“AI Meets Security” is a deep-dive conversation between Mirko Peters and Microsoft Senior Product Manager Danilo Nogueira about how AI is reshaping enterprise security, governance, and compliance. The episode explains that the biggest challenge with Microsoft Copilot and AI adoption is not the technology itself, but the hidden weaknesses already existing inside many Microsoft 365 environments.

Danilo highlights that oversharing in SharePoint, weak permissions, poor governance, and missing classification policies become far more dangerous once AI can instantly surface information through natural language prompts. Organizations often believe they are “AI ready” because they purchased licenses, but true readiness requires understanding data access, governance structures, and organizational behavior.

A major focus is Microsoft Purview, which Danilo compares to a “baby monitor” for enterprise data. Instead of blocking everything, modern security should focus on monitoring, visibility, automation, and intelligent risk detection. The discussion covers Insider Risk Management, Data Loss Prevention, compliance automation, and AI-driven security workflows that help organizations detect suspicious behavior, risky data movement, and abnormal user activity faster.

The episode also explores the future of AI agents and automation in security operations. Rather than replacing security teams, AI will help prioritize alerts, investigate incidents, and recommend remediation actions at scale.

One of the key takeaways is that organizations must build a real AI culture with clear governance rules, acceptable usage policies, and responsible access management. AI does not create security problems — it exposes the ones already hidden in the environment.

Apple Podcasts podcast player iconSpotify podcast player iconYoutube Music podcast player iconSpreaker podcast player iconPodchaser podcast player iconAmazon Music podcast player icon

You see ai meets security transform digital defense in 2026. Every day, ai brings new opportunities and challenges to your workplace. You may worry about how ai could increase security risk or make it harder to protect your data. The State of AI Security 2026 report shows that most organizations want to use agentic ai, but only a few feel ready to manage risk and secure their systems.

The State of AI Security 2026 report highlights the evolving threat landscape of ai security, emphasizing the rapid adoption of ai technologies and the corresponding challenges faced by digital defense mechanisms. It discusses significant risk associated with ai vulnerabilities and the complexities introduced by agentic ai, indicating a need for a fundamental shift in how organizations approach digital security.

You must focus on responsible ai adoption. Events like the AI Security Summit and solutions such as Microsoft Purview show you how ai meets security in real time. You learn that ai meets security not through blocking, but by using monitoring and intelligent automation to manage risk. As ai meets security, you gain tools to spot risk, protect your data, and respond faster than ever.

  • 83% of organizations planned to deploy agentic ai capabilities.
  • Only 29% felt ready to leverage these technologies securely.

You need new ways to address risk. When ai meets security, you take control of your digital defense.

Key Takeaways

  • AI is transforming cybersecurity by enabling real-time threat detection and response.
  • Organizations must adopt responsible AI practices to manage risks effectively.
  • Self-learning systems enhance threat detection by adapting to new threats automatically.
  • Predictive analytics help forecast attack patterns, allowing proactive defense measures.
  • User behavior analytics personalize security controls, improving protection against insider threats.
  • AI-driven tools like Microsoft Purview streamline compliance and data protection efforts.
  • Automation reduces alert fatigue, allowing security teams to focus on high-priority tasks.
  • Investing in AI security solutions is essential for staying ahead of evolving cyber threats.

AI Security Trends 2026

AI Security Trends 2026

You see ai in cybersecurity change how you protect your digital world. In 2026, you rely on ai to spot threats, predict attacks, and personalize security controls. You learn about new trends at events like the AI Security Summit, the AIMS retreat, and from Cisco's State of AI Security Report. These trends show you how ai in cybersecurity brings innovation and transforms your defense.

Autonomous Threat Detection

Self-Learning Systems

You use self-learning systems to improve threat detection. These systems learn from every event and adapt to new threats. You do not need to update rules manually. Ai in cybersecurity helps you build smarter defenses. You see ai-driven threat detection replace old workflows. Ai becomes the backbone of your security. You trust ai to analyze millions of data packets every second. You get faster and more accurate results than traditional methods.

Real-Time Adaptation

You benefit from real-time adaptation. Ai in cybersecurity lets you respond to threats instantly. You do not wait for human analysts to act. Ai systems execute the detection-to-response lifecycle. You see ai-driven defense use deep learning and behavioral analytics. You detect complex threats like ai-generated malware. You use event correlation and risk assessment to build insights. You make better decisions and respond quickly.

You gain instant mitigation with ai in cybersecurity. Ai integrates with your security tools and acts even when your SOC analysts are busy.

Advancement TypeDescription
AI-driven threat detectionAI becomes the backbone of threat detection, replacing reactive workflows with autonomous systems.
Detection-to-response lifecycleAI systems can execute the entire lifecycle, enhancing real-time protection and reducing detection windows.
Advanced detection fabricUtilizes deep learning and behavioral analytics to detect complex threats like AI-generated malware.
Event correlation and risk assessmentCorrelates billions of events to build comprehensive insights, improving decision-making and response.
Instant mitigationEnables immediate action even without SOC analysts, integrating with various security tools.

Recent studies show that ai-driven threat detection systems outperform traditional security solutions. You see faster response times and fewer false positives. You avoid financial losses from delayed detection. Ai in cybersecurity adapts to new threats and keeps your defenses strong.

Predictive Analytics in Cybersecurity

Attack Pattern Forecasting

You use predictive analytics to forecast attack patterns. Ai in cybersecurity analyzes global threat data. You predict trends like cryptocurrency mining malware campaigns. You see ai in cybersecurity help you anticipate attacks before they happen. You rely on threat intelligence to stay ahead.

  • Threat Intelligence: Predictive models analyze global threat data to forecast emerging attack trends.
  • User Behavior Analytics: You establish baselines of normal user behavior. You detect insider threats 30% faster.
  • Network Security: Predictive analytics forecasts network traffic patterns. You identify potential DDoS attacks or breaches early.
  • Vulnerability Management: You analyze historical data. You prioritize patch management and forecast which vulnerabilities are likely to be exploited.

A system developed by Los Alamos National Laboratory can identify potential cyber attacks up to two weeks in advance with over 90% accuracy. You see ai in cybersecurity give you time to prepare and protect your assets.

Proactive Risk Mitigation

You use ai in cybersecurity to mitigate risks proactively. You do not wait for threats to cause damage. Ai-driven defense helps you assess risks and take action. You use continuous monitoring to spot vulnerabilities. You prioritize patching and strengthen your security posture. You rely on ai in cybersecurity to keep your systems safe.

Personalized Security Controls

User Behavior Analytics

You use user behavior analytics to personalize security controls. Ai in cybersecurity tracks how you use your devices and data. You spot unusual activity and prevent insider threats. You build baselines and detect anomalies quickly. You see ai in cybersecurity help you respond to risks faster.

Adaptive Access Management

You use adaptive access management to control who can access your data. Ai in cybersecurity adjusts permissions based on user behavior. You protect sensitive information and reduce the risk of data leaks. You see ai in cybersecurity make access decisions smarter and more flexible.

Microsoft Purview stands out as a leading example of ai-driven security and governance. You use Purview to classify and protect sensitive data, assess risks, and ensure compliance. You get end-to-end protection from identity to data, devices, and cloud. You rely on ai-driven defense to unify your tools and teams for faster response. You build trust, resilience, and efficiency in your organization.

You see the shift from traditional blocking to monitoring and intelligent automation. You use ai in cybersecurity to gain visibility, automate compliance, and respond to threats. You build a stronger defense and protect your digital assets.

AI Meets Security: Practical Applications

Real-Time Threat Detection

Network Intrusion Prevention

You rely on ai to strengthen your cybersecurity and protect your network from threats. Real-time threat detection lets you spot attacker behaviors as they happen. You use ai-driven threat detection to monitor traffic across your network, identity, and cloud environments. You see attackers try to bypass traditional security, but ai adapts and learns from every event.

Application NameKey FeaturesLimitations
AI-driven threat detectionDetects attacker behaviors in real time across various environments, including network and cloud.Detection precision requires improvement; limited data aggregation capabilities; integration gaps.
AccuKnox CDRContinuous monitoring, AI-powered detection, and automated response for cloud environments.Steep learning curve; complex setup; high cost; customer support delays.
Darktrace DETECTSelf-learning AI that identifies unknown threats and provides enterprise-wide coverage.High alert volume requiring tuning; complex initial setup; steep learning curve; high total cost.

You use ai-powered tools like AccuKnox CDR and Darktrace DETECT to gain enterprise-wide coverage. These tools offer continuous monitoring and automated response, helping you reduce dwell time and limit damage. You see ai in cybersecurity transform your approach, making threat detection faster and more accurate.

Cloud Anomaly Detection

You protect your cloud environments with ai-powered anomaly detection. Ai analyzes billions of events and identifies unusual patterns that signal threats. You use ai to spot risky behaviors, such as unauthorized access or data exfiltration. You rely on automated response to contain threats before they spread.

Ai in cybersecurity gives you visibility across multi-cloud workloads. You detect unknown threats without relying on predefined rules. You build a stronger defense by combining real-time threat detection and anomaly detection.

Microsoft Purview helps you manage risks in the cloud. You use Purview to identify and classify sensitive data, apply encryption, and monitor risky sharing behaviors. You prevent oversharing with ai tools like Copilot by enforcing access controls and compliance policies. Purview provides insights into insider risk, allowing you to take proactive measures.

Endpoint Security Innovations

Malware Analysis with AI

You use ai-powered tools to analyze malware and protect your endpoints. Ai in cybersecurity shifts from signature-based detection to behavioral analysis and machine learning. You catch novel threats that traditional security misses. You respond to malware incidents in milliseconds, not hours or days.

AspectTraditional SecurityAI-Powered Security
Detection MethodSignature-basedBehavioral analysis & ML
Response TimeHours to daysMilliseconds
False Positives40-90% of alerts5-10% of alerts
Staffing Requirements24/7 human monitoringAutomated with human oversight
Cost ImplicationsHigh labor costsReduced operational expenses

You reduce false positives and alert fatigue. Ai in cybersecurity automation lets you focus on genuine threats. You lower operational expenses and improve your security posture.

Device Isolation Automation

You use ai to automate device isolation when threats are detected. Ai-powered tools identify compromised devices and remove them from the network instantly. You prevent malware from spreading and protect your data. You rely on automated response to contain incidents and minimize impact.

Ai in cybersecurity empowers you to act quickly. You do not wait for manual intervention. You use response planning to ensure every device stays secure.

Incident Response Automation

Intelligent Playbooks

You use ai to automate incident response and streamline investigations. Intelligent playbooks guide you through response planning and remediation. Ai enriches alerts with contextual data, helping you prioritize significant threats. You reduce investigation times and lower alert fatigue.

Rapid Remediation

You see ai-powered incident response reduce breach response times dramatically. You use cybersecurity automation to resolve incidents faster and limit damage. Case studies show that organizations like Eye Security and Western Governors University improved their dwell time and mean time to resolution.

Bar chart showing dwell time reduction percentages for three incident response automation case studies

You use ai in cybersecurity to automate alert prioritization. Automation enriches alerts with contextual data, allowing you to focus on significant threats. Surveys show that ai automation leads to a 25-50% reduction in investigation time for most organizations.

Ai meets security by empowering you to respond faster, investigate smarter, and protect your organization from evolving threats.

Phishing and Ransomware Defense

Phishing and ransomware attacks continue to threaten your digital safety in 2026. Attackers use advanced tactics to trick you and your team into sharing sensitive information or downloading harmful files. You need smarter tools to spot these threats before they cause damage. AI-powered solutions now give you the upper hand.

NLP for Email Analysis

Natural Language Processing (NLP) helps you analyze emails and messages for signs of phishing. You use AI to read and understand the language in every message. NLP models look for suspicious patterns, such as fake sender addresses, urgent requests, or unusual links. These models learn from millions of real-world phishing attempts.

Tip: You can train NLP models to recognize the latest phishing tricks. This keeps your defenses up to date.

With Microsoft Purview, you gain advanced email scanning powered by AI. Purview uses NLP to flag risky emails and alert you to possible threats. You see which messages contain sensitive data or suspicious attachments. You can set rules to block or quarantine dangerous emails automatically.

Key Benefits of NLP for Email Analysis:

  • Detects phishing emails with high accuracy
  • Flags suspicious links and attachments
  • Reduces the risk of human error
  • Automates email review and response
FeatureTraditional Email SecurityAI-Powered NLP Email Analysis
Keyword Matching
Context Understanding
Adaptive Learning
Real-Time Alerts⚠️

You rely on NLP to protect your inbox and keep your organization safe from phishing attacks.

Early Detection Algorithms

Early detection algorithms help you stop ransomware before it spreads. You use AI to monitor your systems for unusual activity. These algorithms look for signs like rapid file encryption, strange network traffic, or unauthorized access attempts. When AI spots a threat, it acts fast.

You can set up automated responses to isolate infected devices or block suspicious processes. Microsoft Purview supports these actions by monitoring user behavior and flagging risky activities. You get alerts when someone tries to access sensitive files or share confidential data outside your organization.

Note: Early detection gives you time to respond. You can stop ransomware before it locks your data or demands payment.

How Early Detection Algorithms Work:

  1. Monitor user and system activity in real time
  2. Identify patterns linked to ransomware or phishing
  3. Trigger alerts and automated responses
  4. Help you investigate and contain threats quickly

You see fewer successful attacks when you use AI-driven early detection. You protect your data, your reputation, and your business operations.

Summary Table: AI vs. Traditional Defense

Defense AspectTraditional ApproachAI-Driven Approach
Detection SpeedSlowInstant
AccuracyModerateHigh
AutomationLimitedExtensive
Response TimeManualAutomated

You build a stronger defense against phishing and ransomware by combining NLP for email analysis and early detection algorithms. Microsoft Purview helps you stay ahead of attackers and keep your digital world secure.

Human-AI Partnership in Cybersecurity

Human-AI Partnership in Cybersecurity

Augmenting Security Teams

AI as Analyst Assistant

You see ai transform your security team. Ai acts as an analyst assistant, helping you detect threats faster and manage risk more effectively. Ai agents handle unlimited alert volume, so you do not miss critical incidents. You focus on complex investigations while ai automates routine tasks. Organizations report that ai reduces breach detection time by 80 days. You save up to 7 analyst hours each day. Ai tools automate compliance documentation, making your workflow more efficient.

MetricWithout AIWith AI (Extensive)
Average breach cost$5.52M$3.62M
Breach lifecycle321 days241 days
Alert coverage gap40%Majority auto-triaged
Analyst workload reductionBaselineUp to 80%
Daily analyst time savedBaseline6-7 hours
  • Ai agents handle unlimited alert volume without slowing down.
  • You focus on high-value tasks, reducing burnout and improving retention.
  • Ai automates compliance documentation, saving significant time.

Reducing Alert Fatigue

You use ai in cybersecurity to reduce alert fatigue. Ai triages alerts, so you spend less time on false positives. You see mean time to detect threats drop to minutes. Ai collapses multiple alerts into single cases, making your investigations easier. You spend less than 10 minutes per incident. Automation helps you focus on tier 2 investigations, increasing your impact. Attrition rates drop as ai reduces stress and workload.

MetricWhat It MeasuresTarget Benchmark
Mean Time to Detect (MTTD)Speed from threat to alertMinutes with automation
Mean Time to Respond (MTTR)Speed from alert to containmentUnder 30 minutes
False positive rate% of benign alertsUnder 20%
Alert-to-case ratioAlerts collapsed into one case10:1 or better
Analyst triage timeMinutes per alertUnder 10 minutes
Analyst utilization% on high-value work60% or above
Attrition rateAnalyst turnoverReduced with automation

Ethical and Transparent AI

Addressing Bias

You trust ai in cybersecurity when you see transparency and fairness. You address bias by conducting audits on training data and model outputs. You use tools like Fairness Indicators to check for unexpected results. You apply bias-correction techniques during model training. You draft clear guidelines for ethical data handling and model development. You use access controls and encryption to protect sensitive information.

Source of BiasMitigation Strategy
Unexpected outputs from AI modelsBias audits and fairness tools
Data poisoningRe-weighting and re-sampling during training
User input influenceEthical guidelines for data collection and modeling
  • You draft internal guidelines for ethical ai use.
  • You promote transparency by sharing these guidelines with your team.

Ensuring Accountability

You ensure accountability by following compliance frameworks. You use the EU AI Act for mandatory regulation in the EU. You follow ISO/IEC 42001 as a global standard for ai governance. You use NIST AI RMF to manage ai risks. These frameworks help you build trust and maintain transparency in your security perspective.

FrameworkTypeScope and Enforcement
EU AI ActRegulationMandatory for AI use in the EU
ISO/IEC 42001StandardVoluntary global standard for internal AI governance
NIST AI RMFFrameworkGuidelines for managing AI risks

Upskilling for AI Security

Training for AI Tools

You upskill your security team to use ai-powered tools. You strengthen training so everyone knows how to use ai in cybersecurity. You foster a culture of continuous learning. You invest in human strengths like judgment and creativity. You build trust by preparing your team to manage ai responsibly.

StrategyDescription
Strengthening trainingEnsure all team members know how to use ai tools
Continuous learningEncourage ongoing education and adaptation
Investing in human strengthsFocus on judgment, creativity, and experience

New Security Roles

You see new security roles emerge as ai changes cybersecurity. You need fluency in ai-driven threats, secure system design, and policy leadership. You look for specialists who understand ai tools and can apply them in incident response and governance.

New Security RolesIn-Demand Skills
AI-driven Threat AnalystFluency in ai-driven threats
Secure System DesignerSecure system design
Policy LeaderPolicy leadership
Incident Response SpecialistApplication of ai tools in cybersecurity
Governance SpecialistUnderstanding ai tools

You build trust and resilience by upskilling your team and adopting ethical, transparent ai practices. You prepare for the future of cybersecurity by embracing new roles and continuous learning.

Risk and Impact for Organizations & Individuals

Security Transformation

Strategy Shifts

You see organizations transform their cybersecurity strategies as ai becomes central to digital defense. You must move from reactive to proactive security. You use frameworks like NIST AI Risk Management to identify risks and set controls. You create clear accountability, making CISOs responsible for security governance. You build centralized access frameworks that unify controls across cloud and network security environments. You adopt layered defenses to protect against emerging risks and adapt to new cyber threat intelligence.

  • You implement continuous monitoring and behavioral detection.
  • You safeguard legacy systems and secure cloud environments.
  • You integrate ai governance frameworks for responsible deployment.

Organizations using ai detection services reduce low-value alerts by 45% and increase high-priority threat identification by 79%. You see how ai improves vulnerability management and helps you focus on real threats.

Investment in AI Solutions

You invest more in ai security solutions every year. The ai security market was valued at over $20 billion in 2023 and is expected to reach $141 billion by 2032. You see a 24% annual growth rate. You prioritize tools that support cyber threat intelligence, vulnerability management, and third-party risk management. You choose platforms like Microsoft Purview to map controls to data assets and monitor sensitive content. You use access controls and audit logs to protect data and ensure ethical practices.

Managing AI Risks

Adversarial AI

You face new risks from adversarial ai in cybersecurity. Attackers try to manipulate models or exploit weak authentication. You must defend against input manipulation, model poisoning, and transfer learning attacks. You use strong authentication, input validation, and regular audits to manage these threats.

Risk TypeDescriptionMitigation Strategies
Unauthorized AccessGaining access to ai systems through weak controlsStrong authentication and access controls
Input ManipulationPoisoning model behavior with altered dataInput validation and anomaly detection
Model PoisoningModifying model parameters for hidden backdoorsRegular audits and adversarial testing
Transfer Learning AttacksIntroducing bias in pre-trained modelsRobust testing and validation
Membership Inference AttacksPrivacy risks from training data exposureDifferential privacy and data access audits

You implement comprehensive data validation and enhance model security. You conduct regular security audits to identify vulnerabilities.

Data Privacy Concerns

You must address data privacy concerns as you use ai-driven cybersecurity tools. Sensitive data exposure can happen when employees interact with ai. Data poisoning and cloud misconfigurations also pose risks. You use data validation, differential privacy, and strong access controls to protect information. You conduct regular audits to ensure compliance.

Data Privacy ConcernDescription
Sensitive Data ExposureLeaks from employee prompts to ai tools
Data PoisoningCorrupted training datasets causing bias
Cloud MisconfigurationsUnauthorized access from setup errors

You rely on Microsoft Purview for compliance management, data classification, and policy enforcement. You align risk management with human values and legal standards.

Empowering Users

AI-Enhanced Security Tools

You empower yourself with ai-enhanced security tools. These tools use machine learning to detect advanced threats like file-less malware and zero-day attacks. You scan systems for vulnerabilities and prioritize repairs. You automate responses to cyberattacks, improving overall cybersecurity efficiency.

  • You identify patterns and anomalies in large data sets.
  • You use ai for real-time threat detection and vulnerability management.
  • You strengthen your network security posture.

Building Digital Resilience

You build digital resilience by integrating ai-powered security solutions into daily operations. You use real-time threat monitoring, endpoint detection, and advanced analytics. You automate incident response to reduce human error and ensure operational continuity during disruptions.

  1. Real-time threat monitoring through SIEM systems
  2. Proactive defense with endpoint detection and response
  3. Advanced analytics and ai for threat detection
  4. Automation for faster incident response
  5. Strengthening compliance and audit readiness

You use Microsoft Purview to monitor sensitive content and enforce compliance. You stay prepared for breaches and adapt to new threats. You create a resilient organization that can withstand cyberattacks and protect individuals.

Tip: Stay informed about cyber threat intelligence and invest in continuous vulnerability management to keep your defenses strong.


You see ai reshape cybersecurity and security in 2026. You gain smarter, adaptive defenses that protect your digital assets. You rely on ai for continuous monitoring, behavioral detection, and risk-based vulnerability management. You build trust by adopting responsible ai strategies and robust governance. You use ai to safeguard legacy infrastructure and cloud environments. You ensure privacy, transparency, and accountability in every security process.

You empower your team with ai-powered cybersecurity tools like Microsoft Purview. You maintain compliance and ethical standards. You prepare for evolving threats by following these steps:

  1. Use high-quality training data for ai models.
  2. Maintain human oversight in cybersecurity operations.
  3. Update ai models regularly.
  4. Test ai systems continuously.
  5. Integrate ai across your security stack.
  6. Establish clear governance policies.
Key Areas of FocusDescription
Privacy and Data ProtectionYou safeguard sensitive information and comply with regulations.
SecurityYou mitigate cybersecurity threats and vulnerabilities.
Bias and FairnessYou ensure ai-driven decisions are impartial.
Transparency and AccountabilityYou establish clear ai decision-making processes.
Safety and ResiliencyYou enhance ai system reliability for business continuity.

You build digital resilience and stay ready for the future of cybersecurity.

FAQ

What is agentic ai in cybersecurity?

Agentic ai refers to systems that act independently to detect and respond to threats. You see these tools make decisions without waiting for human input. They help you protect your digital assets faster.

How does Microsoft Purview help prevent data leaks?

You use Microsoft Purview to monitor data access and classify sensitive information. Purview alerts you when someone tries to share confidential files. You set rules to block risky actions and keep your data safe.

Can ai detect insider threats?

Yes. Ai analyzes user behavior and flags unusual activity. You spot potential insider threats early. Ai helps you investigate and respond before damage happens.

What are the benefits of automating incident response?

You save time by automating incident response. Ai-driven playbooks guide you through each step. You resolve security issues quickly and reduce the impact on your business.

How do you stay compliant with ai-powered security tools?

You follow regulations like the EU AI Act and ISO/IEC 42001. Microsoft Purview helps you enforce policies and track compliance. You use audit logs to show you meet legal standards.

What should you do if you suspect a phishing attack?

You check the sender’s address and look for suspicious links. Ai tools scan emails for threats. You report the message to your IT team and avoid clicking unknown attachments.

How can you build digital resilience with ai?

You use ai for real-time monitoring and automated responses. You strengthen your defenses and recover quickly from cyberattacks. You keep your systems running and protect your organization.

Tip: Stay updated on new ai security features. Regular training helps you use these tools effectively.

🚀 Want to be part of m365.fm?

Then stop just listening… and start showing up.

👉 Connect with me on LinkedIn and let’s make something happen:

  • 🎙️ Be a podcast guest and share your story
  • 🎧 Host your own episode (yes, seriously)
  • 💡 Pitch topics the community actually wants to hear
  • 🌍 Build your personal brand in the Microsoft 365 space

This isn’t just a podcast — it’s a platform for people who take action.

🔥 Most people wait. The best ones don’t.

👉 Connect with me on LinkedIn and send me a message:
"I want in"

Let’s build something awesome 👊

1
00:00:00,000 --> 00:00:08,000
Yeah, welcome to another episode of the MC65 of M podcast today's conversion sides

2
00:00:08,000 --> 00:00:14,160
rights at the intersection of two of the most important topics that take right now are

3
00:00:14,160 --> 00:00:21,560
the factor intelligence and security joining us is Daniela Nuguiara.

4
00:00:21,560 --> 00:00:29,800
I think I hope I promote this right but I think a lot of almost no Gada almost.

5
00:00:29,800 --> 00:00:37,800
Yeah, I think a lot of people watching this show to pronounce me the right names wrong.

6
00:00:37,800 --> 00:00:42,160
Yeah, this is our net in Portuguese.

7
00:00:42,160 --> 00:00:45,080
Oh, in Portuguese.

8
00:00:45,080 --> 00:00:46,920
Yeah.

9
00:00:46,920 --> 00:00:53,440
Daniela is senior product manager at Microsoft focused on Microsoft PUE, insider risk data security

10
00:00:53,440 --> 00:00:56,280
and I had a security experience.

11
00:00:56,280 --> 00:01:01,760
Daniel also brings more than two decades of experience across productivity compliance

12
00:01:01,760 --> 00:01:04,480
architecture enterprise transformation.

13
00:01:04,480 --> 00:01:12,280
He also has a long time certificate for my NDP because he is at Microsoft actually.

14
00:01:12,280 --> 00:01:19,640
So I think you're moving this title and one of the voices help organization understand

15
00:01:19,640 --> 00:01:23,280
and how to adapt security responsibility.

16
00:01:23,280 --> 00:01:30,120
Yeah, today we will explore how AI changes security, what organizations are getting wrong about

17
00:01:30,120 --> 00:01:37,840
co-pilot readiness and the future of insider risk and what secure AI really looks like.

18
00:01:37,840 --> 00:01:41,200
Daniela, welcome to the show.

19
00:01:41,200 --> 00:01:50,200
Very welcome and thank you very much for for the invite for this podcast pleasure for me

20
00:01:50,200 --> 00:01:51,720
being here.

21
00:01:51,720 --> 00:02:03,680
And let's go let's talk about M2 65 security co-pilot AI and let's go talk about I think the

22
00:02:03,680 --> 00:02:13,640
subject is most say the in talk it in the world AI always AI and the impact in the security

23
00:02:13,640 --> 00:02:17,120
companies, the security in the companies.

24
00:02:17,120 --> 00:02:22,000
I think he's very proud to be here.

25
00:02:22,000 --> 00:02:23,240
Thank you.

26
00:02:23,240 --> 00:02:29,400
And yeah, I will before we deep dive into the traffic, I will a little bit to learn about

27
00:02:29,400 --> 00:02:30,880
you.

28
00:02:30,880 --> 00:02:35,880
You work across productivity security compliance and AI.

29
00:02:35,880 --> 00:02:38,520
What pulled you into this space?

30
00:02:38,520 --> 00:02:39,520
Okay.

31
00:02:39,520 --> 00:02:46,840
I work it in the I'm also I mean, I mean, always modern work guy always.

32
00:02:46,840 --> 00:02:49,560
I love about productivity.

33
00:02:49,560 --> 00:02:59,000
I work in Microsoft partner, managed partner about think five years and always talking

34
00:02:59,000 --> 00:03:10,560
about share point teams, productivity, all the solutions inside Microsoft 365 that resolve

35
00:03:10,560 --> 00:03:15,480
the productivity problems of the people always.

36
00:03:15,480 --> 00:03:23,080
But in this partner college, Claude targets is a is a very familiar partner right in Brazil.

37
00:03:23,080 --> 00:03:32,520
The partner, the this partner, I started there for I think when we was maybe I think 11

38
00:03:32,520 --> 00:03:39,480
people at the company today, I think that more than 100 is a very at the beginning in Microsoft

39
00:03:39,480 --> 00:03:49,840
to tell us that you go back go to the secret side of the technology, the invest in the in

40
00:03:49,840 --> 00:03:57,120
the security Microsoft security and call target investing in the security in I'm trying to

41
00:03:57,120 --> 00:04:05,020
understand the security environment, the security platform, the products that involved in the

42
00:04:05,020 --> 00:04:07,620
Microsoft ecosystem.

43
00:04:07,620 --> 00:04:18,340
And I studied a lot, defender in tune, per view, and I begin to teach customers and doing workshops

44
00:04:18,340 --> 00:04:26,700
to the customers about Microsoft security about Sentinel, about per view, about how can customers

45
00:04:26,700 --> 00:04:33,140
can track the information in the data leaks in your company.

46
00:04:33,140 --> 00:04:44,620
This is so useful to me because I learn a lot of how security in companies works and I

47
00:04:44,620 --> 00:04:54,100
am a I'm a steady addicted to someone like that because I study a lot of think I when I when

48
00:04:54,100 --> 00:05:01,940
for example when AI serves and become to the world comes to the world, I oh my god, this

49
00:05:01,940 --> 00:05:11,900
is changed the world and I let's bring let's big together productivity security in AI in

50
00:05:11,900 --> 00:05:21,060
I hope okay, this is could be very useful for our companies, how can I transform the people,

51
00:05:21,060 --> 00:05:30,060
how the people works and the productivity and as I think that I always said to the customers

52
00:05:30,060 --> 00:05:40,300
in the call targets, the balance is a fundamental is a fundamental thing that you have in your

53
00:05:40,300 --> 00:05:51,420
company, the balance between productivity and security, you never could ever make a environment

54
00:05:51,420 --> 00:05:59,500
so much secure, but you never in you forget about the productivity, but you knew take a

55
00:05:59,500 --> 00:06:05,500
environment all with all the productivity deal, maybe don't care about the security, the

56
00:06:05,500 --> 00:06:14,860
balance I think is the secret and when I teach or teach customers and learn about the

57
00:06:14,860 --> 00:06:24,220
environment, the per view I loved the subject, I love the platform and I studied a lot of

58
00:06:24,220 --> 00:06:35,660
the technology and this is was for me is a beginning of our journey and I just come to Microsoft,

59
00:06:35,660 --> 00:06:43,660
I'm very new at Microsoft only five months, I started the beginning of this year in the

60
00:06:44,620 --> 00:06:55,740
per view team as senior product manager and I now I see how everything works, the step-by-step

61
00:06:55,740 --> 00:07:07,260
of feature requests or a question and a feature request by a customer how works, how the product

62
00:07:10,860 --> 00:07:22,380
increase the productivity and increase the value for the customer is a lovable journey and I

63
00:07:22,380 --> 00:07:30,300
I'm very happy with this opportunity to engage customers, to talk with the customers about

64
00:07:30,300 --> 00:07:37,180
the per view solution especially in my team, I'm a specialist in the inside the risk management

65
00:07:37,180 --> 00:07:46,220
that the tool that monitor the behavior of the users and for example for when the

66
00:07:46,220 --> 00:07:54,940
who know for example user leaves a company or maybe the users do the big downloads from share

67
00:07:54,940 --> 00:08:03,260
points and an excessive like a exploration that is the name for the so many files in the

68
00:08:03,260 --> 00:08:13,820
environment I think this is a very useful for the users for the companies because in the times of AI,

69
00:08:13,820 --> 00:08:22,220
often artificial intelligence so many users are discovering data and the companies have

70
00:08:22,220 --> 00:08:32,060
have make make ways to block this not block but monitoring these activities in

71
00:08:33,020 --> 00:08:44,140
and avoid data which will go out of the company this is a very important concern that we have

72
00:08:44,140 --> 00:08:51,740
in the in the companies today I think the per view is the is a fundamental platform for for customers.

73
00:08:51,740 --> 00:09:01,180
Before we did that one question you have been both deeply technical and also customer

74
00:09:01,180 --> 00:09:05,660
financing how is it shaping your perspective?

75
00:09:05,660 --> 00:09:20,700
I think that at my previous company we always talk about we all in the company are sellers.

76
00:09:20,700 --> 00:09:30,860
I believe a lot in on it but I'm technical I'm a very developing guy

77
00:09:30,860 --> 00:09:38,940
but I make a code but when make a code and you deliver to the customer you have to sell your opinion,

78
00:09:38,940 --> 00:09:52,060
your code, your programming, what you're developing and I think that we always be sellers in your

79
00:09:52,060 --> 00:10:00,300
entire life in your always that we company that we work and I have a balance at I think

80
00:10:00,780 --> 00:10:10,700
maybe 15 years ago a manager that I have had in the past in the company that I work at in the

81
00:10:10,700 --> 00:10:17,100
in Curitiba told me that the Nilo you are a press sales guy but I'm just farming in the

82
00:10:17,100 --> 00:10:29,340
in McKinsey in size computing in computer science oh my god sales and I only heard the the the

83
00:10:29,340 --> 00:10:37,260
word sales no sales I'm a technical guy this is offensive for me sales not I don't know I

84
00:10:37,260 --> 00:10:44,780
I can't imagine that I studied a lot of four or five ten ten years to you called me a sales

85
00:10:44,780 --> 00:10:52,940
person forget it about it but Nilo wait a minute let's let's let me explain what a pre sales guy

86
00:10:53,660 --> 00:11:04,460
does in he explained me and I'm discovered my my my my talent how can I say that because I'm just

87
00:11:04,460 --> 00:11:13,100
talk a lot of customers and talk a lot of technical guys to make the the right solutions for

88
00:11:13,100 --> 00:11:22,380
the customers I think this is a the very good skills skill that we have we have I have

89
00:11:22,940 --> 00:11:27,260
to to offer to the customer to the companies I think is a very very good

90
00:11:27,260 --> 00:11:35,020
yeah first I will say congrats to the job at Microsoft and you are on the very much you

91
00:11:35,020 --> 00:11:45,420
I started a little bit critical as I the first time I touched P.U. view it's was Microsoft only

92
00:11:46,460 --> 00:11:56,700
and what did you think how has and the last years months what I have changed in how develop

93
00:11:56,700 --> 00:12:10,460
P.U. view from your perspective AI AI changes everything because in the past we always think in

94
00:12:10,460 --> 00:12:23,180
block things the proxy servers the we always control the what the users view access and block sites

95
00:12:23,180 --> 00:12:36,940
like YouTube or Facebook or another social media sites to to users don't access but nowadays we see

96
00:12:39,740 --> 00:12:46,700
the world is changing to not blocking but control but monitoring is the best word

97
00:12:46,700 --> 00:13:00,780
monitoring the environment and P.U. view has totally packed in this in this in this environment because

98
00:13:00,780 --> 00:13:10,300
P.U. view does the the monitoring of what the users are doing or investigates what the user

99
00:13:10,300 --> 00:13:20,860
are doing or maybe for a data leak that I want to discover who's who's go out with this information

100
00:13:20,860 --> 00:13:28,140
I can discover with it's covery with the new product that we have in the in the in the fall now

101
00:13:28,140 --> 00:13:35,580
the data security investigation is a new product inside the purview that we have the SI

102
00:13:35,580 --> 00:13:43,660
and to do investigations in environments and with the documents with passwords and the users

103
00:13:43,660 --> 00:13:52,940
and AI change everything in this platform because now the companies wants to discover what's the

104
00:13:52,940 --> 00:14:04,060
user are trying to ask today AI the purview have have a like a very important

105
00:14:04,060 --> 00:14:14,780
important how can I say her role in this in this in this in this environment in this in the

106
00:14:14,780 --> 00:14:23,580
in the all the the computer in the in the companies I believe in in this awesome especially we only

107
00:14:23,580 --> 00:14:31,980
think about AI and security now I think nearly every company wants AI right now do you think

108
00:14:31,980 --> 00:14:42,700
organized organized are moving too fast to AI without thinking about the security topic

109
00:14:43,820 --> 00:14:51,420
I always talk about this in the in the my previous company called targets with the customers to adopt

110
00:14:51,420 --> 00:15:03,660
AI but at first trying to discover how your security works in your environments how the documents

111
00:15:03,660 --> 00:15:11,820
are protect in your environments for example with AI in the in the sharp point you can ask to

112
00:15:11,820 --> 00:15:20,620
compile it for example in Microsoft 365 365 how much is paying for the president of the company or

113
00:15:20,620 --> 00:15:31,100
what's the salary of the all the users in this company is is very easy to a to a user that have

114
00:15:31,100 --> 00:15:39,980
access not to have access but when the copilot shown the AI have access has access to the to the

115
00:15:39,980 --> 00:15:47,100
all the documents is very important to you understand what's the permission that you have in

116
00:15:47,100 --> 00:15:57,740
sharp point in my past my previous as MCT Microsoft certified training that I teach some some classes

117
00:15:57,740 --> 00:16:06,860
some courses I teach sharp point in I always talk to the to the to the the guys about the sharp point

118
00:16:06,860 --> 00:16:16,060
permission is so important to what the people can see what the people can edit and have control

119
00:16:16,060 --> 00:16:26,460
and now in the past I said about the person want to have access to that now we said we say agents

120
00:16:26,460 --> 00:16:34,140
what's the agents can access the information the files the the rewards files the excel files and

121
00:16:34,140 --> 00:16:45,100
so important to you map the the sharing of of the in the Microsoft there are there is a tool that

122
00:16:45,100 --> 00:16:55,100
do that that access governance that you will discovery what's data as is in the new have a data

123
00:16:55,100 --> 00:17:03,100
governance this is so important always before the AI I always always say said to my customers about

124
00:17:03,100 --> 00:17:11,100
the data governance where your data is where your data will go where you data are stored when when

125
00:17:11,100 --> 00:17:20,540
user transfer document for a paint drive for example you know about that you know if you if you

126
00:17:20,540 --> 00:17:31,100
user record and transfer or copy a document contract to a to a paint drive or send this document to

127
00:17:31,100 --> 00:17:38,620
your Gmail your personal email do you know about that never never the customers never is a very

128
00:17:38,620 --> 00:17:46,300
funny situation that when I customer is a very huge company right in Brazil told me that the

129
00:17:46,300 --> 00:17:54,940
deal we have always money to read you control everything you have all the usb ports block it you will

130
00:17:54,940 --> 00:18:03,580
never discover nothing right in in my environment in we just deploy the inside the risk in your

131
00:18:03,580 --> 00:18:15,740
environment in a we discover transfers of true to another devices via bluetooth the customers the

132
00:18:15,740 --> 00:18:26,060
nilo via bluetooth yes you have I think the number I think is about five hundred transfer via bluetooth

133
00:18:26,060 --> 00:18:32,460
in your environment the nilo wait a minute please and I have a five minutes to the customer in the

134
00:18:32,460 --> 00:18:41,580
customers was we were covered in fixes fix this this problem in your environment

135
00:18:43,340 --> 00:18:58,780
ambulances or a police I think a little bit about I can't from the data science part there was

136
00:18:58,780 --> 00:19:07,020
the large was the fabric and I think a little bit companies now yeah we have to shit engine out

137
00:19:08,060 --> 00:19:19,420
argument but there was not so many fears and and feeling about security because okay the CFO and some

138
00:19:19,420 --> 00:19:27,020
other dudes look at power via dashboard so then it's now did you see it's it's it's it's a chance to

139
00:19:27,020 --> 00:19:35,100
do it data especially in governance compliance and risk topics that I believe a lot of a lot of

140
00:19:36,780 --> 00:19:46,460
people and in my team in the customers are thinking about about it because I think it's very

141
00:19:46,460 --> 00:19:56,940
useful for for the companies when you can discover and have the data governance in your

142
00:19:56,940 --> 00:20:03,740
environment where where is the data are and where is the old information are distorted in my

143
00:20:03,740 --> 00:20:11,020
company is so important in the past the company oh my god I have a file file server I have share

144
00:20:11,020 --> 00:20:18,060
point to a crash I have to share a point online no matter where is the file is but okay no matter

145
00:20:18,060 --> 00:20:28,700
for me the users can you will go for this each user will go for near files like a one drive but

146
00:20:28,700 --> 00:20:39,740
a company will drive but I think with AI the the companies wake up for the for for this and discover

147
00:20:39,740 --> 00:20:53,020
that it's so so important to your your govern the data and and knows about what the user I'm doing

148
00:20:53,660 --> 00:21:03,100
are asking to AI are asking for information or at the other side sharing confidential information

149
00:21:03,100 --> 00:21:09,260
outside the company for example in chat GPT taking contracts,

150
00:21:09,260 --> 00:21:15,580
sigilous contracts and confidential contracts and sharing in the in the website that you never

151
00:21:15,580 --> 00:21:24,380
know and the you don't know where is the information will go and I think is a very important concern

152
00:21:24,380 --> 00:21:32,540
that the company has today to to to understand what's happened with data in your environment especially

153
00:21:32,540 --> 00:21:39,900
that you talk it for example in the party BI party BI I think is a is a is a very important

154
00:21:41,820 --> 00:21:48,780
data that you can report as a dashboard to the entire company or for the market or for

155
00:21:48,780 --> 00:21:57,340
for the public in the public view but you have to know what is this information and if this

156
00:21:57,340 --> 00:22:04,940
information is public is internal is could be shared there's so many

157
00:22:06,860 --> 00:22:15,500
preoccupations concerns that you have missed have from our weekday I know I have to prepare this

158
00:22:15,500 --> 00:22:24,220
this interview and I have used one level graph API from LinkedIn and I have a look about

159
00:22:24,220 --> 00:22:33,100
co-pilot and security the most my my search my research and there it's it's for looking for a

160
00:22:33,100 --> 00:22:43,980
bus and one bus word nearly the one of the most people say is AI readiness in this space can you

161
00:22:43,980 --> 00:22:59,180
explain what it really means beyond marketing bus word I think the the marketing always say that

162
00:22:59,180 --> 00:23:15,020
are you you lost your job you will yeah you you have the word in your hands and like a like a movie

163
00:23:15,020 --> 00:23:23,500
I I don't live in this because I think that we have control of course of the AI AI

164
00:23:26,940 --> 00:23:34,940
become us more productivity I believe only this for example I just with with my manager

165
00:23:34,940 --> 00:23:44,300
I have a one to one with my manager and I ask you AI searching my emails in my team's message

166
00:23:44,300 --> 00:23:52,940
in my meetings and said say what I do in this week and organized it by company organized by

167
00:23:53,900 --> 00:24:02,700
actions and and show me what I've done this this week is a perfect because searching on my emails

168
00:24:02,700 --> 00:24:12,780
what emails are I sent to the customers to the to the colleagues what my actions with the customers

169
00:24:12,780 --> 00:24:25,340
and when in the maybe 30 seconds I have all my meeting in a summary to discuss to share with my with

170
00:24:25,340 --> 00:24:36,460
my manager and I think that the next step of the of the of the companies to do that is is teaching is

171
00:24:37,900 --> 00:24:48,380
creating a future I believe a lot of of of in this miracle in the in a future of AI each company

172
00:24:48,380 --> 00:24:59,340
will have a future already have a future but the company have to create a future of AI

173
00:24:59,980 --> 00:25:11,260
what so what the company have to ask to to themselves of what is my future of AI I will block everything

174
00:25:11,260 --> 00:25:20,380
I will share everything I will allow everything to can be shared or can be discovered all the all

175
00:25:20,380 --> 00:25:29,580
the users in my company can use such a pt or copaylach or not or my all my data can be discovered for

176
00:25:29,580 --> 00:25:40,380
for AI I think is is very very very important to to the companies create this culture for to discuss

177
00:25:40,380 --> 00:25:48,540
with your employees to discuss with your board or or your CEO or I don't know but it's very important to

178
00:25:48,540 --> 00:25:57,420
to form and the marketing team of the of the of the for example the company to for example in

179
00:25:57,420 --> 00:26:05,340
this diagram or or in in linkage in how the the marketing of this company will tell to the world

180
00:26:05,340 --> 00:26:16,860
how use or how transform your company to invest yours or don't know invest yours or not know

181
00:26:16,860 --> 00:26:26,780
but how we use the day I think is is a journey but it's very important journey that all companies have to

182
00:26:26,780 --> 00:26:34,460
do from from your perspective and I think about organizations where do they

183
00:26:34,460 --> 00:26:42,140
where's the big biggest struggle the permissions over sharing complaints change management

184
00:26:42,140 --> 00:26:49,740
what what what sharing over sharing over sharing because especially right in Brazil right in Brazil we

185
00:26:49,740 --> 00:26:59,660
always we we're talking I always in my in my courses that I I do with as mct always talk about the

186
00:26:59,660 --> 00:27:04,460
dance of full permission dance of full permission because we always

187
00:27:04,460 --> 00:27:11,180
give full permissions of everything then you know I don't have asked if for permission to to him

188
00:27:11,180 --> 00:27:19,580
but then give give full full control to to this user always in Brazil always that company that

189
00:27:19,580 --> 00:27:28,540
I I see I saw in my in my in my past always the companies never have concerns or

190
00:27:28,540 --> 00:27:39,820
occupations about how this this file or this folder or this library in SharePoint or in the file

191
00:27:39,820 --> 00:27:47,820
server are shared or the permission that have it is file I think that's the the main

192
00:27:48,860 --> 00:27:54,540
preoccupation is I think the biggest problem that we have in the the companies are

193
00:27:54,540 --> 00:28:03,900
over sharing of all the files don't have control this is always always about data governance this is

194
00:28:03,900 --> 00:28:14,380
always about data governance AI the SharePoints the file server CRM systems I don't know all the systems

195
00:28:14,380 --> 00:28:27,500
or or a ER ERP that you have always is is is about what your govern your data what do you think

196
00:28:27,500 --> 00:28:39,100
Pueville plays or what plays let me think what role do you play in the responsible AI

197
00:28:39,100 --> 00:28:48,300
actually monitoring I think the how can I set a minutes ago the company is always

198
00:28:48,300 --> 00:28:59,660
block it access to the users and then the new normal is monitoring in the Pueville do that exactly

199
00:28:59,660 --> 00:29:06,860
that monitoring the environment the users about the behavior of the users when you know for example

200
00:29:06,860 --> 00:29:17,020
users don't know maybe 100 of files of SharePoint this is have to be monitored and have actions

201
00:29:17,020 --> 00:29:23,100
automatic actions that you have in Pueville and inside the risk for example the product the

202
00:29:23,100 --> 00:29:31,020
adaptive protection that you have that you have in the inside the risk when you when a for example

203
00:29:31,020 --> 00:29:40,940
I don't know maybe a user sent sent by mail 100 files for your personal mail you automatically can

204
00:29:40,940 --> 00:29:52,620
block this user reset your password and in mail your manager to what's happened in in announced to

205
00:29:52,620 --> 00:30:00,220
to to age R for example what's a cure with with your with the ordering Pueville with this user I think the

206
00:30:00,220 --> 00:30:10,860
the Pueville has a very important role in this in this case in you you we have a lot of products inside

207
00:30:10,860 --> 00:30:18,060
Perfuel I just talk about the side data security investigation that you can discover where is the

208
00:30:18,060 --> 00:30:27,100
data is for example I can discover what files in my environments have user in password in your

209
00:30:27,100 --> 00:30:34,460
body I can discover that it's covered to investigate for example my list of price of products

210
00:30:34,460 --> 00:30:44,140
was leaked from my environment and I can use the discovery to do that I can do use the SPM data security

211
00:30:44,140 --> 00:30:53,820
posture management to see what my posture of of my company inside a security environment what

212
00:30:53,820 --> 00:31:02,620
the posture of what I have to do in my environment to avoid that I leak this is very important to

213
00:31:02,620 --> 00:31:11,020
to the companies to discover the SPM is a is a very I think the I think I will be the the most

214
00:31:11,020 --> 00:31:19,900
to use it platform of a solution inside Perfuel that the companies will use in the future that a lot

215
00:31:19,900 --> 00:31:26,540
of other products for example you you can complex manager to discover your punctuation your score

216
00:31:26,540 --> 00:31:34,540
security score to in your company to do little actions in your environment to protect the data

217
00:31:34,540 --> 00:31:45,500
what the data is important to monitor or not I think each company have a have a have a concern about

218
00:31:45,500 --> 00:31:54,540
this but I think is the future of the Perfuel will be agents inside the Perfuel already have

219
00:31:54,540 --> 00:32:07,100
we are developing this with already is in G.A general of ability but some features especially

220
00:32:07,100 --> 00:32:18,540
in the agents are we are developing to automatically discover the what's the most important alerts

221
00:32:18,540 --> 00:32:30,380
that I have to investigate or to see before my 1000 of alerts that I have in my in my table

222
00:32:30,940 --> 00:32:41,740
what the of this 1000 of alerts what the 10 most important that I have to look first agents we do

223
00:32:41,740 --> 00:32:50,860
that we agents you tell you that make your your attention have your attention needs attention

224
00:32:50,860 --> 00:32:57,340
these alerts these alerts base it in your environment base it in your instruction that you

225
00:32:58,540 --> 00:33:14,300
gave to to to agents we are developing a lot of agents to to involve the all the security

226
00:33:14,300 --> 00:33:23,580
platform in the different of this is the agents are autonomous and every day the agents will

227
00:33:25,420 --> 00:33:33,580
investigation your alerts to tell you that what is most important what the I love this

228
00:33:33,580 --> 00:33:43,740
the history of the user for example a user done I don't know 100 of the loads of share points

229
00:33:43,740 --> 00:33:53,180
but yesterday the the users also done 20 files and after before and before yesterday

230
00:33:53,820 --> 00:34:04,380
made I don't know 500 files and the agents tell me the history of the of the users inside the company

231
00:34:04,380 --> 00:34:15,180
at the last 30 days is a is a very useful to to analysts that are investigating that that alert to

232
00:34:15,180 --> 00:34:23,660
oh my god this user is a lot doing a lot of things dangerous I have to mark the user as

233
00:34:23,660 --> 00:34:29,340
a his key user we call it this in the environment he's key user because the user are doing a lot of

234
00:34:29,340 --> 00:34:36,140
not complying things let's let's monitor this user is very important to the platform

235
00:34:36,140 --> 00:34:44,620
for people they are unfamiliar with view view how would you explain it to a 10 year old or let

236
00:34:44,620 --> 00:34:51,580
let us go a level harder how do you explain it to see level manager what's perfume

237
00:34:51,580 --> 00:35:06,220
like a baby camera in your room to a baby you don't block a baby to you

238
00:35:07,740 --> 00:35:19,820
to wake up your block you a baby to walk in a room but you can control with a camera and see what

239
00:35:19,820 --> 00:35:29,260
the baby was doing in this room in make actions for example automatically I will turn off the light

240
00:35:29,260 --> 00:35:42,780
or turn on I don't know the music in the room to relax the baby to sleep the analogy that I make

241
00:35:42,780 --> 00:35:51,100
is like a monitoring things is like a monitoring a baby on a camera I think the preview does this

242
00:35:53,420 --> 00:36:02,220
also this was a really good explanation and when you have to rate or say what are the most underrated

243
00:36:02,220 --> 00:36:09,100
capabilities inside Microsoft pure view for you today and rate it

244
00:36:09,100 --> 00:36:16,940
well underrated yeah I don't know I have to think very good question

245
00:36:22,140 --> 00:36:26,700
I don't know Mirko let me see maybe

246
00:36:26,700 --> 00:36:39,820
let me see maybe outage it inside the purview for example I think could be

247
00:36:39,820 --> 00:36:51,260
or rated in this case I think it could be I think it could be the delgit I think

248
00:36:51,260 --> 00:37:01,900
awesome and we have talked to the Sparrow a little bit about the insider risk how has it evolved

249
00:37:01,900 --> 00:37:11,180
over the last few years for your perspective the future of the insider risk

250
00:37:11,180 --> 00:37:24,780
no did you see from insider risk what was I think I changed the question is more we have all

251
00:37:24,780 --> 00:37:32,060
the time the topic inside our risk but how has it changed in the age of AI

252
00:37:32,060 --> 00:37:45,260
the age of AI I think will be excuse the AI I think the

253
00:37:48,700 --> 00:37:57,180
you are giving to the AI to the agents behavior to don't

254
00:37:57,180 --> 00:38:10,060
hallucinate and and do procedures that you have control and that you have the

255
00:38:13,260 --> 00:38:23,500
like a receipt like a receipt that you have every like a workflow to to to the task some like that

256
00:38:23,500 --> 00:38:32,620
I have the the next step or the future of the AI because AI is very funny you have AI

257
00:38:32,620 --> 00:38:40,780
after that you have agents and after I think the the next step the next wave of AI

258
00:38:41,980 --> 00:38:52,300
I think it already is the the the skills I think that everyone have to study have to discover have to

259
00:38:52,300 --> 00:39:01,900
develop your skills to work for you in in yeah environment I have I think that skills is very

260
00:39:01,900 --> 00:39:12,300
important right here Microsoft we have of course I I cannot tell but some programs that we

261
00:39:12,300 --> 00:39:24,380
uses in the in the AI that use a lot of skills using not so open in AI but and tropic another

262
00:39:25,740 --> 00:39:37,660
others AI's or others LLM's I think is the next steps in the future of of AI will grow up you

263
00:39:37,660 --> 00:39:47,500
involve evolve the the skills to more people each or share I think the the futures the skill that you

264
00:39:47,740 --> 00:39:56,620
develop in you share with me I develop or create it another skills and I will share with you I think

265
00:39:56,620 --> 00:40:06,780
you will be the the share the word share about skills exactly that I already have a site with

266
00:40:06,780 --> 00:40:15,020
the skills skills I think the skills dot sh I think is the site is the site to be tell a lot of skills

267
00:40:15,020 --> 00:40:23,740
that the people who are publishing your skills and grow up this the number of skills to use is to use

268
00:40:23,740 --> 00:40:31,180
it in your in your environment or in your AI by particular AI I think I believe in that

269
00:40:31,180 --> 00:40:41,340
how important did you see automation and modern compliance operations totally totally I am I mean

270
00:40:41,340 --> 00:40:48,540
love in the past I think it's 10 years ago about power automate I always when I

271
00:40:48,540 --> 00:40:57,660
done I think one two three times the four times no I will automate this I always automate

272
00:40:57,660 --> 00:41:06,620
everything in my life I have a house automated how can I say if I say Alexa turn off the lights

273
00:41:07,180 --> 00:41:15,180
of the of the of the offcy the turn off the off I have my entire my entire house are automated and my

274
00:41:15,180 --> 00:41:26,140
I till I also automated I always use it the or automated to automate everything in my life when

275
00:41:27,900 --> 00:41:40,300
when the AI serves in the past oh my god I can use AI to call automation and this automation could

276
00:41:40,300 --> 00:41:49,900
be use AI to discover a thing and I believe I totally believe in the the the joint between AI

277
00:41:49,900 --> 00:41:58,860
automation that the workflows that you have in automation I think this is a very good thing that you

278
00:41:58,860 --> 00:42:07,900
can develop and discover in your in your productivity life and you use actually in your daily usage

279
00:42:07,900 --> 00:42:15,900
of of IT of your computer I always automate everything that I can for example I love

280
00:42:18,220 --> 00:42:28,460
shortcuts always windows D windows D windows R windows L windows B to to your when you're we have

281
00:42:28,460 --> 00:42:39,180
a lot of screens to project to monitors for example I love to to to to remind and recording my mind

282
00:42:39,820 --> 00:42:51,260
the their shortcuts I love to jump more into the future of co-pilot

283
00:42:51,260 --> 00:43:01,660
I don't know if you're lowly about talk about it but what how do you see the peer view or

284
00:43:01,660 --> 00:43:09,420
and and co-pilot or the I call it a peer view co-pilot what what

285
00:43:09,420 --> 00:43:16,540
do you think about this and what's what's going on? um saying about co-pilot Microsoft 365 co-pilot

286
00:43:16,540 --> 00:43:28,220
I think the the future of co-pilot you'll be using so many different LLMs from un-tropic from

287
00:43:28,940 --> 00:43:41,900
Open and I from Gemini I don't know from Amazon I think the I think the the the secret of the

288
00:43:41,900 --> 00:43:52,220
co-pilot is using all the best AI's of the world with uh corporates data this is the secret

289
00:43:54,220 --> 00:44:01,660
when you have so many uh corporates information you have to use AI in this information

290
00:44:01,660 --> 00:44:10,620
Microsoft don't don't matter what is if is open and I if it's clouds of front-tropic or I don't know

291
00:44:10,620 --> 00:44:22,620
or from meta uh no matter the important thing of AI inside Microsoft is how you use AI

292
00:44:22,620 --> 00:44:34,380
with your corporate data this is the importance of AI and the co-pilot view uh are going to to this

293
00:44:34,380 --> 00:44:44,220
to to users the usability I think the secrets of the co-pilot in the future is the usability how

294
00:44:44,220 --> 00:44:55,180
the new new users will discover co-pilot inside the world inside excel inside uh park points in your uh

295
00:44:55,180 --> 00:45:04,940
I don't know in your presentation how co-pilot will help me in my day by day in my daily uh users

296
00:45:04,940 --> 00:45:13,420
of my of my computer I think the uh Microsoft is uh walking in this way to facilitate

297
00:45:14,060 --> 00:45:24,460
the use of AI in the corporate environments no matter what AI will use and that's the uh the

298
00:45:24,460 --> 00:45:32,540
background of course the security Microsoft are concerning about all the data is so important

299
00:45:32,540 --> 00:45:41,260
the security guys the compliance guys are there are uh environment totally uh deployed and

300
00:45:41,260 --> 00:45:47,820
configured with with inside the risk with policies of the inside the risk uh with the policies of

301
00:45:47,820 --> 00:45:55,820
the op is so very important the data uh observation is so very important in the in the environment uh

302
00:45:55,820 --> 00:46:02,940
the discovering your poster security with the SPM in your environment with the new data that are

303
00:46:03,900 --> 00:46:12,220
creating in the in the in the environment what's the data is uh a secret is confidential is personal

304
00:46:12,220 --> 00:46:20,620
data is public is very important to the company discovering this information the classification

305
00:46:20,620 --> 00:46:27,260
is this a very important thing that I I forget to to to said about Microsoft information protection

306
00:46:27,260 --> 00:46:35,340
that the F is a classification of your documents is all always companies oh my god then you

307
00:46:35,340 --> 00:46:42,300
don't matter this what's the reason I will classify a word file to confidential no matter this

308
00:46:42,300 --> 00:46:51,660
this document is in the short point but now with AI is very very important uh macro the the you the

309
00:46:51,660 --> 00:46:57,420
companies are discovering that uh information macro macro search information protection your

310
00:46:57,420 --> 00:47:05,660
classification of the documents is so important to go over the data inside your company for example

311
00:47:05,660 --> 00:47:14,380
when documents are word document for example uh was classified as confidential uh

312
00:47:16,700 --> 00:47:25,900
couldn't uh impossible to transfer or to send by mail this is a configurable uh by purple

313
00:47:25,900 --> 00:47:33,420
it's so very important to this classification and now the company are discovering that the important

314
00:47:33,420 --> 00:47:40,060
the the the importance of the classification of files of i mail for example when i say i mail

315
00:47:40,060 --> 00:47:47,980
in class file in mail as confidential the should not be forward for external user for example

316
00:47:47,980 --> 00:47:56,780
this is so important in the in the companies now with AI for for my for my feeling um i was on so many

317
00:47:56,780 --> 00:48:10,860
events or Microsoft events or uh around Microsoft and we have one people they say okay you have to

318
00:48:10,860 --> 00:48:21,740
achieve strong security and the other say we need great employee experience um how can organization

319
00:48:21,740 --> 00:48:29,660
realistic uh achieve both an individual can view you play and and to achieve the achieve the

320
00:48:29,660 --> 00:48:43,100
i think you you have uh the both deep types of person in your company to discuss about this

321
00:48:43,100 --> 00:48:51,260
is that impossible to one person uh make this balance is impossible because always

322
00:48:51,660 --> 00:49:02,540
this person this person always will or uh make the balance uh goes to the to the security or to the

323
00:49:02,540 --> 00:49:14,220
productivity you have uh the both people uh in your company that uh the concern a lot of the what

324
00:49:14,220 --> 00:49:23,900
blocking everything that's uh security in the first time and i want you to block outside you have to

325
00:49:23,900 --> 00:49:32,140
to have you have to have this person in your company and have the guy oh my god i love to share

326
00:49:32,140 --> 00:49:41,580
everything i love to let's go every document to public key and you have the have to to have in

327
00:49:41,580 --> 00:49:51,020
their company they both uh personalities in your company and make this person uh talk about

328
00:49:51,020 --> 00:49:59,340
about the the the product data and make a balance between this i think i always talk about the

329
00:49:59,340 --> 00:50:06,700
future what's the future of the your company uh always is about the future if your

330
00:50:06,700 --> 00:50:13,420
future of your company is share everything you will share everything and no matter AI no matter

331
00:50:13,420 --> 00:50:19,660
data gov there's no matter if security you will always the future of the company is share or

332
00:50:19,660 --> 00:50:28,220
send always the document by mail is the future or the future of their company is or block it uh no

333
00:50:28,220 --> 00:50:36,700
matter if you have a share punch or wine that works via mobile phone but the company is

334
00:50:36,700 --> 00:50:43,580
block it to access information outside the company and you can't uh access the information in your

335
00:50:43,580 --> 00:50:53,100
mobile phone is impossible you have to to take the the both the personalities in your company to

336
00:50:53,100 --> 00:51:00,540
do the balance between productivity and security i i believe totally in this one person will not

337
00:51:00,540 --> 00:51:09,820
define uh this is impossible because we we have experience of or i don't know i do of data

338
00:51:09,820 --> 00:51:21,500
leaks for example or experience of productivity and i always uh push or push from my site

339
00:51:22,140 --> 00:51:31,020
uh open a red all our days pull off off to my side to to my experience i i i believe in this

340
00:51:31,020 --> 00:51:43,340
this one awesome so let's a little bit deep dive in it uh what separates an organization that

341
00:51:43,340 --> 00:51:56,940
successful with co-pilot and from this one they struggle a little bit. Sucess the companies are

342
00:51:56,940 --> 00:52:07,180
addicted about financial benefits being benefits of the AI for the companies uh i think is not a

343
00:52:07,180 --> 00:52:18,140
better way to you analyze uh uh i add option sushi for i add option in a company uh i think

344
00:52:18,140 --> 00:52:28,380
the best way i think in the future okay uh okay i will work at the at the company because the

345
00:52:28,380 --> 00:52:36,460
company use AI i think the future is this like in the past uh i like my my father for example

346
00:52:36,460 --> 00:52:44,060
oh my father i will i will work in itaú because have computers but the company don't have computers

347
00:52:44,060 --> 00:52:50,460
i will work in that company because i have computers i want to uh use computers in my day

348
00:52:50,460 --> 00:52:59,580
day by day in my daily usage i think in the future the the people will follow and we work you

349
00:53:00,300 --> 00:53:12,220
find for uh looking for companies that use AI in a daily usage in uh like uh okay i say in a what

350
00:53:12,220 --> 00:53:21,900
your AI future i think the people you're looking for that i will okay i will work for you but what's your

351
00:53:21,900 --> 00:53:31,500
AI future but another okay i will work here for some like that awesome um yeah let's make somebody

352
00:53:31,500 --> 00:53:42,940
fun with you to to talk and when we uh uh or what should IT professionals learn especially in

353
00:53:42,940 --> 00:53:53,900
and copilot or i uh to stay relevant from your perspective well to professional stay really

354
00:53:53,900 --> 00:54:05,260
for the AI stay relevant as i t professional to to get a job for us well stay in the job is impossible

355
00:54:05,260 --> 00:54:16,300
not uh use uh for example i always use in my workshops when i when i thought about the best

356
00:54:16,300 --> 00:54:27,020
about copilot uh AI's AI today is as in the past datilography you you you done uh that

357
00:54:27,020 --> 00:54:35,020
actually for course in the past i i done but today is no make sense you do a datilography

358
00:54:35,020 --> 00:54:44,540
course in your in your life what makes sense because you're already born with uh with a

359
00:54:44,540 --> 00:54:52,700
mobile phone in your hands in your just type just typing in your always uh and now you're already

360
00:54:52,700 --> 00:55:01,020
have the ability to type fast in your k-bore for example and the future day i will be the same uh

361
00:55:01,020 --> 00:55:10,460
this is the reason i don't believe in the courses of uh of engineering prompt for example i don't

362
00:55:10,460 --> 00:55:18,060
believe in this because you have the experience of prompt and you prompt to what your uh important

363
00:55:18,060 --> 00:55:27,020
for you in your life in your job in what characteristics of instructions that is most important for you

364
00:55:27,020 --> 00:55:36,780
and you have to uh learn about how you ask for AI about uh uh a subject and about the iq

365
00:55:36,780 --> 00:55:46,700
profs uh iq uh iq uh professionals i think that uh i i don't believe in only the iq the iq

366
00:55:46,700 --> 00:55:54,860
the iq are the compliance professionals the security professionals the i don't know the financial

367
00:55:54,860 --> 00:56:01,180
professionals all professionals in the all departments have to uh

368
00:56:03,580 --> 00:56:16,380
learn about the iq use in your daily routine to uh to discover how AI could help in your task

369
00:56:16,380 --> 00:56:25,660
all day i think i believe in that uh yeah uh oh we are around the out of time so uh yes i have a

370
00:56:25,660 --> 00:56:32,460
meeting right now with my egg i have to go so what one last question uh normally i

371
00:56:32,460 --> 00:56:41,820
way we have to do another meeting the uh session um i i think i'll for me personally i think i have

372
00:56:41,820 --> 00:56:51,820
used so many technology and uh i think microsoft has the greatest community built around i think the

373
00:56:51,820 --> 00:57:00,220
greatest community it's not only tech it's one of the greatest community um what will you say

374
00:57:00,220 --> 00:57:07,580
what make this community so great integration i always uh told through my customers to

375
00:57:07,580 --> 00:57:14,380
in my all microsoft to life if microsoft she is not colored microsoft she's colored integration

376
00:57:14,380 --> 00:57:23,420
because microsoft makes the integration between uh lots of forms as another other in in the world

377
00:57:23,420 --> 00:57:29,900
because you can integrate project which at point you can integrate with uh defender that

378
00:57:29,900 --> 00:57:35,900
integrate with dynamics that integrate with teams that integrate with i don't know poor AI

379
00:57:35,900 --> 00:57:47,180
all the microsoft solutions always are integrated with each other i i believe the the main uh that

380
00:57:47,180 --> 00:57:55,660
i love microsoft i i really love i i believe a lot of much in this company the reason is that all

381
00:57:55,660 --> 00:58:03,420
the integration between all the the solutions are it's not perfect because perfect is not but is

382
00:58:03,420 --> 00:58:10,460
uh you you discover a door to make this integration i think i think this is the the expression of the

383
00:58:10,460 --> 00:58:19,180
phrase you you you know uh that have a door to make integration for another platform and AI is

384
00:58:19,180 --> 00:58:25,100
so useful for that for example to you discover how integrate the platform's uh

385
00:58:25,580 --> 00:58:31,260
what between your your environments or your platform i think i believe in that

386
00:58:31,260 --> 00:58:42,460
yeah i i think uh when the greatest uh when you're great when you will be a great

387
00:58:42,460 --> 00:58:51,180
yeah adaption technology together like i don't know like an ambassador or something

388
00:58:51,980 --> 00:58:59,500
i think there's one thing for me in microsoft's base that's microsoft graph api i think if you do

389
00:58:59,500 --> 00:59:09,980
microsoft brain api on on social media you're born the game so yeah uh thank you danilo uh thank you

390
00:59:09,980 --> 00:59:17,580
miss most was was the pleasure to have you here i hope we can do another session um yeah

391
00:59:18,300 --> 00:59:25,500
and uh yeah the the last thing uh you must go to the next meeting everything the someone

392
00:59:25,500 --> 00:59:27,740
should take from this session today

393
00:59:27,740 --> 00:59:39,980
i have uh brazilian guy that's working with me and the person at my previous company called

394
00:59:39,980 --> 00:59:48,060
johnson cruz are you share your link edging with you and you invited him to to a podcast

395
00:59:49,020 --> 00:59:53,820
okay yeah make me the contact i will i will make your content by linking

396
00:59:53,820 --> 01:00:01,020
okay thank you so much uh i really enjoyed this and uh yeah thank you so much

Mirko Peters Profile Photo

Founder of m365.fm, m365.show and m365con.net

Mirko Peters is a Microsoft 365 expert, content creator, and founder of m365.fm, a platform dedicated to sharing practical insights on modern workplace technologies. His work focuses on Microsoft 365 governance, security, collaboration, and real-world implementation strategies.

Through his podcast and written content, Mirko provides hands-on guidance for IT professionals, architects, and business leaders navigating the complexities of Microsoft 365. He is known for translating complex topics into clear, actionable advice, often highlighting common mistakes and overlooked risks in real-world environments.

With a strong emphasis on community contribution and knowledge sharing, Mirko is actively building a platform that connects experts, shares experiences, and helps organizations get the most out of their Microsoft 365 investments.

Danilo Nogueira Profile Photo

Senior Product Manager

Danilo Nogueira is a **Senior Product Manager at Microsoft**, focused on security and compliance solutions within the Microsoft Purview ecosystem, particularly in Insider Risk and Data Security scenarios. He brings over two decades of experience in technology, with a strong background in productivity, security, and digital transformation, along with hands-on expertise in solution architecture and pre-sales strategy for enterprise customers.

Throughout his career, he has built a solid technical foundation, earning dozens of Microsoft certifications and previously being recognized as a Microsoft Most Valuable Professional (MVP). He is also a Microsoft Certified Trainer (MCT) since 2012, having delivered training sessions, workshops, and presentations to a wide range of audiences, from technical teams to business leaders.

Danilo has deep expertise in areas such as Microsoft 365 Copilot, Copilot Studio, and the Power Platform, and is known for connecting technology capabilities to tangible business outcomes. His work includes designing offerings, customer journeys, and adoption strategies aimed at maximizing productivity, strengthening security, and driving measurable ROI.

In addition to his technical and strategic contributions, he stands out for his communication skills and is frequently involved in events and presentations on artificial intelligence, security, and the future of work, actively contributing to the tech community and accelerating the adoption of Microsoft technologies.