent. And you’ll hear from leaders in the public and private sector who have adopted our solutions to transform their security programs. 

Join us to explore the dynamic partnership between Google Cloud and CrowdStrike, combining cutting-edge technology and world-class cybersecurity. Learn how our collaboration drives AI innovations to secure enterprises and power digital transformation. Discover CrowdStrike's adversary-first approach, delivering unmatched breach prevention and safeguarding critical cloud environments amid a complex threat landscape. Join us to see how these industry leaders are redefining cloud security and AI-driven resilience.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

As government customers are evaluating ways to modernize legacy infrastructure and tools to address needs and challenges combined with a IT security threat landscape more intense than ever; technology partners combining AI and security solutions are becoming vitally important. Carahsoft, Google Public Sector and Palo Alto Networks partner to bring best of breed technology systems to public sector customers. Join us to learn more about how you can leverage better together solutions to drive positive outcomes within the public sector ecosystem.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

This hands-on lab equips you with the practical skills to create and optimize secure, high-throughput VPN connections within the Google Cloud environment. You'll learn to establish secure IPsec Virtual Private Network (VPN) tunnels between Google Cloud and external networks, including techniques for distributing traffic across multiple tunnels to maximize bandwidth. Through hands-on exercises, including VPN creation, configuration, and performance testing using iperf, you'll gain the confidence to design and implement robust and scalable VPN solutions for your specific needs.

If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!

Priceline is on a path to take their cloud network to the next level. Architects from Priceline will share their drivers, objectives and practical experience of taking a phased approach to a Northstar architecture based on Google's Cross-cloud Network. Learn how Priceline is migrating their entire network security stack to Google Cloud, evolving their VPC networking to a policy-centric model and streamlining connectivity to other Cloud Service Providers while gaining operational efficiencies, higher reliability and a favorable TCO.

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

What’s step one for protecting cloud-native applications? CSPM, CWPP, CIEM, DSPM or CNAPP? Get beyond acronyms and learn how to improve your security quickly and simply by understanding security findings in context — workloads, infrastructure, identities, network, sensitive data — and then prioritizing risks that matter most. Join this session to see how a unified platform empowers multiple stakeholders to drive identity-driven visibility, risk prioritization, and remediation across complex cloud and hybrid environments.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

session
by Ron Bushar (Google) , Reid Novotny (National Guard Bureau) , Derek Law (United States Space Force (USSF)) , Maria Lipana (California Cybersecurity Integration Center (Cal-CSIC))

Explore how infrastructure, data analytics, cybersecurity, and intelligence at the edge converge to support mission-critical operations on the frontlines. Hear from public sector agencies about how they’re applying technology to their mission to protect and defend our nation.

Granting users the minimum level of access and permissions needed to perform their jobs can reduce the attack surface area of your cloud environment. Learn how Security Command Center integrates cloud infrastructure entitlement management (CIEM) to help you understand which users have access to which cloud resources, get machine learning (ML)-generated recommendations to reduce unnecessary permissions, and accelerate responses to identity-driven vulnerabilities.

Imagine never writing another detection rule, manually creating postures, or remediating common findings. These are the toilsome workflows security teams deal with today that AI promises to offload, thanks to agentic capabilities. When infused through existing tooling, agentic AI will fundamentally change how security teams work, freeing teams to focus on complex issues while reducing time to detect and respond. Join this session to learn how agentic AI is transforming the user experience and driving security outcomes for modern enterprises.

session
by Omar ElAhdan (Google Cloud) , Jeremy Koppen (Google Cloud) , Scott Lashway (Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C)

Cyberattacks are escalating, with healthcare facing devastating ransomware attacks in 2024. Attackers exploit vulnerabilities to cause chaos, disrupting critical services. Effective defense requires a comprehensive approach, including technical solutions, legal preparedness, and robust incident response. This talk provides actionable insights for building resilience against evolving cyberthreats.

Discover how Google’s interconnected ecosystem of Google Cloud platform and specialty solutions can address the needs and challenges of resource-constrained IT teams. We’ll delve into practical use cases and demonstrate how Google Cloud’s specialized business intelligence platform (Looker) and security solutions (Google Security Operations, Mandiant) can help your business improve efficiency and reduce costs while improving your security posture.

Edge computing is becoming increasingly important in the retail industry's digital transformation as it enables innovative customer experiences. As retailers deploy more edge applications and services, securing these environments becomes critical. GDC-Connected extends Google Cloud's infrastructure and services to the edge, offering a robust platform.

This talk will provide you with the knowledge and tools to strengthen your GDC-Connected environment's security through practical demonstrations and real-world examples.

In a world where speed and innovation are paramount, bolting on security after deployment is no longer an option. In this Spotlight, experts from Palo Alto Networks and Google Cloud will dive into the future of AI security through practical experiences faced by customers to address today and tomorrow's most pressing challenges in AI adoption—Shadow AI, data governance complexities, and the evolving threat landscape to AI applications. Discover how a Secure by Design approach, with security embedded across AI initiatives from inception, ensures resilience, scalability, and trust. Don't miss this opportunity to gain actionable insights for accelerating your AI journey securely.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Google Cloud’s Contact Center as a Service (CCaaS) solution has powerful capabilities to modernize and transform contact centers. Learn about the unique features, including co-browse for visual agent assistance and multimodal interactions for seamless customer journeys across channels like voice, chat, and email. The session will also cover integrated quality management (QM) and workforce management (WFM) tools for optimizing agent performance and scheduling, and a robust security architecture featuring VPC Service Controls.