Featured
F5 Automated Defense for application security
Brian McHenry VP, Web Application & API Security, F5
Join this session to learn how F5 Automated Defense can help you reduce the risk of your applications being attacked by malicious actors, improve your security posture by providing a comprehensive set of application security features, and increase the uptime of your applications by protecting them from threats and attacks that could compromise or take them offline.
All episodes
-
The Defender’s Advantage for cloud
Kerry Matre Sr. Director, Mandiant Services & Solutions Google Cloud
The Defender’s Advantage is the concept that organizations are defending against attacks in their own environment. This provides a fundamental advantage arising from the fact that they have control over the landscape where they will meet their adversaries. Organizations struggle to capitalize on this advantage. Join this session to learn about the six critical functions of cyber defense and how you can galvanize your defender’s advantage.
-
Threat intelligence briefing with Mandiant
Andrew Kopcienski, Principal Analyst, Mandiant Google Cloud
Join this Mandiant threat intelligence briefing to get insights into the latest tactics, techniques, and procedures (TTPs) and tools used by threat actors. This session will cover the evolving threat landscape and emerging threats, and provide actionable recommendations that organizations can use to be more proactive in bolstering their security posture and defending against cyberthreats.
-
Enabling business success by reducing cyber exposures
Alexa Rzasa, Product Marketing Manager, Mandiant Google Cloud
Recognizing the expanding threat landscape and the need for effective business enablement through threat-based exposure prioritization, Mandiant has developed a purpose-built solution: Mandiant Proactive Exposure Management. In this session, we’ll go over how this solution helps enterprises reliably and continuously reduce the most critical and exploitable exposures – before adversaries act on them. Security teams need to be able to effectively prioritize exposures that require immediate remediation – and understand what can wait.
-
Secure from the core: Applying key security lessons to software supply chains
Andy Chang, Group Product Manager, Google Cloud; Jonathan Meadows, Managing Director, Citi Tech Fellow Citi
Software supply chain attacks are on the rise. In this session, we’ll explore the most common types of software supply chain attacks and provide an overview of the risks they pose to businesses. We’ll also discuss best practices for securing your software supply chain, such as implementing risk assessment and management processes, establishing strong security controls, and building a culture of supply chain security.
-
Pinpointing and mitigating cloud security risks
Joakim Nydrén, Product Manager, Security Command Center Google Cloud; Ahmed Beder, Security Engineer, Nordnet AB
As cloud environments get larger and more complex, it becomes difficult to identify the greatest security risks. What if you could quickly pinpoint where you’re the most exposed, and then quickly mitigate the risk of attack? Learn how our new attack path simulation engine uses advanced AI to help you visualize multistage attacks by tracing the steps an attacker may potentially take to exploit vulnerabilities, giving you the opportunity to remediate threats before they impact your cloud.
-
Global compliance without compromise:Running regulated workloads on Google Cloud
Christopher Johnson Regulated Cloud Solution Google Cloud; Cyprien Falque CEO S3NS
Creating compliant environments and addressing digital sovereignty concerns can present numerous challenges and even inhibit the use of innovative cloud services. In this session, we’ll describe how public and private sector customers can simplify compliance and meet digital sovereignty requirements in the cloud, applying controls like data location, encryption key management, and personnel restrictions in just a few clicks. You’ll also hear first-hand how we’re working with our partner S3NS to deliver sovereign cloud solutions in France.
-
Supercharge security with generative AI
Umesh Shankar Chief Technologist, Security Google Cloud
Recent advances in artificial intelligence (AI), particularly in large language models (LLMs), accelerate our industry’s ability to help the people responsible for keeping their organizations safe. In this session, we’ll show how Google Cloud Security AI Workbench, our industry-first platform powered by a specialized security LLM, enhances our security portfolio to address three top security challenges: threat overload, toilsome tools, and the talent gap.
-
F5 Automated Defense for application security
Brian McHenry VP, Web Application & API Security, F5
Join this session to learn how F5 Automated Defense can help you reduce the risk of your applications being attacked by malicious actors, improve your security posture by providing a comprehensive set of application security features, and increase the uptime of your applications by protecting them from threats and attacks that could compromise or take them offline.