{"id":116754,"date":"2022-06-29T09:00:00","date_gmt":"2022-06-29T16:00:00","guid":{"rendered":""},"modified":"2025-09-22T01:56:59","modified_gmt":"2025-09-22T08:56:59","slug":"microsoft-at-rsa-2022-envisioning-the-future-of-security","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/","title":{"rendered":"Microsoft at RSA 2022: Envisioning the future of security"},"content":{"rendered":"\n<div class=\"wp-block-bloginabox-theme-post-alert\" role=\"alert\" aria-live=\"polite\" data-bi-an=\"alert\">\n\t<div class=\"alert-content\">\n\t\tThe Microsoft Detection and Response Team (DART) has been renamed to Microsoft Incident Response (Microsoft IR). For more information on IR services, go to <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-incident-response\">Microsoft Incident Response<\/a>\t<\/div>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Like most of you, I was glad to see the 2022 RSA Conference return to its in-person roots after a two-year digital hiatus. This year\u2019s event was a great success, drawing 26,000 attendees to three days of cutting-edge security sessions, tutorials, seminars, and special events at Moscone Center in San Francisco. The conference included more than 600 speakers and 400-plus exhibitors, along with hundreds of media representatives. <a href=\"https:\/\/www.microsoft.com\/security\/business\">Microsoft Security<\/a> was on the ground, interacting with customers and security professionals at <strong>Microsoft\u2019s 20-plus earned sessions<\/strong>, as well as showcasing new solutions like <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-entra\"><strong>Microsoft Entra<\/strong><\/a> that help realize our goal of comprehensive security.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">I was honored to give a <a href=\"https:\/\/www.youtube.com\/watch?v=XgsDoPbED6k\" target=\"_blank\" rel=\"noreferrer noopener\">keynote address<\/a> (video courtesy of <a href=\"https:\/\/www.rsaconference.com\/usa\" target=\"_blank\" rel=\"noreferrer noopener\">RSA Conference<\/a>) on the future of cybersecurity, including a look at where technology and human expertise are headed, as well as why creating a more inclusive and diverse security workforce will be critical in our defense against evolving threats. Also addressing a subject that\u2019s become more urgent with the growth of the decentralized enterprise, my colleague Bret Arsenault, Microsoft Corporate Vice President (CVP) and Chief Information Security Officer (CISO), gave a special presentation on managing Shadow IT. All in all, it was a fun, collegial, and productive five days. Let\u2019s look at some of the highlights.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1704\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Day_2_Highlights-9802-scaled.jpg\" alt=\"Vasu Jakkal, Corporate Vice President, Microsoft Security, Compliance, Identity and Privacy, speaking at RSA Conference 2022.\" class=\"wp-image-116892\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Day_2_Highlights-9802-scaled.jpg 2560w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Day_2_Highlights-9802-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Day_2_Highlights-9802-1024x682.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Day_2_Highlights-9802-768x511.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Day_2_Highlights-9802-1536x1022.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Day_2_Highlights-9802-2048x1363.jpg 2048w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Day_2_Highlights-9802-293x195.jpg 293w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 1. Vasu Jakkal gives the keynote address\u2014Innovation, Ingenuity, and Inclusivity: The Future of Security is Now.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"microsoft-security-hub-you-made-it-shine\">Microsoft Security Hub\u2014you made it shine<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Thanks to our guests and some hard work by our onsite team, the <strong>Microsoft pre-day event<\/strong> was a huge hit. We registered<strong> 430 attendees<\/strong> for this all-day event held on June 5, 2022, at Bespoke Event Center. Attendees were able to partake in <strong>Q&amp;As with security experts<\/strong> about Zero Trust, threat intelligence, multicloud protection, risk management, and how Microsoft is re-envisioning the future of identity and access with <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-entra\">Microsoft Entra<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">I hosted <strong>Bret Arsenault<\/strong> in a fireside chat about navigating today\u2019s security challenges and my colleague <strong>Joy Chik, CVP of Identity and Access<\/strong>, made a special presentation on Microsoft Entra and the trust fabric of identity.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/202206-RSA-PreDay-CIE-Sessions-7652-1024x682.jpg\" alt=\"Joy Chik, Corporate Vice President of Identity and Access, speaking at RSA Conference 2022.\" class=\"wp-image-116952\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/202206-RSA-PreDay-CIE-Sessions-7652-1024x682.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/202206-RSA-PreDay-CIE-Sessions-7652-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/202206-RSA-PreDay-CIE-Sessions-7652-768x511.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/202206-RSA-PreDay-CIE-Sessions-7652-1536x1022.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/202206-RSA-PreDay-CIE-Sessions-7652-2048x1363.jpg 2048w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/202206-RSA-PreDay-CIE-Sessions-7652-293x195.jpg 293w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 2. CVP of Identity and Access Joy Chik speaks at the 2022 RSA Conference.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Attendees also enjoyed our <strong>immersive walkthrough art experience<\/strong> (and of course, the custom swag bar). Many guests took advantage of the reception to network with other security professionals and reconnect with old friends. It was great to see some familiar faces and share new insights with defenders across our community\u2014a big thank you to everyone who joined us!<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Day_0_Highlights-8285-1024x682.jpg\" alt=\"Visitors explore the Microsoft Security Hub and network with other security professionals. \" class=\"wp-image-116901\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Day_0_Highlights-8285-1024x682.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Day_0_Highlights-8285-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Day_0_Highlights-8285-768x511.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Day_0_Highlights-8285-1536x1022.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Day_0_Highlights-8285-2048x1363.jpg 2048w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Day_0_Highlights-8285-293x195.jpg 293w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 3. Attendes network at the Microsoft Security Hub.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft had a booth at the North Expo of RSA which showcased Microsoft comprehensive security solutions across our six product families: Microsoft Entra, Microsoft Endpoint Manager, Microsoft Defender, Microsoft Sentinel, Microsoft Purview, and Microsoft Priva. More than 7,300 people visited the Microsoft booth. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"685\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-3-RSA-Security-booth-1024x685.jpg\" alt=\"People explore the Microsoft Security booth at RSA Conference 2022.\" class=\"wp-image-116772\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-3-RSA-Security-booth-1024x685.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-3-RSA-Security-booth-300x201.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-3-RSA-Security-booth-768x513.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-3-RSA-Security-booth-293x195.jpg 293w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-3-RSA-Security-booth.jpg 1270w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 4. Microsoft Security booth at RSA Conference 2022.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"standout-sessions\">Standout sessions<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft speakers appeared in more than 20 earned sessions at this year\u2019s RSA, addressing everything from supply chain attacks to ransomware, botnets, and ways to protect our democracy. We also hosted 40 sessions in our booth. Some of our most popular sessions included:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Practical Learnings for Threat Hunting and Improving Your Security Posture:<\/strong> Hosted by Jessica Payne, Principal Security Researcher and Threat Intelligence Strategist at Microsoft, and Simon Dyson, Cyber Security Operations Centre Lead in NHS Digitals Data Security Centre, this 50-minute session addressed threat hunting and security posture improvements from a threat intelligence-informed perspective. Attendees gained insights from Jessica\u2019s experience in demystifying and defusing real-world <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/05\/09\/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself\/\">ransomware attacks<\/a>. They also got a first-hand recounting of Simon\u2019s work securing the complex network maintained by England\u2019s National Health Service (NHS) during the pandemic, and how his team\u2019s experience can benefit all of us.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Conti Playbook: Infiltrate the Most Profitable Ransomware Gang:<\/strong> Participants learned how a disgruntled affiliate exposed one of the most infamous ransomware gangs, divulging its ransomware-as-a-service (RaaS) secrets to help take them down. This immersive, hands-on workshop guided attendees through a typical Conti attack sequence and provided tips to defend against advanced persistent threats. Thanks to Tom D\u2019Aquino, Fabien Guillot, and Arpan Sarkar of Microsoft partner Vectra AI for this presentation.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Microsoft Defender Experts for Hunting Has Got Your Back: <\/strong>Abhishek Agarwal, Chief Security and Technology Officer at Helix Biotech, examined threat hunting\u2019s <em>virtuous cycle<\/em>: track, hunt, and analyze. Specifically, attendees learned how <a href=\"https:\/\/www.microsoft.com\/security\/business\/services\/microsoft-defender-experts-hunting\">Microsoft Defender Experts for Hunting<\/a> uses AI to accomplish all three components of the cycle faster, providing automated detection, hunting, and analysis to help the team track and stop threats across the company\u2019s multi-national enterprise.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Microsoft Security Research\u2014How We Responsibly Disclose Vulnerabilities to Apple, Google, and the Linux Community: <\/strong>Jonathan Bar Or, Principal Security Researcher at Microsoft, discussed how disclosing bugs makes the world safer and benefits users, as well as giving Microsoft Security a better understanding of the technologies we work to protect.\u200b The goal is to challenge our own detections and prove product truth\u2014making <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/16\/making-the-world-a-safer-place-with-microsoft-defender-for-individuals\/\">Microsoft Defender<\/a> stronger by challenging our own blue teams.\u200b<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Solve Secure Access Needs for Workload Identities with Microsoft Entra: <\/strong>Microsoft Product Managers Nick Wryter and Sandy Jiang led this informative session on the phenomenon of exploding workload identities. Currently, workload identities outnumber user identities five to one; the challenge being that many traditional identity and access management solutions don\u2019t manage these prevalent and frequently over-permitted identities. Nick and Sandy explained how the new <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/05\/31\/secure-access-for-a-connected-worldmeet-microsoft-entra\/\">Microsoft Entra<\/a> addresses this problem by providing a comprehensive view of every action performed by any identity on any resource, detecting anomalous permission usage at cloud scale.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Tracking Highly Evasive APTs with Vectra Detect &amp; Microsoft Sentinel: <\/strong>Tom D\u2019 Aquino, Senior Security Engineer at Vectra AI, led this demonstration of real-life threat-hunting using Vectra Detect and <a href=\"https:\/\/azure.microsoft.com\/services\/microsoft-sentinel\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel<\/a>. Tom demonstrated real-world workflows for threat tracking, including individual threat severity, lateral movement, threat targets, and more.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>The Shift of &#8220;Why&#8221; and &#8220;How&#8221; of Ransomware Attacks; How Microsoft Helps Customers Survive Ransomware: <\/strong>Led by MacKenzie Brown of Microsoft\u2019s Detection and Response Team (DART), this session examined the how and why behind the recent increase in ransomware attacks. Attendees learned how attackers have evolved their methods to exert minimum effort for maximum return on investment (ROI), and why DART\u2019s methodology can help you defeat them.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"shining-a-light-on-shadow-it\">Shining a light on Shadow IT<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.microsoft.com\/insidetrack\/shining-a-light-on-how-microsoft-manages-shadow-it\">Shadow IT<\/a> can be broadly defined as a \u201cset of applications, services, and infrastructure that are developed and managed outside of defined company standards.\u201d These kinds of ad-hoc systems can pose a compliance risk, especially for security, privacy, data governance, and accessibility. Like any organization, Microsoft has not been immune to the proliferation of Shadow IT.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"685\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-4-RSA-Vasu-and-Bret-1024x685.jpg\" alt=\"Vasu Jakkal and Bret Arsenault  on stage at the Microsoft pre-event. \" class=\"wp-image-116778\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-4-RSA-Vasu-and-Bret-1024x685.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-4-RSA-Vasu-and-Bret-300x201.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-4-RSA-Vasu-and-Bret-768x513.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-4-RSA-Vasu-and-Bret-293x195.jpg 293w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-4-RSA-Vasu-and-Bret.jpg 1270w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 5. Vasu Jakkal and Bret Arsenault speak at the Microsoft pre-day event.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In keeping with our commitment to <a href=\"https:\/\/www.microsoft.com\/security\">security for all<\/a>, <strong>Microsoft<\/strong> <strong>CVP and CISO Bret Arsenault<\/strong> gave a special presentation on June 8, 2022, addressing Microsoft\u2019s approach to managing Shadow IT. Bret discussed how Microsoft\u2019s security team is enabling engineers and developers to build and operate security capabilities in the cloud, as well as <strong>Microsoft\u2019s three primary principles <\/strong>for managing and addressing Shadow IT. For attendees wanting to learn more, we followed up the event with a free <a href=\"https:\/\/www.microsoft.com\/en-us\/insidetrack\/shining-a-light-on-how-microsoft-manages-shadow-it\">white paper on managing Shadow IT<\/a>. &nbsp;We\u2019ve also made Bret\u2019s <a href=\"https:\/\/www.rsaconference.com\/Library\/presentation\/USA\/2022\/How%20to%20Keep%20the%20Cloud%20from%20Casting%20a%20Bigger%20Shadow%20on%20Shadow%20IT\" target=\"_blank\" rel=\"noreferrer noopener\">presentation slides<\/a> available to everyone.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"2022-excellence-awards\">2022 Excellence Awards<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The <strong>Microsoft Security Excellence Awards<\/strong> (formerly Microsoft Security 20\/20 Awards) recognize <a href=\"https:\/\/www.microsoft.com\/security\/business\/intelligent-security-association?rtc=1\">Microsoft Intelligent Security Association<\/a> (MISA) members\u2019 success during the past 12 months. This year\u2019s 10 award categories were carefully selected to recognize the unique ways MISA members support their customers and help improve Microsoft security products. Our cross-functional panel carefully examined hundreds of nominations, narrowing the field to just three finalists for each category.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In the spirit of collaboration, Microsoft and MISA members alike voted on the winners. After dinner and cocktails, the awards were handed out at the San Francisco Design Center by Microsoft executives Phil Montgomery, Andrew Conway, Alym Rayani, Irina Nechaeva, Desmond Forbes, Sue Bohn, Mandana Javaheri, Madhu Prasha, Scott Woodgate, and myself. MISA members are a critical part of our approach to comprehensive security. We\u2019re grateful for their vision and dedication to our shared mission of helping customers do more, safely. To all of <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/06\/announcing-2022-microsoft-security-excellence-awards-winners\/\">this year\u2019s finalists and winners<\/a>\u2014congratulations!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"comprehensive-security-year-round\">Comprehensive security year-round<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft now protects 785,000 customers around the world, including our own digital estate. Our goal is to provide <a href=\"https:\/\/www.microsoft.com\/security\/business\/be-fearless\">comprehensive security<\/a> for our customers while enabling greater security for our shared online world. Microsoft\u2019s best-in-breed protection, built-in intelligence, and simplified management integrates more than 50 product categories in six product families, allowing you to be fearless in the pursuit of your vision. &nbsp;Our newest product family, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-entra\"><strong>Microsoft Entra<\/strong><\/a><strong>,<\/strong> helps fulfill that mission by creating a secure entry point for end-to-end security. Entra provides a unified admin center for <a href=\"https:\/\/azure.microsoft.com\/services\/active-directory\/\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Active Directory<\/a> (Azure AD), <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity-access\/microsoft-entra-permissions-management?rtc=1\">Entra Permissions Management<\/a>, and <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity-access\/microsoft-entra-verified-id\">Entra Verified ID<\/a> where your organization can quickly verify and secure every identity or access request\u2014all in one place.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Our commitment to comprehensive security also means providing the latest research and first-hand knowledge to help keep your organization secure. You can learn more at <a href=\"https:\/\/news.microsoft.com\/cyber-signals\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Signals<\/a>, a cyberthreat intelligence brief drawn from the latest Microsoft data and research. If you attended RSA and engaged with Microsoft, please take a few minutes to respond to our <a href=\"https:\/\/forms.office.com\/pages\/responsepage.aspx?id=v4j5cvGGr0GRqy180BHbR2OWuQneeEJBgynKrVR9m3JUODk0UDNaVlRCOUlVSjhUTVZMTERQUk5QMS4u\" target=\"_blank\" rel=\"noreferrer noopener\">RSAC 2022 survey<\/a> so we can continue to improve your experience. My thanks to everyone who attended, and we\u2019ll see you next year! &nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/business\/solutions\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The 2022 RSA Conference was a great success, drawing 26,000 attendees to three days of cutting-edge security sessions, tutorials, seminars, and special events at Moscone Center in San Francisco. Microsoft Security was on the ground, interacting with customers and security professionals at Microsoft\u2019s 20-plus earned sessions, as well as showcasing new solutions like Microsoft Entra that help realize our goal of comprehensive security.<\/p>\n","protected":false},"author":106,"featured_media":116787,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[],"threat-intelligence":[],"content-type":[3660],"job-role":[],"product":[3690,3702,3726],"topic":[3667,3685],"coauthors":[2400],"class_list":["post-116754","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-events","product-microsoft-defender","product-microsoft-entra","product-microsoft-sentinel","topic-cloud-security","topic-siem-and-xdr","review-flag-1694638265-576","review-flag-1694638265-310","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-3-1694638266-241","review-flag-4-1694638266-512","review-flag-5-1694638266-171","review-flag-7-1694638266-851","review-flag-8-1694638266-352","review-flag-new-1694638263-340","review-flag-partn-1694638263-177"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft at RSA 2022: Envisioning the future of security | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft at RSA 2022: Envisioning the future of security | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"The 2022 RSA Conference was a great success, drawing 26,000 attendees to three days of cutting-edge security sessions, tutorials, seminars, and special events at Moscone Center in San Francisco. Microsoft Security was on the ground, interacting with customers and security professionals at Microsoft\u2019s 20-plus earned sessions, as well as showcasing new solutions like Microsoft Entra that help realize our goal of comprehensive security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-29T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-22T08:56:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-0-RSA-Feature-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"799\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vasu Jakkal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-0-RSA-Feature-image.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vasu Jakkal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/vasu-jakkal\/\",\"@type\":\"Person\",\"@name\":\"Vasu Jakkal\"}],\"headline\":\"Microsoft at RSA 2022: Envisioning the future of security\",\"datePublished\":\"2022-06-29T16:00:00+00:00\",\"dateModified\":\"2025-09-22T08:56:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/\"},\"wordCount\":1613,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-0-RSA-Feature-image.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/\",\"name\":\"Microsoft at RSA 2022: Envisioning the future of security | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-0-RSA-Feature-image.jpg\",\"datePublished\":\"2022-06-29T16:00:00+00:00\",\"dateModified\":\"2025-09-22T08:56:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-0-RSA-Feature-image.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-0-RSA-Feature-image.jpg\",\"width\":1200,\"height\":799,\"caption\":\"Pictured from left to right, Charlie Bell, Executive Vice President of Security, Compliance, Identity, and Management; Vasu Jakkal, Corporate Vice President Microsoft Security, Compliance, Identity & Privacy; and Bret Arsenault, Microsoft Corporate Vice President, Chief Information Security Officer.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft at RSA 2022: Envisioning the future of security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/dce7a42a3a4e63a3350e523c420a4ad1\",\"name\":\"Emma Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=gd8de7ce2349693784c52e03d78a1422c\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=g\",\"caption\":\"Emma Jones\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-coujones\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft at RSA 2022: Envisioning the future of security | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft at RSA 2022: Envisioning the future of security | Microsoft Security Blog","og_description":"The 2022 RSA Conference was a great success, drawing 26,000 attendees to three days of cutting-edge security sessions, tutorials, seminars, and special events at Moscone Center in San Francisco. Microsoft Security was on the ground, interacting with customers and security professionals at Microsoft\u2019s 20-plus earned sessions, as well as showcasing new solutions like Microsoft Entra that help realize our goal of comprehensive security.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/","og_site_name":"Microsoft Security Blog","article_published_time":"2022-06-29T16:00:00+00:00","article_modified_time":"2025-09-22T08:56:59+00:00","og_image":[{"width":1200,"height":799,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-0-RSA-Feature-image.jpg","type":"image\/jpeg"}],"author":"Vasu Jakkal","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-0-RSA-Feature-image.jpg","twitter_misc":{"Written by":"Vasu Jakkal","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/vasu-jakkal\/","@type":"Person","@name":"Vasu Jakkal"}],"headline":"Microsoft at RSA 2022: Envisioning the future of security","datePublished":"2022-06-29T16:00:00+00:00","dateModified":"2025-09-22T08:56:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/"},"wordCount":1613,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-0-RSA-Feature-image.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/","name":"Microsoft at RSA 2022: Envisioning the future of security | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-0-RSA-Feature-image.jpg","datePublished":"2022-06-29T16:00:00+00:00","dateModified":"2025-09-22T08:56:59+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-0-RSA-Feature-image.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/Figure-0-RSA-Feature-image.jpg","width":1200,"height":799,"caption":"Pictured from left to right, Charlie Bell, Executive Vice President of Security, Compliance, Identity, and Management; Vasu Jakkal, Corporate Vice President Microsoft Security, Compliance, Identity & Privacy; and Bret Arsenault, Microsoft Corporate Vice President, Chief Information Security Officer."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/29\/microsoft-at-rsa-2022-envisioning-the-future-of-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft at RSA 2022: Envisioning the future of security"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/dce7a42a3a4e63a3350e523c420a4ad1","name":"Emma Jones","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=gd8de7ce2349693784c52e03d78a1422c","url":"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=g","caption":"Emma Jones"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-coujones\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/116754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/106"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=116754"}],"version-history":[{"count":2,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/116754\/revisions"}],"predecessor-version":[{"id":142468,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/116754\/revisions\/142468"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/116787"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=116754"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=116754"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=116754"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=116754"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=116754"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=116754"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=116754"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=116754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}