Register for the October 30th web seminar featuring Microsoft Digital Defense Report 2024 insights.
Meet the experts
AI
Defending against SIM swapping, AI-driven social engineering
In an interview at Black Hat 2024, Sherrod DeGrippo discusses the latest threat trends including AI’s role in accelerating cybercrime tactics and tips to help organizations be more resilient.
Online fraud
Meet the experts tracking Storm-0539 gift card fraud
Summary: With backgrounds spanning international relations, federal law enforcement, security, and government, Microsoft Threat Intelligence analysts Alison Ali, Waymon Ho, and Emiel Haeghebaert offer a range of unique skills for tracking Storm-0539, a threat actor specializing in payment card theft and gift card fraud.
AI
Expert Profile: Homa Hayatyfar
Principal Data and Applied Science Manager Homa Hayatyfar describes the use of machine learning models to reinforce defenses, just one of many ways AI is changing the face of security.
Nation state
On the frontlines: Decoding Chinese threat actor tactics and techniques
Microsoft Threat Intelligence China experts Sarah Jones and Judy Ng join Microsoft Threat Intelligence Strategy director Sherrod DeGrippo to discuss the geopolitical landscape while providing advice and insight on modern cybersecurity careers.
Supply chain
Industry expert weighs in on security in manufacturing
Industry expert Myrna Soto breaks down the state of cybersecurity across manufacturing, discussing the sector’s emerging risks and opportunities, future legislative developments, and best practices to help strengthen defenses.
Nation state
Putting cyber threat intelligence into geopolitical context
Threat intelligence expert Fanta Orr explains how threat intelligence analysis uncovers the “why” behind cyberthreat activity and helps better protect customers who might be vulnerable targets.
Threat actor
Expert profile: Justin Turner
Principal Group Manager Justin Turner, Microsoft Security Research describes the three enduring challenges he’s seen throughout his cybersecurity career: configuration management, patching, and device visibility.
Multifactor authentication
Expert Profile: Dustin Duran
Threat intelligence expert Dustin Duran explains how his team adopts a threat actor mindset to better understand their adversaries and help keep customer organizations and security centers safe.
Threat actor
Insights from Iranian threat actor expert Simeon Kakpovi
Senior threat intelligence analyst Simeon Kakpovi talks about training the next generation of cyber defenders and overcoming the sheer tenacity of Iranian threat actors.
IoT/OT
Threat Intelligence, Head of IoT/OT Security Research David Atch
In our latest expert profile, we spoke with David Atch, the Head of IoT/OT Security Research at Microsoft, to talk about the growing security risks of IoT and OT connectivity.
Social engineering
Discover how cybercriminals use tactics like social engineering to perpetrate attacks
Matt Lundy of the Microsoft Digital Crimes Unit (DCU) describes how the experts of the Identity and Platform Enforcement team help keep customers safe from threats like ransomware, business email compromise, and homoglyph domains.
Ransomware
Threat intelligence expert Emily Hacker
Threat Intelligence Analyst Emily Hacker discusses how her team stays on top of the changing ransomware as a service landscape and the measures they take to help catch pre-ransomware actors.
Ransomware
Behind the scenes with cybercrime and counter ransomware expert Nick Carr
Nick Carr, Cybercrime Intelligence Team Lead at the Microsoft Threat Intelligence Center, discusses ransomware trends, explains what Microsoft is doing to protect customers from ransomware, and describes what organizations can do if they’ve been affected by it.
Threat actor
Expert Profile: Steve Ginty Behind the scenes with Microsoft’s threat intelligence expert
Steve Ginty, director of cyber intelligence at Microsoft, talks about the importance of knowing your external attack surface, provides tips on effective security readiness, and identifies the most important step you can take to protect yourself against threat actors online.
Multifactor authentication
Expert analysis from inside the Microsoft Security Response Center (MSRC)
Spend a moment behind the scenes with the MSRC’s Russ McRee, who shares his thoughts on the state of modern security.
Identity
Christopher Glyer: Principal Threat Intelligence Lead, MSTIC
As Principal Threat Intelligence Lead with a focus on ransomware at the Microsoft Threat Intelligence Center (MSTIC), Christopher Glyer is part of the team that investigates how the most advanced threat actors access and exploit systems.
Get started
Join Microsoft events
Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
Talk to us
Join Microsoft’s tech community
Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.
Follow Microsoft Security