talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

2078

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

2078 activities · Newest first

This presentation covers the critical transition from traditional analytics to the strategic integration of AI into business processes, from the compelling reasons for adoption to the practical implementation steps. The 'What' segment introduces the foundational elements enabling the AI revolution and the business processes ripe for disruption. Addressing the 'Why', we highlight the responsible adoption of AI with accurate, reliable data as the backbone of any AI-driven initiative. This section underscores the need for solid data benchmarks and testing to measure AI's effectiveness, to ensure that AI implementations lead to tangible, positive outcomes, and to alert leaders to issues early. The 'How' section provides actionable insights on implementing AI to scale data-driven decisions effectively. With real-life examples, this section covers best practices for data management, technology integration, and strategies for fostering a culture that embraces data and AI. Attendees will learn about scaling AI-driven analytics, including considerations for data security, privacy, and ethical AI use.

Internal Developer Platforms (IDPs) are revolutionizing how engineering teams work by streamlining workflows and boosting developer productivity. But building an IDP requires a robust, scalable foundation. In this talk, we'll show you how Google Kubernetes Engine (GKE) Enterprise serves as the perfect launchpad for your IDP journey. Get ready for a hands-on demo and deep dive that will show you how GKE Enterprise simplifies IDP development with built-in security, compliance controls, and multi-cluster management.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

session
by Brad Bonnett (Google Cloud) , Chris Dickens (Google Cloud) , Ankur Jain (Acxiom) , Steve Jarrett (ORANGE) , Navin Anandaraj (Genuine Parts Company)

Discover the cutting-edge technologies and strategic advancements with Google Distributed Cloud's (GDC) 2024 roadmap. GDC's latest innovations will empower your organization to accelerate digital transformation, optimize operations, and gain a competitive advantage. Explore new features that enhance data management, drive AI-powered insights, and strengthen security across distributed cloud environments. A valuable roadmap for business leaders, IT decision-makers, and technology professionals seeking to leverage the full potential of GDC in 2024.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

When data is the most valuable asset of your company, protecting it is a non-negotiable. While Information Security professionals are focused on Bad Actors, we have data operations and data governance professionals focused on Bad Data… Are they one and the same? What’s similar and what’s different between the worlds of data integrity and data security?

Drawing from a wealth of experience and real-world challenges, Gorkem will shed light on the pivotal role of data quality in the forefront of information security. We’ll discuss opportunities for early detection, auto-detection, and the establishment of tiered rules to manage and remediate bad data effectively. Learn how proactive governance and observability can transform data management from a reactive stance to a formidable defense mechanism, ensuring the integrity and security of your data ecosystem. 

With the growth in the volume and variety of operational data, a company‘s success is contingent on how well it can leverage its databases. But with so many databases to meet the growing demands for data processing, teams can be blindsided by operational issues and inefficiencies. Explore how we harness the power of AI through large language models to provide an AI-driven database assistant. Learn how this unified, intelligent experience simplifies programming, monitoring, optimization, security, and migrations for your entire database estate.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Join our experts to learn more about your identity choices with Google Cloud. We will deep-dive into workload identity federation and support for GCE and workforce identity federation for Azure AD, Okta, and other IdPs, secure your environments with access policies like Allow and Deny, and seamlessly use policy intelligence tools for federated identities. We’ll show how you can unlock new use cases, and catch fraud and abuse in your environment. You’ll also learn how L’Oreal uses these features toward their identity-first security platform.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Concerned about over-privileged identities with expansive access within your systems? Join us to learn how to enforce the principle of least privilege on your identities. We'll guide you on how to understand identity entitlements and leverage machine learning to fine-tune access. You’ll learn about proactive access management techniques with just-in-time access workflows. As a bonus, you will also learn firsthand insights from Commerzbank regarding their practical application of these strategies to improve their security posture.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

This session will explore HAVI’s transformative shift from a traditional security information and event management (SIEM) solution to a platform that provides threat detection at petabyte scale and millisecond search performance using the Chronicle SecOps Suite. We’ll see how HAVI navigated the complex regulatory environment to set up a system that allowed them to benefit from a fully managed service, and independently addressed scalability and platform flexibility challenges to create a more cost-effective and high-performing solution.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

In today's data-driven world, organizations face the challenge of not only harnessing the power of data but also ensuring its responsible and effective use. This panel discussion will delve into the critical components of embedding data governance and data literacy into the fabric of organizational culture. Data governance forms the foundation of a robust data strategy, encompassing policies, processes, and frameworks to ensure data quality, integrity, and security. However, effective governance requires more than just frameworks; it necessitates a cultural shift where data stewardship is ingrained into every aspect of organizational operations. Moreover, data literacy is paramount in enabling individuals across an organization to effectively interpret, analyze, and derive insights from data. By cultivating a culture of data literacy, organizations empower employees to make informed decisions, driving innovation and growth. This panel will explore strategies for fostering a culture of accountability, collaboration, and trust around data practices driving sustainable success in today's dynamic business landscape.

Our efforts to obtain – and maintain – a little privacy in our lives have been a subject of concern and conversation in the United States since 1890. A famous article that year, titled “The Right to Privacy,” called out how new technology and business processes threatened what is also called “our right to be let alone.” The concerns and conversations have evolved since then to also encompass the right to privacy over how the data about our personal lives is collected and used. 

Today, collecting and using our personal data is ubiquitous. We are recorded by dashcams and surveillance cameras for safety and security. We use our biometric data to conveniently open phones and enter buildings. We provide intimate details of our lives so connected devices can help us stock refrigerators, brush our teeth, drive cars and more. This session will provide a quick overview of data privacy, with tips for governing the use of personal data in order to comply with laws and meet expectations. 

The Federal Government's approach to AI Policy, Governance, and Security is evolving to address this dynamic landscape of artificial intelligence and the explosion of Large Language Models. The goal is to develop a framework with the aim of reducing risk to people and the planet in the development, procurement and use of AI and the comprehensive strategies employed to formulate and implement policies ensuring responsible AI use. Emphasizing robust governance frameworks, organizations navigate ethical considerations, privacy concerns, and potential biases. Security protocols are paramount, safeguarding against cyber threats and ensuring the integrity of AI systems. Leveraging this multifaceted approach will help to foster innovation while prioritizing transparency, accountability, and the public interest. The Federal Government's commitment to shaping a secure and ethical AI landscape underscores its pivotal role in technological evolution.

GenAI can look deceptively easy when it comes to showing a cool demo, but can prove incredibly hard to productionalize. This session will cover the challenges behind industrializing GenAI applications in the enterprise, and the approaches engineers are taking to meet these challenges. Attendees will get to take a look under the hood to see how Data Engineering and Integration techniques can help us go from simple demos to production grade applications with consistently high quality results.  

We will explore how Retrieval Augmented Generation (RAG) workflows go from naive to advanced. Techniques discussed will cover a typical GenAI application flow with topics including multiple and hybrid models, refined data processing, data security, getting transparency in results, combining structured and unstructured data, and putting it all together to get high performance and cost effective outcomes. Attendees will leave the session with a framework to understand proposed solutions from their teams and ask the right questions to test if a solution can become industrial-grade.

This session explores the technological advancements of analytics, data science, machine learning, AI, and quantum computing. Beginning with an overview of the historical development and current state of these technologies. LexisNexis' Flavio Villanustre will explore how analytics has transformed industries; how data science extracts valuable insights, how machine learning has moved from simple rule-based systems to today's deep learning models; and how quantum computing promises to solve previously intractable problems at speeds unattainable by classical computers.

Attendees will learn about the benefits and associated risks of each technology: Increases in efficiency, productivity, and innovation juxtaposed against vulnerabilities in privacy, security, bias, and wider societal concerns such as unemployment. These competing issues underscore the need for responsible, ethical research and deployment of such tools.

Machine Learning Security by Karol Przystalski

Big Data Europe Onsite and online on 22-25 November in 2022 Learn more about the conference: https://bit.ly/3BlUk9q

Join our next Big Data Europe conference on 22-25 November in 2022 where you will be able to learn from global experts giving technical talks and hand-on workshops in the fields of Big Data, High Load, Data Science, Machine Learning and AI. This time, the conference will be held in a hybrid setting allowing you to attend workshops and listen to expert talks on-site or online.

GitLab and Google Cloud are partnering to deliver a comprehensive, integrated DevSecOps solution that provides best-in-class reliability, efficiency and end-to-end security. In this session you'll learn how you can quickly and securely deploy workloads to Google Cloud using GitLab’s new integrations, which include streamlined IAM configuration, Artifact Registry integration, and optimized GitLab templates and workflows for Google Cloud.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

To extract the maximum performance, reliability and security out of every instance from enterprise applications to AI/ML, we built a cutting-edge system of custom silicon, security microcontrollers, and tiered scale-out offloads: Titanium. Titanium already underpins all of our latest compute instances. Join this session to see why Titanium matters, how it works, and how to maximize the benefit in your workloads.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

Obscurity isn't security. Unmanaged and undocumented APIs increase your attack surface by 30%. In today's landscape where API attacks are prevalent, don't risk data breaches and security vulnerabilities. Join our experts from Google Cloud and BMW to: 1) Discover how Apigee's Advanced API Security helps you shine a light on your shadow APIs 2) Learn how BMW uses Advanced API Security to protect its 250 APIs and five Bn API calls

Join our experts from Google Cloud and BMW to 1/ Discover how Apigee's Advanced API Security helps you shine a light on your shadow APIs 2/ Learn how BMW uses Advanced API Security to protect their 250 APIs and 5 Bn API calls.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

This session will provide an overview of designing VPC connectivity for segmenting sensitive applications for security and compliance reasons in Google Cloud. In particular this session covers how this can be achieved with distributed applications with a global use base and scenarios that leverage Cross Cloud Network (CCN). The session will be co-presented with a major global financial technology customer, a leader in the industry when it comes to building such distributed applications. Please note: seating is limited and on a first-come, first served basis; standing areas are available

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.

The log4shell attack was unique in its complexity, and as a remote code execution attack, incredibly risky should such a vector play out. In this lab we’ll explore the anatomy of how this attack vector works and from that learning experience, count that ways that we can defend against it and others like it in the future.

Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.