%3CLINGO-SUB%20id%3D%22lingo-sub-1736372%22%20slang%3D%22en-US%22%3EOctober%20is%20National%20Cyber%20Security%20Awareness%20Month%20(NCSAM)!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1736372%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Public%20sector%20blog-CF%20(2).jpg%22%20style%3D%22width%3A%20951px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F223445i8A94618AE383BBA1%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Public%20sector%20blog-CF%20(2).jpg%22%20alt%3D%22Public%20sector%20blog-CF%20(2).jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22none%22%3EFor%20the%20last%2017%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Eyears%2C%20the%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.cisa.gov%2Fnational-cyber-security-awareness-month%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22none%22%3ENational%20Cybersecurity%20Awareness%20Month%20(NCSAM)%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Ecampaign%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%2C%20driven%20by%20the%20Department%20of%20Homeland%20Security%2C%20has%20raised%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3Bawareness%20about%20the%20importance%20of%20cyber%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Esecurity%20across%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Ethe%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3BNation%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Ewith%20the%20mission%20of%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Eensuring%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Ethat%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Eall%20Americans%20have%20the%20resources%20they%20need%20to%20be%20safer%20and%20more%20secure%20online.%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EIn%20alignment%20with%20this%20noble%20mission%2C%20M%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eicrosoft%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E365%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eis%20driving%20forward%20content%20and%20executive%20speakers%20to%20empower%20risk%20reduction%20conversations%20when%20they%20matter%20most.%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3BIn%20today%E2%80%99s%20digital%20landscape%20of%20remote%20work%20and%20connection%2C%20security%20has%20become%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eparamount%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%20As%20more%20of%20our%20vital%20infrastructure%20connects%20online%2C%20users%20are%20left%20vulnerable%20to%20the%20risk%20of%20breach.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EConsidering%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bthat%20the%20average%20cost%20of%20a%20breach%20is%20%243.92M%3CA%20href%3D%22%23_ftn1%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20name%3D%22_ftnref1%22%3E%5B1%5D%3C%2FA%3E%20in%20addition%20to%20other%20inherent%20consequences%2C%20we%20simply%20can%E2%80%99t%20take%20cyber%20security%20for%20granted.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3EMS%20Security%20Voices%26nbsp%3B%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3EI%26nbsp%3B%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3EUnplugged%26nbsp%3B%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EMicrosoft%20Public%20Sector%20blog%20is%20dedicating%20the%20month%20of%20October%20to%20unplug%20and%20engage%20with%20Microsoft%20experts%20in%20Security%2C%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3ECompliance%2C%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Band%20Identity%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EDuring%20this%20series%2C%20we%20will%20explore%20security%20in%20teams%2C%20compliance%2C%20the%20use%20of%20predictive%20analytics%2C%20Zero%20Trust%20among%20other%20key%20security%20topics.%20These%20posts%20will%20be%20shared%20throughout%20the%20month%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eof%20October%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Band%20conclude%20with%20a%20risk%20management%20Ask%20Me%20Anything%20(AMA)%20in%20November.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EOur%20goal%20is%20to%20elevate%20the%20voice%20of%20the%20DHS%20and%20support%20their%20mission%20to%20help%20us%20all%20to%20%23BeCyberSmart%20by%20driving%20the%20right%20conversations%20that%20will%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bempower%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bcustomers%20and%20users%20reduce%20risk%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3EMicrosoft%20365%26nbsp%3B%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3EGovernment%26nbsp%3B%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eis%20a%26nbsp%3B%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eproud%20sponsor%20of%26nbsp%3B%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3ECyberWeek%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3ETune%20into%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.cyberscoop.com%2Fevents%2Fcybertalks%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22none%22%3ECyberTalks%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bfor%20an%20update%20from%20the%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EC%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eorporate%20Vice%20President%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bof%20Security%2C%20Compliance%20and%20Identity%2C%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F158219%22%20target%3D%22_blank%22%3E%40Ann%20Johnson%3C%2FA%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eon%20Wednesday%20October%2020%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eth%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eto%20learn%20more%20about%20what%20Microsoft%20is%20doing%20to%20reduce%20risk.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EAttendance%20is%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Efree%2C%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bhowever%20space%20is%20limited%20so%20we%20encourage%20you%20to%20register%20today%20to%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eattend%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.cyberscoop.com%2Fevents%2Fcybertalks%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22none%22%3ECyberTalks%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3ECyber%20Security%20Podcasts%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EIn%20addition%20to%20the%20blog%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eseries%20that%20is%20taking%20over%20our%20blog%20in%20October%2C%20Microsoft%20365%20is%20also%20sponsoring%20two%20security%20podcasts%20in%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3ECyberScoop.com%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bwe%20want%20to%20encourage%20our%20community%20to%20tune%20in%20and%20listen%20to%20both%20conversations.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%20data-leveltext%3D%22%EF%82%B7%22%20data-font%3D%22Symbol%22%20data-listid%3D%221%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%221%22%20data-aria-level%3D%221%22%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3EAvailable%20now%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%3A%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.cyberscoop.com%2Fenabling-secure-remote-work-embracing-zero-trust%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22none%22%3EEnabling%20secure%20remote%20work%20by%20embracing%20Zero%20Trust%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3B-%20One%20of%20the%20greatest%20challenges%20we%20often%20hear%20from%20public%20and%20private%20sector%20CISOs%2C%20when%20it%20comes%20to%20achieving%20a%20Zero%20Trust%20IT%20operating%20environment%2C%20is%20the%20question%20of%20how%20to%20tackle%20such%20a%20massive%20undertaking%20%E2%80%94%20and%20where%20to%20begin.%20Tune%20in%20to%20listen%20to%20CTO%2C%20Steve%20Faehl%2C%20to%20learn%20more%20about%20Microsoft%E2%80%99s%20journey%20towards%20Zero%20Trust.%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22%EF%82%B7%22%20data-font%3D%22Symbol%22%20data-listid%3D%221%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%222%22%20data-aria-level%3D%221%22%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3EAvailable%20October%2019%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eth%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%3A%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3ERisk%20Reduction%20-%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EP%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eodcast%20featuring%20GM%2C%26nbsp%3BAlym%26nbsp%3BRayani%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bwho%20delivers%20an%20in-depth%20conversation%20about%20compliance%20and%20its%20connection%20to%20security.%20We%20will%20share%20the%20link%20to%20this%20podcast%20when%20it%20becomes%20available.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EWe%20hope%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ethat%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eyou%20join%20the%20conversation%20and%20engage%20with%20the%20security%20content%20we%20are%20driving%20forward.%20To%20echo%20the%20voice%20of%20the%20D%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eepartment%20of%20Homeland%20Security%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%2C%20our%20purpose%20is%20to%20empower%20all%20to%20become%20more%20aware%2C%20more%20vigilant%20and%20to%20be%20%23BeCyberSmart.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%221%202%203%204%205%206%207%22%3E%3CEM%3E%3CA%20href%3D%22%23_ftnref1%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20name%3D%22_ftn1%22%3E%5B1%5D%3C%2FA%3E%20%3CA%20href%3D%22https%3A%2F%2Fwww.ibm.com%2Fdownloads%2Fcas%2FZBZLY7KL%3F_ga%3D2.148238199.1762516747.1577395260-1128561362.1577395260%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.ibm.com%2Fdownloads%2Fcas%2FZBZLY7KL%3F_ga%3D2.148238199.1762516747.1577395260-1128561362.1577395260%3C%2FA%3E%3C%2FEM%3E%3C%2FFONT%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1736372%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22pubseccyber2.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F224695iB4603C606BC97E5A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22pubseccyber2.jpg%22%20alt%3D%22pubseccyber2.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOctober%20is%20National%20Cyber%20Security%20Awareness%20Month%20(NCSAM)!%20Find%20out%20how%20we%20are%26nbsp%3B%3CSPAN%20data-contrast%3D%22none%22%3Eraising%20the%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3Bawareness%20about%20the%20importance%20of%20cyber%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Esecurity%20in%20Microsoft%20365%20Government%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1736372%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EPublic%20Sector%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E

Public sector blog-CF (2).jpg

 

For the last 17 years, the National Cybersecurity Awareness Month (NCSAM) campaign, driven by the Department of Homeland Security, has raised awareness about the importance of cyber security across the Nation with the mission of ensuring that all Americans have the resources they need to be safer and more secure online. 

 

In alignment with this noble mission, Microsoft 365 is driving forward content and executive speakers to empower risk reduction conversations when they matter most. In today’s digital landscape of remote work and connection, security has become paramount. As more of our vital infrastructure connects online, users are left vulnerable to the risk of breach. Considering that the average cost of a breach is $3.92M[1] in addition to other inherent consequences, we simply can’t take cyber security for granted.

 

MS Security Voices Unplugged  

 

Microsoft Public Sector blog is dedicating the month of October to unplug and engage with Microsoft experts in Security, Compliance, and IdentityDuring this series, we will explore security in teams, compliance, the use of predictive analytics, Zero Trust among other key security topics. These posts will be shared throughout the month of October and conclude with a risk management Ask Me Anything (AMA) in November.  

 

Our goal is to elevate the voice of the DHS and support their mission to help us all to #BeCyberSmart by driving the right conversations that will empower customers and users reduce risk 

 

Microsoft 365 Government is a proud sponsor of CyberWeek  

 

Tune into CyberTalks for an update from the Corporate Vice President of Security, Compliance and Identity, @Ann Johnson  on Wednesday October 20th to learn more about what Microsoft is doing to reduce risk. Attendance is free, however space is limited so we encourage you to register today to attend CyberTalks. 

 

Cyber Security Podcasts 

 

In addition to the blog series that is taking over our blog in October, Microsoft 365 is also sponsoring two security podcasts in CyberScoop.com we want to encourage our community to tune in and listen to both conversations.  

 

  • Available nowEnabling secure remote work by embracing Zero Trust - One of the greatest challenges we often hear from public and private sector CISOs, when it comes to achieving a Zero Trust IT operating environment, is the question of how to tackle such a massive undertaking — and where to begin. Tune in to listen to CTO, Steve Faehl, to learn more about Microsoft’s journey towards Zero Trust. 
  • Available October 19th: Risk Reduction - Podcast featuring GM, Alym Rayani who delivers an in-depth conversation about compliance and its connection to security. We will share the link to this podcast when it becomes available.  

We hope that you join the conversation and engage with the security content we are driving forward. To echo the voice of the Department of Homeland Security, our purpose is to empower all to become more aware, more vigilant and to be #BeCyberSmart.  

 

[1] https://www.ibm.com/downloads/cas/ZBZLY7KL?_ga=2.148238199.1762516747.1577395260-1128561362.15773952...