“AI Meets Security” is a deep-dive conversation between Mirko Peters and Microsoft Senior Product Manager Danilo Nogueira about how AI is reshaping enterprise security, governance, and compliance. The episode explains that the biggest challenge with Microsoft Copilot and AI adoption is not the technology itself, but the hidden weaknesses already existing inside many Microsoft 365 environments.
Danilo highlights that oversharing in SharePoint, weak permissions, poor governance, and missing classification policies become far more dangerous once AI can instantly surface information through natural language prompts. Organizations often believe they are “AI ready” because they purchased licenses, but true readiness requires understanding data access, governance structures, and organizational behavior.
A major focus is Microsoft Purview, which Danilo compares to a “baby monitor” for enterprise data. Instead of blocking everything, modern security should focus on monitoring, visibility, automation, and intelligent risk detection. The discussion covers Insider Risk Management, Data Loss Prevention, compliance automation, and AI-driven security workflows that help organizations detect suspicious behavior, risky data movement, and abnormal user activity faster.
The episode also explores the future of AI agents and automation in security operations. Rather than replacing security teams, AI will help prioritize alerts, investigate incidents, and recommend remediation actions at scale.
One of the key takeaways is that organizations must build a real AI culture with clear governance rules, acceptable usage policies, and responsible access management. AI does not create security problems — it exposes the ones already hidden in the environment.
You see ai meets security transform digital defense in 2026. Every day, ai brings new opportunities and challenges to your workplace. You may worry about how ai could increase security risk or make it harder to protect your data. The State of AI Security 2026 report shows that most organizations want to use agentic ai, but only a few feel ready to manage risk and secure their systems.
The State of AI Security 2026 report highlights the evolving threat landscape of ai security, emphasizing the rapid adoption of ai technologies and the corresponding challenges faced by digital defense mechanisms. It discusses significant risk associated with ai vulnerabilities and the complexities introduced by agentic ai, indicating a need for a fundamental shift in how organizations approach digital security.
You must focus on responsible ai adoption. Events like the AI Security Summit and solutions such as Microsoft Purview show you how ai meets security in real time. You learn that ai meets security not through blocking, but by using monitoring and intelligent automation to manage risk. As ai meets security, you gain tools to spot risk, protect your data, and respond faster than ever.
- 83% of organizations planned to deploy agentic ai capabilities.
- Only 29% felt ready to leverage these technologies securely.
You need new ways to address risk. When ai meets security, you take control of your digital defense.
Key Takeaways
- AI is transforming cybersecurity by enabling real-time threat detection and response.
- Organizations must adopt responsible AI practices to manage risks effectively.
- Self-learning systems enhance threat detection by adapting to new threats automatically.
- Predictive analytics help forecast attack patterns, allowing proactive defense measures.
- User behavior analytics personalize security controls, improving protection against insider threats.
- AI-driven tools like Microsoft Purview streamline compliance and data protection efforts.
- Automation reduces alert fatigue, allowing security teams to focus on high-priority tasks.
- Investing in AI security solutions is essential for staying ahead of evolving cyber threats.
AI Security Trends 2026

You see ai in cybersecurity change how you protect your digital world. In 2026, you rely on ai to spot threats, predict attacks, and personalize security controls. You learn about new trends at events like the AI Security Summit, the AIMS retreat, and from Cisco's State of AI Security Report. These trends show you how ai in cybersecurity brings innovation and transforms your defense.
Autonomous Threat Detection
Self-Learning Systems
You use self-learning systems to improve threat detection. These systems learn from every event and adapt to new threats. You do not need to update rules manually. Ai in cybersecurity helps you build smarter defenses. You see ai-driven threat detection replace old workflows. Ai becomes the backbone of your security. You trust ai to analyze millions of data packets every second. You get faster and more accurate results than traditional methods.
Real-Time Adaptation
You benefit from real-time adaptation. Ai in cybersecurity lets you respond to threats instantly. You do not wait for human analysts to act. Ai systems execute the detection-to-response lifecycle. You see ai-driven defense use deep learning and behavioral analytics. You detect complex threats like ai-generated malware. You use event correlation and risk assessment to build insights. You make better decisions and respond quickly.
You gain instant mitigation with ai in cybersecurity. Ai integrates with your security tools and acts even when your SOC analysts are busy.
| Advancement Type | Description |
|---|---|
| AI-driven threat detection | AI becomes the backbone of threat detection, replacing reactive workflows with autonomous systems. |
| Detection-to-response lifecycle | AI systems can execute the entire lifecycle, enhancing real-time protection and reducing detection windows. |
| Advanced detection fabric | Utilizes deep learning and behavioral analytics to detect complex threats like AI-generated malware. |
| Event correlation and risk assessment | Correlates billions of events to build comprehensive insights, improving decision-making and response. |
| Instant mitigation | Enables immediate action even without SOC analysts, integrating with various security tools. |
Recent studies show that ai-driven threat detection systems outperform traditional security solutions. You see faster response times and fewer false positives. You avoid financial losses from delayed detection. Ai in cybersecurity adapts to new threats and keeps your defenses strong.
Predictive Analytics in Cybersecurity
Attack Pattern Forecasting
You use predictive analytics to forecast attack patterns. Ai in cybersecurity analyzes global threat data. You predict trends like cryptocurrency mining malware campaigns. You see ai in cybersecurity help you anticipate attacks before they happen. You rely on threat intelligence to stay ahead.
- Threat Intelligence: Predictive models analyze global threat data to forecast emerging attack trends.
- User Behavior Analytics: You establish baselines of normal user behavior. You detect insider threats 30% faster.
- Network Security: Predictive analytics forecasts network traffic patterns. You identify potential DDoS attacks or breaches early.
- Vulnerability Management: You analyze historical data. You prioritize patch management and forecast which vulnerabilities are likely to be exploited.
A system developed by Los Alamos National Laboratory can identify potential cyber attacks up to two weeks in advance with over 90% accuracy. You see ai in cybersecurity give you time to prepare and protect your assets.
Proactive Risk Mitigation
You use ai in cybersecurity to mitigate risks proactively. You do not wait for threats to cause damage. Ai-driven defense helps you assess risks and take action. You use continuous monitoring to spot vulnerabilities. You prioritize patching and strengthen your security posture. You rely on ai in cybersecurity to keep your systems safe.
Personalized Security Controls
User Behavior Analytics
You use user behavior analytics to personalize security controls. Ai in cybersecurity tracks how you use your devices and data. You spot unusual activity and prevent insider threats. You build baselines and detect anomalies quickly. You see ai in cybersecurity help you respond to risks faster.
Adaptive Access Management
You use adaptive access management to control who can access your data. Ai in cybersecurity adjusts permissions based on user behavior. You protect sensitive information and reduce the risk of data leaks. You see ai in cybersecurity make access decisions smarter and more flexible.
Microsoft Purview stands out as a leading example of ai-driven security and governance. You use Purview to classify and protect sensitive data, assess risks, and ensure compliance. You get end-to-end protection from identity to data, devices, and cloud. You rely on ai-driven defense to unify your tools and teams for faster response. You build trust, resilience, and efficiency in your organization.
You see the shift from traditional blocking to monitoring and intelligent automation. You use ai in cybersecurity to gain visibility, automate compliance, and respond to threats. You build a stronger defense and protect your digital assets.
AI Meets Security: Practical Applications
Real-Time Threat Detection
Network Intrusion Prevention
You rely on ai to strengthen your cybersecurity and protect your network from threats. Real-time threat detection lets you spot attacker behaviors as they happen. You use ai-driven threat detection to monitor traffic across your network, identity, and cloud environments. You see attackers try to bypass traditional security, but ai adapts and learns from every event.
| Application Name | Key Features | Limitations |
|---|---|---|
| AI-driven threat detection | Detects attacker behaviors in real time across various environments, including network and cloud. | Detection precision requires improvement; limited data aggregation capabilities; integration gaps. |
| AccuKnox CDR | Continuous monitoring, AI-powered detection, and automated response for cloud environments. | Steep learning curve; complex setup; high cost; customer support delays. |
| Darktrace DETECT | Self-learning AI that identifies unknown threats and provides enterprise-wide coverage. | High alert volume requiring tuning; complex initial setup; steep learning curve; high total cost. |
You use ai-powered tools like AccuKnox CDR and Darktrace DETECT to gain enterprise-wide coverage. These tools offer continuous monitoring and automated response, helping you reduce dwell time and limit damage. You see ai in cybersecurity transform your approach, making threat detection faster and more accurate.
Cloud Anomaly Detection
You protect your cloud environments with ai-powered anomaly detection. Ai analyzes billions of events and identifies unusual patterns that signal threats. You use ai to spot risky behaviors, such as unauthorized access or data exfiltration. You rely on automated response to contain threats before they spread.
Ai in cybersecurity gives you visibility across multi-cloud workloads. You detect unknown threats without relying on predefined rules. You build a stronger defense by combining real-time threat detection and anomaly detection.
Microsoft Purview helps you manage risks in the cloud. You use Purview to identify and classify sensitive data, apply encryption, and monitor risky sharing behaviors. You prevent oversharing with ai tools like Copilot by enforcing access controls and compliance policies. Purview provides insights into insider risk, allowing you to take proactive measures.
Endpoint Security Innovations
Malware Analysis with AI
You use ai-powered tools to analyze malware and protect your endpoints. Ai in cybersecurity shifts from signature-based detection to behavioral analysis and machine learning. You catch novel threats that traditional security misses. You respond to malware incidents in milliseconds, not hours or days.
| Aspect | Traditional Security | AI-Powered Security |
|---|---|---|
| Detection Method | Signature-based | Behavioral analysis & ML |
| Response Time | Hours to days | Milliseconds |
| False Positives | 40-90% of alerts | 5-10% of alerts |
| Staffing Requirements | 24/7 human monitoring | Automated with human oversight |
| Cost Implications | High labor costs | Reduced operational expenses |
You reduce false positives and alert fatigue. Ai in cybersecurity automation lets you focus on genuine threats. You lower operational expenses and improve your security posture.
Device Isolation Automation
You use ai to automate device isolation when threats are detected. Ai-powered tools identify compromised devices and remove them from the network instantly. You prevent malware from spreading and protect your data. You rely on automated response to contain incidents and minimize impact.
Ai in cybersecurity empowers you to act quickly. You do not wait for manual intervention. You use response planning to ensure every device stays secure.
Incident Response Automation
Intelligent Playbooks
You use ai to automate incident response and streamline investigations. Intelligent playbooks guide you through response planning and remediation. Ai enriches alerts with contextual data, helping you prioritize significant threats. You reduce investigation times and lower alert fatigue.
Rapid Remediation
You see ai-powered incident response reduce breach response times dramatically. You use cybersecurity automation to resolve incidents faster and limit damage. Case studies show that organizations like Eye Security and Western Governors University improved their dwell time and mean time to resolution.

- Eye Security reduced dwell time from 24 days to under 24 minutes.
- Western Governors University improved resolution time by 77%.
- DXC Technology & 7AI saved 224,000 analyst hours and cut detection and response times by 50%.
You use ai in cybersecurity to automate alert prioritization. Automation enriches alerts with contextual data, allowing you to focus on significant threats. Surveys show that ai automation leads to a 25-50% reduction in investigation time for most organizations.
Ai meets security by empowering you to respond faster, investigate smarter, and protect your organization from evolving threats.
Phishing and Ransomware Defense
Phishing and ransomware attacks continue to threaten your digital safety in 2026. Attackers use advanced tactics to trick you and your team into sharing sensitive information or downloading harmful files. You need smarter tools to spot these threats before they cause damage. AI-powered solutions now give you the upper hand.
NLP for Email Analysis
Natural Language Processing (NLP) helps you analyze emails and messages for signs of phishing. You use AI to read and understand the language in every message. NLP models look for suspicious patterns, such as fake sender addresses, urgent requests, or unusual links. These models learn from millions of real-world phishing attempts.
Tip: You can train NLP models to recognize the latest phishing tricks. This keeps your defenses up to date.
With Microsoft Purview, you gain advanced email scanning powered by AI. Purview uses NLP to flag risky emails and alert you to possible threats. You see which messages contain sensitive data or suspicious attachments. You can set rules to block or quarantine dangerous emails automatically.
Key Benefits of NLP for Email Analysis:
- Detects phishing emails with high accuracy
- Flags suspicious links and attachments
- Reduces the risk of human error
- Automates email review and response
| Feature | Traditional Email Security | AI-Powered NLP Email Analysis |
|---|---|---|
| Keyword Matching | ✅ | ✅ |
| Context Understanding | ❌ | ✅ |
| Adaptive Learning | ❌ | ✅ |
| Real-Time Alerts | ⚠️ | ✅ |
You rely on NLP to protect your inbox and keep your organization safe from phishing attacks.
Early Detection Algorithms
Early detection algorithms help you stop ransomware before it spreads. You use AI to monitor your systems for unusual activity. These algorithms look for signs like rapid file encryption, strange network traffic, or unauthorized access attempts. When AI spots a threat, it acts fast.
You can set up automated responses to isolate infected devices or block suspicious processes. Microsoft Purview supports these actions by monitoring user behavior and flagging risky activities. You get alerts when someone tries to access sensitive files or share confidential data outside your organization.
Note: Early detection gives you time to respond. You can stop ransomware before it locks your data or demands payment.
How Early Detection Algorithms Work:
- Monitor user and system activity in real time
- Identify patterns linked to ransomware or phishing
- Trigger alerts and automated responses
- Help you investigate and contain threats quickly
You see fewer successful attacks when you use AI-driven early detection. You protect your data, your reputation, and your business operations.
Summary Table: AI vs. Traditional Defense
| Defense Aspect | Traditional Approach | AI-Driven Approach |
|---|---|---|
| Detection Speed | Slow | Instant |
| Accuracy | Moderate | High |
| Automation | Limited | Extensive |
| Response Time | Manual | Automated |
You build a stronger defense against phishing and ransomware by combining NLP for email analysis and early detection algorithms. Microsoft Purview helps you stay ahead of attackers and keep your digital world secure.
Human-AI Partnership in Cybersecurity

Augmenting Security Teams
AI as Analyst Assistant
You see ai transform your security team. Ai acts as an analyst assistant, helping you detect threats faster and manage risk more effectively. Ai agents handle unlimited alert volume, so you do not miss critical incidents. You focus on complex investigations while ai automates routine tasks. Organizations report that ai reduces breach detection time by 80 days. You save up to 7 analyst hours each day. Ai tools automate compliance documentation, making your workflow more efficient.
| Metric | Without AI | With AI (Extensive) |
|---|---|---|
| Average breach cost | $5.52M | $3.62M |
| Breach lifecycle | 321 days | 241 days |
| Alert coverage gap | 40% | Majority auto-triaged |
| Analyst workload reduction | Baseline | Up to 80% |
| Daily analyst time saved | Baseline | 6-7 hours |
- Ai agents handle unlimited alert volume without slowing down.
- You focus on high-value tasks, reducing burnout and improving retention.
- Ai automates compliance documentation, saving significant time.
Reducing Alert Fatigue
You use ai in cybersecurity to reduce alert fatigue. Ai triages alerts, so you spend less time on false positives. You see mean time to detect threats drop to minutes. Ai collapses multiple alerts into single cases, making your investigations easier. You spend less than 10 minutes per incident. Automation helps you focus on tier 2 investigations, increasing your impact. Attrition rates drop as ai reduces stress and workload.
| Metric | What It Measures | Target Benchmark |
|---|---|---|
| Mean Time to Detect (MTTD) | Speed from threat to alert | Minutes with automation |
| Mean Time to Respond (MTTR) | Speed from alert to containment | Under 30 minutes |
| False positive rate | % of benign alerts | Under 20% |
| Alert-to-case ratio | Alerts collapsed into one case | 10:1 or better |
| Analyst triage time | Minutes per alert | Under 10 minutes |
| Analyst utilization | % on high-value work | 60% or above |
| Attrition rate | Analyst turnover | Reduced with automation |
Ethical and Transparent AI
Addressing Bias
You trust ai in cybersecurity when you see transparency and fairness. You address bias by conducting audits on training data and model outputs. You use tools like Fairness Indicators to check for unexpected results. You apply bias-correction techniques during model training. You draft clear guidelines for ethical data handling and model development. You use access controls and encryption to protect sensitive information.
| Source of Bias | Mitigation Strategy |
|---|---|
| Unexpected outputs from AI models | Bias audits and fairness tools |
| Data poisoning | Re-weighting and re-sampling during training |
| User input influence | Ethical guidelines for data collection and modeling |
- You draft internal guidelines for ethical ai use.
- You promote transparency by sharing these guidelines with your team.
Ensuring Accountability
You ensure accountability by following compliance frameworks. You use the EU AI Act for mandatory regulation in the EU. You follow ISO/IEC 42001 as a global standard for ai governance. You use NIST AI RMF to manage ai risks. These frameworks help you build trust and maintain transparency in your security perspective.
| Framework | Type | Scope and Enforcement |
|---|---|---|
| EU AI Act | Regulation | Mandatory for AI use in the EU |
| ISO/IEC 42001 | Standard | Voluntary global standard for internal AI governance |
| NIST AI RMF | Framework | Guidelines for managing AI risks |
Upskilling for AI Security
Training for AI Tools
You upskill your security team to use ai-powered tools. You strengthen training so everyone knows how to use ai in cybersecurity. You foster a culture of continuous learning. You invest in human strengths like judgment and creativity. You build trust by preparing your team to manage ai responsibly.
| Strategy | Description |
|---|---|
| Strengthening training | Ensure all team members know how to use ai tools |
| Continuous learning | Encourage ongoing education and adaptation |
| Investing in human strengths | Focus on judgment, creativity, and experience |
New Security Roles
You see new security roles emerge as ai changes cybersecurity. You need fluency in ai-driven threats, secure system design, and policy leadership. You look for specialists who understand ai tools and can apply them in incident response and governance.
| New Security Roles | In-Demand Skills |
|---|---|
| AI-driven Threat Analyst | Fluency in ai-driven threats |
| Secure System Designer | Secure system design |
| Policy Leader | Policy leadership |
| Incident Response Specialist | Application of ai tools in cybersecurity |
| Governance Specialist | Understanding ai tools |
You build trust and resilience by upskilling your team and adopting ethical, transparent ai practices. You prepare for the future of cybersecurity by embracing new roles and continuous learning.
Risk and Impact for Organizations & Individuals
Security Transformation
Strategy Shifts
You see organizations transform their cybersecurity strategies as ai becomes central to digital defense. You must move from reactive to proactive security. You use frameworks like NIST AI Risk Management to identify risks and set controls. You create clear accountability, making CISOs responsible for security governance. You build centralized access frameworks that unify controls across cloud and network security environments. You adopt layered defenses to protect against emerging risks and adapt to new cyber threat intelligence.
- You implement continuous monitoring and behavioral detection.
- You safeguard legacy systems and secure cloud environments.
- You integrate ai governance frameworks for responsible deployment.
Organizations using ai detection services reduce low-value alerts by 45% and increase high-priority threat identification by 79%. You see how ai improves vulnerability management and helps you focus on real threats.
Investment in AI Solutions
You invest more in ai security solutions every year. The ai security market was valued at over $20 billion in 2023 and is expected to reach $141 billion by 2032. You see a 24% annual growth rate. You prioritize tools that support cyber threat intelligence, vulnerability management, and third-party risk management. You choose platforms like Microsoft Purview to map controls to data assets and monitor sensitive content. You use access controls and audit logs to protect data and ensure ethical practices.
Managing AI Risks
Adversarial AI
You face new risks from adversarial ai in cybersecurity. Attackers try to manipulate models or exploit weak authentication. You must defend against input manipulation, model poisoning, and transfer learning attacks. You use strong authentication, input validation, and regular audits to manage these threats.
| Risk Type | Description | Mitigation Strategies |
|---|---|---|
| Unauthorized Access | Gaining access to ai systems through weak controls | Strong authentication and access controls |
| Input Manipulation | Poisoning model behavior with altered data | Input validation and anomaly detection |
| Model Poisoning | Modifying model parameters for hidden backdoors | Regular audits and adversarial testing |
| Transfer Learning Attacks | Introducing bias in pre-trained models | Robust testing and validation |
| Membership Inference Attacks | Privacy risks from training data exposure | Differential privacy and data access audits |
You implement comprehensive data validation and enhance model security. You conduct regular security audits to identify vulnerabilities.
Data Privacy Concerns
You must address data privacy concerns as you use ai-driven cybersecurity tools. Sensitive data exposure can happen when employees interact with ai. Data poisoning and cloud misconfigurations also pose risks. You use data validation, differential privacy, and strong access controls to protect information. You conduct regular audits to ensure compliance.
| Data Privacy Concern | Description |
|---|---|
| Sensitive Data Exposure | Leaks from employee prompts to ai tools |
| Data Poisoning | Corrupted training datasets causing bias |
| Cloud Misconfigurations | Unauthorized access from setup errors |
You rely on Microsoft Purview for compliance management, data classification, and policy enforcement. You align risk management with human values and legal standards.
Empowering Users
AI-Enhanced Security Tools
You empower yourself with ai-enhanced security tools. These tools use machine learning to detect advanced threats like file-less malware and zero-day attacks. You scan systems for vulnerabilities and prioritize repairs. You automate responses to cyberattacks, improving overall cybersecurity efficiency.
- You identify patterns and anomalies in large data sets.
- You use ai for real-time threat detection and vulnerability management.
- You strengthen your network security posture.
Building Digital Resilience
You build digital resilience by integrating ai-powered security solutions into daily operations. You use real-time threat monitoring, endpoint detection, and advanced analytics. You automate incident response to reduce human error and ensure operational continuity during disruptions.
- Real-time threat monitoring through SIEM systems
- Proactive defense with endpoint detection and response
- Advanced analytics and ai for threat detection
- Automation for faster incident response
- Strengthening compliance and audit readiness
You use Microsoft Purview to monitor sensitive content and enforce compliance. You stay prepared for breaches and adapt to new threats. You create a resilient organization that can withstand cyberattacks and protect individuals.
Tip: Stay informed about cyber threat intelligence and invest in continuous vulnerability management to keep your defenses strong.
You see ai reshape cybersecurity and security in 2026. You gain smarter, adaptive defenses that protect your digital assets. You rely on ai for continuous monitoring, behavioral detection, and risk-based vulnerability management. You build trust by adopting responsible ai strategies and robust governance. You use ai to safeguard legacy infrastructure and cloud environments. You ensure privacy, transparency, and accountability in every security process.
You empower your team with ai-powered cybersecurity tools like Microsoft Purview. You maintain compliance and ethical standards. You prepare for evolving threats by following these steps:
- Use high-quality training data for ai models.
- Maintain human oversight in cybersecurity operations.
- Update ai models regularly.
- Test ai systems continuously.
- Integrate ai across your security stack.
- Establish clear governance policies.
| Key Areas of Focus | Description |
|---|---|
| Privacy and Data Protection | You safeguard sensitive information and comply with regulations. |
| Security | You mitigate cybersecurity threats and vulnerabilities. |
| Bias and Fairness | You ensure ai-driven decisions are impartial. |
| Transparency and Accountability | You establish clear ai decision-making processes. |
| Safety and Resiliency | You enhance ai system reliability for business continuity. |
You build digital resilience and stay ready for the future of cybersecurity.
FAQ
What is agentic ai in cybersecurity?
Agentic ai refers to systems that act independently to detect and respond to threats. You see these tools make decisions without waiting for human input. They help you protect your digital assets faster.
How does Microsoft Purview help prevent data leaks?
You use Microsoft Purview to monitor data access and classify sensitive information. Purview alerts you when someone tries to share confidential files. You set rules to block risky actions and keep your data safe.
Can ai detect insider threats?
Yes. Ai analyzes user behavior and flags unusual activity. You spot potential insider threats early. Ai helps you investigate and respond before damage happens.
What are the benefits of automating incident response?
You save time by automating incident response. Ai-driven playbooks guide you through each step. You resolve security issues quickly and reduce the impact on your business.
How do you stay compliant with ai-powered security tools?
You follow regulations like the EU AI Act and ISO/IEC 42001. Microsoft Purview helps you enforce policies and track compliance. You use audit logs to show you meet legal standards.
What should you do if you suspect a phishing attack?
You check the sender’s address and look for suspicious links. Ai tools scan emails for threats. You report the message to your IT team and avoid clicking unknown attachments.
How can you build digital resilience with ai?
You use ai for real-time monitoring and automated responses. You strengthen your defenses and recover quickly from cyberattacks. You keep your systems running and protect your organization.
Tip: Stay updated on new ai security features. Regular training helps you use these tools effectively.
🚀 Want to be part of m365.fm?
Then stop just listening… and start showing up.
👉 Connect with me on LinkedIn and let’s make something happen:
- 🎙️ Be a podcast guest and share your story
- 🎧 Host your own episode (yes, seriously)
- 💡 Pitch topics the community actually wants to hear
- 🌍 Build your personal brand in the Microsoft 365 space
This isn’t just a podcast — it’s a platform for people who take action.
🔥 Most people wait. The best ones don’t.
👉 Connect with me on LinkedIn and send me a message:
"I want in"
Let’s build something awesome 👊
1
00:00:00,000 --> 00:00:08,000
Yeah, welcome to another episode of the MC65 of M podcast today's conversion sides
2
00:00:08,000 --> 00:00:14,160
rights at the intersection of two of the most important topics that take right now are
3
00:00:14,160 --> 00:00:21,560
the factor intelligence and security joining us is Daniela Nuguiara.
4
00:00:21,560 --> 00:00:29,800
I think I hope I promote this right but I think a lot of almost no Gada almost.
5
00:00:29,800 --> 00:00:37,800
Yeah, I think a lot of people watching this show to pronounce me the right names wrong.
6
00:00:37,800 --> 00:00:42,160
Yeah, this is our net in Portuguese.
7
00:00:42,160 --> 00:00:45,080
Oh, in Portuguese.
8
00:00:45,080 --> 00:00:46,920
Yeah.
9
00:00:46,920 --> 00:00:53,440
Daniela is senior product manager at Microsoft focused on Microsoft PUE, insider risk data security
10
00:00:53,440 --> 00:00:56,280
and I had a security experience.
11
00:00:56,280 --> 00:01:01,760
Daniel also brings more than two decades of experience across productivity compliance
12
00:01:01,760 --> 00:01:04,480
architecture enterprise transformation.
13
00:01:04,480 --> 00:01:12,280
He also has a long time certificate for my NDP because he is at Microsoft actually.
14
00:01:12,280 --> 00:01:19,640
So I think you're moving this title and one of the voices help organization understand
15
00:01:19,640 --> 00:01:23,280
and how to adapt security responsibility.
16
00:01:23,280 --> 00:01:30,120
Yeah, today we will explore how AI changes security, what organizations are getting wrong about
17
00:01:30,120 --> 00:01:37,840
co-pilot readiness and the future of insider risk and what secure AI really looks like.
18
00:01:37,840 --> 00:01:41,200
Daniela, welcome to the show.
19
00:01:41,200 --> 00:01:50,200
Very welcome and thank you very much for for the invite for this podcast pleasure for me
20
00:01:50,200 --> 00:01:51,720
being here.
21
00:01:51,720 --> 00:02:03,680
And let's go let's talk about M2 65 security co-pilot AI and let's go talk about I think the
22
00:02:03,680 --> 00:02:13,640
subject is most say the in talk it in the world AI always AI and the impact in the security
23
00:02:13,640 --> 00:02:17,120
companies, the security in the companies.
24
00:02:17,120 --> 00:02:22,000
I think he's very proud to be here.
25
00:02:22,000 --> 00:02:23,240
Thank you.
26
00:02:23,240 --> 00:02:29,400
And yeah, I will before we deep dive into the traffic, I will a little bit to learn about
27
00:02:29,400 --> 00:02:30,880
you.
28
00:02:30,880 --> 00:02:35,880
You work across productivity security compliance and AI.
29
00:02:35,880 --> 00:02:38,520
What pulled you into this space?
30
00:02:38,520 --> 00:02:39,520
Okay.
31
00:02:39,520 --> 00:02:46,840
I work it in the I'm also I mean, I mean, always modern work guy always.
32
00:02:46,840 --> 00:02:49,560
I love about productivity.
33
00:02:49,560 --> 00:02:59,000
I work in Microsoft partner, managed partner about think five years and always talking
34
00:02:59,000 --> 00:03:10,560
about share point teams, productivity, all the solutions inside Microsoft 365 that resolve
35
00:03:10,560 --> 00:03:15,480
the productivity problems of the people always.
36
00:03:15,480 --> 00:03:23,080
But in this partner college, Claude targets is a is a very familiar partner right in Brazil.
37
00:03:23,080 --> 00:03:32,520
The partner, the this partner, I started there for I think when we was maybe I think 11
38
00:03:32,520 --> 00:03:39,480
people at the company today, I think that more than 100 is a very at the beginning in Microsoft
39
00:03:39,480 --> 00:03:49,840
to tell us that you go back go to the secret side of the technology, the invest in the in
40
00:03:49,840 --> 00:03:57,120
the security Microsoft security and call target investing in the security in I'm trying to
41
00:03:57,120 --> 00:04:05,020
understand the security environment, the security platform, the products that involved in the
42
00:04:05,020 --> 00:04:07,620
Microsoft ecosystem.
43
00:04:07,620 --> 00:04:18,340
And I studied a lot, defender in tune, per view, and I begin to teach customers and doing workshops
44
00:04:18,340 --> 00:04:26,700
to the customers about Microsoft security about Sentinel, about per view, about how can customers
45
00:04:26,700 --> 00:04:33,140
can track the information in the data leaks in your company.
46
00:04:33,140 --> 00:04:44,620
This is so useful to me because I learn a lot of how security in companies works and I
47
00:04:44,620 --> 00:04:54,100
am a I'm a steady addicted to someone like that because I study a lot of think I when I when
48
00:04:54,100 --> 00:05:01,940
for example when AI serves and become to the world comes to the world, I oh my god, this
49
00:05:01,940 --> 00:05:11,900
is changed the world and I let's bring let's big together productivity security in AI in
50
00:05:11,900 --> 00:05:21,060
I hope okay, this is could be very useful for our companies, how can I transform the people,
51
00:05:21,060 --> 00:05:30,060
how the people works and the productivity and as I think that I always said to the customers
52
00:05:30,060 --> 00:05:40,300
in the call targets, the balance is a fundamental is a fundamental thing that you have in your
53
00:05:40,300 --> 00:05:51,420
company, the balance between productivity and security, you never could ever make a environment
54
00:05:51,420 --> 00:05:59,500
so much secure, but you never in you forget about the productivity, but you knew take a
55
00:05:59,500 --> 00:06:05,500
environment all with all the productivity deal, maybe don't care about the security, the
56
00:06:05,500 --> 00:06:14,860
balance I think is the secret and when I teach or teach customers and learn about the
57
00:06:14,860 --> 00:06:24,220
environment, the per view I loved the subject, I love the platform and I studied a lot of
58
00:06:24,220 --> 00:06:35,660
the technology and this is was for me is a beginning of our journey and I just come to Microsoft,
59
00:06:35,660 --> 00:06:43,660
I'm very new at Microsoft only five months, I started the beginning of this year in the
60
00:06:44,620 --> 00:06:55,740
per view team as senior product manager and I now I see how everything works, the step-by-step
61
00:06:55,740 --> 00:07:07,260
of feature requests or a question and a feature request by a customer how works, how the product
62
00:07:10,860 --> 00:07:22,380
increase the productivity and increase the value for the customer is a lovable journey and I
63
00:07:22,380 --> 00:07:30,300
I'm very happy with this opportunity to engage customers, to talk with the customers about
64
00:07:30,300 --> 00:07:37,180
the per view solution especially in my team, I'm a specialist in the inside the risk management
65
00:07:37,180 --> 00:07:46,220
that the tool that monitor the behavior of the users and for example for when the
66
00:07:46,220 --> 00:07:54,940
who know for example user leaves a company or maybe the users do the big downloads from share
67
00:07:54,940 --> 00:08:03,260
points and an excessive like a exploration that is the name for the so many files in the
68
00:08:03,260 --> 00:08:13,820
environment I think this is a very useful for the users for the companies because in the times of AI,
69
00:08:13,820 --> 00:08:22,220
often artificial intelligence so many users are discovering data and the companies have
70
00:08:22,220 --> 00:08:32,060
have make make ways to block this not block but monitoring these activities in
71
00:08:33,020 --> 00:08:44,140
and avoid data which will go out of the company this is a very important concern that we have
72
00:08:44,140 --> 00:08:51,740
in the in the companies today I think the per view is the is a fundamental platform for for customers.
73
00:08:51,740 --> 00:09:01,180
Before we did that one question you have been both deeply technical and also customer
74
00:09:01,180 --> 00:09:05,660
financing how is it shaping your perspective?
75
00:09:05,660 --> 00:09:20,700
I think that at my previous company we always talk about we all in the company are sellers.
76
00:09:20,700 --> 00:09:30,860
I believe a lot in on it but I'm technical I'm a very developing guy
77
00:09:30,860 --> 00:09:38,940
but I make a code but when make a code and you deliver to the customer you have to sell your opinion,
78
00:09:38,940 --> 00:09:52,060
your code, your programming, what you're developing and I think that we always be sellers in your
79
00:09:52,060 --> 00:10:00,300
entire life in your always that we company that we work and I have a balance at I think
80
00:10:00,780 --> 00:10:10,700
maybe 15 years ago a manager that I have had in the past in the company that I work at in the
81
00:10:10,700 --> 00:10:17,100
in Curitiba told me that the Nilo you are a press sales guy but I'm just farming in the
82
00:10:17,100 --> 00:10:29,340
in McKinsey in size computing in computer science oh my god sales and I only heard the the the
83
00:10:29,340 --> 00:10:37,260
word sales no sales I'm a technical guy this is offensive for me sales not I don't know I
84
00:10:37,260 --> 00:10:44,780
I can't imagine that I studied a lot of four or five ten ten years to you called me a sales
85
00:10:44,780 --> 00:10:52,940
person forget it about it but Nilo wait a minute let's let's let me explain what a pre sales guy
86
00:10:53,660 --> 00:11:04,460
does in he explained me and I'm discovered my my my my talent how can I say that because I'm just
87
00:11:04,460 --> 00:11:13,100
talk a lot of customers and talk a lot of technical guys to make the the right solutions for
88
00:11:13,100 --> 00:11:22,380
the customers I think this is a the very good skills skill that we have we have I have
89
00:11:22,940 --> 00:11:27,260
to to offer to the customer to the companies I think is a very very good
90
00:11:27,260 --> 00:11:35,020
yeah first I will say congrats to the job at Microsoft and you are on the very much you
91
00:11:35,020 --> 00:11:45,420
I started a little bit critical as I the first time I touched P.U. view it's was Microsoft only
92
00:11:46,460 --> 00:11:56,700
and what did you think how has and the last years months what I have changed in how develop
93
00:11:56,700 --> 00:12:10,460
P.U. view from your perspective AI AI changes everything because in the past we always think in
94
00:12:10,460 --> 00:12:23,180
block things the proxy servers the we always control the what the users view access and block sites
95
00:12:23,180 --> 00:12:36,940
like YouTube or Facebook or another social media sites to to users don't access but nowadays we see
96
00:12:39,740 --> 00:12:46,700
the world is changing to not blocking but control but monitoring is the best word
97
00:12:46,700 --> 00:13:00,780
monitoring the environment and P.U. view has totally packed in this in this in this environment because
98
00:13:00,780 --> 00:13:10,300
P.U. view does the the monitoring of what the users are doing or investigates what the user
99
00:13:10,300 --> 00:13:20,860
are doing or maybe for a data leak that I want to discover who's who's go out with this information
100
00:13:20,860 --> 00:13:28,140
I can discover with it's covery with the new product that we have in the in the in the fall now
101
00:13:28,140 --> 00:13:35,580
the data security investigation is a new product inside the purview that we have the SI
102
00:13:35,580 --> 00:13:43,660
and to do investigations in environments and with the documents with passwords and the users
103
00:13:43,660 --> 00:13:52,940
and AI change everything in this platform because now the companies wants to discover what's the
104
00:13:52,940 --> 00:14:04,060
user are trying to ask today AI the purview have have a like a very important
105
00:14:04,060 --> 00:14:14,780
important how can I say her role in this in this in this in this environment in this in the
106
00:14:14,780 --> 00:14:23,580
in the all the the computer in the in the companies I believe in in this awesome especially we only
107
00:14:23,580 --> 00:14:31,980
think about AI and security now I think nearly every company wants AI right now do you think
108
00:14:31,980 --> 00:14:42,700
organized organized are moving too fast to AI without thinking about the security topic
109
00:14:43,820 --> 00:14:51,420
I always talk about this in the in the my previous company called targets with the customers to adopt
110
00:14:51,420 --> 00:15:03,660
AI but at first trying to discover how your security works in your environments how the documents
111
00:15:03,660 --> 00:15:11,820
are protect in your environments for example with AI in the in the sharp point you can ask to
112
00:15:11,820 --> 00:15:20,620
compile it for example in Microsoft 365 365 how much is paying for the president of the company or
113
00:15:20,620 --> 00:15:31,100
what's the salary of the all the users in this company is is very easy to a to a user that have
114
00:15:31,100 --> 00:15:39,980
access not to have access but when the copilot shown the AI have access has access to the to the
115
00:15:39,980 --> 00:15:47,100
all the documents is very important to you understand what's the permission that you have in
116
00:15:47,100 --> 00:15:57,740
sharp point in my past my previous as MCT Microsoft certified training that I teach some some classes
117
00:15:57,740 --> 00:16:06,860
some courses I teach sharp point in I always talk to the to the to the the guys about the sharp point
118
00:16:06,860 --> 00:16:16,060
permission is so important to what the people can see what the people can edit and have control
119
00:16:16,060 --> 00:16:26,460
and now in the past I said about the person want to have access to that now we said we say agents
120
00:16:26,460 --> 00:16:34,140
what's the agents can access the information the files the the rewards files the excel files and
121
00:16:34,140 --> 00:16:45,100
so important to you map the the sharing of of the in the Microsoft there are there is a tool that
122
00:16:45,100 --> 00:16:55,100
do that that access governance that you will discovery what's data as is in the new have a data
123
00:16:55,100 --> 00:17:03,100
governance this is so important always before the AI I always always say said to my customers about
124
00:17:03,100 --> 00:17:11,100
the data governance where your data is where your data will go where you data are stored when when
125
00:17:11,100 --> 00:17:20,540
user transfer document for a paint drive for example you know about that you know if you if you
126
00:17:20,540 --> 00:17:31,100
user record and transfer or copy a document contract to a to a paint drive or send this document to
127
00:17:31,100 --> 00:17:38,620
your Gmail your personal email do you know about that never never the customers never is a very
128
00:17:38,620 --> 00:17:46,300
funny situation that when I customer is a very huge company right in Brazil told me that the
129
00:17:46,300 --> 00:17:54,940
deal we have always money to read you control everything you have all the usb ports block it you will
130
00:17:54,940 --> 00:18:03,580
never discover nothing right in in my environment in we just deploy the inside the risk in your
131
00:18:03,580 --> 00:18:15,740
environment in a we discover transfers of true to another devices via bluetooth the customers the
132
00:18:15,740 --> 00:18:26,060
nilo via bluetooth yes you have I think the number I think is about five hundred transfer via bluetooth
133
00:18:26,060 --> 00:18:32,460
in your environment the nilo wait a minute please and I have a five minutes to the customer in the
134
00:18:32,460 --> 00:18:41,580
customers was we were covered in fixes fix this this problem in your environment
135
00:18:43,340 --> 00:18:58,780
ambulances or a police I think a little bit about I can't from the data science part there was
136
00:18:58,780 --> 00:19:07,020
the large was the fabric and I think a little bit companies now yeah we have to shit engine out
137
00:19:08,060 --> 00:19:19,420
argument but there was not so many fears and and feeling about security because okay the CFO and some
138
00:19:19,420 --> 00:19:27,020
other dudes look at power via dashboard so then it's now did you see it's it's it's it's a chance to
139
00:19:27,020 --> 00:19:35,100
do it data especially in governance compliance and risk topics that I believe a lot of a lot of
140
00:19:36,780 --> 00:19:46,460
people and in my team in the customers are thinking about about it because I think it's very
141
00:19:46,460 --> 00:19:56,940
useful for for the companies when you can discover and have the data governance in your
142
00:19:56,940 --> 00:20:03,740
environment where where is the data are and where is the old information are distorted in my
143
00:20:03,740 --> 00:20:11,020
company is so important in the past the company oh my god I have a file file server I have share
144
00:20:11,020 --> 00:20:18,060
point to a crash I have to share a point online no matter where is the file is but okay no matter
145
00:20:18,060 --> 00:20:28,700
for me the users can you will go for this each user will go for near files like a one drive but
146
00:20:28,700 --> 00:20:39,740
a company will drive but I think with AI the the companies wake up for the for for this and discover
147
00:20:39,740 --> 00:20:53,020
that it's so so important to your your govern the data and and knows about what the user I'm doing
148
00:20:53,660 --> 00:21:03,100
are asking to AI are asking for information or at the other side sharing confidential information
149
00:21:03,100 --> 00:21:09,260
outside the company for example in chat GPT taking contracts,
150
00:21:09,260 --> 00:21:15,580
sigilous contracts and confidential contracts and sharing in the in the website that you never
151
00:21:15,580 --> 00:21:24,380
know and the you don't know where is the information will go and I think is a very important concern
152
00:21:24,380 --> 00:21:32,540
that the company has today to to to understand what's happened with data in your environment especially
153
00:21:32,540 --> 00:21:39,900
that you talk it for example in the party BI party BI I think is a is a is a very important
154
00:21:41,820 --> 00:21:48,780
data that you can report as a dashboard to the entire company or for the market or for
155
00:21:48,780 --> 00:21:57,340
for the public in the public view but you have to know what is this information and if this
156
00:21:57,340 --> 00:22:04,940
information is public is internal is could be shared there's so many
157
00:22:06,860 --> 00:22:15,500
preoccupations concerns that you have missed have from our weekday I know I have to prepare this
158
00:22:15,500 --> 00:22:24,220
this interview and I have used one level graph API from LinkedIn and I have a look about
159
00:22:24,220 --> 00:22:33,100
co-pilot and security the most my my search my research and there it's it's for looking for a
160
00:22:33,100 --> 00:22:43,980
bus and one bus word nearly the one of the most people say is AI readiness in this space can you
161
00:22:43,980 --> 00:22:59,180
explain what it really means beyond marketing bus word I think the the marketing always say that
162
00:22:59,180 --> 00:23:15,020
are you you lost your job you will yeah you you have the word in your hands and like a like a movie
163
00:23:15,020 --> 00:23:23,500
I I don't live in this because I think that we have control of course of the AI AI
164
00:23:26,940 --> 00:23:34,940
become us more productivity I believe only this for example I just with with my manager
165
00:23:34,940 --> 00:23:44,300
I have a one to one with my manager and I ask you AI searching my emails in my team's message
166
00:23:44,300 --> 00:23:52,940
in my meetings and said say what I do in this week and organized it by company organized by
167
00:23:53,900 --> 00:24:02,700
actions and and show me what I've done this this week is a perfect because searching on my emails
168
00:24:02,700 --> 00:24:12,780
what emails are I sent to the customers to the to the colleagues what my actions with the customers
169
00:24:12,780 --> 00:24:25,340
and when in the maybe 30 seconds I have all my meeting in a summary to discuss to share with my with
170
00:24:25,340 --> 00:24:36,460
my manager and I think that the next step of the of the of the companies to do that is is teaching is
171
00:24:37,900 --> 00:24:48,380
creating a future I believe a lot of of of in this miracle in the in a future of AI each company
172
00:24:48,380 --> 00:24:59,340
will have a future already have a future but the company have to create a future of AI
173
00:24:59,980 --> 00:25:11,260
what so what the company have to ask to to themselves of what is my future of AI I will block everything
174
00:25:11,260 --> 00:25:20,380
I will share everything I will allow everything to can be shared or can be discovered all the all
175
00:25:20,380 --> 00:25:29,580
the users in my company can use such a pt or copaylach or not or my all my data can be discovered for
176
00:25:29,580 --> 00:25:40,380
for AI I think is is very very very important to to the companies create this culture for to discuss
177
00:25:40,380 --> 00:25:48,540
with your employees to discuss with your board or or your CEO or I don't know but it's very important to
178
00:25:48,540 --> 00:25:57,420
to form and the marketing team of the of the of the for example the company to for example in
179
00:25:57,420 --> 00:26:05,340
this diagram or or in in linkage in how the the marketing of this company will tell to the world
180
00:26:05,340 --> 00:26:16,860
how use or how transform your company to invest yours or don't know invest yours or not know
181
00:26:16,860 --> 00:26:26,780
but how we use the day I think is is a journey but it's very important journey that all companies have to
182
00:26:26,780 --> 00:26:34,460
do from from your perspective and I think about organizations where do they
183
00:26:34,460 --> 00:26:42,140
where's the big biggest struggle the permissions over sharing complaints change management
184
00:26:42,140 --> 00:26:49,740
what what what sharing over sharing over sharing because especially right in Brazil right in Brazil we
185
00:26:49,740 --> 00:26:59,660
always we we're talking I always in my in my courses that I I do with as mct always talk about the
186
00:26:59,660 --> 00:27:04,460
dance of full permission dance of full permission because we always
187
00:27:04,460 --> 00:27:11,180
give full permissions of everything then you know I don't have asked if for permission to to him
188
00:27:11,180 --> 00:27:19,580
but then give give full full control to to this user always in Brazil always that company that
189
00:27:19,580 --> 00:27:28,540
I I see I saw in my in my in my past always the companies never have concerns or
190
00:27:28,540 --> 00:27:39,820
occupations about how this this file or this folder or this library in SharePoint or in the file
191
00:27:39,820 --> 00:27:47,820
server are shared or the permission that have it is file I think that's the the main
192
00:27:48,860 --> 00:27:54,540
preoccupation is I think the biggest problem that we have in the the companies are
193
00:27:54,540 --> 00:28:03,900
over sharing of all the files don't have control this is always always about data governance this is
194
00:28:03,900 --> 00:28:14,380
always about data governance AI the SharePoints the file server CRM systems I don't know all the systems
195
00:28:14,380 --> 00:28:27,500
or or a ER ERP that you have always is is is about what your govern your data what do you think
196
00:28:27,500 --> 00:28:39,100
Pueville plays or what plays let me think what role do you play in the responsible AI
197
00:28:39,100 --> 00:28:48,300
actually monitoring I think the how can I set a minutes ago the company is always
198
00:28:48,300 --> 00:28:59,660
block it access to the users and then the new normal is monitoring in the Pueville do that exactly
199
00:28:59,660 --> 00:29:06,860
that monitoring the environment the users about the behavior of the users when you know for example
200
00:29:06,860 --> 00:29:17,020
users don't know maybe 100 of files of SharePoint this is have to be monitored and have actions
201
00:29:17,020 --> 00:29:23,100
automatic actions that you have in Pueville and inside the risk for example the product the
202
00:29:23,100 --> 00:29:31,020
adaptive protection that you have that you have in the inside the risk when you when a for example
203
00:29:31,020 --> 00:29:40,940
I don't know maybe a user sent sent by mail 100 files for your personal mail you automatically can
204
00:29:40,940 --> 00:29:52,620
block this user reset your password and in mail your manager to what's happened in in announced to
205
00:29:52,620 --> 00:30:00,220
to to age R for example what's a cure with with your with the ordering Pueville with this user I think the
206
00:30:00,220 --> 00:30:10,860
the Pueville has a very important role in this in this case in you you we have a lot of products inside
207
00:30:10,860 --> 00:30:18,060
Perfuel I just talk about the side data security investigation that you can discover where is the
208
00:30:18,060 --> 00:30:27,100
data is for example I can discover what files in my environments have user in password in your
209
00:30:27,100 --> 00:30:34,460
body I can discover that it's covered to investigate for example my list of price of products
210
00:30:34,460 --> 00:30:44,140
was leaked from my environment and I can use the discovery to do that I can do use the SPM data security
211
00:30:44,140 --> 00:30:53,820
posture management to see what my posture of of my company inside a security environment what
212
00:30:53,820 --> 00:31:02,620
the posture of what I have to do in my environment to avoid that I leak this is very important to
213
00:31:02,620 --> 00:31:11,020
to the companies to discover the SPM is a is a very I think the I think I will be the the most
214
00:31:11,020 --> 00:31:19,900
to use it platform of a solution inside Perfuel that the companies will use in the future that a lot
215
00:31:19,900 --> 00:31:26,540
of other products for example you you can complex manager to discover your punctuation your score
216
00:31:26,540 --> 00:31:34,540
security score to in your company to do little actions in your environment to protect the data
217
00:31:34,540 --> 00:31:45,500
what the data is important to monitor or not I think each company have a have a have a concern about
218
00:31:45,500 --> 00:31:54,540
this but I think is the future of the Perfuel will be agents inside the Perfuel already have
219
00:31:54,540 --> 00:32:07,100
we are developing this with already is in G.A general of ability but some features especially
220
00:32:07,100 --> 00:32:18,540
in the agents are we are developing to automatically discover the what's the most important alerts
221
00:32:18,540 --> 00:32:30,380
that I have to investigate or to see before my 1000 of alerts that I have in my in my table
222
00:32:30,940 --> 00:32:41,740
what the of this 1000 of alerts what the 10 most important that I have to look first agents we do
223
00:32:41,740 --> 00:32:50,860
that we agents you tell you that make your your attention have your attention needs attention
224
00:32:50,860 --> 00:32:57,340
these alerts these alerts base it in your environment base it in your instruction that you
225
00:32:58,540 --> 00:33:14,300
gave to to to agents we are developing a lot of agents to to involve the all the security
226
00:33:14,300 --> 00:33:23,580
platform in the different of this is the agents are autonomous and every day the agents will
227
00:33:25,420 --> 00:33:33,580
investigation your alerts to tell you that what is most important what the I love this
228
00:33:33,580 --> 00:33:43,740
the history of the user for example a user done I don't know 100 of the loads of share points
229
00:33:43,740 --> 00:33:53,180
but yesterday the the users also done 20 files and after before and before yesterday
230
00:33:53,820 --> 00:34:04,380
made I don't know 500 files and the agents tell me the history of the of the users inside the company
231
00:34:04,380 --> 00:34:15,180
at the last 30 days is a is a very useful to to analysts that are investigating that that alert to
232
00:34:15,180 --> 00:34:23,660
oh my god this user is a lot doing a lot of things dangerous I have to mark the user as
233
00:34:23,660 --> 00:34:29,340
a his key user we call it this in the environment he's key user because the user are doing a lot of
234
00:34:29,340 --> 00:34:36,140
not complying things let's let's monitor this user is very important to the platform
235
00:34:36,140 --> 00:34:44,620
for people they are unfamiliar with view view how would you explain it to a 10 year old or let
236
00:34:44,620 --> 00:34:51,580
let us go a level harder how do you explain it to see level manager what's perfume
237
00:34:51,580 --> 00:35:06,220
like a baby camera in your room to a baby you don't block a baby to you
238
00:35:07,740 --> 00:35:19,820
to wake up your block you a baby to walk in a room but you can control with a camera and see what
239
00:35:19,820 --> 00:35:29,260
the baby was doing in this room in make actions for example automatically I will turn off the light
240
00:35:29,260 --> 00:35:42,780
or turn on I don't know the music in the room to relax the baby to sleep the analogy that I make
241
00:35:42,780 --> 00:35:51,100
is like a monitoring things is like a monitoring a baby on a camera I think the preview does this
242
00:35:53,420 --> 00:36:02,220
also this was a really good explanation and when you have to rate or say what are the most underrated
243
00:36:02,220 --> 00:36:09,100
capabilities inside Microsoft pure view for you today and rate it
244
00:36:09,100 --> 00:36:16,940
well underrated yeah I don't know I have to think very good question
245
00:36:22,140 --> 00:36:26,700
I don't know Mirko let me see maybe
246
00:36:26,700 --> 00:36:39,820
let me see maybe outage it inside the purview for example I think could be
247
00:36:39,820 --> 00:36:51,260
or rated in this case I think it could be I think it could be the delgit I think
248
00:36:51,260 --> 00:37:01,900
awesome and we have talked to the Sparrow a little bit about the insider risk how has it evolved
249
00:37:01,900 --> 00:37:11,180
over the last few years for your perspective the future of the insider risk
250
00:37:11,180 --> 00:37:24,780
no did you see from insider risk what was I think I changed the question is more we have all
251
00:37:24,780 --> 00:37:32,060
the time the topic inside our risk but how has it changed in the age of AI
252
00:37:32,060 --> 00:37:45,260
the age of AI I think will be excuse the AI I think the
253
00:37:48,700 --> 00:37:57,180
you are giving to the AI to the agents behavior to don't
254
00:37:57,180 --> 00:38:10,060
hallucinate and and do procedures that you have control and that you have the
255
00:38:13,260 --> 00:38:23,500
like a receipt like a receipt that you have every like a workflow to to to the task some like that
256
00:38:23,500 --> 00:38:32,620
I have the the next step or the future of the AI because AI is very funny you have AI
257
00:38:32,620 --> 00:38:40,780
after that you have agents and after I think the the next step the next wave of AI
258
00:38:41,980 --> 00:38:52,300
I think it already is the the the skills I think that everyone have to study have to discover have to
259
00:38:52,300 --> 00:39:01,900
develop your skills to work for you in in yeah environment I have I think that skills is very
260
00:39:01,900 --> 00:39:12,300
important right here Microsoft we have of course I I cannot tell but some programs that we
261
00:39:12,300 --> 00:39:24,380
uses in the in the AI that use a lot of skills using not so open in AI but and tropic another
262
00:39:25,740 --> 00:39:37,660
others AI's or others LLM's I think is the next steps in the future of of AI will grow up you
263
00:39:37,660 --> 00:39:47,500
involve evolve the the skills to more people each or share I think the the futures the skill that you
264
00:39:47,740 --> 00:39:56,620
develop in you share with me I develop or create it another skills and I will share with you I think
265
00:39:56,620 --> 00:40:06,780
you will be the the share the word share about skills exactly that I already have a site with
266
00:40:06,780 --> 00:40:15,020
the skills skills I think the skills dot sh I think is the site is the site to be tell a lot of skills
267
00:40:15,020 --> 00:40:23,740
that the people who are publishing your skills and grow up this the number of skills to use is to use
268
00:40:23,740 --> 00:40:31,180
it in your in your environment or in your AI by particular AI I think I believe in that
269
00:40:31,180 --> 00:40:41,340
how important did you see automation and modern compliance operations totally totally I am I mean
270
00:40:41,340 --> 00:40:48,540
love in the past I think it's 10 years ago about power automate I always when I
271
00:40:48,540 --> 00:40:57,660
done I think one two three times the four times no I will automate this I always automate
272
00:40:57,660 --> 00:41:06,620
everything in my life I have a house automated how can I say if I say Alexa turn off the lights
273
00:41:07,180 --> 00:41:15,180
of the of the of the offcy the turn off the off I have my entire my entire house are automated and my
274
00:41:15,180 --> 00:41:26,140
I till I also automated I always use it the or automated to automate everything in my life when
275
00:41:27,900 --> 00:41:40,300
when the AI serves in the past oh my god I can use AI to call automation and this automation could
276
00:41:40,300 --> 00:41:49,900
be use AI to discover a thing and I believe I totally believe in the the the joint between AI
277
00:41:49,900 --> 00:41:58,860
automation that the workflows that you have in automation I think this is a very good thing that you
278
00:41:58,860 --> 00:42:07,900
can develop and discover in your in your productivity life and you use actually in your daily usage
279
00:42:07,900 --> 00:42:15,900
of of IT of your computer I always automate everything that I can for example I love
280
00:42:18,220 --> 00:42:28,460
shortcuts always windows D windows D windows R windows L windows B to to your when you're we have
281
00:42:28,460 --> 00:42:39,180
a lot of screens to project to monitors for example I love to to to to remind and recording my mind
282
00:42:39,820 --> 00:42:51,260
the their shortcuts I love to jump more into the future of co-pilot
283
00:42:51,260 --> 00:43:01,660
I don't know if you're lowly about talk about it but what how do you see the peer view or
284
00:43:01,660 --> 00:43:09,420
and and co-pilot or the I call it a peer view co-pilot what what
285
00:43:09,420 --> 00:43:16,540
do you think about this and what's what's going on? um saying about co-pilot Microsoft 365 co-pilot
286
00:43:16,540 --> 00:43:28,220
I think the the future of co-pilot you'll be using so many different LLMs from un-tropic from
287
00:43:28,940 --> 00:43:41,900
Open and I from Gemini I don't know from Amazon I think the I think the the the secret of the
288
00:43:41,900 --> 00:43:52,220
co-pilot is using all the best AI's of the world with uh corporates data this is the secret
289
00:43:54,220 --> 00:44:01,660
when you have so many uh corporates information you have to use AI in this information
290
00:44:01,660 --> 00:44:10,620
Microsoft don't don't matter what is if is open and I if it's clouds of front-tropic or I don't know
291
00:44:10,620 --> 00:44:22,620
or from meta uh no matter the important thing of AI inside Microsoft is how you use AI
292
00:44:22,620 --> 00:44:34,380
with your corporate data this is the importance of AI and the co-pilot view uh are going to to this
293
00:44:34,380 --> 00:44:44,220
to to users the usability I think the secrets of the co-pilot in the future is the usability how
294
00:44:44,220 --> 00:44:55,180
the new new users will discover co-pilot inside the world inside excel inside uh park points in your uh
295
00:44:55,180 --> 00:45:04,940
I don't know in your presentation how co-pilot will help me in my day by day in my daily uh users
296
00:45:04,940 --> 00:45:13,420
of my of my computer I think the uh Microsoft is uh walking in this way to facilitate
297
00:45:14,060 --> 00:45:24,460
the use of AI in the corporate environments no matter what AI will use and that's the uh the
298
00:45:24,460 --> 00:45:32,540
background of course the security Microsoft are concerning about all the data is so important
299
00:45:32,540 --> 00:45:41,260
the security guys the compliance guys are there are uh environment totally uh deployed and
300
00:45:41,260 --> 00:45:47,820
configured with with inside the risk with policies of the inside the risk uh with the policies of
301
00:45:47,820 --> 00:45:55,820
the op is so very important the data uh observation is so very important in the in the environment uh
302
00:45:55,820 --> 00:46:02,940
the discovering your poster security with the SPM in your environment with the new data that are
303
00:46:03,900 --> 00:46:12,220
creating in the in the in the environment what's the data is uh a secret is confidential is personal
304
00:46:12,220 --> 00:46:20,620
data is public is very important to the company discovering this information the classification
305
00:46:20,620 --> 00:46:27,260
is this a very important thing that I I forget to to to said about Microsoft information protection
306
00:46:27,260 --> 00:46:35,340
that the F is a classification of your documents is all always companies oh my god then you
307
00:46:35,340 --> 00:46:42,300
don't matter this what's the reason I will classify a word file to confidential no matter this
308
00:46:42,300 --> 00:46:51,660
this document is in the short point but now with AI is very very important uh macro the the you the
309
00:46:51,660 --> 00:46:57,420
companies are discovering that uh information macro macro search information protection your
310
00:46:57,420 --> 00:47:05,660
classification of the documents is so important to go over the data inside your company for example
311
00:47:05,660 --> 00:47:14,380
when documents are word document for example uh was classified as confidential uh
312
00:47:16,700 --> 00:47:25,900
couldn't uh impossible to transfer or to send by mail this is a configurable uh by purple
313
00:47:25,900 --> 00:47:33,420
it's so very important to this classification and now the company are discovering that the important
314
00:47:33,420 --> 00:47:40,060
the the the importance of the classification of files of i mail for example when i say i mail
315
00:47:40,060 --> 00:47:47,980
in class file in mail as confidential the should not be forward for external user for example
316
00:47:47,980 --> 00:47:56,780
this is so important in the in the companies now with AI for for my for my feeling um i was on so many
317
00:47:56,780 --> 00:48:10,860
events or Microsoft events or uh around Microsoft and we have one people they say okay you have to
318
00:48:10,860 --> 00:48:21,740
achieve strong security and the other say we need great employee experience um how can organization
319
00:48:21,740 --> 00:48:29,660
realistic uh achieve both an individual can view you play and and to achieve the achieve the
320
00:48:29,660 --> 00:48:43,100
i think you you have uh the both deep types of person in your company to discuss about this
321
00:48:43,100 --> 00:48:51,260
is that impossible to one person uh make this balance is impossible because always
322
00:48:51,660 --> 00:49:02,540
this person this person always will or uh make the balance uh goes to the to the security or to the
323
00:49:02,540 --> 00:49:14,220
productivity you have uh the both people uh in your company that uh the concern a lot of the what
324
00:49:14,220 --> 00:49:23,900
blocking everything that's uh security in the first time and i want you to block outside you have to
325
00:49:23,900 --> 00:49:32,140
to have you have to have this person in your company and have the guy oh my god i love to share
326
00:49:32,140 --> 00:49:41,580
everything i love to let's go every document to public key and you have the have to to have in
327
00:49:41,580 --> 00:49:51,020
their company they both uh personalities in your company and make this person uh talk about
328
00:49:51,020 --> 00:49:59,340
about the the the product data and make a balance between this i think i always talk about the
329
00:49:59,340 --> 00:50:06,700
future what's the future of the your company uh always is about the future if your
330
00:50:06,700 --> 00:50:13,420
future of your company is share everything you will share everything and no matter AI no matter
331
00:50:13,420 --> 00:50:19,660
data gov there's no matter if security you will always the future of the company is share or
332
00:50:19,660 --> 00:50:28,220
send always the document by mail is the future or the future of their company is or block it uh no
333
00:50:28,220 --> 00:50:36,700
matter if you have a share punch or wine that works via mobile phone but the company is
334
00:50:36,700 --> 00:50:43,580
block it to access information outside the company and you can't uh access the information in your
335
00:50:43,580 --> 00:50:53,100
mobile phone is impossible you have to to take the the both the personalities in your company to
336
00:50:53,100 --> 00:51:00,540
do the balance between productivity and security i i believe totally in this one person will not
337
00:51:00,540 --> 00:51:09,820
define uh this is impossible because we we have experience of or i don't know i do of data
338
00:51:09,820 --> 00:51:21,500
leaks for example or experience of productivity and i always uh push or push from my site
339
00:51:22,140 --> 00:51:31,020
uh open a red all our days pull off off to my side to to my experience i i i believe in this
340
00:51:31,020 --> 00:51:43,340
this one awesome so let's a little bit deep dive in it uh what separates an organization that
341
00:51:43,340 --> 00:51:56,940
successful with co-pilot and from this one they struggle a little bit. Sucess the companies are
342
00:51:56,940 --> 00:52:07,180
addicted about financial benefits being benefits of the AI for the companies uh i think is not a
343
00:52:07,180 --> 00:52:18,140
better way to you analyze uh uh i add option sushi for i add option in a company uh i think
344
00:52:18,140 --> 00:52:28,380
the best way i think in the future okay uh okay i will work at the at the company because the
345
00:52:28,380 --> 00:52:36,460
company use AI i think the future is this like in the past uh i like my my father for example
346
00:52:36,460 --> 00:52:44,060
oh my father i will i will work in itaú because have computers but the company don't have computers
347
00:52:44,060 --> 00:52:50,460
i will work in that company because i have computers i want to uh use computers in my day
348
00:52:50,460 --> 00:52:59,580
day by day in my daily usage i think in the future the the people will follow and we work you
349
00:53:00,300 --> 00:53:12,220
find for uh looking for companies that use AI in a daily usage in uh like uh okay i say in a what
350
00:53:12,220 --> 00:53:21,900
your AI future i think the people you're looking for that i will okay i will work for you but what's your
351
00:53:21,900 --> 00:53:31,500
AI future but another okay i will work here for some like that awesome um yeah let's make somebody
352
00:53:31,500 --> 00:53:42,940
fun with you to to talk and when we uh uh or what should IT professionals learn especially in
353
00:53:42,940 --> 00:53:53,900
and copilot or i uh to stay relevant from your perspective well to professional stay really
354
00:53:53,900 --> 00:54:05,260
for the AI stay relevant as i t professional to to get a job for us well stay in the job is impossible
355
00:54:05,260 --> 00:54:16,300
not uh use uh for example i always use in my workshops when i when i thought about the best
356
00:54:16,300 --> 00:54:27,020
about copilot uh AI's AI today is as in the past datilography you you you done uh that
357
00:54:27,020 --> 00:54:35,020
actually for course in the past i i done but today is no make sense you do a datilography
358
00:54:35,020 --> 00:54:44,540
course in your in your life what makes sense because you're already born with uh with a
359
00:54:44,540 --> 00:54:52,700
mobile phone in your hands in your just type just typing in your always uh and now you're already
360
00:54:52,700 --> 00:55:01,020
have the ability to type fast in your k-bore for example and the future day i will be the same uh
361
00:55:01,020 --> 00:55:10,460
this is the reason i don't believe in the courses of uh of engineering prompt for example i don't
362
00:55:10,460 --> 00:55:18,060
believe in this because you have the experience of prompt and you prompt to what your uh important
363
00:55:18,060 --> 00:55:27,020
for you in your life in your job in what characteristics of instructions that is most important for you
364
00:55:27,020 --> 00:55:36,780
and you have to uh learn about how you ask for AI about uh uh a subject and about the iq
365
00:55:36,780 --> 00:55:46,700
profs uh iq uh iq uh professionals i think that uh i i don't believe in only the iq the iq
366
00:55:46,700 --> 00:55:54,860
the iq are the compliance professionals the security professionals the i don't know the financial
367
00:55:54,860 --> 00:56:01,180
professionals all professionals in the all departments have to uh
368
00:56:03,580 --> 00:56:16,380
learn about the iq use in your daily routine to uh to discover how AI could help in your task
369
00:56:16,380 --> 00:56:25,660
all day i think i believe in that uh yeah uh oh we are around the out of time so uh yes i have a
370
00:56:25,660 --> 00:56:32,460
meeting right now with my egg i have to go so what one last question uh normally i
371
00:56:32,460 --> 00:56:41,820
way we have to do another meeting the uh session um i i think i'll for me personally i think i have
372
00:56:41,820 --> 00:56:51,820
used so many technology and uh i think microsoft has the greatest community built around i think the
373
00:56:51,820 --> 00:57:00,220
greatest community it's not only tech it's one of the greatest community um what will you say
374
00:57:00,220 --> 00:57:07,580
what make this community so great integration i always uh told through my customers to
375
00:57:07,580 --> 00:57:14,380
in my all microsoft to life if microsoft she is not colored microsoft she's colored integration
376
00:57:14,380 --> 00:57:23,420
because microsoft makes the integration between uh lots of forms as another other in in the world
377
00:57:23,420 --> 00:57:29,900
because you can integrate project which at point you can integrate with uh defender that
378
00:57:29,900 --> 00:57:35,900
integrate with dynamics that integrate with teams that integrate with i don't know poor AI
379
00:57:35,900 --> 00:57:47,180
all the microsoft solutions always are integrated with each other i i believe the the main uh that
380
00:57:47,180 --> 00:57:55,660
i love microsoft i i really love i i believe a lot of much in this company the reason is that all
381
00:57:55,660 --> 00:58:03,420
the integration between all the the solutions are it's not perfect because perfect is not but is
382
00:58:03,420 --> 00:58:10,460
uh you you discover a door to make this integration i think i think this is the the expression of the
383
00:58:10,460 --> 00:58:19,180
phrase you you you know uh that have a door to make integration for another platform and AI is
384
00:58:19,180 --> 00:58:25,100
so useful for that for example to you discover how integrate the platform's uh
385
00:58:25,580 --> 00:58:31,260
what between your your environments or your platform i think i believe in that
386
00:58:31,260 --> 00:58:42,460
yeah i i think uh when the greatest uh when you're great when you will be a great
387
00:58:42,460 --> 00:58:51,180
yeah adaption technology together like i don't know like an ambassador or something
388
00:58:51,980 --> 00:58:59,500
i think there's one thing for me in microsoft's base that's microsoft graph api i think if you do
389
00:58:59,500 --> 00:59:09,980
microsoft brain api on on social media you're born the game so yeah uh thank you danilo uh thank you
390
00:59:09,980 --> 00:59:17,580
miss most was was the pleasure to have you here i hope we can do another session um yeah
391
00:59:18,300 --> 00:59:25,500
and uh yeah the the last thing uh you must go to the next meeting everything the someone
392
00:59:25,500 --> 00:59:27,740
should take from this session today
393
00:59:27,740 --> 00:59:39,980
i have uh brazilian guy that's working with me and the person at my previous company called
394
00:59:39,980 --> 00:59:48,060
johnson cruz are you share your link edging with you and you invited him to to a podcast
395
00:59:49,020 --> 00:59:53,820
okay yeah make me the contact i will i will make your content by linking
396
00:59:53,820 --> 01:00:01,020
okay thank you so much uh i really enjoyed this and uh yeah thank you so much

Founder of m365.fm, m365.show and m365con.net
Mirko Peters is a Microsoft 365 expert, content creator, and founder of m365.fm, a platform dedicated to sharing practical insights on modern workplace technologies. His work focuses on Microsoft 365 governance, security, collaboration, and real-world implementation strategies.
Through his podcast and written content, Mirko provides hands-on guidance for IT professionals, architects, and business leaders navigating the complexities of Microsoft 365. He is known for translating complex topics into clear, actionable advice, often highlighting common mistakes and overlooked risks in real-world environments.
With a strong emphasis on community contribution and knowledge sharing, Mirko is actively building a platform that connects experts, shares experiences, and helps organizations get the most out of their Microsoft 365 investments.

Senior Product Manager
Danilo Nogueira is a **Senior Product Manager at Microsoft**, focused on security and compliance solutions within the Microsoft Purview ecosystem, particularly in Insider Risk and Data Security scenarios. He brings over two decades of experience in technology, with a strong background in productivity, security, and digital transformation, along with hands-on expertise in solution architecture and pre-sales strategy for enterprise customers.
Throughout his career, he has built a solid technical foundation, earning dozens of Microsoft certifications and previously being recognized as a Microsoft Most Valuable Professional (MVP). He is also a Microsoft Certified Trainer (MCT) since 2012, having delivered training sessions, workshops, and presentations to a wide range of audiences, from technical teams to business leaders.
Danilo has deep expertise in areas such as Microsoft 365 Copilot, Copilot Studio, and the Power Platform, and is known for connecting technology capabilities to tangible business outcomes. His work includes designing offerings, customer journeys, and adoption strategies aimed at maximizing productivity, strengthening security, and driving measurable ROI.
In addition to his technical and strategic contributions, he stands out for his communication skills and is frequently involved in events and presentations on artificial intelligence, security, and the future of work, actively contributing to the tech community and accelerating the adoption of Microsoft technologies.

![AI Meets Security: A Conversation with Danilo Nogueira [Microsoft] AI Meets Security: A Conversation with Danilo Nogueira [Microsoft]](https://img.youtube.com/vi/n4ZycV-zYRs/maxresdefault.jpg)





