Featured
The power of choice: Addressing diverse global regulatory requirements on Google Cloud
Stephanie Nogues Director Group Strategic Partnerships Worldline Archana Ramamoorthy Senior Director, Product Management Google Cloud
Learn how you can quickly and easily build applications in environments with predefined controls and guardrails to meet global regulatory requirements and maintain digital sovereignty. In this session, you’ll hear about the wide variety of options available that allow you to align cloud controls with risk and regulatory mandates worldwide.
All episodes
-
From detection to protection: Five ways to use Gemini, Google’s AI assistant, in Security
Spencer Lichtenstein, Product Lead, Gemini in Google SecOps, Google; Hector Peña, Senior Director, Information Security Apex Fintech Solutions
You can’t spell “action” without “AI,” and in this session, we’ll show you five ways you can take action today to stay ahead of threats using generative AI. Our team of product experts will demo new features, cover use cases with a customer from Apex Fintech Solutions, and share best practices that empower security professionals to unleash the potential of AI and transform their operations.
-
The indispensable technologies for reducing cloud risk
Tim Knudsen Director Product Management Google Cloud Security; Sowmya Karmali Group Product Manager Google
The practice of security in highly dynamic cloud environments begins by discovering where you are most vulnerable to attack and identifying high-value resources that could be exposed to adversaries. Google Cloud Security advancements help pinpoint the risks and vulnerabilities that matter most so you can directly respond and reduce exposure. Join this session to learn about the latest technologies that can help keep your multi-cloud environment safe.
-
The symbiotic relationship between incident response and threat intelligence
Jibran Ilyas, Consulting Leader at Mandiant, Google Cloud
Cyber attacks are inevitable. When they happen it’s important to stay calm and have a plan. For many that plan is to enlist help from outside the organization. Join Jibran Ilyas, a seasoned security consultant and incident response expert as he dissects the strategies his team employs in recent high profile breaches and how the threat intelligence is applied in investigations to speed up analysis and for swift containment and remediation. This session is essential for anyone seeking to strengthen their incident response capabilities and safeguard their organization against the ever-evolving landscape of cyber threats.
-
Etsy and the art of SIEM Migration
Nimmy Reichenberg, Head of Security Operations Product Marketing, Google Cloud Security; Manan "Naan" Doshi, Senior Security Engineer Etsy
Major shifts in the SIEM market are driving security operations teams to migrate from legacy to modern platforms. In this session, Etsy will share best practices from its journey to fast and effective migration and SecOps modernization.
-
At the breaking point: Is your work email safe against ransomware and state-sponsored attacks?
Anu Yamunan, Director Product Management, Google Workspace
Is clinging to the "safe" choice of legacy productivity tools actually putting your organization at risk? We believe there's a better way: Google Workspace's cloud-first architecture minimizes security risks by eliminating data storage on user devices, dependence on desktop apps, and on-premises infrastructure.
-
Simplifying and strengthening endpoint security
Mark Berschadski, Director Product Management, Google
Browsers are no longer just a portal to the internet, they are the new endpoint where almost every high-value activity or interaction in the enterprise takes place. In this session, learn how you can create a new nexus of security, privacy, control, and visibility for users on managed and unmanaged devices using Chrome Enterprise.
-
Security foundations: What’s new in Identity and Access Management
Christian Gorke VP / Head of Cyber Center of Excellence, Big Data & Advanced Analytics Commerzbank; Akshay Datar Product Manager, Cloud Security, Google Cloud
The key to maintaining a strong cloud security posture is to build from a robust foundation of baseline security controls. In this session we will highlight our latest innovations in IAM. Join us and learn how to enforce the principle of least privilege for your identities using Privileged Access Management and how to mitigate data exfiltration risks with Principal Access Boundary.
-
The power of choice: Addressing diverse global regulatory requirements on Google Cloud
Stephanie Nogues Director Group Strategic Partnerships Worldline Archana Ramamoorthy Senior Director, Product Management Google Cloud
Learn how you can quickly and easily build applications in environments with predefined controls and guardrails to meet global regulatory requirements and maintain digital sovereignty. In this session, you’ll hear about the wide variety of options available that allow you to align cloud controls with risk and regulatory mandates worldwide.