Surviving the Perfect Storm | Companion Resource Hub
Welcome to the resource page for the [un]prompted 2026's session "Securing Workspace GenAI at Google Speed : Surviving the Perfect Storm".
As generative AI reshapes the way we work, it also fundamentally alters the cybersecurity landscape.
This hub provides the supplementary materials you need to move beyond reactive security and build systemic resilience within your environment inspired by Google Workspace approach to secure AI.
Generative AI has democratized both defense and exploitation. We are currently facing what industry experts call the "Perfect Trifecta" for cybercriminals: GenAI simultaneously increases the effectiveness of social engineering/phishing, scales attacks effortlessly, and drastically reduces the technical skill required to execute them. Understanding this new baseline is the first step to securing your organization.
Key Concept: The barrier to entry for complex cyberattacks is now near zero.
Relying on legacy, reactive security models to fight AI-driven threats is a losing battle. Threat actors can iterate attack campaigns faster than traditional signatures and models can update. This section of the presentation highlights why organizations must pivot from chasing threats to minimizing their attack surface entirely through continuous, context-aware verification.
Key Concept: Stop chasing the anomalies; start locking down the baseline.
A single security perimeter is useless against a threat landscape where identities can be convincingly spoofed and data is continuously accessed, summarized, and generated by AI models. "Architecting the Fortress" means building multiple, overlapping security controls so that if one defensive layer fails, the next layer is ready to intercept the attack.
Key Concept: Assume defensive layer breach. Build overlapping security domains to contain, isolate, and neutralize threats before they can reach your critical core assets.
To survive the perfect storm, security cannot be static. True systemic resilience is achieved through a relentless cycle of testing, validating, and learning. By embedding continuous feedback loops into your architecture, you ensure your defenses evolve faster than the adversarial landscape.
Key Concept: Security is a continuous feedback loop. Test aggressively, log everything, and adapt constantly.
Google's Secure AI Framework (SAIF): The official Google conceptual framework for securing AI systems, providing a practical guide for organizations to build, deploy, and manage AI safely.
Mitigating prompt injection attacks with a layered defense strategy: The layered approach used for Gemini in Google Workspace and the Gemini app.
The Lethal Trifecta: Simon Willison's observation that combining an AI agent's access to private data with exposure to untrusted content and external communication creates a "lethal trifecta" that allows attackers to easily exfiltrate sensitive information.
Conseca: Contextual Agent Security framework generating just-in-time, contextual, and human-verifiable security policies.
Google VRP Program: go to place for external security researchers who want to contribute to keeping Google products safe and secure.
Hacking Google Videos: go behind the scenes with the hacking teams at Google keeping more people safe online than anyone else in the world.Â