Trace Id is missing
Skip to main content
Microsoft Security

Passwordless: What’s It Worth

Passwords are a thing of the past. Join Bret Arsenault, Microsoft CISO, and Joy Chik, CVP of Identity, as they talk about the cost of going passwordless.

A person using a laptop.

The CISO Spotlight Series helps you address cybersecurity challenges head-on with 10-minute video episodes that discuss cybersecurity problems and solutions from AI to Zero Trust.

The latest episodes

Ann Johnson and Emma Smith having a discussion.

Episode 8

Does being compliant mean you are secure?

Join Ann Johnson, Microsoft CVP of Cybersecurity, as she discusses compliance and security with Emma Smith, Group CISO at Vodafone.
Theresa Payton and Jonathan Trull seated at a counter in a professional studio setting with CISO Spotlight Series and CISO city image in background.

Episode 7

Episode 7: The people behind the cloud

Focus on your top threats and let Microsoft Security operations take care of the rest. We’ve got you covered. You’re not alone.

Theresa Payton, Diana Kelley and Greg Petersen seated at a counter in a professional studio setting with CISO Spotlight Series and CISO city image in background.

Episode 6

Episode 6: Security Intelligence Report

Learn about the latest threats in 2019 and how to protect your organization now and in the future.

Three people, including Charles Sims, Head of Technology with the LA Clippers, seated at a counter in a professional studio setting with CISO Spotlight Series and CISO city image in background.

Episode 5

Episode 5: Moving to the Cloud with Better Security

Discover how Charles Sims, Head of Technology with the LA Clippers, was able to help his organization move securely to the cloud.

Theresa Payton, Ann Johnson, and Valecia Maclin seated at a counter in a professional studio setting with CISO Spotlight Series and CISO city image in background.

Episode 4

Episode 4: Closing the Cybersecurity Skills Gap

Join host Theresa Payton; Ann Johnson, Microsoft CVP, Cybersecurity Solutions Group; and Valecia Maclin, Microsoft GM Engineering, Customer Security, as they discuss closing the cybersecurity skills gap.

Theresa Payton, Mark Simos, and David Weston seated at a counter in a professional studio setting with CISO Spotlight Series and CISO city image in background.

Episode 3.2

Episode 3: The Steps to Enable Zero Trust Part 2

Join host Theresa Payton and Microsoft cybersecurity experts Mark Simos and David Weston as they talk about how to enable Zero Trust and the steps you need to take.

Theresa Payton, Mark Simos, and David Weston seated at a counter in a professional studio setting with CISO Spotlight Series and CISO city image in background.

Episode 3.1

Episode 3: How to Enable Zero Trust Part 1

Join host Theresa Payton and Microsoft cybersecurity experts Mark Simos and David Weston as they talk about Zero Trust—what it is and how to effectively implement it.

Theresa Payton and Bret Arsenault seated at a counter in a professional studio setting with CISO Spotlight Series and CISO city image in background.

Episode 2.2

Episode 2: Security is Everyone’s Business Part 2

Join host Theresa Payton and Microsoft CISO Bret Arsenault on how to talk to the board of directors about a cybersecurity incident. Learn about the TSR for executives and how this can help you.

Theresa Payton and Bret Arsenault seated at a counter in a professional studio setting with CISO Spotlight Series and CISO city image in background.

Episode 2.1

Episode 2: Security is Everyone’s Business part 1

Join host Theresa Payton and Microsoft CISO Bret Arsenault, and learn how to engage with the board of directors. Plus, discover the four primary objectives any CISO needs to focus on.

Theresa Payton, Diana Kelley, and Ken Malcolmson seated at a counter in a professional studio setting with CISO Spotlight Series and CISO city image in background.

Episode 1

Episode 1: CISO Lessons Learned

Join host Theresa Payton and security experts Diana Kelley and Ken Malcolmson as they talk about CISO lessons learned and the action CISOs should take now.

Podcasts: Afternoon Cyber Tea with Ann Johnson

Logo for Podcast Afternoon Cyber Tea with Ann Johnson

Social Engineering: The Human Threat to Cybersecurity

Ann and Rachel delve into the neuroscience behind social engineering, the entry points social media offers, how fear and urgency factor in, and the similarities between improv and vishing.

Logo for Podcast Afternoon Cyber Tea with Ann Johnson

The State of Cybersecurity: How Did We Get Here? What Does It Mean?

Join host Ann Johnson and global security strategist Marc Goodman as they discuss how authorities and experts at local, national, and global levels defend against cyberthreats.

Logo for Podcast Afternoon Cyber Tea with Ann Johnson

From Threat Intelligence to Chatbots: A Look at AI in Cybersecurity

Listen as Ann chats with CISO advisor, author, speaker, and champion for women in cybersecurity Jane Frankland.

Logo for Podcast Afternoon Cyber Tea with Ann Johnson

Building Operational Resilience in a Digital World

Join Ann as she discusses how CISOs can prepare for a cyberattack with Kubernetes container and cloud infrastructure specialist Ian Coldwater.

Logo for Podcast Afternoon Cyber Tea with Ann Johnson

Cybersecurity and IoT: New Risks and How to Minimize Them

Learn from cybersecurity expert Dr. Andrea Little Limbago about how IoT can empower businesses to enrich and leverage AI, machine learning, and automation to achieve their goals.

Logo for Podcast Afternoon Cyber Tea with Ann Johnson

Peak, Plateau, or Plummet? Cyber Trends That Are Here to Stay…and Fading Away

Listen as cybersecurity thought leader Kevin Beaumont trades insights with Ann on how organizations can examine the dynamics of an attack and effectively prevent or recover from one.

Logo for Podcast Afternoon Cyber Tea with Ann Johnson

Thoughts from the Edge: Leveraging a Hacker Mindset

Hear Ann and security expert Chris Wysopal talk about how cybercriminals monetize attacks, the rise of attacks by nation states, and what hacktivists are up to these days.

Microsoft is an industry leader

See why industry analysts and other security experts have recognized Microsoft as a leader.

CISO series blog

Security, compliance, and business topics help CISOs keep their organization, employees, and customers safe.

Additional resources

CISO online workshop

Five one-hour modules of security learnings, principles, best practices, and recommendations.

Analyst review 2019

Ovum recommends Microsoft security to safeguard your hybrid cloud and multiple cloud environments.

CSO online podcast

Listen in as Bob Bragdon, Senior Vice President and Founding Publisher of CSO, interviews tech leaders in security from across the nation.

Follow Microsoft