Google’s initiative will offer security and compliance services to guide governments, critical infrastructure, enterprises, and small businesses through digital transformation. Google has announced the formation of a cybersecurity action team to provide support to governments, critical infrastructure, enterprises, and small businesses. The Google Cybersecurity Action Team will consist of cybersecurity experts from across the organization and will guide customers through the cycle of security and digital transformation.“The Google Cybersecurity Action Team is part of our ongoing commitment to be the best partner for our enterprise and government customers along their security transformation journey,” said Thomas Kurian, CEO of Google Cloud. Cybersecurity is at the top of every C-level and board agenda, given the increasing prominence of software supply chain exploits, ransomware, and other attacks, he added.How Google’s Cybersecurity Action Team will support customersGoogle says the effort will begin within Google Cloud, building on its partnerships with organizations of all sizes, and will evolve to bring Google security to more companies as it progresses. As part of its long-term mission, the cybersecurity team will provide a range of services to support customers including: Strategic advisory services for customers’ security strategies, including transformation workshops and educational content. This function will advise customers on the structure of their digital security transformation and provide program management and professional services support.Trust and compliance services that map Google’s global compliance certifications to industry control frameworks, enabling customers to simplify compliance.Security customer and solutions engineering that deliver blueprints and architectures for deploying Google Cloud products and services securely and in accordance with regulatory requirements, as well as solutions for autonomic security operations and cyber resilience.Threat intelligence and incident response services, which include threat briefings, preparedness drills, incident support, and rapid response engagements to stay on top of the evolving security landscape.Benefits of Google’s cybersecurity expertiseCybersecurity and Infrastructure Security Agency (CISA) director Jen Easterly champions Google’s decision to form a team dedicated to offering its customers services and guidance around security transformation. “It’s great to see a large company like Google Cloud orient itself to support the cybersecurity of all organizations large and small through its Cybersecurity Action Team, and as part of the JCDC [Joint Cyber Defense Collaborative] and other initiatives, we look forward to partnering with them and other tech companies in this vital effort,” she said in a press release. Forrester VP and principal analyst Jeff Pollard concurs, telling CSO that offering expertise at such scale is an intriguing and ambitious approach on Google’s part. “The incentives make sense for Google. The Security Action Team should facilitate and accelerate the adoption of Google Cloud Platform and Chronicle, and it puts Google at the forefront of security thought leadership for the clients that turn to it,” says Pollard. Customers get access to Google caliber experts that understand cloud, software development, DevOps, and scale in ways that are hard to find when hiring on your own, he says. “In addition, traditional consulting firms’ advisory offerings don’t understand cloud – or cloud security – the way Google does. Those firms think about cloud and cloud security as a project to migrate and implement, not as a strategy.” Related content news Bug in EmbedAI can allow poisoned data to sneak into your LLMs The vulnerability can be used to deceive a user into inadvertently uploading and integrating incorrect data into the application’s language model. By Shweta Sharma May 31, 2024 3 mins Generative AI Vulnerabilities news OpenAI accuses Russia, China, Iran, and Israel of misusing its GenAI tools for covert Ops OpenAI’s generative AI tools were used to create and post propaganda content on various geo-political and socio-economic issues across social media platforms, the company said. By Gyana Swain May 31, 2024 4 mins Generative AI news Okta alerts customers against new credential-stuffing attacks Hackers are using credential-stuffing to attack endpoints that are used to support the cross-origin authentication feature. By Shweta Sharma May 31, 2024 4 mins Identity and Access Management Vulnerabilities feature 3 reasons users can’t stop making security mistakes — unless you address them Understanding what’s behind employee security mistakes can help CISOs make meaningful adjustments to their security awareness training strategies. By Ariella Brown May 31, 2024 5 mins Data Breach Risk Management PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe