talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

2078

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

2078 activities · Newest first

Explore the revolutionary Isolator tool developed by Google Cloud Consulting, enabling secure collaboration on AI projects involving sensitive data. Understand the Zero Trust architecture behind this solution and how it integrates Google's core security products for a safe collaborative environment. Gain insights into practical applications with a focus on maintaining data integrity. Join us for this Mini Talk at 'Meet the Experts, hosted by Google Cloud Consulting' at Expo. Seating is limited and on a first-come, first served basis; standing areas are available.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

In this session we’ll create an Apigee proxy that will talk to our containerized workload on Google Cloud Run and Google Cloud SQL, where our business logic will be stored. We’ll explore Apigee capabilities like security and monetization, and build developer resources. We will also cover the concept of “treating your APIs as products.”

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Women in AI experts will provide a unique perspective on why it is important to start with the data for algorithms to be ethical, be it for new transformations or for enterprise transitions towards the Generative AI era. Data governance along with regulatory audits are not sufficient anymore, and the multifaceted responsibilities towards an accessible and inclusive future for all humans requires a comprehensive data strategy. The panelists will share industry perspectives from finance and sustainability that emphasize privacy, security, synthetic data, and maturity scores to scale ethical models.

AppSec and Cloud teams have an opportunity to connect where they’re truly joined together and able to accelerate under a single, unified platform. This Palo Alto Networks cloud security session will show how to simultaneously enhance security and automation, reduce the attack surface, and lower both your team’s mean time to detection (MTTD) and mean time to resolution (MTTR) using Prisma Cloud best-of-breed capabilities in visibility, threat detection, compliance, and DevOps, from Code to Cloud.

By attending this session, your contact information may be shared with the sponsor for relevant follow up for this event only.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Learn how Google Workspace identity and access management partners Okta and JumpCloud help customers like Winsupply and Unicity migrate off Microsoft 365 and onto Workspace to transform their collaboration capabilities while maintaining a robust security posture.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Discover how to leverage Chrome Enterprise to apply built-in security measures, including data-loss prevention and context-aware access controls, plus the latest product announcements. You’ll leave with actionable best practices, and tips to safeguard your corporate data and empower your team.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

While everyone's talking about AI, far fewer have deployed it successfully or turned technology into business outcomes. This panel changes that, bringing together Generative AI experts for a deep dive into the practical application of generative AI. From building new customer offerings to refreshing internal processes, the panellists will reflect on the importance of data quality, data security, the responsible use of data as well as change management when it comes to embedding generative AI into the business strategy.

They see your every move! You know it’s true: Your data is everywhere, the fingerprints of your behavior and movements captured by all manner of apps and devices. Does privacy still exist? The short answer is no, but striving toward it will help mitigate the many risks of inappropriate data access, and that’s really what “privacy” is all about these days! Check out this Fireside Chat with Data Warrior Kent Graziano and DM Radio Host Eric Kavanagh to learn more! They’ll talk about practical methods for designing and managing data governance programs, security protocols and most importantly: responsible behavior!

At Airbnb Payments, integrating AI with blockchain can transform our services by enhancing transaction efficiency, security, and personalization. AI analyzes blockchain data, identifying potential financial anomalies and reconciling transactions immediately. 

It also optimizes blockchain operations, increasing transaction speed and reducing AWS usage.

Perhaps most importantly, AI also supports predictive analysis in for our users, creating more personalized experiences using blockchain's secure data. AI's analysis of individual preferences on blockchain enables personalized payments advice, such as how to price a listing or what payment methods to utilize. 

Overall, this integration leads to more efficient, secure, and tailored financial services, revolutionizing the industry with data-driven decision-making.

Gemini in VSCode and JetBrains integrated development environments can unlock significant improvements in software delivery and security. In this session, you’ll learn how to harness the power of Code Transformations to streamline multiple tasks of the software development lifecycle, such as code optimization or troubleshooting. You’ll also learn how Commerzbank has been leveraging AI to accelerate its software delivery velocity and code quality/security.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Experience the transformation. Learn how Gemini for Google Cloud uses AI to effortlessly manage Google Cloud. Get help with design, deployment, troubleshooting, and optimization directly within Google Cloud Console. Accelerate complex tasks, boost productivity, and stay focused on core business value. Gemini for Google Cloud offers goal-driven design, guided operations, and tailored optimizations, all with enterprise-grade security and privacy.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Today’s fragmented and static approach to managing cloud risk makes it nearly impossible to prioritize security issues. This technical session explains how Security Command Center combines an in-depth understanding of your unique multicloud environment with Mandiant threat intelligence and artificial intelligence (AI) to play the role of a sophisticated attacker by simulating thousands of possible attack vectors to compromise cloud resources. Learn how to find the security issues that matter most and improve your overall risk posture.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

One of the biggest challenges in the era of generative AI is understanding how organizations can secure their AI use. Mandiant understands how threat actors are using gen AI and are targeting gen AI systems. Come hear expert thoughts on how to assess the security of gen AI implementations and training data, review applications built upon gen AI models, and provide end-to-end technical testing to validate the protections of gen AI pipelines.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

While many organizations have threat intelligence as part of their security operations program, most struggle to apply it effectively, and lack the required resources and expertise to keep up with the latest threat actors and TTPs. In this session, we’ll unveil the new intelligence-driven approach in Google Security Operations (Chronicle), and how it can deliver turnkey security outcomes with threat intelligence that’s personalized, relevant, and seamlessly embedded.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Join us for a firsthand account of TELUS's epic journey to the cloud, migrating their vast Oracle database landscape to Google Cloud Platform (GCP). Discover how this strategic move unlocks unparalleled performance, elasticity, and innovation, propelling TELUS towards a future of limitless potential. In this session you will witness firsthand the tangible benefits TELUS has achieved in terms of performance, scalability, and security and learn from the experts and gain invaluable insights into planning and executing a complex cloud migration. Please note: seating is limited and on a first-come, first served basis; standing areas are available

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Learn how Google Cloud’s backup and storage services secure and protect your data from a variety of threats, such as ransomware, outages, and user errors. Our backup services protect VMs, databases (such as SAP HANA), and Google Kubernetes Engine environments. Expand threat detection capabilities by alerting on suspicious activities around backup through Security Command Center. We’ll also dive into Cloud Storage and our industry-leading turbo replication for dual-region deployments, soft delete, versioning, and more to protect your data.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Cloud infrastructure management demands constant attention to ensure high availability, efficiency, and security. Gemini, a powerful large language model assistant, streamlines these critical tasks for compute, storage, and networking on Google Cloud. Imagine describing infrastructure needs in plain language and receiving best-practices configurations – or proactively analyzing your environment to identify troubleshooting root causes. Join this session to see how Gemini automates routine tasks, suggests optimizations, and provides infrastructure insights.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Generative AI is only as good as its data. Join this session to explore the powerful synergy between Stack Overflow and Gemini and learn how they’re coming together to bring a new level of productivity through cutting-edge AI tools backed by accurate data foundation trusted by millions of developers. The speakers will showcase where developers can benefit from the enterprise and security support you’ve come to expect from Google, with accurate and trusted knowledge that’s made Stack Overflow a go-to resource for all developers.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Firewalls are essential for any network security architecture. As organizations embrace the cloud, they seek cloud-first firewall solutions that seamlessly adapt to their evolving workload protection requirements. This session explores how you can reach this goal with Google Cloud's next generation firewall (NGFW). Learn how to secure all network paths with advanced threat prevention, coupled with flexible and granular control to ensure a strong security posture in Google Cloud. Plus, you'll gain insights from shared customer experiences in safeguarding workloads with Cloud NGFW.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

The key to maintaining a strong cloud security posture is to build from the start on a robust foundation of baseline security controls. Google Cloud’s Security Foundation provides recommended controls to common cloud adoption use cases, including infrastructure modernization, AI workloads, data analytics, and application modernization. In this session, you’ll learn how to start secure and stay secure in the cloud using the Security Foundation.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.