events
93 TopicsJoin Our Microsoft Security Community
Want to help defend the world against cyber attacks? We want you to influence our designs, plans, and guidance so we can have a global impact together. That's why we need your participation in our security community. Please join our email list to be notified about the upcoming webinars, events, and other announcements. Upcoming Webinars NOVEMBER 4 (8:00 AM- 9:00 AM) Sentinel to Defender | Your Path to the Unified SOC Experience - Episode 1 EPISODE 1: Prepare for Take-off: Why Move and How to Get Ready. Understand the benefits, architectural changes, and prerequisites for a successful transition. This session is one of a 3-part technical webinar series designed to guide security teams through the transition from Microsoft Sentinel to the unified Microsoft Defender portal. NOVEMBER 4 (9:00 AM-10:00 AM) Microsoft Sentinel | Introduction to Sentinel data lake for Developers Discover how Sentinel data lake empowers developers with seamless integrations, practical demos, and clear steps to get started. Join us for an exclusive session introducing the Sentinel data lake, the foundation for scalable security analytics and innovation in Microsoft Sentinel. NOVEMBER 5 (8:00 AM - 9:00 AM) 425 Show | Using AI to optimize Conditional Access policies Learn about you can leverage AI to improve and enhance your Conditional Access policies, identify coverage drift, and even discover policies that are causing spikes in sign-in failures. All courtesy of the Conditional Access Optimization Agent, part of Security Copilot! NOVEMBER 5 (9:00 AM - 10:00 AM) Microsoft Sentinel | Adopting Unified Custom Detections in Microsoft Sentinel via the Defender Portal: Now Better Than Ever Join us for an in-depth session designed to help SOC professionals and security engineers to maximize the benefits from the integration of Microsoft Sentinel into the defender portal. This webinar will showcase the latest enhancements in Unified Custom Detections and how you can adopt them to maximize detection value. NOVEMBER 11 (8:00 AM - 9:00 AM) Sentinel to Defender | Your Path to the Unified SOC Experience - Episode 2 EPISODE 2: Hands On – Onboarding and Configuration Deep Dive Follow along as we onboard workspaces, configure data connectors, and migrate analytics rules and automation. This is session two of a three-part technical webinar series designed to guide security teams through the transition from Microsoft Sentinel to the unified Microsoft Defender portal. NOVEMBER 11 (8:00 AM - 9:00 AM) Microsoft Purview | New Content Explorer for Cases in Insider Risk management Insider Risk Management is launching a new content explorer as part of the Cases experience. This content explorer expands on the existing capabilities with more advanced filtering, grouping options, document preview, column customization, and time zone selection. NOVEMBER 12 (8:00 AM - 9:00 AM) Azure Network Security | Zero Trust - Defense in Depth with Azure Firewall and Azure WAF In today’s threat landscape, securing web applications requires more than traditional network boundaries and demands a layered, Zero Trust approach. Join us for this webinar as we explore how Azure Firewall and Azure Web Application Firewall (WAF) work together to deliver defense in depth for modern cloud-native applications. Learn how to strengthen your network posture with real-time threat detection, granular access controls, and intelligent traffic filtering. NOVEMBER 13 (8:00 AM - 9:00 AM) Security Copilot Skilling Series | Microsoft Entra AI: Unlocking Identity Intelligence with Security Copilot and Agents This session will demonstrate how Security Copilot in Microsoft Entra transforms identity security by introducing intelligent, autonomous capabilities that streamline operations and elevate protection. Customers will discover how to leverage AI-driven tools to optimize conditional access, automate access reviews, and proactively manage identity and application risks - empowering them into a more secure, and efficient digital future. NOVEMBER 17 (8:00 AM - 9:00 AM) Sentinel to Defender | Your Path to the Unified SOC Experience - Episode 3 EPISODE 3: SOC Ready – Investigate, Hunt, and Respond Like a Pro Learn how analysts can leverage the unified portal for incident management, advanced hunting, and daily SOC operations. This is the final session of a three-part technical webinar series designed to guide security teams through the transition from Microsoft Sentinel to the unified Microsoft Defender portal. DECEMBER 2 (9:00 AM - 10:00 AM) Microsoft Sentinel and Microsoft Defender XDR | Empowering the Modern SOC Microsoft is simplifying the SecOps experience and delivering innovation that will allow your team to scale in new ways. Join us for actionable learnings to help your team modernize your operations and enhance protection of your organization. DECEMBER 3 (8:00 AM -9:00 AM) Microsoft Defender for Identity | Identity Centric Protection in the Cloud Era Microsoft Defender for Identity provides identity would like to introduce the new identity centric protection capabilities providing identity centric protection across any identity source. DECEMBER 4 (8:00 AM- 9:00 AM) Microsoft Defender for Cloud | Unlocking New Capabilities in Defender for Storage Join us for an in-depth look at the latest enhancements in Microsoft Defender for Storage. In this session, we’ll explore two powerful capabilities now available in public preview: Cloud Storage Aggregated Events and Built-in Automated Malware Remediation for Malicious Blobs. We’ll showcase live demos of these features in action and share best practices for leveraging them effectively. RESCHEDULED FOR DECEMBER 4 (9:00 AM- 10:00 AM) Microsoft Sentinel | What's New in the Past 6 Months Join us for an insightful session on “What’s New in Microsoft Sentinel.” We’ll spotlight the latest innovations and enhancements, including improvements to the Defender portal that deepen its integration with Microsoft Sentinel. We’ll also explore how data lake capabilities are evolving to support more scalable and flexible security operations. Expect demos, real-world use cases, and a discussion on why these updates matter to our customers. Don’t miss out if you want to stay ahead of what’s new and what’s next! DECEMBER 9 (8:00 AM - 9:00 AM) Microsoft Defender XDR | A Deep Dive into Automated Attack Disruption Uncover the value of automated attack disruption and how it delivers protection without the complexity. Join the Automatic Attack Disruption team for an exclusive deep dive into these powerful capabilities. You’ll get a front-row seat to a demo, explore the latest innovations, a look at future investments and have your questions answered directly by the experts. Don’t miss this chance to see effortless protection in action. DECEMBER 10 (8:00 AM - 9:00 AM) Azure Network Security | Deep Dive into Azure DDoS Protection Join us for an in-depth exploration of Azure DDoS Protection and learn how to safeguard your applications and infrastructure against distributed denial-of-service attacks. This session will walk through the end-to-end architecture and planning considerations, dive into the detection and mitigation flow, and showcase telemetry, analytics, and alerting best practices. We’ll also cover how Azure DDoS Protection integrates with first-party services to deliver seamless protection and visibility across your environment. DECEMBER 10 (9:00 AM - 10:00 AM) Microsoft Defender for Cloud | Expose Less, Protect More with Microsoft Security Exposure Management Join us for an in-depth look at how Microsoft Security Exposure Management helps organizations reduce risk by identifying and prioritizing exposures before attackers can exploit them. Learn practical strategies to minimize your attack surface, strengthen defenses, and protect what matters most. DECEMBER 11 (8:00 AM - 9:00 AM) Microsoft Defender for Cloud | Modernizing Cloud Security with Next‑Generation Microsoft Defender for Cloud Microsoft Defender for Cloud is evolving to deliver a unified, intuitive, and scalable approach to cloud security. In this session, we’ll discuss how organizations can simplify posture management and threat protection across multicloud environments (Azure, AWS, GCP, and beyond) while improving efficiency and reducing risk. Learn how this direction streamlines operations, enhances clarity for security teams, and supports smarter risk prioritization. JANUARY 20 (8:00 AM - 9:00 AM) Microsoft Defender for Cloud | What's New in Microsoft Defender CSPM Cloud security posture management (CSPM) continues to evolve, and Microsoft Defender CSPM is leading the way with powerful enhancements introduced after Microsoft Ignite (November 2025). This session will showcase the latest innovations designed to help security teams strengthen their posture and streamline operations. Videos, Webinar Recordings & Decks Subscribe to our YouTube channel. A complete list of past webinar recordings and decks can be found here. For security documentation click here. Private Community Customer Connection Programs We offer several customer connection programs within our private communities. By signing up, you can help us shape our products through activities such as reviewing product roadmaps, participating in co-design, previewing features, and staying up-to-date with announcements. Sign up at aka.ms/JoinCCP. Upcoming Events & Announcements TBA Blogs & Forums Got questions or feedback? Check out our blogs and forums where you can see the latest product developments and speak directly to our engineering teams, and see the latest product developments. GitHub Azure Network Security GitHub Microsoft Defender for Cloud GitHub Microsoft Sentinel GitHub Microsoft Defender XDR GitHub Microsoft Defender for Cloud Apps GitHub Microsoft Defender for Identity Microsoft Purview LinkedIn We have a general discussion group on LinkedIn Ninja Trainings Azure Network Security Microsoft 365 Advanced eDiscovery Microsoft Copilot for Security Microsoft Defender XDR Microsoft Defender External Attack Surface Management Microsoft Defender for Cloud Microsoft Defender for Cloud Apps Microsoft Defender for Endpoint Microsoft Defender Experts Microsoft Defender for Identity Microsoft Defender for IoT Microsoft Defender for Office 365 Microsoft Defender Threat Intelligence Microsoft Defender Vulnerability Management Microsoft Purview Insider Risk Management Microsoft Purview Data Lifecycle & Records Management Microsoft Purview Information Protection Microsoft Purview Data Loss Prevention Microsoft Purview Communication Compliance Microsoft Purview Compliance Manager Microsoft Sentinel Microsoft Sentinel Notebooks Microsoft Unified SOC Platform1.4MViews158likes54CommentsCelebrating Cybersecurity Awareness Month: Everyday Protection with Microsoft 365
Every October, people around the world- from students and parents to large organizations and governments- take time to strengthen their online safety habits and learn how to protect their digital lives. Microsoft’s pledge to our customers and our community is to prioritize your cybersafety above all else. Whether you're running a Fortune 100 company, shopping online, or helping your kids with homework, we’re here to help you stay one step ahead of cyber threats. Our goal is simple: to give you the tools, tips, and confidence to be cybersmart every day. The Evolving Threat Landscape In the past year, online threats have become more aggressive and harder to spot: Phishing scams are everywhere—fraudsters now mimic trusted brands to trick you into giving up passwords or personal info. Fraudulent websites are deceptive and often mimic legitimate businesses or government agencies, luring users into sharing sensitive information like passwords or credit card numbers. Identity theft is on the rise, with criminals using leaked personal data to open fake accounts or impersonate you online. These attacks are fast, sneaky, and can be powered by artificial intelligence. That’s why you need to have a security-first mindset. Today, you need always-on protection that can spot suspicious behavior, predict hacker tactics, and respond quickly—before damage is done. Microsoft’s Commitment to Security Every time you check your email, save a photo, or browse the web, Microsoft’s security ecosystem is working behind the scenes to keep you safe. Microsoft analyzes over 84 trillion signals daily—from devices, emails, and cloud activity—to detect threats and protect your personal data. Millions of people trust Microsoft to help secure their digital lives, whether they’re managing finances, helping kids with homework, or staying connected with loved ones. Through our Secure Future Initiative, we’re investing in smarter, faster protection—powered by over 30,000 engineers focused on identity safety, threat detection, and cloud security. This means that whether you're using Outlook to email a friend, OneDrive to store family memories, or your phone to shop online, you're backed by the same advanced security that protects global organizations—tailored for your everyday life. Microsoft 365: Everyday Online Protection in Action Microsoft 365 and its suite of apps are here to keep you safer online: Microsoft Defender for Individuals¹ ²: Get peace of mind with a proactive online security solution to protect your family’s identities³, data, and devices from hackers and scammers. Outlook: Keep your emails safer – automatically scan⁴ emails for viruses and malware from unsafe links and attachments or encrypt⁴ your sensitive emails. OneDrive: Save your photos, videos, and files securely to OneDrive and keep them protected with ransomware detection and file recovery⁴. Personal Vault provides another layer of protection for your most sensitive files. Security Is a Shared Responsibility Technology plays a big role in keeping you safe online—but it’s not the whole story. You are the first and last line of defense. This Cybersecurity Awareness Month, take simple steps to protect yourself and your family: Turn on multi-factor authentication (MFA) for all your accounts to add an extra layer of security. Keep your devices and apps updated so you’re protected against the latest threats. Use strong, unique passwords—and consider a password manager to help keep track. Take advantage of built-in security tools like Defender, Outlook, and OneDrive to help safeguard your personal phones and computers, data, emails, and files. Together, we can build a safer digital world. When each of us takes action, we raise the bar against cyber threats. Let’s make online safety a daily habit—for ourselves and those we care about. Explore our Cybersecurity Awareness Month resources for best practices on how to be cybersmart, which includes articles on AI safety, phishing, fraud, cybersecurity 101, and more. We also include cybersecurity learning paths, certification opportunities, and the latest insights about threat intelligence and cybersecurity developments, including tools like the Be Cybersmart Kit. Cybersecurity first, stay safe always. Happy Cybersecurity Awareness Month! References 1 – Microsoft 365 Personal, Family, or Premium subscription is required. 2 – Microsoft Defender is currently not available in certain regions. 3 – Available in the US and US territories only. Your device's primary display language must be set to English. 4 – Microsoft 365 Basic, Personal, Family, or Premium subscription is required.Want to earn an Exclusive Security Tech Community Badge? Take our quick survey!
Hey there Security Tech Community! As we prepare for Microsoft Ignite, we’re building a focused, practitioner-led security roundtable and we want your input to ensure it reflects the most relevant and pressing topics in the field. We invite you to take a short survey and share the security topics, trends, and technical questions you want to see covered. Your input will directly influence the structure and substance of the Ignite Security Roundtable. The first 5 people to post a screenshot for proof of survey completion in the comments below will receive this "Microsoft Security Star" Badge to add to their Tech Community profile! TAKE THE SURVEY NOW: https://aka.ms/IgniteSecurityRoundtableSurvey2025Solved250Views3likes6CommentsDiscover the latest security innovations at Microsoft Ignite 2025
In today’s rapidly evolving digital world, security leaders and practitioners face new challenges—and opportunities—driven by the rise of AI. At Microsoft Ignite, we will showcase end-to-end security innovations and share world class threat and regulatory intelligence to give you the advantage you need to safely adopt AI and face the rapidly changing threat landscape. Why attend Microsoft Ignite? Visionary insights: Hear directly from Microsoft Security leaders and industry experts on the evolving threat landscape and the role of AI in defense. Community connections: Network with peers and industry experts, and join community events throughout the week, including the Secure the Night party (register here for the party—please note this is a separate registration from the main conference). Immersive experiences: Get hands-on with the latest security technologies and discover tools designed to help you accelerate secure AI adoption. Career growth: Take advantage of opportunities to expand your skills and earn certifications that set you apart in the industry. Whether you’re a CISO, security architect, or passionate about protecting what matters, Microsoft Ignite is your chance to dive into the latest security innovations to help you accelerate the secure adoption of AI. Save the date San Francisco, November 17–21, 2025 Or join us online November 18–21 Register now and secure your spot at this premier event for security professionals. Learn more about the security experience at Microsoft Ignite.Announcing a New Microsoft Security Virtual Training Day
We’re thrilled to announce a brand-new opportunity for learning and growth: Microsoft Virtual Training Day: Strength Cloud Security with Microsoft Defender for Cloud! This free, online event is designed to empower professionals with the skills and knowledge needed to thrive in today’s digital landscape. During this training, you’ll be able to: Learn how to increase cloud security using Microsoft Defender for Cloud and how to deploy security across your DevOps workflows. Discover how to detect risks, maintain compliance, and protect hybrid and multicloud environments. Find out how to defend servers, containers, storage, and databases using built-in security. Chat with Microsoft experts—ask questions and get answers on real-world security challenges. Here’s what you can expect: Part 1 Part 2 Introduction Introduction What a comprehensive cloud-native application protection platform looks like Comprehensive workload protection (part 1) Break: 10 minutes Break: 10 minutes Starting with proactive security Comprehensive workload protection (part 2) Break: 10 minutes Automating responses Operationalizing Posture Management Closing question and answer Closing question and answer Why Attend this Virtual Training Day? Microsoft Virtual Training Days offer a host of benefits: Flexible Learning: Attend from anywhere, at your own pace. Expert Instruction: Gain insights from industry leaders and certified professionals. Certification Opportunities: Many sessions prepare you for Microsoft certifications. Networking: Connect with peers and professionals across industries. Free Resources: Access downloadable materials and follow-up learning paths. Earn a voucher: Upon completion of the event, the exam is offered at a 50% discount off the exam rate. Don't miss out on this opportunity. Go and registertoday! For more information on all things security, please visit our Security Hub.Help Shape the Microsoft Ignite Security Roundtable: Take Our Quick Survey
As we prepare for Microsoft Ignite, we’re building a focused, practitioner-led security roundtable and we want your input to ensure it reflects the most relevant and pressing topics in the field. We invite you to take a short survey and share the security topics, trends, and technical questions you want to see covered. Your input will directly influence the structure and substance of the Ignite Security Roundtable. Thank you for helping us design a roundtable that delivers value, drives insight, and reflects what truly matters to the security community! TAKE THE SURVEY NOW: https://aka.ms/IgniteSecurityRoundtableSurvey2025Microsoft at Black Hat USA 2025: A Unified Approach to Modern Cyber Defense
Microsoft will be at Black Hat USA 2025, August 5–7 in Las Vegas, and we’re bringing you a unified, practitioner-driven experience built around real-world insights, threat intelligence, incident response, and hands-on AI expertise. We believe security teams are strongest when intelligence, tools, and deep expertise come together. At Microsoft, we’ve eliminated internal silos between threat intelligence, red teaming, incident response, and product engineering. That closed-loop system lets us move faster, translating threat signals into global protection every day. This integration isn’t theoretical. It means when researchers detect a threat through our global network, that information flows directly to the red team stress-testing our defenses, the incident responders investigating real intrusions, and the engineering teams building new mitigations; all at once. It's a system designed to learn, adapt, and protect at scale. At Black Hat, we’re opening that loop so you can see how it works and inviting you to see how it can help you defend at AI speed. Want to meet the people behind our operations? Request an invite to our Black Hat VIP mixer. Start your Black Hat journey early with the Microsoft Threat Intelligence Podcast Before Black Hat kicks off, hear from Black Hat NOC lead Grifter and Lintile in our latest episode of the Microsoft Threat Intelligence Podcast. They explore what it takes to secure one of the world’s most high-profile cybersecurity conferences, what the Black Hat Network Operations Center (NOC) sees in real time, and how defenders can apply those lessons to their own environments. Whether you're attending in person or following along remotely, this episode offers a rare look into threat activity and security insights from inside the NOC. Meet us at Booth 2246: Conversations, not presentations. Skip the crowded theater sessions and pull up a chair. Throughout the day, we’re hosting informal conversations at our mobile podcast studio and then shifting to expert meetups where your questions will be answered. At booth 2246, you’ll hear directly from Microsoft security experts on what they’re seeing, and how you can apply it. Topics include: Addressing the ransomware threat landscape Defending against BEC attacks Shifts in social engineering and phishing Securing non-human identities (agents) And a few surprises We’ll also be inviting our friends from the Microsoft Threat Intelligence Podcast, Microsoft BlueHat podcast (MSRC), GitHub, and a few special guests. Each session is a chance to hear what our teams are seeing in the wild, how we’re responding, and how you can apply those insights in your own environment. Whether it's a live threat briefing, a deep dive into red teaming, or a behind-the-scenes look at real incident response, these are unscripted, interactive discussions designed for defenders and researchers. Demos of Microsoft Defender, Microsoft Entra, Microsoft Purview, and Microsoft Security Copilot will run throughout the week. Stop by to talk shop, ask questions, or just get a clearer view of why our AI-first, end-to-end platform is designed to help you move faster, respond with precision, and adapt to new threats with confidence. Connect with the experts at our VIP Mixer You’re invited to connect with the people behind the defense at our VIP Mixer on Wednesday, Aug. 6. Join Microsoft Security for an evening of conversations, insights, and connections with our threat intelligence, incident response, and Security Copilot teams, alongside your peers from across the security community. Whether you're exploring how to put AI agents to work, navigating advanced threats, or evolving your detection and response strategy, this is your chance to meet the experts and teams helping defenders stay ahead. Security is a team sport, and we would like to thank Armor, Cyberproof, Forescout, Ontinue and Security Risk Advisors members of the Microsoft Intelligent Security Association (MISA) for sponsoring this event. Drinks and appetizers will be provided. Request to attend today! Session Spotlight: Gain practical strategies for unmasking cyber threats Thursday, August 7 | 12:15–12:40 PM In a threat landscape shaped by AI and threat actors, cybersecurity teams need more than tools; they need the right mindset, collaboration models, and playbooks to stay ahead. During our main stage session, we will bring together frontline experts from Microsoft Security—Sherrod DeGrippo, Director, Threat Intelligence Strategy, Aarti Borkar, Corporate Vice President, Customer Success and Incident Response, Andrew Rapp, Leader, Incident Response and Simeon Kakpovi, —to share how they approach high-impact intrusions and what defenders everywhere can take away from it. This session will offer practical strategies grounded in real-world operations, including: How to build tighter alignment across threat intel, IR, and detection teams Approaches to reduce friction and accelerate signal-to-action response time Lessons from tracking threat actors focused on social engineering and ransomware Ways to adapt red teaming and detection in a rapidly evolving AI landscape Whether you're refining your team’s structure or looking for sharper ways to think about advanced threats, this conversation will deliver actionable insight you can bring back to your own environment. Inside Look: How Microsoft Red Teams Stay in Sync Wednesday, August 6 | 11:25–11:45 AM What happens when red teams operate not in isolation, but as a connected part of a broader defense ecosystem? Microsoft security experts Ram Shankar Siva Kumar (founder of the AI Red Team) and Craig Nelson (Microsoft Red Team) will explore how traditional and AI red teams work side by side to proactively test Microsoft’s products, platforms, and AI systems. You’ll hear how these teams: Identify systemic risks across cloud and enterprise services Probe generative AI systems for jailbreaks and indirect misuse Collaborate with MSRC and threat researchers to close the loop from discovery to defense Embed red teaming into engineering cycles, not just as a check, but as a design influence Whether you’re red-teaming your own products or rethinking how to operationalize adversarial testing, this session will offer lessons in collaboration, tooling, and mindset from two of the most advanced offensive security teams in the industry. Exchange ideas with other MISA members The Microsoft booth will include a featured partner demo station where 7 partners from the Microsoft Intelligent Security Association (MISA) will showcase how their solutions together with Microsoft Security technology help defend our mutual customers from cybersecurity threats. Connect with us at the Microsoft booth to find out more. Connect with us at Black Hat US Cybersecurity is a team sport and defending against threats takes a cohesive approach that brings multiple disciplines and experts across specialties together. We’re committed to eliminating internal silos to focus on threat hunting that supports a comprehensive defense. You’ll hear more of this approach and how it can benefit your organization at Black Hat US. Check out Microsoft Security executives at the AI Summit at Black Hat (separate pass required) Request to attend our VIP Mixer to meet the experts behind Microsoft threat intelligence, incident response, and the Microsoft Security Response Center. Discover how our end-to-end platform can help you strengthen resilience and elevate your security posture. Get an exclusive $200 briefings and $100 business hall pass discount to share with your customers and prospects. Sign up for a one-on-one meeting with Microsoft Security experts. Listen to our Threat Intelligence Podcast. Visit us in Booth #2246 for a live demo and learn how our AI-powered cybersecurity can protect your organization. Hope to see you at Black Hat!Connect with us at the Gartner Security & Risk Management Summit
Security professionals visiting booths scattered around a hall, eager for solutions to today’s top cybersecurity challenges to protect their resources and people. The hum of hundreds of conversations. Presenters in packed sessions sharing expertise, trends, and stories to energize attendees. Few occasions are as thrilling as a cybersecurity event, knowing that all around you are people who understand the frustrating challenges and exciting wins of working in cybersecurity. The rise in quantum computing and AI as tools used by adversaries make such events both inspiring and necessary as professionals seek new approaches and ways to manage risk and protect assets. Join Microsoft Security at Gartner Security & Risk Management Summit, where we will showcase end-to-end security innovations and share world-class threat and regulatory intelligence to give you the advantage you need in the era of AI. This is an opportunity to learn how Microsoft’s AI-first end-to-end security platform can help you overcome the top security challenges and manage risk effectively even as high-level threats evolve. The Summit is one of many top cybersecurity events in 2025 where security professionals like you can hear insights from Microsoft Security and interact with your peers. Microsoft Security offers AI-first, end-to-end protection for identities, endpoints, apps, and clouds, providing comprehensive security in the AI era, powered by unmatched threat intelligence. Accelerate your secure adoption of AI with ready-to-go security and governance tools built for generative AI. We’re excited to be returning to the Gartner Security & Risk Management Summit and look forward to giving attendees several ways to connect. We invite you to come see our innovation and engage with us. Our experts will be giving two sessions, we’ll be offering live demos in our booth (#945), and we’ll be chatting with attendees during one-on-one meetings. Sign up for a one-on-one meeting We’re excited to meet with conference attendees and encourage you to book a time. During these meetings, we can exchange perspectives on the latest cybersecurity threats, security best practices, and industry trends. It’s also a good time to learn more about specific Microsoft product capabilities and which features can address your organization’s unique challenges. We’re always up for sharing security strategies too. Book a one-on-one meeting with a Microsoft expert. Propel your security efforts with Microsoft sessions When choosing session topics for conferences, we consider several factors. What topics or trends are top of mind in the industry? What is sparking conversation with our clients? Where can we add the most value to help organizations facing modern security challenges? The Gartner Security & Risk Management is no exception and attendees can benefit from attending one – or even better, both –- of Microsoft’s two sessions at the event. If you want to hear insights on AI news and maximize the value of Microsoft products, you won’t want to miss these sessions for insights that can help you better manage your organization’s risk: “Microsoft: Security in the Age of Agentic AI” (11:30 AM-12:00 PM on Tuesday, June 10): Hammad Rajjoub, Director, Security will explore the future of security AI agents and the human-driven way they introduce innovative security principles tailored for AI-driven enterprises. Agentic workflows are set to revolutionize security by enabling complex problem-solving, agent collaboration, and iterative learning. Hammad will also discuss the continued importance of principles like Zero Trust, least privilege, and assume breach, but share why they will be insufficient as AI reshapes enterprises and cybersecurity, requiring new principles. “Trustwave: Unlocking Your Data Fortress: Mastering Microsoft Purview for Proactive Cybersecurity” (2:00–2:45 PM on Wednesday, June 11): Microsoft Global Partner Solutions Architect David Branscome will share strategies for fortifying your security and maximizing ROI with Microsoft Purview, the integrated data governance and compliance solution transforming security. You’ll learn more about Purview capabilities like data classification, data loss prevention, insider risk management, and eDiscovery and hear from Purview clients on how it enables proactive data protection. Don’t let your data be the next target—empower your defense with Purview. Connect with us at the Summit Elevate your defenses, enhance efficiency, and empower your team to focus on the most critical threats with generative AI for cybersecurity. We’d be thrilled to meet one-on-one with you at the Gartner conference. Whether you have questions, want a personalized demo, or want to chat about how AI could impact your security, schedule a time to speak with one of our experts at the event. And stop by Booth #945 for a live demo. In the meantime, explore how AI-powered cybersecurity can transform how you protect your organization. Hope to see you at the Gartner event!1.7KViews2likes0Comments14 Secure Coding Tips: Learn from the Experts at @Build
Hey friends! If you are a developer, you know that writing clean and efficient code is just the starting point. Now, with AI playing a bigger role, secure coding isn't just a 'nice-to-have'—it's a must. Whether you're building web apps, working on cloud services, or adding AI to your projects, keeping your code safe is just as important as getting it out the door. At Microsoft Build 2025, we’re bringing together some of the most influential security engineers, researchers, and developers to share practical tips and modern best practices to help you ship secure code — faster. Here are 14 quick secure coding tips that will make you a better, more security-savvy developer — and the security sessions @Build where you can learn more from the experts: 🎯 1. Secure AI from the start Discover how to deliver intelligent apps without sacrificing security. This session covers how to protect against threats across code, secrets, dependencies, and even LLMs. Learn how to use Threat Modeling early in the product lifecycle to identify, assess and address security risks. You’ll learn about developer-focused security tools to deploy with confidence without context switching. Learn more: Session: “Shift Left: Secure Your Code and AI from the Start” With Mark Russinovich, CTO, Deputy CISO and Technical Fellow, Microsoft Azure; Marcelo Oliveira, VP, Product Management, GitHub; Neil Coles, Principal Security Engineer 🧪 2. Use the Wisdom from the Past Michael Howard - author of the original secure coding book back in 2003 and now a senior director in the Microsoft Red Team - reflects on 25 years of secure code, how the practice has developed and current challenges in secure development. Get ready for an end-to-end secure coding journey from Bill Gates anecdotes and tips for how you in 2025 can code securely to meet today's security threats. Learn more: Session: “Reflections on 25 years of writing secure code” With Michael Howard, Senior Director, Red Team 📏3. Lock down the data Microsoft is releasing a set of Purview APIs (+SDK) that will allow partners and customers to integrate their custom AI apps with the Microsoft Purview ecosystem for enterprise grade Data Security and Compliance outcomes. Join this demo session to get the latest. Learn more: Session: “Build secure and compliant AI applications with Microsoft Purview” With Arpitha Dhanapathi, Principal Product Manager 🔚4. Think about security from start to finish Security can be challenging at the best of times, especially when it’s not your full-time job. In this session, we walk you through the end-to-end deployment of a secure AI application, all the way from identities, VNETS, NSGs, key vault through to prompt shields and data labelling. If you’ve ever felt overwhelmed by trying to do the right thing by security but didn’t know where to start, this session is for you! Learn more: Session: “Deploying an end-to-end secure AI application” With Sarah Young, Principal Security Advocate & Pamela Fox, Principal Cloud Advocate 🤖 5. Play dev-ils advocate To keep pace with evolving AI risks, organizations need tools to effectively test their AI systems, simulate adversarial attacks, and uncover weaknesses before bad actors can exploit them. Learn how the AI Red Teaming Agent in Azure AI Foundry can help your organization run automated scans for safety risks so you can leverage Microsoft's deep expertise to scale and accelerate your AI development with Trustworthy AI at the forefront. Learn more: Session: “Accelerate AI red teaming for your GenAI apps with Azure AI Foundry” With Minsoo Thigpen, Senior Product Manager & Nagkumar Arkalgud, Senior Software Engineer 🥷6. Skill up on agents Agents—they’re all anyone is talking about. Join this demo session to learn how to extend security copilot to facilitate security and IT workflows across your environment. In this demo you will see how to build an agent with supporting components - plugins and KQL queries - and architect it with triggers to automatically run. Learn more: Session: “Building Agents with Security Copilot” With Vinod Jagannathan, Principal Product Manager 🔐7. Get the inside scoop first One of the pillars of SFI is securing the engineering system. We will explore changes made to Azure DevOps to enable enhanced engineering system security at Microsoft and how customers can use them to better secure their own engineering systems as well. Learn more: Session: “Learn How Microsoft secured the Engineering System” With Karl Piteira, Principal Group Program Manager & Rajesh Ramamurthy, Senior Director, Principal Group Product Management 🚩8. Automate what you can You don’t have to wait to identify risks. The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and engineers to proactively identify risks in generative AI systems. In this hands-on lab, you will learn how to deploy PyRIT and test it against a variety of AI applications. Learn more: Session: “AI security testing with PyRIT” With Roman Lutz, Responsible AI Engineer & Richard Lundeen, Principal Software Engineering Lead - AI Red Team ⚙️ 9. Secure APIs Join us for an engaging and informative session where we delve into the intricacies of API security in the context of AI. We'll examine the unique challenges posed by AI-driven applications and the sophisticated threats that target their APIs. From unauthorized access and data breaches to injection attacks and exploitation of vulnerabilities, the risks are manifold. However, with the right approach, these risks can be effectively mitigated. Learn more: Session: “Fortifying AI Frontiers - Securing APIs the path to your AI app” With Abhi Singh, Director, Global Black Belt - Security & Preetham Anand Naik, Senior Product Manager 🆔 10. Verify explicitly, and automatically We all know the saying, but we’ve got to put it into practice. Join this session to learn how to enable automated processes to securely onboard and grant resource access for high-privilege users with the Microsoft Entra Suite and MS Graph. Verify the identities of admins, C-level employees, or others who need access to sensitive internet or on-premises resources, and automatically reverify them at regular intervals. Work with a chosen identity verification partner for government ID-based verification that ensures your organization onboards and grants access to the right person. Learn more: Session: “Secure onboarding and access with the Microsoft Entra Suite” With Sri Ponnada, Senior Product Manager ✅11. Apply best practices Join us for an insightful session on best practices and enablement topics for developing and deploying secure solutions within Business Applications, as part of the Secure Future Initiative (SFI). We will look holistically at Power Platform features for Security under SFI pillars and explore Responsible AI with Purview and Copilot. We will further explore demos, design review checklists on product features under Secure by Design, Secure by Default, and Secure Operations for BizApps Solutions. Learn more: Session: “Building Secure Business Apps: Best Practices for Design to Deployment” With Muhammad Aurangzeb, Senior Partner Solution Architect 🕶️ 12. Use agents for Zero Trust In this session, you will learn how to build AI Agents using the OpenAI SDK with Assistants and Function Calling for APIs secured by Microsoft Entra ID. This ensures adherence to Zero Trust principles. We will cover the essential steps to set up and configure the OpenAI SDK in a C# environment and demonstrate how to leverage Microsoft Entra ID for secure authentication and authorization. Learn more: Session: “Building Secure AI Agents with Microsoft Entra ID” With Fabian Alves, Senior Product Manager 😶🌫️ 13. Secure your apps, secure your people Learn how to enable automated processes to securely onboard and grant resource access for high-privilege users with the Microsoft Entra Suite and MS Graph. Verify the identities of admins, C-level employees, or others who need access to sensitive internet or on-premises resources, and automatically reverify them at regular intervals. Work with a chosen identity verification partner for government ID-based verification that ensures your organization onboards and grants access to the right person. Learn more: Session: “Securing Applications with Microsoft Entra ID” With Robert Stewart, Senior Specialist 📲 14. Keep it user-friendly for the best results In the rapidly evolving landscape of mobile application development, achieving pixel-perfect design and robust security is paramount. This lab focuses on the creation of mobile applications integrated via Native Authentication in Microsoft Entra External ID. Participants will explore the intricacies of designing visually precise user interfaces that align seamlessly with their brand while implementing native authentication methods, ensuring secure and efficient user verification processes. Learn more: Session: “Creating pixel-perfect mobile apps with Native Authentication” With Joylynn Kirui, Senior Cloud Security Advocate 💬 Come Learn from the People Building the Future Join these sessions and more at Microsoft Build 2025. Whether you're a junior dev or a senior architect, you'll walk away with real-world tactics to help you build apps that are secure, scalable, and resilient — by design. 👉 Register for Microsoft Build Security Sessions Now »