{"id":58623,"date":"2025-05-07T16:00:00","date_gmt":"2025-05-07T16:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/"},"modified":"2025-05-07T16:00:00","modified_gmt":"2025-05-07T16:00:00","slug":"meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/","title":{"rendered":"Meet the Deputy CISOs who help shape Microsoft\u2019s approach to cybersecurity: Part 2"},"content":{"rendered":"<p>Microsoft launched its <a href=\"https:\/\/www.microsoft.com\/trust-center\/security\/secure-future-initiative\">Cybersecurity Governance Council in 2024<\/a>, and with it, named a group of deputy chief information security officers that ensure comprehensive oversight of the company\u2019s cybersecurity risk, defense, and compliance. These leaders work in tandem with product and engineering leaders across the company to create accountability and advance cybersecurity protection for Microsoft, our customers, and the industry.<\/p>\n<p>In this second part of our series, we\u2019ll introduce three more of these leaders and share more about their background, their role, and their priorities.<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Terrell Cox<\/strong>, Vice President for Privacy and Compliance and Deputy Chief Information Security Officer for Microsoft Security Products Division.<\/li>\n<li><strong>Ilya Grebnov<\/strong>, Distinguished Engineer and Deputy Chief Information Security Officer, Business Applications.<\/li>\n<li><strong>Damon Becknel<\/strong>, Vice President and Deputy Chief Information Security Officer, Regulated Industries.<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"456\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/05\/UTF-8MS_CISO_SpeakerSeries_BlogGraphic_Final-Group-2-1024x456.jpg\" alt=\"A group of people with text.\" class=\"wp-image-138787\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/05\/UTF-8MS_CISO_SpeakerSeries_BlogGraphic_Final-Group-2-1024x456.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/05\/UTF-8MS_CISO_SpeakerSeries_BlogGraphic_Final-Group-2-300x134.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/05\/UTF-8MS_CISO_SpeakerSeries_BlogGraphic_Final-Group-2-768x342.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/05\/UTF-8MS_CISO_SpeakerSeries_BlogGraphic_Final-Group-2.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/figure>\n<h2 class=\"wp-block-heading\" id=\"q-how-did-you-get-your-start-in-cybersecurity\">Q: How did you get your start in cybersecurity?<\/h2>\n<p><strong>Terrell Cox<\/strong>:&nbsp;\u201cIt began with Public Key Infrastructure (PKI) work on Windows Server 2003. What hooked me to cybersecurity was the challenge of taking powerful security tools like encryption and making them usable and approachable. Later, AI and threat detection became natural extensions of that \u2018accessible security\u2019 mission.\u201d&nbsp;<\/p>\n<p><strong>Damon Becknel<\/strong>: \u201cWhile I was a United States Army Officer, I attended a course at Quantico, the U.S. Marine Corps base outside of Washington D.C. During that time, we toured various government agencies, and I had a long conversation with a researcher on a hacking tool that was fairly point and click. That really caught my attention and opened my eyes. This introduction fueled my choice for my master\u2019s degree, as part of my research had me working on techniques for what we now call hunting. My interest solidified when I led U.S. Military Academy cadets as interns inside the National Security Agency for a summer, and it\u2019s driven my career choices since.\u201d<\/p>\n<p><strong>Ilya Grebnov<\/strong>: \u201cI initially began my career as a coding-focused individual contributor. However, I naturally gravitated towards <a href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/sdl\/threatmodeling\">threat modeling<\/a> and security reviews. As a result, my colleagues began to assume that I was responsible for this area, leading it to become my official role. I embraced these responsibilities, which ultimately defined my current position.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"q-what-does-your-team-do-and-how-do-you-work-with-others-across-the-company\">Q: What does your team do, and how do you work with others across the company?<\/h2>\n<p><strong>Terrell Cox<\/strong>:&nbsp;\u201cI\u2019m part of the Microsoft Security division, where we deliver security, management, and privacy products. My dual focus includes serving as Deputy Chief Information Security Officer for our products and leading <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\/privacy-risk-management\">privacy, compliance, and risk efforts<\/a>. Separately, my team oversees infrastructure used company-wide to ensure we respect customer data rights. We\u2019re essentially the backbone of Microsoft\u2019s privacy operations.\u201d&nbsp;<\/p>\n<p><strong>Damon Becknel<\/strong>: \u201cI\u2019m part of the Microsoft Security division, and my job is to help the divisions of Microsoft ensure they, our products, and our services are compliant with all these various regulations. To do that I adopt the best practices from our customers in regulated industries like banking and healthcare. I provide guidance to teams on how to follow those regulations so we can ensure our products and services are compliant now and built in from the beginning. This also helps us be a better partner to our customers in these regulated industries by providing the security they need when they buy something from us.\u201d<\/p>\n<p><strong>Ilya Grebnov<\/strong>: \u201cI\u2019m part of the Microsoft Cloud and AI division, and my team is responsible for compliance, security, quality, and other cross-group initiatives. Given our heavy focus on platform engineering, much of our work involves defining standards and assisting with their adoption. Many engineers within our group also know me personally, which facilitates trust and effective collaboration across the group.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"q-security-is-a-team-sport-at-microsoft-how-do-you-emphasize-awareness-and-accountability-within-your-organization\">Q: Security is a team sport at Microsoft\u2014how do you emphasize awareness and accountability within your organization?<\/h2>\n<p><strong>Terrell Cox<\/strong>:&nbsp;\u201cBy making security everyone\u2019s key performance indicator. Senior leadership has set the tone, but mid-level managers operationalize it. For example, when engineering teams see security requirements as innovation multipliers and not obstacles, that\u2019s cultural success. We also \u2018shine lights\u2019 on risks through transparent reporting. People naturally step up when their metrics are there for everyone to see.\u201d&nbsp;<\/p>\n<p><strong>Damon Becknel<\/strong>: \u201cActions speak louder than words. Communication is important, but more important is creating a safe space for that communication. Whether I\u2019m sharing updates, or my team is setting commitments and holding ourselves to them, it\u2019s critical everyone feels they can be vulnerable and admit mistakes, because mistakes are a necessary part of the learning process.\u201d<\/p>\n<p><strong>Ilya Grebnov<\/strong>: \u201cSecurity relies on clear prioritization and effective collaboration. Our team aims to set high standards within both Microsoft and the broader industry, aligning objectives accordingly. Due to our scale, this is primarily a process matter. If engineers perceive conflicting priorities or lack awareness, it indicates a communication issue, not a technical one.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"q-what-are-some-of-the-biggest-cybersecurity-misconceptions-that-you-encounter\">Q: What are some of the biggest cybersecurity misconceptions that you encounter?<\/h2>\n<p><strong>Terrell Cox<\/strong>: \u201cBelieving you can wall yourself off in today\u2019s connected world. Threat actors don\u2019t play by rules, so <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-incident-response\">defense must be proactive<\/a>, not containment based. That\u2019s why we treat every team, from finance spotting phishing invoices to human resources securing onboarding docs, as frontline defenders.\u201d<\/p>\n<p><strong>Damon Becknel<\/strong>: \u201cThe notion that the next best thing is going to solve all our problems.\u201d<\/p>\n<p><strong>Ilya Grebnov<\/strong>: \u201cContrary to popular misconceptions, hackers typically operate as professionals rather than mere publicity seekers. Understanding that these actors often view their activities as employment, sometimes even state-sponsored, requires us to rethink our defensive strategies. Given their high level of skill and sophisticated resources, our defensive measures must be equally robust.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"q-how-does-your-approach-to-security-enable-rather-than-inhibit-innovation\">Q: How does your approach to security enable rather than inhibit innovation?<\/h2>\n<p><strong>Terrell Cox<\/strong>: \u201cSecurity isn\u2019t about shackling innovation\u2014it\u2019s about focusing it. When engineering teams see compliance as core to their mission and not an add-on, that\u2019s when breakthroughs happen. You want durable solutions? Embrace the tension, because good security doesn\u2019t limit what you build\u2014it builds trust that lets you go further.\u201d&nbsp;<\/p>\n<p><strong>Damon Becknel<\/strong>: \u201cI liken it to playing football, where basic skills are required before adding a Hail Mary play. You can\u2019t go straight into Hail Mary plays without the ability to block, tackle, throw, and run. You have to do the basics over and over until they are second nature. In an enterprise, security needs to be one of those basics that is practiced every day, and using new technologies to build upon those basics make us better.\u201d<\/p>\n<p><strong>Ilya Grebnov<\/strong>: \u201cCritical and immediate threats are prioritized. For non-critical tasks, my team evaluates work against innovation to find a balanced approach. And we prefer central or standard solutions instead of quick fixes. Since our team handles all aspects of customer trust, we use prioritization frameworks to maintain this balance.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"security-as-the-operational-backbone\">Security as the operational backbone<\/h2>\n<p>These leaders underscore that cybersecurity success hinges on&nbsp;rigorous process discipline, not just technology.<\/p>\n<p>Terrell\u2019s product and privacy focus, Damon\u2019s compliance rigor, and Ilya\u2019s engineering standards reveal the need for, and benefits of,&nbsp;proactive trust-building. By redefining cyberattackers as persistent professionals and prioritizing fundamentals, they exemplify how security enables innovation.<\/p>\n<p>Stay tuned as we continue to share profiles of Microsoft\u2019s deputy chief information security officers, outlining their mission to pioneer strategies that redefine trust, resilience, and innovation in a world where security enables progress for all.<\/p>\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters\">\n<div class=\"col-md-4\"> <img loading=\"lazy\" decoding=\"async\" width=\"997\" height=\"806\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/05\/image-2-e1746640669484.png\" class=\"card-img img-object-cover\" alt=\"A blue and pink background with black text\"> <\/div>\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\" readability=\"30.984455958549\">\n<h2>Microsoft Secure<\/h2>\n<div class=\"mb-3\" readability=\"10\">\n<p>Learn how to enhance your defenses, discover Microsoft&#8217;s latest security investments, and explore how Security Copilot can help your team improve remediation efforts.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<p>To learn more about Microsoft Security solutions, visit our&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\">Microsoft Security<\/a>) and X (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/05\/07\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Meet the minds behind how Microsoft prioritizes cybersecurity across every team and employee. Three deputy chief information security officers share their experiences in cybersecurity and how they are redefining protection.<br \/>\nThe post Meet the Deputy CISOs who help shape Microsoft\u2019s approach to cybersecurity: Part 2 appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[],"class_list":["post-58623","post","type-post","status-publish","format-standard","hentry","category-microsoft-secure"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Meet the Deputy CISOs who help shape Microsoft\u2019s approach to cybersecurity: Part 2 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Meet the Deputy CISOs who help shape Microsoft\u2019s approach to cybersecurity: Part 2 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-07T16:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/05\/UTF-8MS_CISO_SpeakerSeries_BlogGraphic_Final-Group-2-1024x456.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Meet the Deputy CISOs who help shape Microsoft\u2019s approach to cybersecurity: Part 2\",\"datePublished\":\"2025-05-07T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\\\/\"},\"wordCount\":1315,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/UTF-8MS_CISO_SpeakerSeries_BlogGraphic_Final-Group-2-1024x456.jpg\",\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\\\/\",\"name\":\"Meet the Deputy CISOs who help shape Microsoft\u2019s approach to cybersecurity: Part 2 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/UTF-8MS_CISO_SpeakerSeries_BlogGraphic_Final-Group-2-1024x456.jpg\",\"datePublished\":\"2025-05-07T16:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/UTF-8MS_CISO_SpeakerSeries_BlogGraphic_Final-Group-2-1024x456.jpg\",\"contentUrl\":\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/UTF-8MS_CISO_SpeakerSeries_BlogGraphic_Final-Group-2-1024x456.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Meet the Deputy CISOs who help shape Microsoft\u2019s approach to cybersecurity: Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Meet the Deputy CISOs who help shape Microsoft\u2019s approach to cybersecurity: Part 2 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/","og_locale":"en_US","og_type":"article","og_title":"Meet the Deputy CISOs who help shape Microsoft\u2019s approach to cybersecurity: Part 2 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-05-07T16:00:00+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/05\/UTF-8MS_CISO_SpeakerSeries_BlogGraphic_Final-Group-2-1024x456.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Meet the Deputy CISOs who help shape Microsoft\u2019s approach to cybersecurity: Part 2","datePublished":"2025-05-07T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/"},"wordCount":1315,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/05\/UTF-8MS_CISO_SpeakerSeries_BlogGraphic_Final-Group-2-1024x456.jpg","articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/","url":"https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/","name":"Meet the Deputy CISOs who help shape Microsoft\u2019s approach to cybersecurity: Part 2 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/05\/UTF-8MS_CISO_SpeakerSeries_BlogGraphic_Final-Group-2-1024x456.jpg","datePublished":"2025-05-07T16:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/05\/UTF-8MS_CISO_SpeakerSeries_BlogGraphic_Final-Group-2-1024x456.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/05\/UTF-8MS_CISO_SpeakerSeries_BlogGraphic_Final-Group-2-1024x456.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Meet the Deputy CISOs who help shape Microsoft\u2019s approach to cybersecurity: Part 2"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=58623"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58623\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=58623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=58623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=58623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}