talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

2078

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

2078 activities · Newest first

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

BigQuery helps you build an autonomous data and AI platform from your organization. In this session, you’ll learn how BigQuery agentic intelligence is automating critical data workflows, including data preparation, analysis, predictions, model tuning, security, and governance. We’ll explore the BigQuery AI capabilities that all data practitioners can use to address data challenges in the AI era.

Europe is leading the way in data sovereignty, privacy, and sovereign AI. Learn how Google Sovereign Cloud products, including the Trusted Partner Cloud by S3NS, empower European organizations to innovate while upholding these values. Discover how these products provide a secure and compliant environment for businesses to leverage the full potential of cloud technology. We’ll explore how the Trusted Partner Cloud, built with S3NS, meets France’s SecNumCloud regulations.

Building and maintaining detection rules is the cornerstone of any high-performing security operations function, but it’s often easier said than done. Join us for an in-depth exploration of detections in Google Security Operations (Google SecOps) and learn how it empowers detection teams to stay ahead of threats – from curated detections delivered out of the box by Google SecOps to address the latest threats, to building custom rules using entity graphs, AI, and the wealth of functions and context provided by Google SecOps.

The world of data security and privacy is changing. Quantum computing threatens traditional encryption, but you can stay ahead. Learn how to protect your AI and machine learning (ML) models and your sensitive data with cutting-edge techniques and tools like Gemini. This session covers end-to-end privacy, confidential computing with Google Cloud, navigating the post-quantum cryptography (PQC) landscape, the challenges and opportunities of PQC, and how Google Cloud is preparing you for the future.

Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.

Explore how AI agents and assistants are transforming Software Logistics, bringing intelligence to cloud application delivery. This session demonstrates practical applications of AI in deployment automation, configuration management, and runtime optimization. Discover how Platform Engineers leverage AI to create more efficient delivery systems. Learn design strategies from automated security scanning to intelligent deployment decisions, and how to integrate these capabilities into your existing platform engineering practices.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

Bad actors are sneaky, slippery, and getting smarter all the time. However, businesses now have a powerful new defense. Advances in AI offer opportunities to arm developers with information and tools to help mitigate risks. Join us as we share perspectives on design, considerations, and challenges when deploying AI to enhance security and improve efficiencies for developers.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Generative AI is revolutionizing app development, demanding a robust network architecture capable of supporting distributed, cross-cloud deployments. This session dives into the essential networking strategies for building and deploying these next-generation applications. Discover new technologies to establish secure, reliable, and high-performance connectivity spanning Google Cloud, multicloud, and hybrid networks. Explore how to seamlessly integrate service-centric architectures to accelerate developer velocity without compromising security.

Generative AI enables you to build amazing new apps, but you may also have concerns. Will it be too complex or too expensive, or will it create security risks? Fortunately, building good gen AI apps has become much easier in the past year, in large part due to updated capabilities within databases. We’ll learn how Google Cloud databases handle key AI technologies like vector search, retrieval-augmented generation (RAG), and orchestration, helping you bridge the gap between general-purpose AI models and your business-specific data. We’ll dive into some fun application examples to see how they were built and how you can use the same techniques in your apps.

Want to deploy generative AI across your organization but not sure how to keep your sensitive data secure and compliant? Join this session to hear from industry practitioners and Google experts about the best practices and lessons learned when embarking on this journey. We will demo how you can use built-in controls to identify sensitive data in your organization and restrict access to it and share insights, admin control recommendations, and lived customer experiences.

Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.

This talk explores IAM Deny's ability to enforce security at scale, drawing from hands-on experience with major enterprise customers. Learn to craft effective Deny policies, manage exceptions, and integrate Org Policies for a multi-layered security approach. Master the Policy Troubleshooter to efficiently resolve access issues. Move beyond simple "allow" rules, embrace the power of least privilege, and transform your Google Cloud security posture with IAM Deny.

Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.

CNAPP has always been about protecting cloud applications, and with the rise in automation and AI-scaled attacks, incidents in the cloud are unfolding faster than ever. AI-powered Cloud Detection and Response (CDR) has emerged to help teams stop cloud attacks faster than ever. Join us to learn how Palo Alto Networks is transforming security operations with a unified platform built on a single agent for cloud and endpoint security,offering best in class runtime protection.Detect, investigate, and shut down cloud attacks faster with Precision AI.

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Empower your team to build insightful dashboards in Google SecOps. This hands-on lab provides skills to create compelling visualizations from diverse data sources, including UDM events and detections. Learn to modify dashboards, build custom charts, leverage calculations, and tell impactful security stories. Ideal for content creators who need to communicate complex security data to leadership and stakeholders. Enhance your SecOps reporting and decision-making in this hands-on session.

Explore how to design a customer service chatbot that prioritizes privacy and security using a multi-agent system and Gemini. We’ll cover the benefits of multi-agent architecture and share 10 best practices to safeguard user data and privacy. Experience a live demo that illustrates agent collaboration and external tool integration in action. Don’t miss this session to see how Gemini can help you deliver a secure, customer-friendly chatbot solution.

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!