Hi [[ session.user.profile.firstName ]]

Google Cloud and AppViewX: Reimagining PKI Deployment and Management

Cloud PKI is disrupting the conventionally on-premise PKI market. Why? The On-premise model has traditionally taken significant costs and manpower to set up, deploy, and manage. Sometimes, they also lack agility and compatibility with new tech like cloud applications and IoT devices. The COVID-19 pandemic has also created a need for easy-to-administer PKI which can be remotely managed and does not require skilled personnel to be on-site to do so. Cloud PKI solves all these problems by incorporating a scalable pay-as-you-go model along with rapid deployment – allowing teams to obtain and use PKI whenever they want to, with little to no infrastructure costs being incurred along the way.

Google created the Google CA Service to PKI delegate deployment to the cloud, and AppViewX creates market-leading certificate lifecycle management solutions. In this webinar, you’ll learn how the Google-AppViewX joint solution has made it incredibly easy and inexpensive for businesses of all sizes to deploy, maintain, manage, and scale a highly secure PKI system from a single pane of glass, while streamlining certificate and key lifecycle management processes through consolidation and automation. The solution is highly available, and conducive to the growing needs for compatibility with DevOps, IoT, remote working (VPNs), and a lot more. What’s more, the AppViewX platform can help teams shift gears and move towards a cryptographically agile operating model, which means PKI migrations are minimally disruptive, and take days, not months.

Key Takeaways:
1. Cloud PKI Model Overview
2. Key Benefits of Cloud PKI and PKIaaS
3. Lifecycle Management of Cloud-based PKI
4. Joint Lifecycle Management Solution: Google CA Service and AppViewX
Recorded Nov 17 2020 37 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Anoosh Saboori, Product Manager, Google; Anton Chuvakin, Security Strategy, Google; Murali Palanisamy, CSO, AppViewX
Presentation preview: Google Cloud and AppViewX: Reimagining PKI Deployment and Management

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Google's State of the Market on Bot Fraud, featuring Forrester Jan 26 2021 6:30 pm UTC 32 mins
    Sandy Carielli, Principal Analyst, Forrester and Kelly Anderson, Product Marketing Lead, Google Cloud
    Organizations recognize the very real risk of bot fraud--91% agree that
    the number of bot attacks they see will increase over the next 12 months. However, today’s firm is not protecting itself against the most common forms of attacks and expect to lose considerable percentages of their revenues to bot attacks.

    In this webinar, you’ll hear from our guest speaker Sandy Carielli at Forrester and Kelly Anderson at Google about the latest status of the online fraud market and proper bot fraud management. You’ll learn about the most common web-based attacks and how to correctly protect against them. You’ll also see the many teams involved in bot fraud management and the importance of creating a cohesive approach to reduce the many hours that are spent managing post-attack situations. On average, teams spend 424 hours (17 days and 16 hours) resolving bot attacks. We’ll also explore the benefits--including reducing customer friction--that result in improved bot management.
  • Protecting from Ransomware attacks Jan 21 2021 6:00 pm UTC 25 mins
    Vicente Diaz and Gerardo Fernandez - Virus Total
    Ransomware attacks are one of the biggest worries for any company. During the last years, cybercriminal groups were attracted to ransomware given the huge benefit and difficulties to trace attacks back.
    Not everything is lost. Prevention is the most effective measure, and from VirusTotal we want to show what to do in order to avoid being a victim.
    During this workshop we will show with practical examples what Threat Intelligence can do to significantly reduce your risk vector against ransomware.
  • Modern Detection for Modern Security Threats with Chronicle Recorded: Jan 14 2021 61 mins
    Ansh Patnaik, Product Marketing & Svetla Yankova, Customer Experience Engineering, Google Cloud Security
    Google Cloud Security has launched modern detection at Google scale with the debut of our new solution, Chronicle Detect. It includes a rules engine that operates at the speed of search, a widely-used detection language for describing threat behaviors, and a regular stream of new rules and indicators, built by our elite research team.

    Join this webinar to:

    - Hear from Paul Farley, Deputy CISO, NCR about their journey with Chronicle
    - Get a demo of the new detection engine that includes reference rules for the ATT&CK framework
    - Learn how Chronicle's elite research team, UpperCase, creates rules and indicators so you don't have to
  • Advancing Threat Intelligence & Hunting with VirusTotal Recorded: Jan 6 2021 30 mins
    Alvin Lung, Customer Experience Engineer, VirusTotal and Ben Caisley, Security Specialist, VirusTotal
    During this webinar, we will run through an overview of VirusTotal Intelligence and Hunting capabilities. Showcasing the search capabilities within VirusTotal to help sift through the vast amount of malware and how it may be pertinent to your organization as well as ways to track various threats. An investigation can start from IoC’s with little context, and how an analyst can leverage the data in VirusTotal to help uncover additional variants and the techniques attack groups may be utilising. Learn how VirusTotal can supercharge your team in regards to:
    - Security threat enrichment
    - Incident response
    - Threat hunting
  • A Practical Solution to Manage, Externalize, and Implement Cloud Trust Recorded: Dec 22 2020 46 mins
    Andrew Lance, Sidechain Security; Anton Chuvakin, Google; Robert Ball, Ionic Security; Christy Smith, Ionic Security
    Watch a group of innovators from Ionic Security, Google, and Sidechain Security as they explore the cloud trust paradox and the compelling events that are exacerbating cloud adoption. Hear about the practical concerns and use cases that led to the powerful integration between Ionic MachinaTM and Google Cloud EKM. Watch a demonstration of the solution in action.
  • Transform your security strategy with data driven detection Recorded: Dec 15 2020 18 mins
    Christopher Martin, Security Specialist, Google Cloud
    Ever feel like your security team is overly reliant on vendor-created threat detection? There are nuances to your environment that often require a more customized approach to identifying potential TTPs. Furthermore, advanced threat actors may use methods, techniques and malware that are custom-made for your organization. The art of detection is evolving as more investments are made into SOC analysts, threat responders, and hunters - and as part of this movement, data driven detection is emerging as the most accurate way to craft enterprise-specific detections.

    Attend this session to learn how you can intelligently transform your security strategy by authoring detections, treating them as code, and putting best practices in place to use, store, share and maintain your custom detections.

    Learn how to get started with a custom detection security strategy.
    Experience how the custom detection lifecycle provides insight into attacker behavior.
    Understand the core components of authoring detections.
    See how you can incorporate security frameworks into your detections.
    Learn how a data driven approach to detection writing detections captures lessons learned and sustains institutional knowledge.
  • The Cloud Trust Paradox: Trusting Cloud Computing More Requires Trusting it Less Recorded: Dec 9 2020 59 mins
    Speakers: Dr. Anton Chuvakin, Head of Security Solution Strategy, Google Cloud Dr. Anand Kashyap, CTO and Founder, Fortanix
    Today the very concept of “using public cloud” is inseparably connected to “trusting your cloud provider.” While many have taken that leap of faith, there are important workloads that organizations and regulatory bodies are reluctant to move to the cloud because they can’t verifiably prevent the cloud provider from getting access to their data.

    What if you could move data to the cloud without your cloud provider having access to the data or the encryption keys?

    Google Cloud Platform (GCP) is the first public cloud to announce the availability of External Key Manager (EKM) with early adopter PayPal, using Fortanix to store and manage encryption keys off-cloud for data encrypted in GCP. One year later, this webinar will examine how customers are using GCP EKM and Fortanix to move sensitive data in financial services, healthcare, and government onto the public cloud, while ensuring that the organization maintains control of the encryption keys and data at all times.

    In this webinar, you will learn about:
    - Real-world use cases where customers are using external key management to solve data security challenges
    - A cloud data security control model for understanding the differences and trade-offs between public cloud data security options.
    - Using virtual data sovereignty to solve regional data residency requirements
    - Compliance interpretations that require or encourage External Key Management
    - How to implement centralized key management for multicloud data security
  • [PANEL] Cloud Security Risks and Solutions Recorded: Dec 8 2020 59 mins
    Clarify360 | PerimeterX | Google Cloud | Appgate | Anitian
    In a recent report, the Cloud Security Alliance (CSA) outlined the top 11 threats to cloud computing for 2020. Data breaches, misconfiguration and inadequate change control, a lack of cloud security architecture and strategy, and insufficient identity and access management were among the biggest security challenges for all industries operating in the cloud.

    These issues are not unique to any particular industry, but fortunately, they have common solutions. It’s clear that protecting public cloud assets is key. COVID-19 pandemic was a major accelerant for organizations to quickly move forward with the migration of business infrastructure and applications to the cloud.

    Cloud Controls and Breach Prevention are top of mind for IT leadership and team alike.

    In this panel discussion, we’ll discuss the importance of cloud controls and breach protection during this accelerated move to the cloud

    - What the C Suite Needs to Know about Cloud Security
    - Why Cloud Security is not an IT problem, it’s a business problem
    - The Revenue and Brand ROI of Preventing Data Breaches
    - Real productivity results from correcting misconfiguration and inadequate change control
    - The importance of building a cloud security architecture and strategy
    - Why managing sufficient identity, credential, access, and key policies
    - Cross Training and Upskilling your team


    Moderated by: Jo Peterson, Vice President, Cloud & Security Services, Clarify360

    Dr. Anton Chuvakin, Head of Solution Strategy, Google Cloud
    Amir Shaked, VP R&D PerimeterX
    Tina Gravel, Senior Vice President, Appgate
    Charles Johnson, Cybersecurity Advocate, Anitian
  • Rethinking your Cloud Security Strategy for 2021 Recorded: Dec 7 2020 29 mins
    Dr. Anton Chuvakin, Head of Solution Strategy, Google Cloud
    This year brought security teams new challenges to tackle. The dynamics of 2020 have put incredible pressure on enterprises to be secure, virtual and easily accessible by the masses. Modern cloud computing implies very different operational processes, new tools and practices — and some concepts alien to traditional IT. The security leaders must re-imagine the future state to avoid bringing pre-cloud tools and pre-cloud thinking into your cloud migration. In this webinar, we will:

    Look back at how 2020 changed the secure digital transformation roadmap and cloud migration
    Discuss common pitfalls teams make when moving to the cloud
    Review 2021 recommendations for cloud security success
  • Similarity brings your threat hunting to the next level Recorded: Nov 25 2020 53 mins
    Jeremy Brown & James Hays - Trinity Cyber, Fernando Merces & Jon Oliver - TrendMicro, Vicente Diaz - VirusTotal
    Join TrendMicro, Trinity Cyber and VirusTotal in this workshop where you will learn how similarity is one of the most powerful tools when it comes to threat analysis, greatly speeding up your research, helping to avoid some of the tricks used by attackers to avoid being detected, giving you a more complete overview of malicious campaigns and allowing to further pivoting and discovering artefacts from your adversaries. We will present you the most recent similarity algorithms, why they are relevant, and how to use them in real case scenarios you can leverage in your daily security investigations.
  • Crimeware: A Bigger Threat than Nation States Recorded: Nov 19 2020 33 mins
    Brandon Levene, Uppercase Lead Cyber Crime Researcher, Google Cloud
    Lead cyber crime researcher for Google Cloud's Uppercase Brandon Levene discusses crimeware and how, in 2020, financially motivated threat actors are likely to cause damage far outstripping that of nation-state or espionage oriented attacks.
  • Transforme su estrategia de seguridad con detecciones basadas en datos Recorded: Nov 18 2020 21 mins
    Piergiorgio Di Giacomo, Security Specialist, Google Cloud
    ¿Alguna vez ha sentido que su equipo de seguridad se basa demasiado en detecciones de amenazas dependientes de vendedores externos? En ocasiones, es necesario disponer de una aproximación más personalizada para detectar TTPs potenciales. Los actores maliciosos pueden utilizar métodos, técnicas y procedimientos especialmente diseñados contra su organización. El arte de la detección está evolucionando, y cada vez se destina más inversión a analistas de SOC, respuesta a incidentes, y cazadores de amenazas - y como parte de este movimiento, la detección basada en datos surge como la técnica más adecuada para crear detecciones específicas para cada entorno particular.

    En esta sesión aprenderá cómo transformar su estrategia de seguridad mediante la creación de detecciones, creadas de forma muy parecida a la creación de código, y usando las mejores prácticas para el uso, almacenamiento, compartición y mantenimiento de sus detecciones personalizadas.

    Aprenda cómo iniciar su estrategia de detección personalizada.
    Vea cómo el ciclo de vida de detecciones personalizadas le proporciona visibilidad del comportamiento de los atacantes.
    Descubra los principios para crear sus propias detecciones.
    Aprenda cómo incorporar marcos de seguridad en sus detecciones
    Entienda cómo la aproximación basada en datos para la creación de detecciones destila lecciones aprendidas y se refuerza con el conocimiento particular de su institución.
  • Google Cloud and AppViewX: Reimagining PKI Deployment and Management Recorded: Nov 17 2020 37 mins
    Anoosh Saboori, Product Manager, Google; Anton Chuvakin, Security Strategy, Google; Murali Palanisamy, CSO, AppViewX
    Cloud PKI is disrupting the conventionally on-premise PKI market. Why? The On-premise model has traditionally taken significant costs and manpower to set up, deploy, and manage. Sometimes, they also lack agility and compatibility with new tech like cloud applications and IoT devices. The COVID-19 pandemic has also created a need for easy-to-administer PKI which can be remotely managed and does not require skilled personnel to be on-site to do so. Cloud PKI solves all these problems by incorporating a scalable pay-as-you-go model along with rapid deployment – allowing teams to obtain and use PKI whenever they want to, with little to no infrastructure costs being incurred along the way.

    Google created the Google CA Service to PKI delegate deployment to the cloud, and AppViewX creates market-leading certificate lifecycle management solutions. In this webinar, you’ll learn how the Google-AppViewX joint solution has made it incredibly easy and inexpensive for businesses of all sizes to deploy, maintain, manage, and scale a highly secure PKI system from a single pane of glass, while streamlining certificate and key lifecycle management processes through consolidation and automation. The solution is highly available, and conducive to the growing needs for compatibility with DevOps, IoT, remote working (VPNs), and a lot more. What’s more, the AppViewX platform can help teams shift gears and move towards a cryptographically agile operating model, which means PKI migrations are minimally disruptive, and take days, not months.

    Key Takeaways:
    1. Cloud PKI Model Overview
    2. Key Benefits of Cloud PKI and PKIaaS
    3. Lifecycle Management of Cloud-based PKI
    4. Joint Lifecycle Management Solution: Google CA Service and AppViewX
  • A Conversation with NCR Recorded: Nov 13 2020 27 mins
    Paul Farley, Deputy CISO of NCR
    Google Cloud Security has launched modern detection at Google scale with the debut of our new solution, Chronicle Detect. It includes a rules engine that operates at the speed of search, a widely-used detection language for describing threat behaviors, and a regular stream of new rules and indicators, built by our elite research team. Join this webinar to hear from Paul Farley, Deputy CISO, NCR about their journey with Chronicle.
  • SANS Webinar: Accelerate SecOps Incident Response with High Performance Playbook Recorded: Nov 6 2020 62 mins
    SANS Moderator, Matt Bromiley; Cortex Product Lead, Pramukh Ganeshamurthy; Google Cloud's Anton Chuvakin & John McGovern
    Google Cloud's Chronicle platform works seamlessly with Palo Alto Networks Cortex XSOAR solution to investigate and remediate security threats with speed and scale. Join this webinar to learn more about this integration and see our product teams walk through a live ransomware attack identification and remediation exercise in the product.
  • Protecting from Ransomware attacks Recorded: Nov 4 2020 26 mins
    Vicente Diaz and Gerardo Fernandez - Virus Total
    Ransomware attacks are one of the biggest worries for any company. During the last years, cybercriminal groups were attracted to ransomware given the huge benefit and difficulties to trace attacks back.
    Not everything is lost. Prevention is the most effective measure, and from VirusTotal we want to show what to do in order to avoid being a victim.
    During this workshop we will show with practical examples what Threat Intelligence can do to significantly reduce your risk vector against ransomware.
  • A Study of High End Big Game Hunting in 2020 Recorded: Nov 3 2020 12 mins
    Brandon Levene, Head of Applied Intelligence
    Opportunistically targeted ransomware deployments, aka Big Game Hunting (BGH), have caused a distinct disruption in the mechanics of monetizing crimeware compromises. This strategy has become the “end game” for the majority of organized cybercrime organizations, and one effect of this shift is the increased emphasis on enterprise-level targets. This session will walk you through research about how a specific BGH threat actor pursues entry points, gains its foothold, pivots, and deploys payloads to maximize their financial gains with minimal effort - and infrastructure! You’ll walk away with an understanding of the latest BGH TTPs seen in enterprise environments, and how they map to the ATT&CK framework so you can build this research into your threat detection strategy and enhance your defenses.
  • Protégete del Ransomware Recorded: Oct 28 2020 32 mins
    Vicente Diaz and Gerardo Fernandez - VirusTotal
    Los ataques de ransomware son, por un buen motivo, una de las mayores preocupaciones de cualquier empresa. Durante los últimos años, grupos dedicados a otros ciberdelitos se han visto atraídos por esta modalidad dado el gran beneficio que reporta y la dificultad para seguir el rastro del ataque.

    No todo está perdido. La prevención es evidentemente la medida más efectiva, y desde VirusTotal queremos enseñarte qué técnicas aplicar para evitar ser una víctima.

    Te mostramos mediante ejemplos prácticos qué técnicas de inteligencia van a minimizar significativamente tu vector de riesgo ante este tipo de ataques.

    Queremos compartir contigo todo lo que hemos aprendido para que estés seguro.
  • Modern Detection for Modern Security Threats with Chronicle Recorded: Oct 21 2020 62 mins
    Ansh Patnaik, Head of Product Marketing and Svetla Yankova, Head of Customer Experience Engineering, Google Cloud Security
    Google Cloud Security has launched modern detection at Google scale with the debut of our new solution, Chronicle Detect. It includes a rules engine that operates at the speed of search, a widely-used detection language for describing threat behaviors, and a regular stream of new rules and indicators, built by our elite research team.

    Join this webinar to:

    - Hear from Paul Farley, Deputy CISO, NCR about their journey with Chronicle
    - Get a demo of the new detection engine that includes reference rules for the ATT&CK framework
    - Learn how Chronicle's elite research team, UpperCase, creates rules and indicators so you don't have to
  • Modern Detection for Modern Security Threats with Chronicle Recorded: Oct 21 2020 62 mins
    Ansh Patnaik, Product Marketing & Svetla Yankova, Customer Experience Engineering, Google Cloud Security
    Google Cloud Security has launched modern detection at Google scale with the debut of our new solution, Chronicle Detect. It includes a rules engine that operates at the speed of search, a widely-used detection language for describing threat behaviors, and a regular stream of new rules and indicators, built by our elite research team.

    Join this webinar to:

    - Hear from Paul Farley, Deputy CISO, NCR about their journey with Chronicle
    - Get a demo of the new detection engine that includes reference rules for the ATT&CK framework
    - Learn how Chronicle's elite research team, UpperCase, creates rules and indicators so you don't have to
Security First. Everything Follows.
Helping to modernize security whether you are transforming your systems in our cloud or in place.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Google Cloud and AppViewX: Reimagining PKI Deployment and Management
  • Live at: Nov 17 2020 5:55 pm
  • Presented by: Anoosh Saboori, Product Manager, Google; Anton Chuvakin, Security Strategy, Google; Murali Palanisamy, CSO, AppViewX
  • From:
Your email has been sent.
or close