{"id":22004,"date":"2023-05-15T08:01:01","date_gmt":"2023-05-15T16:01:01","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/05\/15\/news-15735\/"},"modified":"2023-05-15T08:01:01","modified_gmt":"2023-05-15T16:01:01","slug":"news-15735","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/05\/15\/news-15735\/","title":{"rendered":"Microsoft Security highlights from RSA Conference 2023"},"content":{"rendered":"<p><strong>Credit to Author: Matt Thomas| Date: Mon, 15 May 2023 16:00:00 +0000<\/strong><\/p>\n<p>The RSA Conference (RSAC) gave us an incredible opportunity to meet with security professionals from around the world, learn about exciting advances in the world of cybersecurity, and share our own security innovations. Defenders everywhere serve an important mission of protecting our world, and RSAC is a special time to connect with the defender community and support each other in our collective mission.<\/p>\n<p>I had the honor of representing Microsoft at our RSA keynote, \u201c<strong>Defending at Machine Speed: Technology\u2019s New Frontier.\u201d<\/strong> AI is having a profound impact in our world, and I believe security is going to be one of AI\u2019s most important use cases. During this session, I shared how AI is causing a paradigm shift, augmenting the essential power of human intuition and expertise and reshaping the future of cybersecurity. For details, watch <a href=\"https:\/\/www.rsaconference.com\/USA\/agenda\/session\/Defending%20at%20Machine%20Speed%20Technologys%20New%20Frontier\">the full keynote here<\/a> (video courtesy of <a href=\"https:\/\/www.rsaconference.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">RSA Conference<\/a>).<\/p>\n<p>RSAC is the largest and most important cybersecurity conference in the industry\u2014we value every opportunity to learn directly from our customers, partners, and community, and share how Microsoft Security is empowering our customers to protect everything.<\/p>\n<p>Let\u2019s walk through some of the most memorable moments from RSAC.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"681\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-1-1024x681.jpg\" alt=\"Vasu Jakkal, Corporate Vice President, Microsoft Security, speaking at RSAC 2023.\" class=\"wp-image-127679\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-1-1024x681.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-1-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-1-768x511.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-1-1536x1022.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-1-293x195.jpg 293w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-1.jpg 1678w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<h2 class=\"wp-block-heading\">Pre-Day with Microsoft<\/h2>\n<p>Microsoft Security opened RSAC with the Pre-Day event and reception on Sunday, April 23. Pre-Day was an expansion of our presence at RSAC and amplification of the announcements we made at Microsoft Secure. The presentations helped attendees gain a deeper understanding of what an AI-powered future means for cybersecurity. They also shared comprehensive strategies to help organizations protect everything, highlighted the latest announcements in Threat Intelligence, which is critical to defending against an evolving threat landscape, and gave customers a chance to interact with Microsoft Security business and engineering leaders, as well as network with their peers during an evening reception. I was very pleased to share the stage with Charlie Bell, Executive Vice President, Microsoft Security; Bret Arsenault, CVP, Microsoft Security and Chief Information Security Officer; Kelly Bissell, CVP, Microsoft Security; Andy Elder, CVP, Microsoft Security Solution Area; Jeremy Dallman, Principal Research Director, Microsoft Threat Intelligence; Holly Stewart, Principal Research Director, Microsoft Threat Intelligence; and engineering leaders.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"684\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-2-1024x684.jpg\" alt=\"From left to right, Vasu Jakkal, Bret Arsenault, Any Elder, and Charlie Bell speaking at Pre-Day with Microsoft event.\" class=\"wp-image-127680\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-2-1024x684.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-2-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-2-768x513.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-2-1536x1026.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-2-293x195.jpg 293w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-2.jpg 1682w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<h2 class=\"wp-block-heading\">Major product announcements<\/h2>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/business\/ai-machine-learning\/microsoft-security-copilot?rtc=1\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security Copilot<\/a>, Microsoft&#8217;s new generative AI solution, garnered plenty of buzz during the conference. First announced at <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/28\/microsoft-secure-explore-innovations-transforming-the-future-of-security\/\">Microsoft Secure<\/a>, Security Copilot combines the latest Open AI large language model with Microsoft\u2019s unique security specific model powered by 65 trillion signals, human intelligence, and cyberskills to help defenders move at the speed and scale of AI. It was wonderful to see the interest from our customers and partners for Security Copilot.<\/p>\n<p>Now in private preview, this groundbreaking technology serves as a true copilot to defenders. It augments a security analyst\u2019s work, continually learning from users and letting them provide feedback and inform future interactions. The AI capabilities you gain include ongoing access to the most advanced OpenAI models, integration with Microsoft\u2019s end-to-end security portfolio, and visibility and evergreen threat intelligence powered by your organization\u2019s security products and the 65 trillion threat signals received by Microsoft every day. Importantly, Security Copilot is built with privacy at its heart. This means your data remains your data, and it is not used to train or enrich foundation AI models. Further, Security Copilot runs on our security and privacy-compliant Azure Cloud hyperscale infrastructure, enabling organizations to truly defend at machine speed.<\/p>\n<p>In other threat intelligence news, <a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-defender-threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender Threat Intelligence<\/a> is now available to licensed customers directly within Microsoft 365 Defender. It\u2019s already integrated with <a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-sentinel?rtc=1?ef_id=_k_9079dacc1baf1f751ff6be97cac9df94_k_&amp;OCID=AIDcmmdamuj0pc_SEM__k_9079dacc1baf1f751ff6be97cac9df94_k_&amp;msclkid=9079dacc1baf1f751ff6be97cac9df94\">Microsoft Sentinel<\/a> and now has an application programming interface (API) to help enrich incidents, automate incident response, and work with a broad ecosystem of security tools. With this advancement, you get one of the world\u2019s best threat intelligence, integrated with the tools you use every day.<\/p>\n<p>Specific capabilities available as part of a Microsoft Sentinel solutions package\u2014generally available beginning in July\u2014are:<\/p>\n<ul>\n<li><strong>Microsoft Defender Threat Intelligence enrichment playbooks<\/strong>: Defender Threat Intelligence integrates with all security information and event management (SIEMS) via an API, but playbooks in the Microsoft Sentinel Content hub are available to enrich incidents with reputation data to add context and triage them automatically.<\/li>\n<li><strong>Microsoft Defender Threat Intelligence data connector<\/strong>: Microsoft threat researchers add indicators of compromise (IOCs) from finished intelligence to the threat intelligence (TI) blade to add massive value to Microsoft Sentinel users by adding critical context and enhancing detections and investigations.<\/li>\n<li><strong><strong>Microsoft Defender Threat Intelligence<\/strong> analytics rules<\/strong>: This built-in rule takes URLs, domains, and internet protocols (IPs) from a customer environment via log data and checks them against known bad IOCs from Defender Threat Intelligence, creating incidents when there&#8217;s a match.<\/li>\n<\/ul>\n<p>At RSAC, we also had several other major product announcements.<\/p>\n<p>Security researchers and customers are confronted with an overwhelming amount of threat intelligence data\u2014and we want to help by giving them better clarity. Our new <a href=\"https:\/\/aka.ms\/threatactorsblog\">threat actor naming taxonomy<\/a> will offer a more organized, articulate, and easy way to reference adversary groups so that organizations can better prioritize threats and protect against attacks. Microsoft Security also is rolling out a new icon system to make it even easier to identify and remember threat actors. Each icon represents a unique family name and will accompany the threat actor names as a visual aid.&nbsp;<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"640\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-3-1024x640.png\" alt=\"A person touching a globe.\" class=\"wp-image-127682\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-3-1024x640.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-3-300x187.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-3-768x480.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-3-1536x960.png 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-3.png 1647w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">To demonstrate these changes, we showcased the Microsoft Threat Intelligence Interactive Experience at our booth and Microsoft Security Hub.<\/figcaption><\/figure>\n<p><a href=\"http:\/\/aka.ms\/DfAPIlaunch\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender for API<\/a> is a new offering focused on threat protection for APIs\u2014built for organizations that provide cross-organizational visibility of the Azure API Management inventory, data classification, and coverage to detect exploits of API risks. Classify and understand the API security posture based on cloud security insights and sensitive data exposure. Harden API configuration and prioritize API risk remediation by monitoring for security best practices in a full lifecycle approach, across infrastructure as code templates and runtime environments. Detect and respond to active runtime threats within minutes\u2014using machine learning powered anomalous and suspicious API usage detections.&nbsp;<\/p>\n<p><a href=\"https:\/\/aka.ms\/mdeasm-dataconnector\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender External Attack Surface Management (MDEASM)\u2014Data Connector<\/a> provides automated export of attack surface details, updates, and findings to Kusto or Microsoft Sentinel Log Analytics, giving customers the ability to analyze, report, and correlate attack surface information against other data sources and use additional tooling such as Power BI to customize analysis to their organization\u2019s needs.&nbsp;<\/p>\n<p>Now in general availability as part of the <a href=\"https:\/\/aka.ms\/IntuneSuiteLaunch\">Microsoft Intune Suite<\/a> and as a standalone add-on, <a href=\"https:\/\/aka.ms\/Blog_EPM\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Intune Endpoint Privilege Management<\/a> is a feature that enables admins to set policies that allow standard users to perform tasks normally reserved for an administrator. The feature supports automatic and user-confirmed workflows for elevation as well as insights and reporting.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\">RSA Conference highlights<\/h2>\n<p>Highlights of our sessions included:<\/p>\n<ul>\n<li><strong>\u201c<\/strong><a href=\"https:\/\/www.rsaconference.com\/usa\/agenda\/session\/Hands-on%20Tutorial%20to%20Red%20Teaming%20AI%20Systems%20with%20Open%20Source%20Tools\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Hands-on Tutorial to Red Teaming AI Systems with&nbsp;Open Source&nbsp;Tools<\/strong><\/a><strong>\u201d<\/strong>: Microsoft\u2019s Raja Sekhar Rao Dheekonda and Charlotte Siska shared how to use&nbsp;open source&nbsp;tools to red team&nbsp;AI models. These&nbsp;tools can be adapted to multiple environments, models, and&nbsp;data types.<\/li>\n<li><strong>\u201c<\/strong><a href=\"https:\/\/www.rsaconference.com\/usa\/agenda\/session\/Geopolitical%20Resilience%20Why%20Operational%20Resilience%20Is%20No%20Longer%20Enough\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Geopolitical Resilience: Why Operational Resilience Is&nbsp;No Longer Enough<\/strong><\/a><strong>\u201d<\/strong>: Microsoft\u2019s Ann Johnson and Team8\u2019s Nadav Zafrir&nbsp;spoke about how&nbsp;merging business, social, and political crises necessitates a new&nbsp;approach to resilience. More than operational recovery,&nbsp;organizations have new dimensions of risk to consider,&nbsp;including deglobalization, data sovereignty, sanctions, and forced&nbsp;market exits.<\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\">Microsoft Security Hub sessions and activities<\/h3>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"681\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-4-1024x681.jpg\" alt=\"A room full of people communicating.\" class=\"wp-image-127683\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-4-1024x681.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-4-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-4-768x511.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-4-1536x1022.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-4-2048x1362.jpg 2048w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-4-293x195.jpg 293w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<p>Living up to its name, the Microsoft Security Hub was a hubbub of activity throughout RSA Conference. Held at the Ecosystem Coworking Space, the private and semi-private meeting rooms provided fantastic opportunity for us to meet with customers and partners, and there were multiple learning opportunities and networking events.<\/p>\n<h3 class=\"wp-block-heading\">Microsoft sessions and experiences<\/h3>\n<div class=\"wp-block-columns is-layout-flex wp-container-3\">\n<div class=\"wp-block-column is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"794\" height=\"528\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-5.jpg\" alt=\"People speaking around a globe.\" class=\"wp-image-127684\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-5.jpg 794w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-5-300x199.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-5-768x511.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-5-293x195.jpg 293w\" sizes=\"auto, (max-width: 794px) 100vw, 794px\" \/><\/figure>\n<\/p><\/div>\n<div class=\"wp-block-column is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"783\" height=\"528\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-6.jpg\" alt=\"Two people smiling\" class=\"wp-image-127685\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-6.jpg 783w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-6-300x202.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-6-768x518.jpg 768w\" sizes=\"auto, (max-width: 783px) 100vw, 783px\" \/><\/figure>\n<\/p><\/div>\n<\/p><\/div>\n<ul>\n<li>During our session<strong> \u201cAI: Shaping Security Today and Into the Future\u201d, <\/strong><strong>Microsoft\u2019s Scott Woodgate&nbsp;<\/strong>discussed how AI is an integral part of Microsoft\u2019s security strategy, helping drive security operations center efficiency with Microsoft Sentinel and Microsoft 365 Defender and now taking it to the next level with Microsoft Security Copilot.<\/li>\n<li>The <strong>Microsoft Threat Intelligence Interactive Experience<\/strong> wowed attendees throughout the conference. The experience invited hundreds of people&nbsp;to explore our unparalleled, 360-degree view of the threat landscape. The 3D-touchscreen globe was unlike anything found at the conference. Customers explored the new threat actor taxonomy with stunning visuals, an interactive quiz to test their cybersecurity knowledge, and attack chain case studies to explore the tactics, techniques, and procedures (TTPs) of threat actors. The experience wowed customers, \u201cThis is something only Microsoft would do, this is amazing,\u201d and was moving to others, \u201cThis just means a lot being able to see the stuff I work with every day visualized like this.\u201d<\/li>\n<li>Another popular event was our <a href=\"https:\/\/microsoft.eplannerpro.com\/rsa2023\/HappyHour\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Threat Intelligence Happy Hour<\/strong><\/a>, hosted by Microsoft Security Experts, on April 25. This networking event allowed customers and partners to connect with the many, varied experts from Microsoft Security to talk shop, score swag, and learn more about the new threat actor taxonomy in a casual setting that included drinks aligned to the new weather-themed taxonomy. &nbsp;<\/li>\n<li>We kicked off the first day of RSAC with the<strong> Diversity Executive Women\u2019s Lunch<\/strong>, where I joined Aarti Borkar, Ann Johnson, Tanya Janca, and Lynn Dohm to discuss what industry, academia, government, and not-for-profits can do together as a community to nurture more women into successful careers in cybersecurity. With an audience of security leaders, not-for-profit representatives, community college students, and educators, this session welcomed an inspiring reflection on the importance of diversity for building a strong workforce, provided calls to action to make real difference, and enabled a great networking moment.<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"668\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-7-1024x668.jpg\" alt=\"Five women speaking on a panel celebrating women and diversity in cybersecurity\" class=\"wp-image-127686\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-7-1024x668.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-7-300x196.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-7-768x501.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-7-200x130.jpg 200w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/RSA-7.jpg 1518w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Celebrating women in cybersecurity with presenters (pictured from left to right): <strong>Ann Johnson<\/strong>, CVP, Microsoft Security, <strong>Lynn Dohm<\/strong>, Executive Director, Women in Cybersecurity, <strong>Vasu Jakkal<\/strong>, <strong>Tanya Janca<\/strong>, Founder and Chief Executive Officer, We Hack Purple, and <strong>Aarti Borkar<\/strong>, Vice President, Customer Success, Microsoft Security.<\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\">RSA Conference ancillary events<\/h2>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"683\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/52870168437_ab93ac81b5_o-1024x683.jpg\" alt=\"4 people posing with a trophy at an awards ceremony.\" class=\"wp-image-127809\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/52870168437_ab93ac81b5_o-1024x683.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/52870168437_ab93ac81b5_o-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/52870168437_ab93ac81b5_o-768x512.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/52870168437_ab93ac81b5_o-1536x1024.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/52870168437_ab93ac81b5_o-2048x1365.jpg 2048w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/52870168437_ab93ac81b5_o-293x195.jpg 293w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<p>Microsoft Security Excellence Awards (MISA) members gathered on April 24 at The Fairmont Hotel to honor <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/25\/microsoft-announces-the-2023-microsoft-security-excellence-awards-winners\/\">award winners in 11 security categories<\/a> at the Microsoft Security Excellence Awards. The fourth annual awards give us an opportunity to recognize outstanding contributions of partners in our MISA organization. MISA is a coalition of Microsoft leaders and subject matter experts, independent software vendors, and managed security service providers working together to defend organizations around the world from increasing threats. <a href=\"https:\/\/cloudpartners.transform.microsoft.com\/download?assetname=assets%2FMS-Security-Excellence-Awards-2023-sizzle-video.mp4\" target=\"_blank\" rel=\"noreferrer noopener\">Watch the awards<\/a> yourself to see all the excitement!<\/p>\n<p>Two nights later, Microsoft sponsored the 13th&nbsp;Annual Executive Dinner, hosted by Forgepoint Capital and PwC. The event\u2019s theme was \u201cWorking Together in the New Era of Transparency and Resilience.\u201d Guests enjoyed dinner, cocktails, and conversation about cybersecurity.<\/p>\n<h2 class=\"wp-block-heading\">Join us for Microsoft Build<\/h2>\n<p>We relish any opportunity to connect with customers and partners and hear your stories of how you\u2019re innovating with technology. Thankfully, we don\u2019t have long to wait. Join us in Seattle for <a href=\"https:\/\/build.microsoft.com\/home\">Microsoft Build<\/a>, including pre-day workshops on May 22 and keynotes, Expert Meet-ups, sessions, demos, and skill labs May 23 to 25. If you can\u2019t attend in-person, consider attending virtually May 23 to 24. <a href=\"https:\/\/register.build.microsoft.com\/\">Register today<\/a> to reserve your spot.<\/p>\n<p>To learn more about Microsoft Security solutions, visit our&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\">Microsoft Security<\/a>) and Twitter (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/05\/15\/microsoft-security-highlights-from-rsa-conference-2023\/\">Microsoft Security highlights from RSA Conference 2023<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/05\/15\/microsoft-security-highlights-from-rsa-conference-2023\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Matt Thomas| Date: Mon, 15 May 2023 16:00:00 +0000<\/strong><\/p>\n<p>At RSA Conference April 24 to 26, 2023, Microsoft Security shared solution news and insights. Watch Vasu Jakkal\u2019s keynote on-demand (video courtesy of RSA conference).    <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/05\/15\/microsoft-security-highlights-from-rsa-conference-2023\/\">Microsoft Security highlights from RSA Conference 2023<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500,12982],"class_list":["post-22004","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity","tag-security-management"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22004"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22004\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22004"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}