Featured
Simplifying and strengthening endpoint security
Mark Berschadski, Director Product Management, Google
Browsers are no longer just a portal to the internet, they are the new endpoint where almost every high-value activity or interaction in the enterprise takes place. In this session, learn how you can create a new nexus of security, privacy, control, and visibility for users on managed and unmanaged devices using Chrome Enterprise.
All episodes
-
From detection to protection: Five ways to use Gemini, Google’s AI assistant, in Security
Spencer Lichtenstein, Product Lead, Gemini in Google SecOps, Google; Hector Peña, Senior Director, Information Security Apex Fintech Solutions
You can’t spell “action” without “AI,” and in this session, we’ll show you five ways you can take action today to stay ahead of threats using generative AI. Our team of product experts will demo new features, cover use cases with a customer from Apex Fintech Solutions, and share best practices that empower security professionals to unleash the potential of AI and transform their operations.
-
The indispensable technologies for reducing cloud risk
Tim Knudsen Director Product Management Google Cloud Security; Sowmya Karmali Group Product Manager Google
The practice of security in highly dynamic cloud environments begins by discovering where you are most vulnerable to attack and identifying high-value resources that could be exposed to adversaries. Google Cloud Security advancements help pinpoint the risks and vulnerabilities that matter most so you can directly respond and reduce exposure. Join this session to learn about the latest technologies that can help keep your multi-cloud environment safe.
-
The symbiotic relationship between incident response and threat intelligence
Jibran Ilyas, Consulting Leader at Mandiant, Google Cloud
Cyber attacks are inevitable. When they happen it’s important to stay calm and have a plan. For many that plan is to enlist help from outside the organization. Join Jibran Ilyas, a seasoned security consultant and incident response expert as he dissects the strategies his team employs in recent high profile breaches and how the threat intelligence is applied in investigations to speed up analysis and for swift containment and remediation. This session is essential for anyone seeking to strengthen their incident response capabilities and safeguard their organization against the ever-evolving landscape of cyber threats.
-
Etsy and the art of SIEM Migration
Nimmy Reichenberg, Head of Security Operations Product Marketing, Google Cloud Security; Manan "Naan" Doshi, Senior Security Engineer Etsy
Major shifts in the SIEM market are driving security operations teams to migrate from legacy to modern platforms. In this session, Etsy will share best practices from its journey to fast and effective migration and SecOps modernization.
-
At the breaking point: Is your work email safe against ransomware and state-sponsored attacks?
Anu Yamunan, Director Product Management, Google Workspace
Is clinging to the "safe" choice of legacy productivity tools actually putting your organization at risk? We believe there's a better way: Google Workspace's cloud-first architecture minimizes security risks by eliminating data storage on user devices, dependence on desktop apps, and on-premises infrastructure.
-
Simplifying and strengthening endpoint security
Mark Berschadski, Director Product Management, Google
Browsers are no longer just a portal to the internet, they are the new endpoint where almost every high-value activity or interaction in the enterprise takes place. In this session, learn how you can create a new nexus of security, privacy, control, and visibility for users on managed and unmanaged devices using Chrome Enterprise.