Share
Uncovering Hidden Risks
How eDiscovery Can Help You Reduce Data and Risks in Three Steps
As data volumes continue to balloon, it's becoming clear that the quickest path to victory does not involve the fewest steps. This month's episode of Uncovering Hidden Risks explores ways to defensibly move data minimization decisions upstream to collaboratively expedite the eDiscovery process. EJ Bastien, Director of Discovery Programs at Microsoft, joins Erica Toelle and guest host Caitlin Fitzgerald for the discussion. EJ leads the eDiscovery and Litigation Support team at Microsoft. EJ shares his experience using technology to address the challenges of eDiscovery in the modern cloud world and shares some strategies and best practices to help mitigate risk.
In This Episode You Will Learn:
- Advice for organizations trying to handle the growing amount of new data types
- Best practices for implementing an effective eDiscovery strategy
- Why you should be excited about the future of eDiscovery
Some Questions We Ask:
- What trends are you seeing that are affecting the eDiscovery space?
- How you are approaching some of the new technology innovations?
- What benefits are there to using Purview eDiscovery Premium internally at Microsoft?
Resources:
View Caitlin Fitzgerald on LinkedIn
Related Microsoft Podcasts:
Listen to: Afternoon Cyber Tea with Ann Johnson
Listen to: Security Unlocked
Listen to: Security Unlocked: CISO Series with Bret Arsenault
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Uncovering Hidden Risks is produced by Microsoft and distributed as part of The CyberWire Network.
More episodes
View all episodes
18. Navigating Multicloud Security Risks: A Customer Story
17:52||Season 1, Ep. 18Christian Koberg Pineda, Principal Security DevOps Engineer, Cloud Security & Innovation, Falabella joins Erica Toelle and guest host Bojan Magusic, on this week's episode of Uncovering Hidden Risks. In today's episode Erica, Christian and Bojan explore the complexities of managing security across multiple cloud platforms, highlighting the importance of standardization and centralized management. They also cover some of the challenges in identity management, securing cloud-native applications, and the evolving role of AI in both enhancing and threatening cloud security. Christian and Bojan share with Erica the need for innovative, adaptable approaches to stay ahead in the rapidly changing cloud security landscape. In This Episode You Will Learn: Importance of standardization and centralization for security solutions Centralizing identity management to handle multiple identity providers Implementing security checks in development pipelines to detect vulnerabilities Some Questions We Ask: What should organizations consider when standardizing CSPM across multiple clouds? How can organizations defend against next-gen AI attacks on cloud infrastructure? What future factors will impact securing multi-cloud environments? Resources: Download the “2024 State of Multicloud Security Report" today to identify your greatest risks and learn actionable strategies for strengthening multicloud security. View Christian Koberg Pineda on LinkedInView Bojan Magusic on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Microsoft Threat Intelligence Podcast Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of N2K media network.17. Understanding Cloud Native Applications Protection Platform (CNAPP)
42:11||Season 1, Ep. 17Giulio Astori, Principal PM at Microsoft, joins Erica Toelle and guest host Yuri Diogenes on this week's episode of Uncovering Hidden Risks. Giulio Astori works as a Principal Program Manager for Microsoft Defender for Cloud and Yuri has been at Microsoft for the past 18 years and manages a Product Management team for the Defender for Cloud Product. In this discussion, Giulio delves into the world of Cloud Native Application Protection Platforms (CNAPPs), explaining their significance and utility in enhancing cloud security and protecting workloads. He explores the distinction between CNAPPs and Cloud Security Posture Management, shedding light on their roles in bolstering organizational security. In This Episode You Will Learn: What a Cloud Native Application Protection Platform is and why it's useful The difference between CNAPP and Cloud Security Posture Management How organizations can start to plan for CNAPP adoption Some Questions We Ask: Why is a CNAPP crucial for improving Cloud security and workload protection? Do you have any tips for how organizations can increase their maturity level? What distinguishes CNAPP from Cloud Security Posture Management in bolstering security? Resources: View Giulio Astori on LinkedIn View Yuri Diogenes on LinkedIn View Erica Toelle on LinkedIn From planning to deploying to operationalizing, the complete guide to implementing a CNAPP strategy is here - aka.ms/mscnapp Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Microsoft Threat Intelligence Podcast Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of N2K media network.16. Securing the Digital Frontier: Global Regulatory Readiness with Microsoft
33:54||Season 1, Ep. 16Beau Faull, Technology Specialist at Microsoft and Asia Security Strategy Leader, Dmitry Butko, join guest host Manny Sahota on this week's episode of Uncovering Hidden Risks. Today's episode sets the stage for a detailed exploration of regulatory challenges, cybersecurity trends, and Microsoft's approach to ensuring regulatory readiness in the digital landscape. Beau discusses Australian and global regulations, emphasizing the need to meet industry standards like GDPR and the Essential 8, while Dmitry expresses excitement about the increasing focus on regulatory compliance. The discussion highlights the complexities of balancing technology solutions with regulatory compliance, the importance of responsible data management practices, and the evolving culture of cybersecurity within organizations. In This Episode You Will Learn: The vital role of general counsel in tech solutions and compliance decisions Misconception surrounding AI's role in surfacing security issues within organizations The importance of aligning technology solutions with regulatory requirements Some Questions We Ask: How Microsoft integrates security in product development? What are some global cybersecurity trends, particularly in regions like Australia? How does Microsoft Copilot ensure global regulatory compliance? Resources: View Beau Faull on LinkedIn View Dmitry Butko on LinkedIn View Manny Sahota on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Microsoft Threat Intelligence Podcast Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of N2K media network.15. Secure Access in the Era of AI
23:53||Season 1, Ep. 15Jef Kazimer, Microsoft's Principal Product Manager, and Bailey Bercik, Senior Product Manager, join Erica Toelle and guest host Lisa Huang-North on this week's episode of Uncovering Hidden Risks. Today's episode will focus on security in the era of cloud and AI, with insights from Microsoft Security's product team. It will encompass AI-driven security measures, data protection, identity management, and compliance in the cloud while providing valuable insights for professionals navigating the evolving landscape of cloud security and AI's influence on it. Together, they discuss the importance of basic security hygiene, the implications of sophisticated AI-based attacks, and the necessity of adopting a defense-in-depth strategy to protect against emerging threats. In This Episode You Will Learn: The use of generative AI in attack vectors like phishing and social engineering Principles of zero trust and how they apply to AI systems Challenges and opportunities for securing identity and access in 2024 Some Questions We Ask: How can organizations leverage Microsoft’s Zero Trust framework to protect their data? What are the best practices when implementing passwordless authentication? Are the principles of Zero Trust still relevant to this new wave of threats? Resources: View Lisa Huang-North on LinkedIn View Jef Kazimer on LinkedIn View Bailey Bercik on LinkedIn View Erica Toelle on LinkedIn MITRE ATLAS: MITRE | ATLAS™Book: Not with a Bug but with a StickerBlog Post: Demystifing LLMs and Threats. Based off of my presentation for CSA | by Caleb Sima | csima | Medium Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Microsoft Threat Intelligence Podcast Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of N2K media network.14. How to Master Risk and Compliance Initiatives
37:50||Season 1, Ep. 14Patrick Chavez, Chief Privacy Officer at Edward Jones, joins Erica Toelle and guest host Mark Diamond, CEO of Contoural, on this week's episode of Uncovering Hidden Risks. Patrick leads the firm's privacy efforts and develops and implements policies and processes for preparing for and responding to cyber and privacy incidents. He also oversees the firm’s Records and Information Management Program within the Legal Division. He provides legal guidance and advice to the firm’s business areas on eDiscovery, privacy, information and data security and protection, and information governance. Contoural is the largest independent provider of strategic Information Governance consulting services, including records management, privacy, litigation readiness, and employee collaboration. Contoural is also a trusted advisor to more than 30% of the Fortune 500 plus many mid-size and public sector organizations. In This Episode You Will Learn: How to successfully execute policies and meet regulatory requirements Management tools for privacy, eDiscovery, and Information Security conflicts How Edward Jones aligns its legal support for privacy and records management. Some Questions We Ask: How have you seen companies successful in building senior-level support? What is the most significant barrier to creating a unified or federated approach? How should organizations consider policy creation to ensure they can be executed? Resources: View Patrick Chavez on LinkedInView Mark Diamond on LinkedInView Erica Toelle on LinkedIn Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Microsoft Threat Intelligence Podcast Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of The CyberWire Network.13. Unveil Data Security Paradoxes
20:21||Season 1, Ep. 13Herain Oberoi, General Manager of Data Security, Privacy, and Compliance for Microsoft, joins Erica Toelle and guest host Tina Ying, Senior Product Marketing Manager at Microsoft, on this week's episode of Uncovering Hidden Risks. Microsoft has recently released a new report called the Data Security Index. Erica, Tina, and Herain explain what drove the team to complete this research, release the report, and share valuable insights that can empower organizations to optimize their data security programs. In This Episode You Will Learn: Why more tools bring less security, but organizations still adopt them When organizations should allocate resources to optimize data security How security leaders can lead their teams with the goal of enhancing all-up security posture Some Questions We Ask: How can organizations enhance their data security posture? Should organizations purchase best-of-suite or best-of-breed solutions? What advice do you give organizations with the challenge of using isolated solutions? Resources: View Herain Oberoi on LinkedIn View Tina Ying on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Security Unlocked Security Unlocked: CISO Series with Bret Arsenault Microsoft Threat Intelligence Podcast Secure the Job: Breaking into Security Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of The CyberWire Network.12. Cloud Security Posture Management: Top Risks and Best Practice Solutions
30:37||Season 1, Ep. 12Drew Nicholas, Microsoft Principal Security Global Black Belt, joins Erica Toelle and guest host Daniela Villarreal, Sr. Product Marketing Manager for Microsoft Defender for Cloud, on this week's episode of Uncovering Hidden Risks. Drew has spent eight-plus years at Microsoft in different roles. These roles include working for Microsoft's consulting services, Microsoft's customer-facing Incident Response team, and his current position. Drew, Erica, and Daniela provide insight into hidden risks in cloud-native apps to help customers gain visibility and control of their cloud security posture to take a risk-based approach to proactive cloud security. In This Episode You Will Learn: How cloud security posture fits into the big picture of security Qualities organizations should look for in a cloud security posture management tool How different platforms can help strengthen cloud security posture Some Questions We Ask: Regarding cloud-native application development, what security trends have you seen? Why is cloud security posture so important? What risks can a unified security posture management approach help address? Resources: View Drew Nicholas on LinkedIn View Daniela Villarreal on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Listen to: Afternoon Cyber Tea with Ann Johnson Listen to: Security Unlocked Listen to: Security Unlocked: CISO Series with Bret Arsenault Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of The CyberWire Network.11. Cybersecurity 101: What Are the Three Pillars of a Robust Strategy
36:30||Season 1, Ep. 11Cybersecurity is not just a defensive strategy; it can be a powerful driver of an organization's success. In this episode, host Erica Toelle talks to Nashid Shaker, AVP, Information and Cyber Security Strategy at Canadian Western Bank Financial Group, and Antonio Maio, Managing Director at Protiviti, about how to tactically create a cybersecurity strategy that aligns with business goals, fosters trust, and enables innovation. Nash is an experienced and innovative cybersecurity leader passionate about orchestrating secure digital transformations that fuel growth—leveraging a multidisciplinary background in strategic planning and cybersecurity. In This Episode You Will Learn: When it’s time to re-evaluate your cybersecurity strategy. What cybersecurity leaders should think about today to prepare for a future that will use AI. Predictions for cybersecurity in the next 2-4 years. Some Questions We Ask: What is the top risk that organizations tend to overlook? What are some tips for how cybersecurity leaders should engage with the c-suite? Can cybersecurity contribute to an organization's bottom line or mission? Resources: View Nash Shaker on LinkedIn View Antonio Maio on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Listen to: Afternoon Cyber Tea with Ann Johnson Listen to: Security Unlocked Listen to: Security Unlocked: CISO Series with Bret Arsenault Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of The CyberWire Network.