New AI workloads in the enterprise can create new and novel security exposures. In this session, you’ll learn directly from our Mandiant team about what they are seeing in this new AI-driven world. And we’ll share how Google Cloud AI protection capabilities can help protect your workloads against the most sophisticated threats. We’ll guide you through how you can protect your data, models, applications, and infrastructure throughout the AI life cycle.
talk-data.com
Topic
Cyber Security
2078
tagged
Activity Trend
Top Events
Achieve compliant collaboration with Google Workspace and Gemini for Google Workspace. This session explores how Google's suite of tools can help regulated customers meet their compliance needs with rigorous industry certifications (HIPAA, SOC, ISO). In addition, customers will share how using Workspace helps them to meet new executive orders and regulatory requirements to retain government and defense customers at a lower cost and with ease.
Maximize performance with innovations in Compute Engine. Come learn about the latest innovations and portfolio additions from Compute Engine. Learn about new virtual machines (VMs) that are purpose-built to deliver leadership performance for all your workloads, including AI and machine learning (ML), databases, enterprise applications, and network and security compliances. Understand how to pick the right VM. We’ll cover product capabilities, best practices, and announce exciting new products targeted at making it easy for you to operate your Compute Engine environment.
Google Cloud’s Sensitive Data Protection service is a highly effective capability that can discover and classify sensitive data in your environment, helping to prevent data leakage. But it also has features useful to developers to minimize the exposure of confidential customer information when handling large volumes of sensitive data. By taking advantage of Sensitive Data Protection transformation techniques, you can de-identify sensitive information in a dataset through redaction, replacement, masking, tokenization, bucketing, date shifting, and time extraction. Developers retain the ability to test applications using functional data while still meeting security requirements put in place to protect customer information. By using pseudonymization, which is reversible and provides an easier path for troubleshooting, developers will have a more useful dataset for functional testing than they would if they used data anonymization. In this talk, you’ll learn how to use the Cloud Data Loss Prevention API (DLP API) of Sensitive Data Protection to inspect data for sensitive information and build an automated data transformation pipeline to create de-identified copies of your dataset.
In this hands-on lab, you'll learn how to create a cross-region HTTP(S) load balancer that intelligently distributes traffic to instances in multiple regions. By setting up four Compute Engine instances across two regions, you'll configure the load balancer to ensure seamless traffic routing to the right instance. This lab will help you optimize application performance, improve availability, and enhance fault tolerance across geographically distributed systems.
If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!
Discover why Chubb, Munich Re, and Beazley, global leaders in cyber insurance, have partnered with Google Cloud to enhance the Risk Protection Program. Learn about our shared vision for added cyber insurance and how it translates to stronger protection and greater peace of mind for your business.
Presenting “one network,” a novel approach to simplify service integration and increase compliance across heterogeneous environments. Learn how using open source proxies provides a policy-oriented network architecture for consistent policy enforcement, service assembly, and secure-by-default deployments. One network also provides role separation across DevOps, SecOps, site reliability engineers, and app developers, streamlining operations and increasing efficiency. Attend this session to discover how one network can transform your approach to service delivery.
Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.
As attackers get more creative, organizations need to take a defense-in-depth approach to mitigate data exfiltration risks and reduce their attack surface. Join us in this session to learn about some of the most common attack vectors that can lead to data exfiltration, and discover which Google Cloud security controls can help foil these attacks.
Join Google Cloud’s leading security experts along with security leaders from leading enterprise companies to discuss cybersecurity challenges in the age of generative AI. In this live panel discussion, learn how clever cybercriminals are weaponizing this revolutionary technology to launch mind-blowing attacks. We’ll dive headfirst into the latest tricks, from AI-fueled attacks to autonomous hacking tools that operate with chilling efficiency. Discover how companies are fighting back with cutting-edge defenses with tales directly from security practitioners, including solutions from leading security ISVs (independent software vendors). By the end of this session, you’ll have the knowledge you need to outsmart the bad guys and protect your digital kingdom – today and tomorrow.
Explore the journey behind building the McKinsey Value Intelligence Assistant, bringing AI powered curation and insights to key business leaders by integrating dozens of datasets, filings and earnings call transcripts from 50K global companies. Gain insights into overcoming challenges in system architecture, data security, and real-time analytics to create a robust, cloud-native data intelligence platform with a small team in a short period time and the resulting business impact!
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
Security is often referred to as a big data problem, and the growing volume, variety, and nuance of security telemetry requires more sophistication and control than ever before. This session dives into the new data pipeline management capabilities of Google Security Operations. We’ll show how you can improve the way you route, reduce, redact, enrich, and transform security data to manage scale, reduce costs, satisfy compliance mandates, and, most importantly, drive better security outcomes.
With great power comes great responsibility – and the need for confidentiality. This talk explores how confidential computing technology can act as a powerful shield for your AI deployments. We’ll show how Confidential Computing and confidential accelerators safeguard sensitive data and algorithms, even during processing, to ensure that your AI workloads remain protected throughout their life cycle.
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
Running performance-intensive services at scale while meeting the rigorous security and compliance requirements of some of the most demanding public and private sector organizations presents many interesting challenges. In this talk, you will hear how Pexip, a leading video technology provider, works to build, operate, and protect their global technology platform with the help of Google Cloud security solutions.
Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!
In this session, Fortinet and Google Cloud will jointly present on how Fortinet's AI-powered security solution integrated with Google Cloud's native security services can help organizations make better informed decisions, rapidly respond to threats, and save time on even the most complex tasks.
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
As the volume and value of data in cloud surges, defending it is an ever increasing challenge. In 2022, 94% of cloud tenants were targeted every month, and 62% are successfully compromised. A focus on preventing breaches is no longer sufficient – data must be defensible, even after a compromise. This session explores how to expand your cybersecurity strategy, enabling you to control risk, recover quickly and safely in the event of an incident, and ensure your Google Cloud data and business stand resilient against cyberattacks.
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
Gain unprecedented visibility into AI applications and threats with Palo Alto Networks AI-Runtime, now easily deployed with Google Packet Mirroring/Intercept. This session reveals how this powerful combination analyzes network traffic to discover both legitimate and malicious uses of AI, enabling proactive threat detection and rapid response. Learn how to simplify deployment, improve security posture, and stay ahead of the evolving AI threat landscape.
This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.
Connect with other security professionals in our Birds of a Feather sessions. Dive into lively discussions with peers and Google Cloud experts on key security topics, including identity and access management, network security, multicloud monitoring, and more.
Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.