{"provider_url":"https://hatena.blog","author_name":"KHALEED","categories":["\u30a4\u30d9\u30f3\u30c8","\u53c2\u52a0\u30ec\u30dd\u30fc\u30c8"],"title":"Google Cloud\u793e\u4e3b\u50ac Security Summit \u201925\u3000\u53c2\u52a0\u30ec\u30dd\u30fc\u30c8","url":"https://blog.scsksecurity.co.jp/entry/20251201/1764514800","version":"1.0","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/K/KHALEED/20251126/20251126172340.png","provider_name":"Hatena Blog","blog_url":"https://blog.scsksecurity.co.jp/","published":"2025-12-01 00:00:00","author_url":"https://blog.hatena.ne.jp/KHALEED/","type":"rich","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fblog.scsksecurity.co.jp%2Fentry%2F20251201%2F1764514800\" title=\"Google Cloud\u793e\u4e3b\u50ac Security Summit \u201925\u3000\u53c2\u52a0\u30ec\u30dd\u30fc\u30c8 - SCSK\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d6\u30ed\u30b0\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","description":"\u3053\u3093\u306b\u3061\u306f\u3001KHALEED\u3067\u3059\u3002 \u4eca\u56de\u306f\u30012025\u5e7411\u670812\u65e5\u306b\u958b\u50ac\u3055\u308c\u305fGoogle Cloud\u793e\u4e3b\u50ac\u306e Security Summit \u201925 \u306b\u73fe\u5730\u53c2\u52a0\u3057\u3066\u304d\u307e\u3057\u305f\u306e\u3067\u3001\u96f0\u56f2\u6c17\u3084\u611f\u60f3\u306b\u3064\u3044\u3066\u30ec\u30dd\u30fc\u30c8\u3057\u3066\u3044\u304d\u305f\u3044\u3068\u601d\u3044\u307e\u3059\u3002 \u4f1a\u5834\u306f\u6e0b\u8c37\u306eGoogle\u793e\u30aa\u30d5\u30a3\u30b9\u3067\u3059 Security Summit\u3068\u306f \u5f53\u793e\u767a\u8868\u30bb\u30c3\u30b7\u30e7\u30f3 \u8c6a\u83ef\u767a\u8868\u30bb\u30c3\u30b7\u30e7\u30f3 \u9ad8\u5ea6\u5316\u3059\u308b\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306b\u3069\u3046\u7acb\u3061\u5411\u304b\u3046\u304b\uff1a\u6301\u7d9a\u53ef\u80fd\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f53\u5236\u306e\u69cb\u7bc9 \u30a8\u30ad\u30b9\u30d1\u30fc\u30c8\u306b\u805e\u304f\uff5c\u30b1\u30fc\u30b9\u30b9\u30bf\u30c7\u30a3\u306b\u898b\u308b\u653b\u6483\u306e\u624b\u53e3\u3068\u8abf\u67fb\u306e\u821e\u53f0\u88cf \u30d1\u30cd\u30eb\u30d6\u30fc\u30b9\u30b3\u30fc\u30ca\u30fc \u53c2\u52a0\u3057\u305f\u611f\u60f3 Security Summit\u3068\u306f Google Cloud\u793e\u304c\u4e3b\u50ac\u3059\u308b\u3001\u2026","width":"100%","height":"190","blog_title":"SCSK\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d6\u30ed\u30b0"}