CINXE.COM

CISO Insider: Issue 3

<!doctype html> <html lang="en-US" dir="ltr"> <head> <base href="https://www.microsoft.com/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3"> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta http-equiv="x-ua-compatible" content="ie=edge"> <link rel="SHORTCUT ICON" href="/favicon.ico?v2" type="image/x-icon"> <meta name="robots" content="index, follow"> <meta name="template" content="reimagine---thought-leadership-article-template"> <meta name="awa-canvasType" content="web"> <meta name="awa-isTented" content="false"> <meta name="awa-pgtmp" content="reimagine---thought-leadership-article-template"> <meta name="awa-pageType" content="Microsoft Teams"> <meta name="awa-market" content="en-us"> <meta name="awa-cms" content="AEM"> <meta name="awa-enabledFeatures" content="contentbackfillgenerate;esiproductcards;feature-controlled-mwf;uhf-ms-io-endpoint;uhf-esi-cv;uhf-esi-cache;fraud-greenid;contentsquare;mediapixel;holiday-themer;lazyload-static-components;clientlibDefer;upsellEnabled;contentbackfillpkgdelete;healthcheck;contentbackfillhttpgenerate;perf-tracker-1ds;dynamic-bundle;cvIncrementer;tentingEnabled;chatCookiesImplemented;alertCountDownWithoutServerTime;pdpDynamicRendering;bundlesDynamicRendering;contentbackfillmetadatachangesvideo;contentbackfillmetadatachangesnonvideo;listDynamicRendering;experimentation-without-personalization;generic-list-importer;combinedUHF;cvCallEnabled;m365ProductCatalog;support-unsupported-locales;deferClickTale;videoLazyLoad;prefetchFontsEnabled;enable-code-isolation;imageLinkTag;fetchPriority;contentIngestionAgent;enableClickgroupTelemetry;imageLazyLoad;contentIngestionAgent-dispatcher2westus2Agent;isCacheControlFeatureEnabled;feature-controlled-content-card;lcpPrioritizationPhase1;ocReimagineTelemetry;deferScriptsEnabled;lcpPrioritizationPhase2;ocReimagineSlotNumberTelemetry;contentIngestionAgent-dispatcher1westus2Agent;ocReimagineComponentNameTelemetry;ocReimagineTemplateNameTelemetry;ptePhase1;extended-html-minification-sites;dynamicPrice;gl-auto-config;displayV35Toggle;chatCustomEndpoint;enableBoostPersonalization;ocReimagineTelemetryTemplateNameSwap;enableEmailConnector;enable-eventingService;ocReimagineAIAssistant;acsPMEFeatureEnabled;ocReimagineCustomerApiUrl;ocReimagineCustomerFilterApiUrl;ocProductPricePrimaryLocale"> <title>CISO Insider: Issue 3</title> <link rel="canonical" href="https://www.microsoft.com/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3"> <meta name="description" content="With the increase in organizations shifting to cloud-centric models the risks of cloud threats continue to loom. Learn how a well-developed cloud security strategy, comprehensive posture management, and IoT/OT Zero Trust principles can help protect your organization from cloud threats"> <meta name="twitter:url" content="https://www.microsoft.com/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3"> <meta name="twitter:title" content="CISO Insider: Issue 3"> <meta name="twitter:description" content="With the increase in organizations shifting to cloud-centric models the risks of cloud threats continue to loom. Learn how a well-developed cloud security strategy, comprehensive posture management, and IoT/OT Zero Trust principles can help protect your organization from cloud threats"> <meta name="twitter:card" content="summary"> <meta property="og:url" content="https://www.microsoft.com/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3"> <meta property="og:title" content="CISO Insider: Issue 3"> <meta property="og:description" content="With the increase in organizations shifting to cloud-centric models the risks of cloud threats continue to loom. Learn how a well-developed cloud security strategy, comprehensive posture management, and IoT/OT Zero Trust principles can help protect your organization from cloud threats"> <meta property="og:type" content="website"> <link rel="stylesheet" href="/etc.clientlibs/onecloud/clientlibs/clientlib-mwf-new/main-light.min.ACSHASH561c834597fb9bc5aac4021e21e006be.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/onecloud/clientlibs/clientlib-reimagine/main-security.min.ACSHASHdd9badc86479a6af55e5b144cf1f1f84.css" type="text/css"> <script src="/etc.clientlibs/onecloud/clientlibs/clientlib-vars/publisher.min.ACSHASHd2f3218a374a1305fe262fc4baeeddd1.js"></script> <script src="/etc.clientlibs/onecloud/clientlibs/clientlib-onecloud-util.min.ACSHASH1c7e214f5af8caa06f783a38d40127c6.js"></script> <script src="/etc.clientlibs/onecloud/clientlibs/clientlib-mwf-new/main-light.min.ACSHASH3cb55a1b7e29cabded7d23377524b55e.js"></script> <script src="/etc.clientlibs/onecloud/clientlibs/clientlib-reimagine/main-light.min.ACSHASH763c942b927fe0f5d20f673eaea8ca64.js"></script> <script src="/etc.clientlibs/onecloud/clientlibs/clientlib-events.min.ACSHASH7677f65c1626ab1bde509437776d4291.js"></script> <link rel="stylesheet" href="/etc.clientlibs/cascade.component.authoring/clientlibs/clientlib-uhf.min.ACSHASHf9f2395c582fa601707b7a5dfae9f05f.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/onecloud/clientlibs/clientlib-action.min.ACSHASH44700d76f3f63fa33f30039bb9c74b39.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/onecloud/clientlibs/clientlib-reimagine-page/clientlib-aem-styles.min.ACSHASHd66c468f4ca17e83ccd97a4518b3e814.css" type="text/css"> <script>oc.geo.country = "SG";</script> <script id="ie11-polyfill-script"> var isModernBrowser = ( 'fetch' in window && 'assign' in Object ); if ( !isModernBrowser ) { var scriptElement = document.createElement('script'); scriptElement.async = false; scriptElement.src = '/etc.clientlibs/cascade.component.authoring/clientlibs/clientlib-polyfills/resources/ie11-polyfills.js'; var polyfillScriptElement = document.querySelector('#ie11-polyfill-script'); if (polyfillScriptElement) { polyfillScriptElement.parentNode.insertBefore(scriptElement, polyfillScriptElement.nextSibling); } } </script> <script src="/etc.clientlibs/cascade.component.authoring/clientlibs/clientlib-polyfills.min.ACSHASHf381d5147c85ee687ea8fbef32c83d37.js"></script> <script src="/etc.clientlibs/cascade.component.authoring/clientlibs/clientlib-jquery.min.ACSHASH35986a813756f39ab6b922979ffedb03.js"></script> <script src="/etc.clientlibs/cascade.component.authoring/clientlibs/clientlib-jquery-cookie.min.ACSHASH20aafdf6904d3dc5db0e0e33abbfc1a4.js"></script> <script src="/etc.clientlibs/microsoft/clientlibs/exp-analytics/v1.min.ACSHASH4cffc2c9b55f8bde649e0d2535a1eebd.js"></script> <script type="text/javascript"> var expToken = { "exp": { "target": { "propertyToken": "3c148cf5-9769-f782-32c4-14f7eba5d269", "visitorJsHash": "30368a72d017e4133bfd3b5d073d06ff", "expJsHash": "895e2a12062f1ee44d7d72d266904bde", "isExpWithoutPersonalizationEnabled": ("false"==="true") } } }; window.cas = expToken; </script> <meta name="cas-exp-visitor" content="/etc.clientlibs/microsoft/components/structure/page/clientlibs/visitor.min.ACSHASH30368a72d017e4133bfd3b5d073d06ff.js"> <meta name="cas-exp-at" content="/etc.clientlibs/microsoft/components/structure/page/clientlibs/experimentation.min.ACSHASH895e2a12062f1ee44d7d72d266904bde.js"> <script type="text/javascript" src="/etc.clientlibs/microsoft/clientlibs/exp-cookiecomp/v1.min.ACSHASHbe3f2a9f6a41fc40556efe260fc861a5.js" async></script> <meta name="exp-visitor-anchor" content=""> <meta name="exp-atjs-anchor" content=""> <link id="onecloud-head-style" href="/msonecloudapi/assets/msochead.css" type="text/css" rel="stylesheet"> <script id="onecloud-head-script" type="text/javascript" src="/msonecloudapi/assets/msochead.js" async></script> <script type="text/javascript" async src="https://play.vidyard.com/embed/v4.js"></script> <meta name="oc-version" content="reimagine"> <script src="/etc.clientlibs/cascade.component.authoring/dynamicclientsidelibs/handlerscripts/v1.min.ACSHASHd7106db242c2b41f88a1b02418bec7e2.js"></script> <meta http-equiv="X-Translated-By" content="Google"> <meta http-equiv="X-Translated-To" content="cs"> <script type="text/javascript" src="https://www.gstatic.com/_/translate_http/_/js/k=translate_http.tr.en_GB.1_qyHg0XphE.O/am=DAY/d=1/rs=AN8SPfo_O3MiUOHLzIFK2FbMzbiipwQcbg/m=corsproxy" data-sourceurl="https://www.microsoft.com/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3"></script> <link href="https://fonts.googleapis.com/css2?family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20..48,100..700,0..1,-50..200" rel="stylesheet"> <script type="text/javascript" src="https://www.gstatic.com/_/translate_http/_/js/k=translate_http.tr.en_GB.1_qyHg0XphE.O/am=DAY/d=1/exm=corsproxy/ed=1/rs=AN8SPfo_O3MiUOHLzIFK2FbMzbiipwQcbg/m=phishing_protection" data-phishing-protection-enabled="false" data-forms-warning-enabled="true" data-source-url="https://www.microsoft.com/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3"></script> <meta name="robots" content="none"> </head> <body class="reimagine-page page basicpage"> <script type="text/javascript" src="https://www.gstatic.com/_/translate_http/_/js/k=translate_http.tr.en_GB.1_qyHg0XphE.O/am=DAY/d=1/exm=corsproxy,phishing_protection/ed=1/rs=AN8SPfo_O3MiUOHLzIFK2FbMzbiipwQcbg/m=navigationui" data-environment="prod" data-proxy-url="https://www-microsoft-com.translate.goog" data-proxy-full-url="https://www-microsoft-com.translate.goog/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-source-url="https://www.microsoft.com/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3" data-source-language="pl" data-target-language="cs" data-display-language="en-GB" data-detected-source-language="" data-is-source-untranslated="false" data-source-untranslated-url="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://www.microsoft.com/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3&amp;anno=2" data-client="tr"></script> <div data-geo-country="SG"><span style="display:none"> <script> window.mscv = 'CASMicrosoftCV1932f5a8.0' </script><script> window.msservercv = 'CASMicrosoftCV1932f5a8.0' </script> Trace Id is missing <script> window.traceid = undefined; </script></span> <script type="text/javascript"> window.msauthIsPublisher = true; </script><span aria-hidden="true" class="d-none geo-info" data-continent="AS" data-country_code="SG" data-region_code="" data-city="SINGAPORE" data-timezone="GMT+8" data-zip="" data-county="" data-areacode=""> </span> <div id="page-top" tabindex="-1"></div> <div id="modalsRenderedAfterPageLoad"> </div> <div class="root responsivegrid"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="universalheader aem-GridColumn aem-GridColumn--default--12" data-component-id="cf9a86dceae618e01d6e6399d243873c"> <link rel="stylesheet" href="/etc.clientlibs/microsoft/components/content/universalheader/v1/universalheader/clientlibs/site.min.ACSHASHa8a3710424dc6e0dff393c6964441bdb.css" type="text/css"> <link rel="stylesheet" href="https://www.microsoft.com/onerfstatics/marketingsites-eas-prod/west-european/shell/_scrf/css/themes=default.device=uplevel_web_pc/1b-9d8ed9/c9-be0100/a6-e969ef/43-9f2e7c/82-8b5456/a0-5d3913/52-918540/ca-ae3ce4?ver=2.0&amp;_cf=02242021_3231" type="text/css" media="all"> <div id="headerArea" class="uhf" data-m="{&quot;cN&quot;:&quot;headerArea&quot;,&quot;cT&quot;:&quot;Area_coreuiArea&quot;,&quot;id&quot;:&quot;a1Body&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;Body&quot;}"> <div id="headerRegion" data-region-key="headerregion" data-m="{&quot;cN&quot;:&quot;headerRegion&quot;,&quot;cT&quot;:&quot;Region_coreui-region&quot;,&quot;id&quot;:&quot;r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;a1&quot;}"> <div id="headerUniversalHeader" data-m="{&quot;cN&quot;:&quot;headerUniversalHeader&quot;,&quot;cT&quot;:&quot;Module_coreui-universalheader&quot;,&quot;id&quot;:&quot;m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;r1a1&quot;}" data-module-id="Category|headerRegion|coreui-region|headerUniversalHeader|coreui-universalheader"> <div data-m="{&quot;cN&quot;:&quot;cookiebanner_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c1m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;m1r1a1&quot;}"> <div id="uhfCookieAlert" data-locale="en-us"> <div id="msccBannerV2"></div> </div> </div><a id="uhfSkipToMain" class="m-skip-to-main" href="javascript:void(0)?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-href="#mainContent" tabindex="0" data-m="{&quot;cN&quot;:&quot;Skip to content_nonnav&quot;,&quot;id&quot;:&quot;nn2m1r1a1&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;m1r1a1&quot;}">Skip to main content</a> <header class="c-uhfh context-uhf no-js c-sgl-stck c-category-header " itemscope data-header-footprint="/MSSecurity/MSSecurityInsiderHeader, fromService: True" data-magict="true" itemtype="http://schema.org/Organization"> <div class="theme-light js-global-head f-closed global-head-cont" data-m="{&quot;cN&quot;:&quot;Universal Header_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;m1r1a1&quot;}"> <div class="c-uhfh-gcontainer-st"><button type="button" class="c-action-trigger c-glyph glyph-global-nav-button" aria-label="All Microsoft expand to see list of Microsoft products and services" initialstate-label="All Microsoft expand to see list of Microsoft products and services" togglestate-label="Close All Microsoft list" aria-expanded="false" data-m="{&quot;cN&quot;:&quot;Mobile menu button_nonnav&quot;,&quot;id&quot;:&quot;nn1c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c3m1r1a1&quot;}"></button> <button type="button" class="c-action-trigger c-glyph glyph-arrow-htmllegacy c-close-search" aria-label="Close search" aria-expanded="false" data-m="{&quot;cN&quot;:&quot;Close Search_nonnav&quot;,&quot;id&quot;:&quot;nn2c3m1r1a1&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c3m1r1a1&quot;}"></button> <a id="uhfLogo" class="c-logo c-sgl-stk-uhfLogo" itemprop="url" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" aria-label="Microsoft" data-m="{&quot;cN&quot;:&quot;GlobalNav_Logo_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c3m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c3m1r1a1&quot;}"> <img alt="" itemprop="logo" class="c-image" src="https://cdn-dynmedia-1.microsoft.com/is/image/microsoftcorp/UHFbanner-MSlogo?fmt=png-alpha&amp;bfc=off&amp;qlt=100,1" role="presentation" aria-hidden="true"> <span itemprop="name" role="presentation" aria-hidden="true">Microsoft</span> </a> <div class="f-mobile-title"><button type="button" class="c-action-trigger c-glyph glyph-chevron-left" aria-label="See more menu options" data-m="{&quot;cN&quot;:&quot;Mobile back button_nonnav&quot;,&quot;id&quot;:&quot;nn4c3m1r1a1&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c3m1r1a1&quot;}"></button> <span data-global-title="Microsoft home" class="js-mobile-title">Security Insider</span> <button type="button" class="c-action-trigger c-glyph glyph-chevron-right" aria-label="See more menu options" data-m="{&quot;cN&quot;:&quot;Mobile forward button_nonnav&quot;,&quot;id&quot;:&quot;nn5c3m1r1a1&quot;,&quot;sN&quot;:5,&quot;aN&quot;:&quot;c3m1r1a1&quot;}"></button> </div> <div class="c-show-pipe x-hidden-vp-mobile-st"><a id="uhfCatLogo" class="c-logo c-cat-logo" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" aria-label="Security Insider" itemprop="url" data-m="{&quot;cN&quot;:&quot;CatNav_Security Insider_nav&quot;,&quot;id&quot;:&quot;n6c3m1r1a1&quot;,&quot;sN&quot;:6,&quot;aN&quot;:&quot;c3m1r1a1&quot;}"> <span>Security Insider</span> </a> </div> <div class="cat-logo-button-cont x-hidden"><button type="button" id="uhfCatLogoButton" class="c-cat-logo-button x-hidden" aria-expanded="false" aria-label="Security Insider" data-m="{&quot;cN&quot;:&quot;Security Insider_nonnav&quot;,&quot;id&quot;:&quot;nn7c3m1r1a1&quot;,&quot;sN&quot;:7,&quot;aN&quot;:&quot;c3m1r1a1&quot;}"> Security Insider </button> </div> <nav id="uhf-g-nav" aria-label="Contextual menu" class="c-uhfh-gnav" data-m="{&quot;cN&quot;:&quot;Category nav_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c8c3m1r1a1&quot;,&quot;sN&quot;:8,&quot;aN&quot;:&quot;c3m1r1a1&quot;}"> <ul class="js-paddle-items"> <li class="single-link js-nav-menu x-hidden-none-mobile-vp uhf-menu-item"><a class="c-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;CatNav_Home_nav&quot;,&quot;id&quot;:&quot;n1c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c8c3m1r1a1&quot;}"> Home </a></li> <li class="single-link js-nav-menu uhf-menu-item"><a id="c-shellmenu_40" class="c-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/emerging-threats?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;id&quot;:&quot;n2c8c3m1r1a1&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c8c3m1r1a1&quot;}">Emerging threats</a></li> <li class="nested-menu uhf-menu-item"> <div class="c-uhf-menu js-nav-menu"><button type="button" id="c-shellmenu_41" aria-expanded="false" data-m="{&quot;id&quot;:&quot;nn3c8c3m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c8c3m1r1a1&quot;}">Intelligence reports</button> <ul class="" data-class-idn="" aria-hidden="true" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c4c8c3m1r1a1&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c8c3m1r1a1&quot;}"> <li class="js-nav-menu single-link" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c1c4c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c4c8c3m1r1a1&quot;}"><a id="c-shellmenu_42" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/intelligence-reports?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB#microsoft-digital-defense" data-m="{&quot;id&quot;:&quot;n1c1c4c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c1c4c8c3m1r1a1&quot;}">Microsoft Digital Defense Reports</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c2c4c8c3m1r1a1&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c4c8c3m1r1a1&quot;}"><a id="c-shellmenu_43" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/intelligence-reports?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB#cyber-signals" data-m="{&quot;id&quot;:&quot;n1c2c4c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c2c4c8c3m1r1a1&quot;}">Cyber Signals reports</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c4c8c3m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c4c8c3m1r1a1&quot;}"><a id="c-shellmenu_44" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/intelligence-reports?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB#nation-state-reports" data-m="{&quot;id&quot;:&quot;n1c3c4c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c3c4c8c3m1r1a1&quot;}">Nation state reports</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c4c4c8c3m1r1a1&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c4c8c3m1r1a1&quot;}"><a id="c-shellmenu_45" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/intelligence-reports?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB#special-reports" data-m="{&quot;id&quot;:&quot;n1c4c4c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c4c4c8c3m1r1a1&quot;}">More reports</a></li> </ul> </div></li> <li class="single-link js-nav-menu uhf-menu-item"><a id="c-shellmenu_46" class="c-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/practical-cyber-defense?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;id&quot;:&quot;n5c8c3m1r1a1&quot;,&quot;sN&quot;:5,&quot;aN&quot;:&quot;c8c3m1r1a1&quot;}">Practical cyber defense</a></li> <li class="single-link js-nav-menu uhf-menu-item"><a id="c-shellmenu_47" class="c-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/meet-the-experts?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;id&quot;:&quot;n6c8c3m1r1a1&quot;,&quot;sN&quot;:6,&quot;aN&quot;:&quot;c8c3m1r1a1&quot;}">Meet the experts</a></li> <li class="nested-menu uhf-menu-item"> <div class="c-uhf-menu js-nav-menu"><button type="button" id="c-shellmenu_48" aria-expanded="false" data-m="{&quot;id&quot;:&quot;nn7c8c3m1r1a1&quot;,&quot;sN&quot;:7,&quot;aN&quot;:&quot;c8c3m1r1a1&quot;}">Browse by topic</button> <ul class="" data-class-idn="" aria-hidden="true" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c8c8c3m1r1a1&quot;,&quot;sN&quot;:8,&quot;aN&quot;:&quot;c8c3m1r1a1&quot;}"> <li class="js-nav-menu single-link" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c1c8c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c8c8c3m1r1a1&quot;}"><a id="c-shellmenu_49" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/browse-by-topic/AI?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;id&quot;:&quot;n1c1c8c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c1c8c8c3m1r1a1&quot;}">AI</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c2c8c8c3m1r1a1&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c8c8c3m1r1a1&quot;}"><a id="c-shellmenu_50" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/browse-by-topic/business-email-compromise?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;id&quot;:&quot;n1c2c8c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c2c8c8c3m1r1a1&quot;}">Business email compromise</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c8c8c3m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c8c8c3m1r1a1&quot;}"><a id="c-shellmenu_51" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/browse-by-topic/cybercrime?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;id&quot;:&quot;n1c3c8c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c3c8c8c3m1r1a1&quot;}">Cybercrime</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c4c8c8c3m1r1a1&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c8c8c3m1r1a1&quot;}"><a id="c-shellmenu_52" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/browse-by-topic/cyber-influence-operations?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;id&quot;:&quot;n1c4c8c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c4c8c8c3m1r1a1&quot;}">Cyber influence operations</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c5c8c8c3m1r1a1&quot;,&quot;sN&quot;:5,&quot;aN&quot;:&quot;c8c8c3m1r1a1&quot;}"><a id="c-shellmenu_53" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/browse-by-topic/ddos?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;id&quot;:&quot;n1c5c8c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c5c8c8c3m1r1a1&quot;}">DDoS</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c6c8c8c3m1r1a1&quot;,&quot;sN&quot;:6,&quot;aN&quot;:&quot;c8c8c3m1r1a1&quot;}"><a id="c-shellmenu_54" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/browse-by-topic/identity?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;id&quot;:&quot;n1c6c8c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c6c8c8c3m1r1a1&quot;}">Identity</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c7c8c8c3m1r1a1&quot;,&quot;sN&quot;:7,&quot;aN&quot;:&quot;c8c8c3m1r1a1&quot;}"><a id="c-shellmenu_55" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/browse-by-topic/iot-and-ot?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;id&quot;:&quot;n1c7c8c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c7c8c8c3m1r1a1&quot;}">IoT and OT</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c8c8c8c3m1r1a1&quot;,&quot;sN&quot;:8,&quot;aN&quot;:&quot;c8c8c3m1r1a1&quot;}"><a id="c-shellmenu_56" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/browse-by-topic/nation-state-reports?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;id&quot;:&quot;n1c8c8c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c8c8c8c3m1r1a1&quot;}">Nation state reports</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c9c8c8c3m1r1a1&quot;,&quot;sN&quot;:9,&quot;aN&quot;:&quot;c8c8c3m1r1a1&quot;}"><a id="c-shellmenu_57" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/browse-by-topic/phishing?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;id&quot;:&quot;n1c9c8c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c9c8c8c3m1r1a1&quot;}">Phishing</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c10c8c8c3m1r1a1&quot;,&quot;sN&quot;:10,&quot;aN&quot;:&quot;c8c8c3m1r1a1&quot;}"><a id="c-shellmenu_58" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/browse-by-topic/ransomware?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;id&quot;:&quot;n1c10c8c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c10c8c8c3m1r1a1&quot;}">Ransomware</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c11c8c8c3m1r1a1&quot;,&quot;sN&quot;:11,&quot;aN&quot;:&quot;c8c8c3m1r1a1&quot;}"><a id="c-shellmenu_59" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/browse-by-topic/threat-actors?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;id&quot;:&quot;n1c11c8c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c11c8c8c3m1r1a1&quot;}">Threat actors</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c12c8c8c3m1r1a1&quot;,&quot;sN&quot;:12,&quot;aN&quot;:&quot;c8c8c3m1r1a1&quot;}"><a id="c-shellmenu_60" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/browse-by-topic/vulnerabilities?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;id&quot;:&quot;n1c12c8c8c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c12c8c8c3m1r1a1&quot;}">Vulnerabilities</a></li> </ul> </div></li> <li id="overflow-menu" class="overflow-menu x-hidden uhf-menu-item"> <div class="c-uhf-menu js-nav-menu"><button data-m="{&quot;pid&quot;:&quot;More&quot;,&quot;id&quot;:&quot;nn9c8c3m1r1a1&quot;,&quot;sN&quot;:9,&quot;aN&quot;:&quot;c8c3m1r1a1&quot;}" type="button" aria-label="More" aria-expanded="false">More</button> <ul id="overflow-menu-list" aria-hidden="true" class="overflow-menu-list"> </ul> </div></li> </ul> </nav> <div class="c-uhfh-actions" data-m="{&quot;cN&quot;:&quot;Header actions_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c9c3m1r1a1&quot;,&quot;sN&quot;:9,&quot;aN&quot;:&quot;c3m1r1a1&quot;}"> <div class="wf-menu"> <nav id="uhf-c-nav" aria-label="All Microsoft menu" data-m="{&quot;cN&quot;:&quot;GlobalNav_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c9c3m1r1a1&quot;}"> <ul class="js-paddle-items"> <li> <div class="c-uhf-menu js-nav-menu"><button type="button" class="c-button-logo all-ms-nav" aria-expanded="false" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_nonnav&quot;,&quot;id&quot;:&quot;nn1c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c1c9c3m1r1a1&quot;}"> <span>All Microsoft</span></button> <ul class="f-multi-column f-multi-column-4" aria-hidden="true" data-m="{&quot;cN&quot;:&quot;More_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c1c9c3m1r1a1&quot;}"> <li class="c-w0-contr"><h2 class="c-uhf-sronly">Global</h2> <ul class="c-w0"> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;Microsoft Security_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c1c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_0" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/security?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;W0Nav_Microsoft Security_nav&quot;,&quot;id&quot;:&quot;n1c1c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c1c2c1c9c3m1r1a1&quot;}">Microsoft Security</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;Azure_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c2c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_1" class="js-subm-uhf-nav-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://azure.microsoft.com/en-us/" data-m="{&quot;cN&quot;:&quot;W0Nav_Azure_nav&quot;,&quot;id&quot;:&quot;n1c2c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c2c2c1c9c3m1r1a1&quot;}">Azure</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;Dynamics 365_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_2" class="js-subm-uhf-nav-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://dynamics.microsoft.com/en-us/" data-m="{&quot;cN&quot;:&quot;W0Nav_Dynamics 365_nav&quot;,&quot;id&quot;:&quot;n1c3c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c3c2c1c9c3m1r1a1&quot;}">Dynamics 365</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;Microsoft 365_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c4c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_3" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/microsoft-365/business/?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;W0Nav_Microsoft 365_nav&quot;,&quot;id&quot;:&quot;n1c4c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c4c2c1c9c3m1r1a1&quot;}">Microsoft 365</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;Microsoft Teams_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c5c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:5,&quot;aN&quot;:&quot;c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_4" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/microsoft-teams/group-chat-software?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;W0Nav_Microsoft Teams_nav&quot;,&quot;id&quot;:&quot;n1c5c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c5c2c1c9c3m1r1a1&quot;}">Microsoft Teams</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;Windows 365_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c6c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:6,&quot;aN&quot;:&quot;c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_5" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/windows-365?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;W0Nav_Windows 365_nav&quot;,&quot;id&quot;:&quot;n1c6c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c6c2c1c9c3m1r1a1&quot;}">Windows 365</a></li> </ul></li> <li class="f-sub-menu js-nav-menu nested-menu" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:7,&quot;aN&quot;:&quot;c2c1c9c3m1r1a1&quot;}"><span id="uhf-navspn-shellmenu_7-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m="{&quot;id&quot;:&quot;nn1c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c7c2c1c9c3m1r1a1&quot;}">Tech &amp; innovation</span> <button id="uhf-navbtn-shellmenu_7-button" type="button" f-multi-parent="true" aria-expanded="false" data-m="{&quot;id&quot;:&quot;nn2c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c7c2c1c9c3m1r1a1&quot;}">Tech &amp; innovation</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_7-span"> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_TechInnovation_MicrosoftCloud_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c7c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_8" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/microsoft-cloud?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_TechInnovation_MicrosoftCloud_nav&quot;,&quot;id&quot;:&quot;n1c3c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c3c7c2c1c9c3m1r1a1&quot;}">Microsoft Cloud</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_TechInnovation__AI_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c4c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c7c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_9" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/ai?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_TechInnovation__AI_nav&quot;,&quot;id&quot;:&quot;n1c4c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c4c7c2c1c9c3m1r1a1&quot;}">AI</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_TechInnovation_AzureSpace_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c5c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:5,&quot;aN&quot;:&quot;c7c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_10" class="js-subm-uhf-nav-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://azure.microsoft.com/en-us/solutions/space/" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_TechInnovation_AzureSpace_nav&quot;,&quot;id&quot;:&quot;n1c5c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c5c7c2c1c9c3m1r1a1&quot;}">Azure Space</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_TechInnovation_MixedReality_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c6c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:6,&quot;aN&quot;:&quot;c7c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_11" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/mixed-reality/windows-mixed-reality?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_TechInnovation_MixedReality_nav&quot;,&quot;id&quot;:&quot;n1c6c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c6c7c2c1c9c3m1r1a1&quot;}">Mixed reality</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_TechInnovation_MicrosoftHololens_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c7c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:7,&quot;aN&quot;:&quot;c7c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_12" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/hololens?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_TechInnovation_MicrosoftHololens_nav&quot;,&quot;id&quot;:&quot;n1c7c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c7c7c2c1c9c3m1r1a1&quot;}">Microsoft HoloLens</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_TechInnovation_Microsoft Viva_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c8c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:8,&quot;aN&quot;:&quot;c7c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_13" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/microsoft-viva?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_TechInnovation_Microsoft Viva_nav&quot;,&quot;id&quot;:&quot;n1c8c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c8c7c2c1c9c3m1r1a1&quot;}">Microsoft Viva</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_TechInnovation_QuantumComputing_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c9c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:9,&quot;aN&quot;:&quot;c7c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_14" class="js-subm-uhf-nav-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://azure.microsoft.com/en-us/solutions/quantum-computing/" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_TechInnovation_QuantumComputing_nav&quot;,&quot;id&quot;:&quot;n1c9c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c9c7c2c1c9c3m1r1a1&quot;}">Quantum computing</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_TechInnovation_Sustainability_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c10c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:10,&quot;aN&quot;:&quot;c7c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_15" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/sustainability/?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_TechInnovation_Sustainability_nav&quot;,&quot;id&quot;:&quot;n1c10c7c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c10c7c2c1c9c3m1r1a1&quot;}">Sustainability</a></li> </ul></li> <li class="f-sub-menu js-nav-menu nested-menu" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:8,&quot;aN&quot;:&quot;c2c1c9c3m1r1a1&quot;}"><span id="uhf-navspn-shellmenu_16-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m="{&quot;id&quot;:&quot;nn1c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c8c2c1c9c3m1r1a1&quot;}">Industries</span> <button id="uhf-navbtn-shellmenu_16-button" type="button" f-multi-parent="true" aria-expanded="false" data-m="{&quot;id&quot;:&quot;nn2c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c8c2c1c9c3m1r1a1&quot;}">Industries</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_16-span"> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Industries_Education_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c8c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_17" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/education?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Industries_Education_nav&quot;,&quot;id&quot;:&quot;n1c3c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c3c8c2c1c9c3m1r1a1&quot;}">Education</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Industries_Automotive_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c4c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c8c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_18" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/industry/automotive?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Industries_Automotive_nav&quot;,&quot;id&quot;:&quot;n1c4c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c4c8c2c1c9c3m1r1a1&quot;}">Automotive</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Industries_Financialservices_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c5c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:5,&quot;aN&quot;:&quot;c8c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_19" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/industry/financial-services/banking?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Industries_Financialservices_nav&quot;,&quot;id&quot;:&quot;n1c5c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c5c8c2c1c9c3m1r1a1&quot;}">Financial services</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Industries_Government_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c6c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:6,&quot;aN&quot;:&quot;c8c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_20" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/industry/government?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Industries_Government_nav&quot;,&quot;id&quot;:&quot;n1c6c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c6c8c2c1c9c3m1r1a1&quot;}">Government</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Industries_Health_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c7c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:7,&quot;aN&quot;:&quot;c8c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_21" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/industry/health/microsoft-cloud-for-healthcare?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Industries_Health_nav&quot;,&quot;id&quot;:&quot;n1c7c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c7c8c2c1c9c3m1r1a1&quot;}">Healthcare</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Industries_Manufacturing_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c8c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:8,&quot;aN&quot;:&quot;c8c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_22" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/industry/manufacturing/microsoft-cloud-for-manufacturing?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Industries_Manufacturing_nav&quot;,&quot;id&quot;:&quot;n1c8c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c8c8c2c1c9c3m1r1a1&quot;}">Manufacturing</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Industries_Retail_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c9c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:9,&quot;aN&quot;:&quot;c8c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_23" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/industry/consumer-goods?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Industries_Retail_nav&quot;,&quot;id&quot;:&quot;n1c9c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c9c8c2c1c9c3m1r1a1&quot;}">Retail</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Industries_Allindustries_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c10c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:10,&quot;aN&quot;:&quot;c8c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_24" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/industry?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Industries_Allindustries_nav&quot;,&quot;id&quot;:&quot;n1c10c8c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c10c8c2c1c9c3m1r1a1&quot;}">All industries</a></li> </ul></li> <li class="f-sub-menu js-nav-menu nested-menu" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c9c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:9,&quot;aN&quot;:&quot;c2c1c9c3m1r1a1&quot;}"><span id="uhf-navspn-shellmenu_25-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m="{&quot;id&quot;:&quot;nn1c9c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c9c2c1c9c3m1r1a1&quot;}">Partners</span> <button id="uhf-navbtn-shellmenu_25-button" type="button" f-multi-parent="true" aria-expanded="false" data-m="{&quot;id&quot;:&quot;nn2c9c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c9c2c1c9c3m1r1a1&quot;}">Partners</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_25-span"> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Partner_FindPartner_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c9c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c9c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_26" class="js-subm-uhf-nav-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://partner.microsoft.com/en-US/" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Partner_FindPartner_nav&quot;,&quot;id&quot;:&quot;n1c3c9c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c3c9c2c1c9c3m1r1a1&quot;}">Find a partner</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Partner_BecomePartner_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c4c9c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c9c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_27" class="js-subm-uhf-nav-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://partner.microsoft.com/en-US/membership/cloud-solution-provider" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Partner_BecomePartner_nav&quot;,&quot;id&quot;:&quot;n1c4c9c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c4c9c2c1c9c3m1r1a1&quot;}">Become a partner</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Partner_PartnerNetwork_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c5c9c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:5,&quot;aN&quot;:&quot;c9c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_28" class="js-subm-uhf-nav-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://partner.microsoft.com/en-us/membership" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Partner_PartnerNetwork_nav&quot;,&quot;id&quot;:&quot;n1c5c9c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c5c9c2c1c9c3m1r1a1&quot;}">Partner Network</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Partner_AzureMarketplace_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c6c9c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:6,&quot;aN&quot;:&quot;c9c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_29" class="js-subm-uhf-nav-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://azuremarketplace.microsoft.com/en-us/" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Partner_AzureMarketplace_nav&quot;,&quot;id&quot;:&quot;n1c6c9c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c6c9c2c1c9c3m1r1a1&quot;}">Azure Marketplace</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Partner_AppSource_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c7c9c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:7,&quot;aN&quot;:&quot;c9c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_30" class="js-subm-uhf-nav-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://appsource.microsoft.com/en-us/" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Partner_AppSource_nav&quot;,&quot;id&quot;:&quot;n1c7c9c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c7c9c2c1c9c3m1r1a1&quot;}">AppSource</a></li> </ul></li> <li class="f-sub-menu js-nav-menu nested-menu" data-m="{&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:10,&quot;aN&quot;:&quot;c2c1c9c3m1r1a1&quot;}"><span id="uhf-navspn-shellmenu_31-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m="{&quot;id&quot;:&quot;nn1c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c10c2c1c9c3m1r1a1&quot;}">Resources</span> <button id="uhf-navbtn-shellmenu_31-button" type="button" f-multi-parent="true" aria-expanded="false" data-m="{&quot;id&quot;:&quot;nn2c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c10c2c1c9c3m1r1a1&quot;}">Resources</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_31-span"> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Resources_Blog_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c10c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_32" class="js-subm-uhf-nav-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://blogs.microsoft.com/" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Resources_Blog_nav&quot;,&quot;id&quot;:&quot;n1c3c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c3c10c2c1c9c3m1r1a1&quot;}">Blog</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Resources_MicrosoftAdvertising_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c4c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c10c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_33" class="js-subm-uhf-nav-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://about.ads.microsoft.com/en-us?s_cid%3Ddig-src_uhfcomm" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Resources_MicrosoftAdvertising_nav&quot;,&quot;id&quot;:&quot;n1c4c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c4c10c2c1c9c3m1r1a1&quot;}">Microsoft Advertising</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Resources_DeveloperCenter_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c5c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:5,&quot;aN&quot;:&quot;c10c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_34" class="js-subm-uhf-nav-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://developer.microsoft.com/en-us/" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Resources_DeveloperCenter_nav&quot;,&quot;id&quot;:&quot;n1c5c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c5c10c2c1c9c3m1r1a1&quot;}">Developer Center</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Resources_Documentation_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c6c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:6,&quot;aN&quot;:&quot;c10c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_35" class="js-subm-uhf-nav-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://learn.microsoft.com/docs/" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Resources_Documentation_nav&quot;,&quot;id&quot;:&quot;n1c6c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c6c10c2c1c9c3m1r1a1&quot;}">Documentation</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Resources_Events_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c7c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:7,&quot;aN&quot;:&quot;c10c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_36" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/events?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Resources_Events_nav&quot;,&quot;id&quot;:&quot;n1c7c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c7c10c2c1c9c3m1r1a1&quot;}">Events</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Resources_Licensing_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c8c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:8,&quot;aN&quot;:&quot;c10c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_37" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/licensing/?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Resources_Licensing_nav&quot;,&quot;id&quot;:&quot;n1c8c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c8c10c2c1c9c3m1r1a1&quot;}">Licensing</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Resources_MicrosoftLearn_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c9c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:9,&quot;aN&quot;:&quot;c10c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_38" class="js-subm-uhf-nav-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://learn.microsoft.com/" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Resources_MicrosoftLearn_nav&quot;,&quot;id&quot;:&quot;n1c9c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c9c10c2c1c9c3m1r1a1&quot;}">Microsoft Learn</a></li> <li class="js-nav-menu single-link" data-m="{&quot;cN&quot;:&quot;More_Resources_MicrosoftResearch_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c10c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:10,&quot;aN&quot;:&quot;c10c2c1c9c3m1r1a1&quot;}"><a id="shellmenu_39" class="js-subm-uhf-nav-link" href="https://www-microsoft-com.translate.goog/en-us/research/?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;GlobalNav_More_Resources_MicrosoftResearch_nav&quot;,&quot;id&quot;:&quot;n1c10c10c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c10c10c2c1c9c3m1r1a1&quot;}">Microsoft Research</a></li> </ul></li> <li class="f-multi-column-info"><a data-m="{&quot;id&quot;:&quot;n11c2c1c9c3m1r1a1&quot;,&quot;sN&quot;:11,&quot;aN&quot;:&quot;c2c1c9c3m1r1a1&quot;}" href="https://www-microsoft-com.translate.goog/en-us/sitemap?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" aria-label="" class="c-glyph">View Sitemap</a></li> </ul> </div></li> </ul> </nav> </div> <form class="c-search" autocomplete="off" id="searchForm" name="searchForm" role="search" action="https://www.microsoft.com/en-us/security/site-search" method="GET" data-seautosuggest="" data-seautosuggestapi="https://www.microsoft.com/msstoreapiprod/api/autosuggest" data-m="{&quot;cN&quot;:&quot;GlobalNav_Search_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c1c9c3m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c1c9c3m1r1a1&quot;}" aria-expanded="false"><input id="cli_shellHeaderSearchInput" aria-label="Search Expanded" aria-expanded="false" aria-controls="universal-header-search-auto-suggest-transparent" aria-owns="universal-header-search-auto-suggest-ul" type="search" name="q" placeholder="Search Microsoft Security" data-m="{&quot;cN&quot;:&quot;SearchBox_nav&quot;,&quot;id&quot;:&quot;n1c3c1c9c3m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c3c1c9c3m1r1a1&quot;}" data-toggle="tooltip" data-placement="right" title="Search Microsoft Security"> <button id="search" aria-label="Search Microsoft Security" class="c-glyph" data-m="{&quot;cN&quot;:&quot;Search_nav&quot;,&quot;id&quot;:&quot;n2c3c1c9c3m1r1a1&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c3c1c9c3m1r1a1&quot;}" data-bi-mto="true" aria-expanded="false" disabled> <span role="presentation">Search</span> <span role="tooltip" class="c-uhf-tooltip c-uhf-search-tooltip">Search Microsoft Security</span> </button> <div class="m-auto-suggest" id="universal-header-search-auto-suggest-transparent" role="group"> <ul class="c-menu" id="universal-header-search-auto-suggest-ul" aria-label="Search Suggestions" aria-hidden="true" data-bi-dnt="true" data-bi-mto="true" data-js-auto-suggest-position="default" role="listbox" data-tel="jsll" data-m="{&quot;cN&quot;:&quot;search suggestions_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c3c1c9c3m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c3c1c9c3m1r1a1&quot;}"></ul> <ul class="c-menu f-auto-suggest-no-results" aria-hidden="true" data-js-auto-suggest-postion="default" data-js-auto-suggest-position="default" role="listbox"> <li class="c-menu-item"><span tabindex="-1">No results</span></li> </ul> </div> </form><button data-m="{&quot;cN&quot;:&quot;cancel-search&quot;,&quot;pid&quot;:&quot;Cancel Search&quot;,&quot;id&quot;:&quot;nn4c1c9c3m1r1a1&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c1c9c3m1r1a1&quot;}" id="cancel-search" class="cancel-search" aria-label="Cancel Search"> <span>Cancel</span> </button> </div> </div> </div> </header> </div> </div> </div> <div class="meControl-configInfo" data-isenabled="true" data-convergedstack="true" data-baseurl="/cascadeauth/account" data-appid="10fa57ef-4895-4ab2-872c-8c3613d4f7fb" data-appcallbackurl="https://www.microsoft.com/cascadeauth/account/signin-oidc" data-accountconstraint="0" data-apigeneration="GEN2" data-silentauthrequirereload="false" data-silentauthaction="aadfirst"></div> <div class="userInfo-config" data-userinfourl="/cascadeauth/api/v1/account/userinfo" data-userinfotimeoutms="1000" data-retrydelayms="2000" data-maxretryattempt="3"></div> <script src="/etc.clientlibs/microsoft/components/content/universalheader/v1/universalheader/clientlibs/site.min.ACSHASH1dabd5cc3f7b68c178b59ea74dc62947.js"></script> </div> <div class="layout-container responsivegrid aem-GridColumn aem-GridColumn--default--12" data-component-id="28134f1ee1370eee417bc52d1ed0a717"> <main class="microsoft-template-layout-container" tabindex="-1"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="responsivegrid aem-GridColumn aem-GridColumn--default--12"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="experiencefragment aem-GridColumn aem-GridColumn--default--12" data-component-id="581db1ec198007e2a00cbac3e44e3de9" oc-component-name="experiencefragment"> <div class="cmp-experiencefragment"> <div class="xf-content-height"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="responsivegrid aem-GridColumn aem-GridColumn--default--12"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="alert-component aem-GridColumn aem-GridColumn--default--12" data-component-id="eef2af98123779adee801727449a8dad"> <link rel="stylesheet" href="/etc.clientlibs/microsoft/components/content/alert/v1/alert/clientlibs/site.min.ACSHASH96ddea96f43b844ad97950d109c49366.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/onecloud/components/content/alert/v1/alert/clientlibs/site.min.ACSHASH866c3a4ac33e41fa69b45e73bba381b8.css" type="text/css"> <div class="theme-light" data-oc="oca60e" id="alert-oca60e"> <style> #alert-oca60e .oc-aem-alert-bg-color-picker { background-color: } </style> <div class="alert alert-full-bleed" aria-label="Register for exclusive sessions at the Microsoft Security Hub" role="alert" aria-live="polite"> <div class="alert-content text-center "> <script src="/etc.clientlibs/onecloud/clientlibs/clientlib-product-pricing.min.ACSHASH884bd098ecb71645787c430f99c6d7b6.js"></script> <link rel="stylesheet" href="/etc.clientlibs/onecloud/clientlibs/clientlib-product-pricing.min.ACSHASH2add065651afb45e8c80967dd7b86a41.css" type="text/css"> <div data-oc-token-text><a href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2289914" class="ms-rte-link" aria-label="Register for Microsoft event on Microsoft journay through AI and sustainability">Register</a>&nbsp;now to watch the on-demand web seminar featuring Microsoft Digital Defense Report 2024 insights. </div> </div> </div> </div> <script src="/etc.clientlibs/microsoft/components/content/alert/v1/alert/clientlibs/site.min.ACSHASH2779a1f7171beec22e383ef464e8a205.js"></script> </div> </div> </div> </div> </div> </div><span style="display:none"> </span> </div> <div ocr-component-name="hero-article" data-component-id="388cd73af17bf018b961e98d66fb45f6" class="hero-article theme-night bg--base-fade aem-GridColumn aem-GridColumn--default--12"> <div class="container hero-article__breadcrumbs"> <div class="row"> <div class="col"> <div class="layout layout--cols-2 layout--density-relaxed"> <div class="layout__col"> <div ocr-component-name="breadcrumbs" data-component-id="caf40786f6294ee99e9fdfb140f4b713" class="breadcrumbs" data-mount="ocr-breadcrumbs"> <nav> <ol class="breadcrumbs__list"> <li class="breadcrumbs__item breadcrumbs__collapsed-item "><a href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/practical-cyber-defense/?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" class="link link-inline"> <span class="link__text"> Security Insider </span> </a> <div class="ocr-icon d-inline-flex" aria-hidden="true" role="presentation"><span class="glyph-prepend glyph-prepend-chevron-right" aria-hidden="true"></span> </div></li> <li class="breadcrumbs__collapsed-item breadcrumbs__btn-expand breadcrumbs__item--d-none"><a href="javascript:void(0);?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" class="btn btn--icon btn--ghost btn--sm btn--icon-only" role="button"> <div class="ocr-icon d-inline-flex" aria-hidden="true" role="presentation"><span class="glyph-prepend glyph-prepend-more" aria-hidden="true"></span> </div></a> <div class="ocr-icon d-inline-flex" aria-hidden="true" role="presentation"><span class="glyph-prepend glyph-prepend-chevron-right" aria-hidden="true"></span> </div></li> <li class="breadcrumbs__item "><a href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/practical-cyber-defense/?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" class="link link-inline"> <span class="link__text"> Practical cyber defense </span> </a> <div class="ocr-icon d-inline-flex" aria-hidden="true" role="presentation"><span class="glyph-prepend glyph-prepend-chevron-right" aria-hidden="true"></span> </div></li> <li class="breadcrumbs__item "><a href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/practical-cyber-defense/?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" class="link link-inline"> <span class="link__text"> CISO Insider: Issue 3 </span> </a> <div class="ocr-icon d-inline-flex" aria-hidden="true" role="presentation"><span class="glyph-prepend glyph-prepend-chevron-right" aria-hidden="true"></span> </div></li> </ol> </nav> </div> </div> </div> </div> </div> </div> <div class="container"> <div class="row"> <div class="col"> <div class="layout layout--cols-2 layout--density-relaxed"> <div class="layout__col hero-article__heading"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading block-heading--size-l"> <div class=" block-heading__title" ocr-telemetry-name ocr-en-title="<h1>CISO Insider: Issue 3</h1> "> <script src="/etc.clientlibs/onecloud/clientlibs/clientlib-product-pricing.min.ACSHASH884bd098ecb71645787c430f99c6d7b6.js"></script> <link rel="stylesheet" href="/etc.clientlibs/onecloud/clientlibs/clientlib-product-pricing.min.ACSHASH2add065651afb45e8c80967dd7b86a41.css" type="text/css"> <div data-oc-token-text> <h1>CISO Insider: Issue 3</h1> </div> </div> <div class="block-heading__button-group"> <div ocr-component-name="action-group" data-component-id="e44de352c999ca6efd7a58dc4a5d7a5b" class="button-group"><a class="btn btn--icon btn--sm " data-bi-ecn="Download" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-bi-cn="Download" data-regenerate-fwlink="true" target="_blank" data-oc="oc3355" id="action-oc3355" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2262079%26clcid%3D0x409%26culture%3Den-us%26country%3Dus" aria-label="Download Full Report" data-isenvauthor="false"> <span class="btn__text">Download</span> <div ocr-component-name="icon" data-component-id="467e35e809075d121962a1d239c316b2" class="ocr-icon d-inline-flex"><span class="glyph-prepend glyph-prepend-download" role="presentation" aria-hidden="true"> </span> </div></a> <script src="/etc.clientlibs/onecloud/clientlibs/clientlib-localstorage.min.ACSHASHb884ef4864d6867bd00aa4a7a5cfb368.js"></script> <script src="/etc.clientlibs/onecloud/clientlibs/clientlib-action.min.ACSHASH9eea5f80fed74a300ccbbaa4dc41df2a.js"></script><a class="btn btn--secondary theme-night" data-target="#modal-dialog" data-bi-ecn="Share" role="button" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-bi-cn="Share" target="_self" data-oc="oc1f10" id="action-oc1f10" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB#modal-dialog" aria-label="social share dialog button" data-isenvauthor="false"> <span class="btn__text">Share</span> </a> </div> </div> </div> </div> <div class="layout__col hero-article__empty-div"></div> </div> </div> </div> </div> <div class="hero-article__media"> <div ocr-component-name="media" data-component-id="9b002e252846bf14b532f40bd58c2fca" class="media media--ratio-16-9"> <div ocr-component-name="image" data-component-id="9b002e252846bf14b532f40bd58c2fca" class="ocr-img media__asset"><img src="https://cdn-dynmedia-1.microsoft.com/is/image/microsoftcorp/CISO_Insider3_MSFTInsider_Article_Hero_Mobile_375x234@2x?resMode=sharp2&amp;op_usm=1.5,0.65,15,0&amp;wid=752&amp;hei=580&amp;qlt=100&amp;fmt=png-alpha&amp;fit=constrain" class=" " alt="CISO Insider Issue 3 looks at emerging security priorities as organizations shift to an increasingly cloud-centric model, bringing along everything in their digital estate from on-premises systems to IoT devices." loading="lazy" data-oc="oc2c15" id="image-oc2c15"> </div> </div> </div> <div class="experiencefragment" data-component-id="581db1ec198007e2a00cbac3e44e3de9" oc-component-name="experiencefragment"> <div class="cmp-experiencefragment"> <div class="xf-content-height"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="responsivegrid aem-GridColumn aem-GridColumn--default--12"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div ocr-component-name="modal" data-component-id="d73704b488e9f411875cbdfb1198c533" class="reimagine-modal aem-GridColumn aem-GridColumn--default--12"> <div class="modal-wrapper modal--dialog-card"> <div data-mount="reimagine-modal" class="modal fade theme-day" id="modal-dialog" role="dialog" aria-label="Share this article" aria-hidden="true" tabindex="-1"> <div class="modal-dialog layout "> <div class="modal-col layout__col d-flex justify-content-center"> <div class="modal-content justify-content-center my-l theme-day"> <div class="modal-header align-items-center"> <h2 class="modal-header__container">Share this article</h2><button class="modal-close btn btn--icon-only btn--md btn--secondary" data-dismiss="modal" aria-label="Close"> <span class="glyph-prepend glyph-prepend-cancel" aria-hidden="true"></span> </button> </div> <div class="modal-body"> <div class="modal-body-wrapper"> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oce2b2" id="richtext-oce2b2"> </section> </div> <div ocr-component-name="action-group" data-component-id="e44de352c999ca6efd7a58dc4a5d7a5b" class="button-group"><a class="link with-icon " data-isautoappendreferrer="true" data-bi-ecn="Facebook" data-bi-tags="{&quot;BiLinkName&quot;:&quot;facebook&quot;}" tabindex="0" data-bi-bhvr="126" data-bi-cn="Facebook" target="_blank" data-oc="occe66" id="action-occe66" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://www.facebook.com/sharer.php?u%3Dhttps://www.microsoft.com/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3" aria-label="Share this article on Facebook"> <span class="btn btn--icon btn--icon-only btn--sm "> <div ocr-component-name="icon" data-component-id="467e35e809075d121962a1d239c316b2" class="ocr-icon d-inline-flex ocr-icon--size-xl"> <div class="ocr-img media__asset"><img src="/content/dam/microsoft/final/en-us/microsoft-product-and-services/security/security-insider/security-insider-articles-all/Logo%20-%20Facebook.png" aria-hidden="true" role="presentation" alt> </div> </div></span> <span class="link__text">Facebook</span> </a> <a class="link with-icon " data-isautoappendreferrer="true" data-bi-ecn="LinkedIn" data-bi-tags="{&quot;BiLinkName&quot;:&quot;linkedIn&quot;}" tabindex="0" data-bi-bhvr="126" data-bi-cn="LinkedIn" target="_blank" data-oc="oc4d01" id="action-oc4d01" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://www.linkedin.com/sharing/share-offsite/?url%3Dhttps://www.microsoft.com/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3" aria-label="Share this article on LinkedIn"> <span class="btn btn--icon btn--icon-only btn--sm "> <div ocr-component-name="icon" data-component-id="467e35e809075d121962a1d239c316b2" class="ocr-icon d-inline-flex ocr-icon--size-xl"> <div class="ocr-img media__asset"><img src="/content/dam/microsoft/final/en-us/microsoft-product-and-services/security/security-insider/security-insider-articles-all/Logo%20-%20LinkedIn.png" aria-hidden="true" role="presentation" alt> </div> </div></span> <span class="link__text">LinkedIn</span> </a> <a class="link with-icon " data-isautoappendreferrer="true" data-bi-ecn="Twitter" data-bi-tags="{&quot;BiLinkName&quot;:&quot;twitter&quot;}" tabindex="0" data-bi-bhvr="126" data-bi-cn="Twitter" target="_blank" data-oc="ocb940" id="action-ocb940" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://twitter.com/intent/tweet?url%3Dhttps://www.microsoft.com/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3" aria-label="Share this article on Twitter"> <span class="btn btn--icon btn--icon-only btn--sm "> <div ocr-component-name="icon" data-component-id="467e35e809075d121962a1d239c316b2" class="ocr-icon d-inline-flex ocr-icon--size-xl"> <div ocr-component-name="image" data-component-id="9b002e252846bf14b532f40bd58c2fca" class="ocr-img media__asset"><img src="https://cdn-dynmedia-1.microsoft.com/is/image/microsoftcorp/X%20-%20Black%20BG%20-%20Updated?resMode=sharp2&amp;op_usm=1.5,0.65,15,0&amp;wid=120&amp;hei=120&amp;qlt=100&amp;fmt=png-alpha&amp;fit=stretch" class=" " alt loading="lazy" data-oc="oc7670" id="image-oc7670"> </div> </div></span> <span class="link__text">Twitter</span> </a> </div> </div> </div> <div class="divider-component ocr-divider" data-component-id="596e5fa739d15607c6adc6715f1e064e"> <hr> </div> <div class="modal-footer"> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div><span style="display:none"> </span> </div> </div> <div ocr-component-name="secondary-sticky-nav" class="secondary-sticky-nav aem-GridColumn aem-GridColumn--default--12" data-component-id="83e50c71372fe9edec320caf70f0e996"> <div class="sticky" data-mount="sticky" data-direction="top" data-observer-behavior="size-aware"> <div class="secondary-nav "> <nav id="sticky-nav" class="container d-flex flex-grow-1" aria-label="In Page Navigation"> <div class="dropdown"><a class="w-100 dropdown__link" id="x0785783b32ff49038f005e0aae5f2cc7" data-mount="m365-dropdown" aria-expanded="false" aria-controls="x1e362cc124014454a0cc46c1e5acb0c4" type="button" role="button" tabindex="0"> <div ocr-component-name="block-list" data-component-id="9a71882adcc03ab3e1be8cd12015f1a9" class="list-item"> <div class="list-item__inner d-flex align-items-center" data-en-title="About article"> <div class="list-item__content flex-grow-1 d-flex flex-column"> <div class="fg--base-strong label list-item__content-title"> <div class=" mb-0"> <div data-oc-token-text> About article </div> </div> </div> </div> </div> </div></a> <div class="dropdown-menu menu-list p-0 rounded-scrollbar overflow-auto menu-list--no-padding" id="x1e362cc124014454a0cc46c1e5acb0c4" aria-labelledby="x0785783b32ff49038f005e0aae5f2cc7" tabindex="-1"> <div class="col ocr-slider ocr-slider--small-arrows" data-mount="ocr-slider" data-item-list-selector=".menu-list__item-link"> <div class="slider__overflow"> <ul class="slider__window rounded-scrollbar"> <li class="menu-list__list-item"><a class="menu-list__item-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB#section-master-ocbf67" role="link" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-oc="oca414" id="nt:unstructured-oca414" aria-label="Executive summary"> <div class="indicator indicator--shape-pill"></div><span class="menu-list__list-item-text"> <div ocr-component-name="block-list" data-component-id="9a71882adcc03ab3e1be8cd12015f1a9" class="list-item"> <div class="list-item__inner d-flex align-items-center" data-en-title="Executive summary"> <div class="list-item__content flex-grow-1 d-flex flex-column"> <div class="fg--base-strong label list-item__content-title"> <div class=" mb-0"> <div data-oc-token-text> Executive summary </div> </div> </div> </div> </div> </div></span> </a></li> <li class="menu-list__list-item"><a class="menu-list__item-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB#section-master-oc0365" role="link" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-oc="oc9b13" id="nt:unstructured-oc9b13" aria-label="Cloud security strategy"> <div class="indicator indicator--shape-pill"></div><span class="menu-list__list-item-text"> <div ocr-component-name="block-list" data-component-id="9a71882adcc03ab3e1be8cd12015f1a9" class="list-item"> <div class="list-item__inner d-flex align-items-center" data-en-title="Cloud security strategy"> <div class="list-item__content flex-grow-1 d-flex flex-column"> <div class="fg--base-strong label list-item__content-title"> <div class=" mb-0"> <div data-oc-token-text> Cloud security strategy </div> </div> </div> </div> </div> </div></span> </a></li> <li class="menu-list__list-item"><a class="menu-list__item-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB#section-master-oc5b41" role="link" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-oc="ocfb84" id="nt:unstructured-ocfb84" aria-label="Comprehensive posture management"> <div class="indicator indicator--shape-pill"></div><span class="menu-list__list-item-text"> <div ocr-component-name="block-list" data-component-id="9a71882adcc03ab3e1be8cd12015f1a9" class="list-item"> <div class="list-item__inner d-flex align-items-center" data-en-title="Comprehensive posture management"> <div class="list-item__content flex-grow-1 d-flex flex-column"> <div class="fg--base-strong label list-item__content-title"> <div class=" mb-0"> <div data-oc-token-text> Comprehensive posture management </div> </div> </div> </div> </div> </div></span> </a></li> <li class="menu-list__list-item"><a class="menu-list__item-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB#section-master-oc7800" role="link" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-oc="ocd1d9" id="nt:unstructured-ocd1d9" aria-label="IoT and OT Security"> <div class="indicator indicator--shape-pill"></div><span class="menu-list__list-item-text"> <div ocr-component-name="block-list" data-component-id="9a71882adcc03ab3e1be8cd12015f1a9" class="list-item"> <div class="list-item__inner d-flex align-items-center" data-en-title="IoT and OT Security"> <div class="list-item__content flex-grow-1 d-flex flex-column"> <div class="fg--base-strong label list-item__content-title"> <div class=" mb-0"> <div data-oc-token-text> IoT and OT Security </div> </div> </div> </div> </div> </div></span> </a></li> <li class="menu-list__list-item"><a class="menu-list__item-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB#section-master-ocf7cd" role="link" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-oc="oc0046" id="nt:unstructured-oc0046" aria-label="IoT-OT Risk Today"> <div class="indicator indicator--shape-pill"></div><span class="menu-list__list-item-text"> <div ocr-component-name="block-list" data-component-id="9a71882adcc03ab3e1be8cd12015f1a9" class="list-item"> <div class="list-item__inner d-flex align-items-center" data-en-title="IoT-OT Risk Today"> <div class="list-item__content flex-grow-1 d-flex flex-column"> <div class="fg--base-strong label list-item__content-title"> <div class=" mb-0"> <div data-oc-token-text> IoT-OT Risk Today </div> </div> </div> </div> </div> </div></span> </a></li> <li class="menu-list__list-item"><a class="menu-list__item-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB#section-master-ocd8a3" role="link" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-oc="oce160" id="nt:unstructured-oce160" aria-label="Securing IoT"> <div class="indicator indicator--shape-pill"></div><span class="menu-list__list-item-text"> <div ocr-component-name="block-list" data-component-id="9a71882adcc03ab3e1be8cd12015f1a9" class="list-item"> <div class="list-item__inner d-flex align-items-center" data-en-title="Securing IoT"> <div class="list-item__content flex-grow-1 d-flex flex-column"> <div class="fg--base-strong label list-item__content-title"> <div class=" mb-0"> <div data-oc-token-text> Securing IoT </div> </div> </div> </div> </div> </div></span> </a></li> <li class="menu-list__list-item"><a class="menu-list__item-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB#section-master-oca42a" role="link" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-oc="oc632b" id="nt:unstructured-oc632b" aria-label="Actionable insights"> <div class="indicator indicator--shape-pill"></div><span class="menu-list__list-item-text"> <div ocr-component-name="block-list" data-component-id="9a71882adcc03ab3e1be8cd12015f1a9" class="list-item"> <div class="list-item__inner d-flex align-items-center" data-en-title="Actionable insights"> <div class="list-item__content flex-grow-1 d-flex flex-column"> <div class="fg--base-strong label list-item__content-title"> <div class=" mb-0"> <div data-oc-token-text> Actionable insights </div> </div> </div> </div> </div> </div></span> </a></li> </ul> </div> <div class="slider__arrows"><button type="button" class="slider__arrow-prev" tabindex="-1" aria-hidden="true"></button> <div class="slider__arrow-prev slider__arrow-prev-bg"></div><button type="button" class="slider__arrow-next" tabindex="-1" aria-hidden="true"></button> <div class="slider__arrow-next slider__arrow-next-bg"></div> </div> </div> <div class="divider-component ocr-divider--orientation-vertical ocr-divider--size-s ocr-divider" data-component-id="596e5fa739d15607c6adc6715f1e064e"> <hr> </div> <div ocr-component-name="action-group" data-component-id="e44de352c999ca6efd7a58dc4a5d7a5b" class="button-group button-group--stacked"><a class="btn btn--icon btn--sm " data-bi-ecn="Download" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-bi-cn="Download" data-regenerate-fwlink="true" target="_blank" data-oc="ocfd35" id="action-ocfd35" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2262079%26clcid%3D0x409%26culture%3Den-us%26country%3Dus" aria-label="Download Full Report" data-isenvauthor="false"> <span class="btn__text">Download</span> <div ocr-component-name="icon" data-component-id="467e35e809075d121962a1d239c316b2" class="ocr-icon d-inline-flex"><span class="glyph-prepend glyph-prepend-download" role="presentation" aria-hidden="true"> </span> </div></a> </div> </div> </div> <div ocr-component-name="action-group" data-component-id="e44de352c999ca6efd7a58dc4a5d7a5b" class="button-group"><a class="btn btn--icon btn--sm " data-bi-ecn="Download" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-bi-cn="Download" data-regenerate-fwlink="true" target="_blank" data-oc="ocfd35" id="action-ocfd35" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2262079%26clcid%3D0x409%26culture%3Den-us%26country%3Dus" aria-label="Download Full Report" data-isenvauthor="false"> <span class="btn__text">Download</span> <div ocr-component-name="icon" data-component-id="467e35e809075d121962a1d239c316b2" class="ocr-icon d-inline-flex"><span class="glyph-prepend glyph-prepend-download" role="presentation" aria-hidden="true"> </span> </div></a> </div> </nav> <div class="indicator indicator--horizontal"></div> </div> </div> <div class="scrollspy-container"> <div ocr-component-name="section-master" data-component-id="2b9a710ec7952a9e39aaccb62b93dcee" class="section-master section-master--breadth-none"> <div class="container" data-oc="oc9b95" id="section-master-oc9b95"> </div> <div class="row section-master__slot"> <div class="col"> <div ocr-component-name="editorial-article-article-header" data-component-id="4e56ca5865e264e6bf0030618f54ca9a" class="editorial-article__templates-item editorial-article--article-header"> <div class="container" data-oc="oc49a0" id="article-header-oc49a0"> <div class="row"> <div class="col"> <div class="layout layout--cols-2 layout--editorial"> <aside class="editorial-article__left-rail editorial-article--article-header__left-rail layout__col"> <section class="editorial-article--article-header__read-time editorial-article__left-rail-item"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__eyebrow"> <div data-oc-token-text> Read time </div> </div> </div> <div ocr-component-name="tag" data-component-id="811da1e051db1f3830114eecce423acd" class="tag"> <div class="label"> <div data-oc-token-text> 16 min </div> </div> </div> </section> <section class="editorial-article--article-header__written-by editorial-article__left-rail-item"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__eyebrow"> <div data-oc-token-text> WRITTEN BY </div> </div> <div class=" block-heading__paragraph"> <div data-oc-token-text> Rob Lefferts, Corporate Vice President, Microsoft 365 Security </div> </div> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc5b08" id="richtext-oc5b08"> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc9dbc" id="richtext-oc9dbc"> <div data-oc-token-text> <p>04/26/2023</p> </div> </section> </div> </section> <div class="editorial-article--article-header__divider"> <div class="ocr-divider"></div> </div> </aside> <article class="editorial-article__main layout__col"> <div ocr-component-name="editorial-article-article-slot" data-component-id="30dac58d9f8596a1c923c2643d4143ef" class="editorial-article__slot"> <div ocr-component-name="editorial-article-subsection-heading" data-component-id="f60d1aa103c8a805e55155e769f08cbc" class="editorial-article-subsection editorial-article-subsection--article-detail"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading block-heading--size-l"> <div class=" block-heading__title" ocr-telemetry-name ocr-en-title="<h2>Cloud-centric security: How leading CISOs close coverage gaps</h2> "> <div data-oc-token-text> <h2>Cloud-centric security: How leading CISOs close coverage gaps</h2> </div> </div> </div> </div> </div> </article> </div> </div> </div> </div> </div> </div> </div> </div> <div ocr-component-name="section-master" data-component-id="2b9a710ec7952a9e39aaccb62b93dcee" class="section-master section-master--breadth-none"> <div class="container" data-oc="oce0a4" id="section-master-oce0a4"> </div> <div class="row section-master__slot"> <div class="col"> <div ocr-component-name="editorial-article-article-chapter" data-component-id="27d83c8af12200311e6e98dcf45ce868" class="editorial-article__templates-item editorial-article--chapter"> <div class="container" data-oc="oc1bf3" id="chapter-oc1bf3"> <div class="row"> <div class="col"> <div class="ocr-divider ocr-divider--size-xs editorial-article__title-divider"> </div> <div class="layout layout--cols-2 layout--editorial"> <aside class="editorial-article__left-rail layout__col"> <div class="editorial-article__left-rail-item"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__eyebrow"> <div data-oc-token-text> Letter from Rob </div> </div> </div> </div> </aside> <article class="editorial-article__main layout__col"> <div class="editorial-article__main__header"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> </div> </div> <div ocr-component-name="editorial-article-article-slot" data-component-id="30dac58d9f8596a1c923c2643d4143ef" class="editorial-article__slot"> <div ocr-component-name="editorial-article-subsection-paragraphs" data-component-id="17ccf6951975d20d644034fe6d2ff5ad" class="editorial-article-subsection editorial-article-subsection--paragraphs"> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="occe0c" id="richtext-occe0c"> <div data-oc-token-text> <p>Welcome to our third issue in the CISO Insider series. I’m Rob Lefferts and I lead the Microsoft Defender and Sentinel engineering teams. We launched this series about a year ago to share insights from our discussions with some of your peers as well as from our own research and experience working on the frontlines of cybersecurity.</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="ocd96b" id="richtext-ocd96b"> <div data-oc-token-text> <p>Our first two issues considered escalating threats such as ransomware and how security leaders are using automation and upskilling opportunities to help respond effectively to these threats amid an ongoing talent shortage. With CISOs facing even more pressure to operate efficiently in today’s economic uncertainty, many are looking to optimize using cloud-based solutions and integrated managed security services. In this issue, we look at emerging security priorities as organizations shift to an increasingly cloud-centric model, bringing along everything in their digital estate from on-premises systems to IoT devices.</p> </div> </section> </div> </div> </div> </article> </div> </div> </div> </div> </div> </div> </div> </div> <div ocr-component-name="section-master" data-component-id="2b9a710ec7952a9e39aaccb62b93dcee" class="section-master section-master--breadth-none section-master--density-compact"> <div class="container" data-oc="ocbf67" id="section-master-ocbf67"> </div> <div class="row section-master__slot"> <div class="col"> <div ocr-component-name="editorial-article-article-chapter" data-component-id="27d83c8af12200311e6e98dcf45ce868" class="editorial-article__templates-item editorial-article--chapter"> <div class="container" data-oc="oc9b75" id="chapter-oc9b75"> <div class="row"> <div class="col"> <div class="ocr-divider ocr-divider--size-xs editorial-article__title-divider"> </div> <div class="layout layout--cols-2 layout--editorial"> <aside class="editorial-article__left-rail layout__col"> <div class="editorial-article__left-rail-item"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__eyebrow"> <div data-oc-token-text> Executive summary </div> </div> </div> </div> </aside> <article class="editorial-article__main layout__col"> <div class="editorial-article__main__header"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> </div> </div> <div ocr-component-name="editorial-article-article-slot" data-component-id="30dac58d9f8596a1c923c2643d4143ef" class="editorial-article__slot"> <div ocr-component-name="editorial-article-subsection-paragraphs" data-component-id="17ccf6951975d20d644034fe6d2ff5ad" class="editorial-article-subsection editorial-article-subsection--paragraphs"> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc41fb" id="richtext-oc41fb"> <div data-oc-token-text> <p>The public cloud offers the win-win-win of strong foundational security plus cost efficiency plus scalable computing, making it a key resource in a time of tightening budgets. But with this triple play comes a need to ‘mind the gaps’ that arise in the nexus between the public cloud and private clouds and on-premises systems. We look at what security leaders are doing to manage security in the liminal spaces between networked devices, endpoints, apps, clouds, and managed services. Finally, we look at two technologies that represent the apex of this security challenge, IoT and OT. The convergence of these two polarized technologies—one nascent and the other legacy, both introduced to the network without adequate built-in security—creates a porous edge vulnerable to attack.</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc9d7d" id="richtext-oc9d7d"> <div data-oc-token-text> <p>Issue 3 looks at these three cloud-centric security priorities:</p> </div> </section> </div> </div> </div> </article> </div> </div> </div> </div> </div> </div> </div> </div> <div ocr-component-name="section-master" data-component-id="2b9a710ec7952a9e39aaccb62b93dcee" class="section-master section-master--breadth-none section-master--density-compact"> <div class="container" data-oc="oc4c0e" id="section-master-oc4c0e"> </div> <div class="row section-master__slot"> <div class="col"> <div ocr-component-name="editorial-article-article-chapter" data-component-id="27d83c8af12200311e6e98dcf45ce868" class="editorial-article__templates-item editorial-article--chapter"> <div class="container" data-oc="oc7355" id="chapter-oc7355"> <div class="row"> <div class="col"> <div class="ocr-divider ocr-divider--size-xs editorial-article__title-divider"> </div> <div class="layout layout--cols-2 layout--editorial"> <aside class="editorial-article__left-rail layout__col"> <div class="editorial-article__left-rail-item"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__eyebrow"> <div data-oc-token-text> Cloud security strategy </div> </div> </div> </div> </aside> <article class="editorial-article__main layout__col"> <div class="editorial-article__main__header"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> </div> </div> <div ocr-component-name="editorial-article-article-slot" data-component-id="30dac58d9f8596a1c923c2643d4143ef" class="editorial-article__slot"> <div ocr-component-name="editorial-article-subsection-heading" data-component-id="f60d1aa103c8a805e55155e769f08cbc" class="editorial-article-subsection editorial-article-subsection--article-detail"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading block-heading--size-l"> <div class=" block-heading__title" ocr-telemetry-name ocr-en-title="<h2>The cloud is secure; but are you managing your cloud environment securely?</h2> "> <div data-oc-token-text> <h2>The cloud is secure; but are you managing your cloud environment securely?</h2> </div> </div> <div class=" block-heading__paragraph"> <div data-oc-token-text> Cloud adoption has accelerated as organizations seek new efficiencies in response to both economic constraints and a talent shortage. CISOs trust the public cloud services for their foundational security, but the cloud is only as secure as the customer’s ability to manage the interface between the public cloud and private infrastructure. We look at how security leaders are closing the gap with a strong cloud security strategy—for example, by securing their cloud apps and workloads with tools like cloud posture management and the cloud-native application protection platform (CNAPP). </div> </div> </div> </div> </div> </article> </div> </div> </div> </div> </div> </div> </div> </div> <div ocr-component-name="section-master" data-component-id="2b9a710ec7952a9e39aaccb62b93dcee" class="section-master section-master--breadth-comfortable section-master--density-none"> <div class="container" data-oc="oca392" id="section-master-oca392"> </div> <div class="row section-master__slot"> <div class="col"> <div ocr-component-name="editorial-article-article-chapter" data-component-id="27d83c8af12200311e6e98dcf45ce868" class="editorial-article__templates-item editorial-article--chapter"> <div class="container" data-oc="oc079e" id="chapter-oc079e"> <div class="row"> <div class="col"> <div class="ocr-divider ocr-divider--size-xs editorial-article__title-divider"> </div> <div class="layout layout--cols-2 layout--editorial"> <aside class="editorial-article__left-rail layout__col"> <div class="editorial-article__left-rail-item"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__eyebrow"> <div data-oc-token-text> Comprehensive posture management </div> </div> </div> </div> </aside> <article class="editorial-article__main layout__col"> <div class="editorial-article__main__header"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__title" ocr-telemetry-name ocr-en-title="<h2>A comprehensive security posture starts with visibility and ends with prioritized risk management.</h2> "> <div data-oc-token-text> <h2>A comprehensive security posture starts with visibility and ends with prioritized risk management.</h2> </div> </div> </div> </div> <div ocr-component-name="editorial-article-article-slot" data-component-id="30dac58d9f8596a1c923c2643d4143ef" class="editorial-article__slot"> <div ocr-component-name="editorial-article-subsection-paragraphs" data-component-id="17ccf6951975d20d644034fe6d2ff5ad" class="editorial-article-subsection editorial-article-subsection--paragraphs"> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc585f" id="richtext-oc585f"> <div data-oc-token-text> <p>With accelerated cloud adoption comes a proliferation of services, endpoints, apps, and devices. In addition to a strategy for managing the critical cloud connection points, CISOs are recognizing a need for greater visibility and coordination across their expanding digital footprint—a need for comprehensive posture management. We look at how security leaders are expanding their approach from preventing attacks (still the best defense, as long as it works) to managing risk through comprehensive posture management tools that help with inventorying assets and modeling business risk—and of course, identity and access control.</p> </div> </section> </div> </div> </div> </article> </div> </div> </div> </div> </div> </div> </div> </div> <div ocr-component-name="section-master" data-component-id="2b9a710ec7952a9e39aaccb62b93dcee" class="section-master section-master--breadth-none section-master--density-none"> <div class="container" data-oc="oc195e" id="section-master-oc195e"> </div> <div class="row section-master__slot"> <div class="col"> <div ocr-component-name="editorial-article-article-chapter" data-component-id="27d83c8af12200311e6e98dcf45ce868" class="editorial-article__templates-item editorial-article--chapter"> <div class="container" data-oc="ocb27b" id="chapter-ocb27b"> <div class="row"> <div class="col"> <div class="ocr-divider ocr-divider--size-xs editorial-article__title-divider"> </div> <div class="layout layout--cols-2 layout--editorial"> <aside class="editorial-article__left-rail layout__col"> <div class="editorial-article__left-rail-item"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__eyebrow"> <div data-oc-token-text> IoT/OT </div> </div> </div> </div> </aside> <article class="editorial-article__main layout__col"> <div class="editorial-article__main__header"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__title" ocr-telemetry-name ocr-en-title="<h2>Lean on Zero Trust and hygiene to tame the wildly diverse, hyper-networked environment of IoT &amp;amp; OT.</h2> "> <div data-oc-token-text> <h2>Lean on Zero Trust and hygiene to tame the wildly diverse, hyper-networked environment of IoT &amp; OT.</h2> </div> </div> </div> </div> <div ocr-component-name="editorial-article-article-slot" data-component-id="30dac58d9f8596a1c923c2643d4143ef" class="editorial-article__slot"> <div ocr-component-name="editorial-article-subsection-paragraphs" data-component-id="17ccf6951975d20d644034fe6d2ff5ad" class="editorial-article-subsection editorial-article-subsection--paragraphs"> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc585f" id="richtext-oc585f"> <div data-oc-token-text> <p>The exponential growth in connected IoT and OT devices continues to present security challenges—especially given the difficulty of reconciling technologies that are a blend of cloud-native, third-party tools and legacy equipment retrofitted for networking. The number of global IoT devices is projected to reach 41.6 billion by 2025, creating an expanded attack surface area for attackers who use such devices as entry points for cyber-attacks. These devices tend to be targeted as points of vulnerability in a network. They may have been introduced ad hoc and connected to the IT network without clear direction from the security team; developed without foundational security by a third party; or managed inadequately by the security team due to challenges like proprietary protocols and availability requirements (OT). Learn how many IT leaders are now evolving their IoT/OT security strategy to navigate this gap-ridden edge.</p> </div> </section> </div> </div> </div> </article> </div> </div> </div> </div> </div> </div> </div> </div> <div ocr-component-name="section-master" data-component-id="2b9a710ec7952a9e39aaccb62b93dcee" class="section-master section-master--breadth-comfortable section-master--density-none"> <div class="container" data-oc="oc0365" id="section-master-oc0365"> </div> <div class="row section-master__slot"> <div class="col"> <div ocr-component-name="editorial-article-article-chapter" data-component-id="27d83c8af12200311e6e98dcf45ce868" class="editorial-article__templates-item editorial-article--chapter"> <div class="container" data-oc="ocf93c" id="chapter-ocf93c"> <div class="row"> <div class="col"> <div class="ocr-divider ocr-divider--size-xs editorial-article__title-divider"> </div> <div class="layout layout--cols-2 layout--editorial"> <aside class="editorial-article__left-rail layout__col"> <div class="editorial-article__left-rail-item"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__eyebrow"> <div data-oc-token-text> Cloud security strategy </div> </div> </div> </div> </aside> <article class="editorial-article__main layout__col"> <div class="editorial-article__main__header"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__title" ocr-telemetry-name ocr-en-title="<h2>The cloud is secure; but are you managing your cloud environment securely?</h2> "> <div data-oc-token-text> <h2>The cloud is secure; but are you managing your cloud environment securely?</h2> </div> </div> </div> </div> <div ocr-component-name="editorial-article-article-slot" data-component-id="30dac58d9f8596a1c923c2643d4143ef" class="editorial-article__slot"> <div ocr-component-name="editorial-article-subsection-paragraphs" data-component-id="17ccf6951975d20d644034fe6d2ff5ad" class="editorial-article-subsection editorial-article-subsection--paragraphs"> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc3ec8" id="richtext-oc3ec8"> <div data-oc-token-text> <p>At a time of talent shortages and tightening budgets, the cloud offers many benefits—cost efficiency, infinitely scalable resources, cutting-edge tooling, and more reliable data protection than most security leaders feel they can achieve on-premises. While CISOs used to see cloud resources as a tradeoff between greater risk exposure and greater cost efficiency, most of the security leaders we speak to today have embraced the cloud as the new normal. They trust in the strong foundational security of cloud technology: “I expect that cloud service providers have their house in order in terms of their identity and access management, their system security, and their physical security,” says one CISO.</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc9630" id="richtext-oc9630"> <div data-oc-token-text> <p>But as most security leaders recognize, cloud foundational security does not guarantee your data is secure—the protection of your data in the cloud greatly depends on how cloud services are implemented alongside on-premises systems and homegrown technology. Risk arises in the gaps between the cloud and the traditional organizational boundary, the policies, and technologies used to secure the cloud. Misconfigurations occur, often leaving organizations exposed and dependent on security teams to identify and close the gaps.</p> </div> </section> </div> </div> <div ocr-component-name="editorial-article-subsection-heading" data-component-id="f60d1aa103c8a805e55155e769f08cbc" class="editorial-article-subsection editorial-article-subsection--article-detail"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading block-heading--size-l"> <div class=" block-heading__title" ocr-telemetry-name ocr-en-title="<blockquote>“A high number of breaches are because of misconfiguration, someone inadvertently misconfiguring something, or changing something that allows the data to be leaked.”</blockquote> "> <div data-oc-token-text> <blockquote> “A high number of breaches are because of misconfiguration, someone inadvertently misconfiguring something, or changing something that allows the data to be leaked.” </blockquote> </div> </div> <div class=" block-heading__paragraph"> <div data-oc-token-text> Utilities – Water, 1,390 employees </div> </div> </div> </div> <div ocr-component-name="editorial-article-subsection-paragraphs" data-component-id="17ccf6951975d20d644034fe6d2ff5ad" class="editorial-article-subsection editorial-article-subsection--paragraphs"> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="ocb655" id="richtext-ocb655"> <div data-oc-token-text> <p>By 2023, 75 percent of cloud security breaches will be caused by inadequate management of identities, access, and privileges, up from 50 percent in 2020 (<a href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2262158" target="_blank" class="ms-rte-link">Misconfiguration and vulnerabilities biggest risks in cloud security: Report | CSO Online</a>). The challenge exists not in the security of the cloud itself, but in the policies and controls used to secure access. As a financial services CISO puts it, “Cloud security is very good if it is deployed correctly. The cloud itself and their components are secure. But you get into the configuration: am I writing my code properly? Am I setting up my connectors across the enterprise correctly?” Another security leader sums up the challenge: “The misconfiguration of those cloud services is what opens up the services to threat actors.” As more security leaders become aware of the risks of cloud misconfiguration, the conversation around cloud security has shifted from “Is the cloud secure?” to “Am I using the cloud securely?”</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="occ50c" id="richtext-occ50c"> <div data-oc-token-text> <p>What does it mean to use the cloud securely? Many of the leaders I talk to approach cloud security strategy from the ground up, tackling the human errors that expose the organization to risk such as identity breaches and misconfigurations. This is in line with our recommendations as well—<strong>securing identities and adaptively managing their access are absolutely fundamental to any cloud security strategy.</strong></p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oce0f1" id="richtext-oce0f1"> <div data-oc-token-text> <p>For anyone still on the fence, maybe this will help: McAfee reported that 70 percent of exposed records—5.4 billion—were compromised due to misconfigured services and portals. Managing access through identity controls and implementing strong security hygiene can go a long way to closing the gaps. McAfee similarly reported that 70 percent of exposed records—5.4 billion—were compromised due to misconfigured services and portals. Managing access through identity controls and implementing strong security hygiene can go a long way to closing the gaps.</p> </div> </section> </div> </div> </div> </article> </div> </div> </div> </div> </div> </div> </div> </div> <div ocr-component-name="section-master" data-component-id="2b9a710ec7952a9e39aaccb62b93dcee" class="section-master section-master--breadth-none section-master--density-none"> <div class="container" data-oc="occ67e" id="section-master-occ67e"> </div> <div class="row section-master__slot"> <div class="col"> <div ocr-component-name="editorial-article-article-chapter" data-component-id="27d83c8af12200311e6e98dcf45ce868" class="editorial-article__templates-item editorial-article--chapter"> <div class="container" data-oc="oc98e5" id="chapter-oc98e5"> <div class="row"> <div class="col"> <div class="ocr-divider ocr-divider--size-xs editorial-article__title-divider"> </div> <div class="layout layout--cols-2 layout--editorial"> <aside class="editorial-article__left-rail layout__col"> <div class="editorial-article__left-rail-item"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__eyebrow"> <div data-oc-token-text> Best practices for a strong cloud security strategy </div> </div> </div> </div> </aside> <article class="editorial-article__main layout__col"> <div class="editorial-article__main__header"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__title" ocr-telemetry-name ocr-en-title="<h2>A robust cloud security strategy involves these best practices:</h2> "> <div data-oc-token-text> <h2>A robust cloud security strategy involves these best practices:</h2> </div> </div> </div> </div> <div ocr-component-name="editorial-article-article-slot" data-component-id="30dac58d9f8596a1c923c2643d4143ef" class="editorial-article__slot"> <div ocr-component-name="editorial-article-subsection-paragraphs" data-component-id="17ccf6951975d20d644034fe6d2ff5ad" class="editorial-article-subsection editorial-article-subsection--paragraphs"> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc585f" id="richtext-oc585f"> <div data-oc-token-text> <p>1. Implement an end-to-end cloud-native application protection platform (CNAPP) strategy: Managing security with fragmented tools can cause blind spots in protection and higher costs. Having an all-in-one platform that enables you to embed security from code to cloud is critical to reduce overall cloud attack surface and automate threat protection. The CNAPP strategy involves the following best practices:</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc5d2d" id="richtext-oc5d2d"> <div data-oc-token-text><strong>a.&nbsp;Prioritize security from the start in DevOps.</strong>&nbsp;Security can fall to the wayside in the rush to develop cloud apps. Developers have an incentive to solve a business problem quickly and may lack cloud security skills. As a result, apps can proliferate without the appropriate data authorization rules. APIs have become a prime target for hackers, as organizations often cannot keep track of them given the rate of cloud app development. Gartner identifies “API sprawl” as a growing issue, predicting that by 2025, fewer than half of enterprise APIs will be managed (<a href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2262419" target="_blank" class="ms-rte-link">Gartner</a>). It is therefore critical to implement a DevSecOps strategy as quickly as possible. </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="ocd62c" id="richtext-ocd62c"> <div data-oc-token-text><strong>b.&nbsp;Strengthen cloud security posture and fix misconfigurations.</strong>&nbsp;Misconfigurations are the most common cause for cloud breaches—check out&nbsp;<a href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2262159" target="_blank" class="ms-rte-link">Cloud Security Alliance’s</a>&nbsp;top most common security group-setting misconfigurations. While leaving storage resources open to the public is the most common fear we hear, CISOs also cite other areas of neglect: disabled monitoring and logging, excessive permissions, unprotected backups, etc. Encryption is an important hedge against mismanagement—and critical to reducing the risk of ransomware. Cloud security posture management tools offer another line of defense by monitoring cloud resources for exposures and misconfigurations before a breach happens, so you can reduce attack surface proactively. </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oca238" id="richtext-oca238"> <div data-oc-token-text><strong>c.</strong>&nbsp;<strong>Automate detection, response, and analysis of incidents.</strong>&nbsp;Identifying and fixing misconfigurations is great, but we also need to ensure we have the tools and processes in place to detect attacks that make it past the defense. This is where threat detection and response management tools can help. </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc7fde" id="richtext-oc7fde"> <div data-oc-token-text><strong>d.&nbsp;Get access management right.&nbsp;</strong>Multifactor authentication, single sign-on, role-based access control, permission management, and certifications help manage the two biggest risks to cloud security: the user and misconfigured digital properties. Least access is a cloud infrastructure entitlement management (CIEM) best practice. Some leaders rely on an identity access management or entitlement management solution to put active security controls in place. One financial services leader leans on the cloud access security broker (CASB) as a “key backstop” to manage the organization’s SaaS services and to maintain control of their users and data. The CASB acts as an intermediary between users and cloud apps, providing visibility and enforcing governance actions through policies. backstop” to manage their SaaS services and maintain control of their users and data. The CASB acts as an intermediary between users and cloud apps, providing visibility and enforcing governance actions through policies. </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="ocedc7" id="richtext-ocedc7"> <div data-oc-token-text> <p>A cloud-native application protection platform like that offered in&nbsp;<a href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2262074" target="_blank" class="ms-rte-link">Microsoft Defender for Cloud</a>&nbsp;not only offers visibility across multi-cloud resources, but also provides protection at all layers of the environment while monitoring for threats and correlating alerts into incidents that integrate with your SIEM. This streamlines investigations and helps your SOC teams stay ahead of cross-platform alerts.</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oced77" id="richtext-oced77"> <div data-oc-token-text> <p>An ounce of prevention—closing identity and misconfiguration gaps—combined with robust tools for attack response go a long way to securing the whole cloud environment, from the corporate network to cloud services.</p> </div> </section> </div> </div> </div> </article> </div> </div> </div> </div> </div> </div> </div> </div> <div ocr-component-name="section-master" data-component-id="2b9a710ec7952a9e39aaccb62b93dcee" class="section-master section-master--breadth-none"> <div class="container" data-oc="oc5b41" id="section-master-oc5b41"> </div> <div class="row section-master__slot"> <div class="col"> <div ocr-component-name="editorial-article-article-chapter" data-component-id="27d83c8af12200311e6e98dcf45ce868" class="editorial-article__templates-item editorial-article--chapter"> <div class="container" data-oc="oc9d80" id="chapter-oc9d80"> <div class="row"> <div class="col"> <div class="ocr-divider ocr-divider--size-xs editorial-article__title-divider"> </div> <div class="layout layout--cols-2 layout--editorial"> <aside class="editorial-article__left-rail layout__col"> <div class="editorial-article__left-rail-item"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__eyebrow"> <div data-oc-token-text> Comprehensive posture management </div> </div> </div> </div> </aside> <article class="editorial-article__main layout__col"> <div class="editorial-article__main__header"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__title" ocr-telemetry-name ocr-en-title="<h2>A comprehensive security posture starts with visibility and ends with prioritized risk management.</h2> "> <div data-oc-token-text> <h2>A comprehensive security posture starts with visibility and ends with prioritized risk management.</h2> </div> </div> </div> </div> <div ocr-component-name="editorial-article-article-slot" data-component-id="30dac58d9f8596a1c923c2643d4143ef" class="editorial-article__slot"> <div ocr-component-name="editorial-article-subsection-paragraphs" data-component-id="17ccf6951975d20d644034fe6d2ff5ad" class="editorial-article-subsection editorial-article-subsection--paragraphs"> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc12a9" id="richtext-oc12a9"> <div data-oc-token-text> <p>The shift to cloud-centric IT not only exposes the organization to implementation gaps, but also to a proliferating array of networked assets—devices, apps, endpoints—as well as to exposed cloud workloads. Security leaders are managing their posture in this perimeter-less environment with technologies that deliver visibility and prioritized response. These tools help organizations map an asset inventory that covers the entire attack surface, spanning managed and unmanaged devices both within and outside of the organization’s network. Using these resources, CISOs are able to assess the security posture of each asset as well as its role in the business to develop a prioritized risk model.</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc58de" id="richtext-oc58de"> <div data-oc-token-text> <p>In our conversations with security leaders, we’re seeing an evolution from perimeter-based security toward a security posture-based approach that embraces a borderless ecosystem.</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc7c51" id="richtext-oc7c51"> <div data-oc-token-text> <p>As one CISO puts it, “To me, the posture goes down to the identity…. We don’t look at it just as the old traditional posture where the perimeter is but move that all the way down to the endpoint.” (Utilities-Water, 1,390 employees). “Identity has become the new perimeter,” comments a FinTech CISO, asking: “What does identity mean in this new model where there is no outside and inside?” (FinTech, 15,000 employees).</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc803c" id="richtext-oc803c"> <div data-oc-token-text> <p>Given this porous environment, CISOs understand the urgency of comprehensive posture management—but many question whether they have the resources and digital maturity to put this vision into practice. Fortunately, through a combination of industry-proven frameworks (updated for today’s needs) and security innovation, comprehensive posture management is within reach for most organizations.</p> </div> </section> </div> </div> <div ocr-component-name="editorial-article-subsection-heading" data-component-id="f60d1aa103c8a805e55155e769f08cbc" class="editorial-article-subsection editorial-article-subsection--article-detail"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading block-heading--size-l"> <div class=" block-heading__title" ocr-telemetry-name ocr-en-title="<blockquote>Get tooling in your cyber infrastructure that allows you to do an asset inventory. Second, look at which one of those are critical, which have the biggest risk to the organization and understand what the potential vulnerabilities are of these devices, and decide whether this is acceptable—do I need to patch or isolate it.</blockquote> "> <div data-oc-token-text> <blockquote> Get tooling in your cyber infrastructure that allows you to do an asset inventory. Second, look at which one of those are critical, which have the biggest risk to the organization and understand what the potential vulnerabilities are of these devices, and decide whether this is acceptable—do I need to patch or isolate it. </blockquote> </div> </div> <div class=" block-heading__paragraph"> <div data-oc-token-text> Ken Malcolmson, Executive Security Advisor, Microsoft </div> </div> </div> </div> </div> </article> </div> </div> </div> </div> </div> <div ocr-component-name="section-master" data-component-id="2b9a710ec7952a9e39aaccb62b93dcee" class="section-master section-master--breadth-none section-master--density-none"> <div class="container" data-oc="ocaf93" id="section-master-ocaf93"> </div> <div class="row section-master__slot"> <div class="col"> <div ocr-component-name="editorial-article-article-chapter" data-component-id="27d83c8af12200311e6e98dcf45ce868" class="editorial-article__templates-item editorial-article--chapter"> <div class="container" data-oc="oc5169" id="chapter-oc5169"> <div class="row"> <div class="col"> <div class="ocr-divider ocr-divider--size-xs editorial-article__title-divider"> </div> <div class="layout layout--cols-2 layout--editorial"> <aside class="editorial-article__left-rail layout__col"> <div class="editorial-article__left-rail-item"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__eyebrow"> <div data-oc-token-text> BEST PRACTICES FOR COMPREHENSIVE SECURITY POSTURE MANAGEMENT </div> </div> </div> </div> </aside> <article class="editorial-article__main layout__col"> <div class="editorial-article__main__header"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__title" ocr-telemetry-name ocr-en-title="<h2>Here are some best practices and tools security leaders are using to manage their posture in an open-ended, cloud-centric environment:</h2> "> <div data-oc-token-text> <h2>Here are some best practices and tools security leaders are using to manage their posture in an open-ended, cloud-centric environment:</h2> </div> </div> </div> </div> <div ocr-component-name="editorial-article-article-slot" data-component-id="30dac58d9f8596a1c923c2643d4143ef" class="editorial-article__slot"> <div ocr-component-name="editorial-article-subsection-paragraphs" data-component-id="17ccf6951975d20d644034fe6d2ff5ad" class="editorial-article-subsection editorial-article-subsection--paragraphs"> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc585f" id="richtext-oc585f"> <div data-oc-token-text><strong>1. Achieve comprehensive visibility with an asset inventory.</strong><br> Visibility is the first step in holistic posture management. CISOs are asking, ‘Do we even know all we have out there as a first step? Do we even have visibility before we can get to management?’ A risk asset inventory includes IT assets like networks and applications, databases, servers, cloud properties, IoT properties, as well as the data and IP assets stored on this digital infrastructure. Most platforms, like Microsoft 365 or Azure, include built-in asset inventory tools that can help you get started. </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc5d2d" id="richtext-oc5d2d"> <div data-oc-token-text><strong>2. Assess vulnerability and analyze risk.</strong><br> Once an organization has a comprehensive asset inventory, it’s possible to analyze risk with respect to both internal vulnerabilities and external threats. This step relies heavily on context and is unique to each organization—a reliable risk assessment depends on a strong partnership among the security, IT, and data teams. This cross-functional team leverages automated risk scoring and prioritization tools in their analysis—for example, the risk prioritization tools integrated into Microsoft Entra ID, Microsoft Defender XDR and Microsoft 365. Automated risk scoring and prioritization technologies may also incorporate expert guidance for remediating the gaps as well as contextual information for effective threat response. </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="ocd62c" id="richtext-ocd62c"> <div data-oc-token-text><strong>3. Prioritize risk and security needs with business risk modeling.</strong><br> With a clear understanding of the risk landscape, technical teams can work with business leaders to prioritize security interventions with respect to business needs. Consider the role of each asset, its value to business, and the risk to the business if it is compromised, asking questions like, ‘How sensitive is this information and what would be the impact to the business of its exposure?’ or ‘How mission critical are these systems—what would be the impact of downtime to the business?’ Microsoft offers tools to support a comprehensive identification and prioritization of vulnerabilities according to business risk modeling, including Microsoft Secure Score, Microsoft Compliance Score, Azure Secure Score, Microsoft Defender External Attack Surface Management, and Microsoft Defender Vulnerability Management. </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oca9a4" id="richtext-oca9a4"> <div data-oc-token-text><strong>4. Create a posture management strategy.</strong><br> An asset inventory, risk analysis, and business risk model form the basis for comprehensive posture management. This visibility and insight help the security team determine how best to allocate resources, what hardening measures need to be applied, and how to optimize the tradeoff between risk and useability for each segment of the network. </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oca6bb" id="richtext-oca6bb"> <div data-oc-token-text> <p>Posture management solutions offer the visibility and vulnerability analysis to help organizations understand where to focus their posture improvement efforts. With this insight, they can identify and prioritize important areas in their attack surface.</p> </div> </section> </div> </div> </div> </article> </div> </div> </div> </div> </div> </div> </div> </div> <div ocr-component-name="section-master" data-component-id="2b9a710ec7952a9e39aaccb62b93dcee" class="section-master section-master--breadth-none section-master--density-none"> <div class="container" data-oc="oc7800" id="section-master-oc7800"> </div> <div class="row section-master__slot"> <div class="col"> <div ocr-component-name="editorial-article-article-chapter" data-component-id="27d83c8af12200311e6e98dcf45ce868" class="editorial-article__templates-item editorial-article--chapter"> <div class="container" data-oc="oc8645" id="chapter-oc8645"> <div class="row"> <div class="col"> <div class="ocr-divider ocr-divider--size-xs editorial-article__title-divider"> </div> <div class="layout layout--cols-2 layout--editorial"> <aside class="editorial-article__left-rail layout__col"> <div class="editorial-article__left-rail-item"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__eyebrow"> <div data-oc-token-text> IoT and OT Security </div> </div> </div> </div> </aside> <article class="editorial-article__main layout__col"> <div class="editorial-article__main__header"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__title" ocr-telemetry-name ocr-en-title="<h2>Lean on Zero Trust and hygiene to tame the wildly diverse, hyper-networked environment of IoT and OT</h2> "> <div data-oc-token-text> <h2>Lean on Zero Trust and hygiene to tame the wildly diverse, hyper-networked environment of IoT and OT</h2> </div> </div> </div> </div> <div ocr-component-name="editorial-article-article-slot" data-component-id="30dac58d9f8596a1c923c2643d4143ef" class="editorial-article__slot"> <div ocr-component-name="editorial-article-subsection-paragraphs" data-component-id="17ccf6951975d20d644034fe6d2ff5ad" class="editorial-article-subsection editorial-article-subsection--paragraphs"> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc585f" id="richtext-oc585f"> <div data-oc-token-text> <p>The two challenges we’ve discussed—the cloud implementation gap and the proliferation of cloud-connected devices—are creating a perfect storm of risk in IoT and OT device environments. In addition to the inherent risk of an expanded attack surface area introduced by IoT and OT devices, security leaders tell me they’re trying to rationalize the convergence of nascent IoT and legacy OT strategies. IoT may be cloud native, but these devices frequently prioritize business expediency over foundational security; OT tends to be vendor-managed legacy equipment developed without modern security and introduced ad hoc onto the organization’s IT network.</p> </div> </section> </div> </div> </div> </article> </div> </div> </div> </div> </div> </div> </div> </div> <div ocr-component-name="section-master" data-component-id="2b9a710ec7952a9e39aaccb62b93dcee" class="section-master section-master--breadth-none section-master--density-none"> <div class="container" data-oc="ocf7cd" id="section-master-ocf7cd"> </div> <div class="row section-master__slot"> <div class="col"> <div ocr-component-name="editorial-article-article-chapter" data-component-id="27d83c8af12200311e6e98dcf45ce868" class="editorial-article__templates-item editorial-article--chapter"> <div class="container" data-oc="oc8726" id="chapter-oc8726"> <div class="row"> <div class="col"> <div class="ocr-divider ocr-divider--size-xs editorial-article__title-divider"> </div> <div class="layout layout--cols-2 layout--editorial"> <aside class="editorial-article__left-rail layout__col"> <div class="editorial-article__left-rail-item"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__eyebrow"> <div data-oc-token-text> IoT-OT Risk Today </div> </div> </div> </div> </aside> <article class="editorial-article__main layout__col"> <div class="editorial-article__main__header"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> </div> </div> <div ocr-component-name="editorial-article-article-slot" data-component-id="30dac58d9f8596a1c923c2643d4143ef" class="editorial-article__slot"> <div ocr-component-name="editorial-article-subsection-paragraphs" data-component-id="17ccf6951975d20d644034fe6d2ff5ad" class="editorial-article-subsection editorial-article-subsection--paragraphs"> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc585f" id="richtext-oc585f"> <div data-oc-token-text> <p>IoT and OT devices are helping organizations modernize workspaces, become more data driven, and ease demands on staff through strategic shifts like remote management and automation. The International Data Corporation (IDC) estimates there will be 41.6 billion connected IoT devices by 2025, a growth rate exceeding that of traditional IT devices.</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc5d2d" id="richtext-oc5d2d"> <div data-oc-token-text> <p>But with this opportunity comes significant risk. Our December 2022 Cyber Signals report,&nbsp;<a href="https://www-microsoft-com.translate.goog/en-us/security/business/security-insider/reports/cyber-signals/cyber-signals-issue-3-the-convergence-of-it-and-ot/?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB">The Convergence of IT and Operational Technology</a>, looked at the risks to critical infrastructure posed by these technologies.</p> </div> </section> </div> </div> <div ocr-component-name="editorial-article-subsection-heading" data-component-id="f60d1aa103c8a805e55155e769f08cbc" class="editorial-article-subsection editorial-article-subsection--article-detail"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading block-heading--size-l"> <div class=" block-heading__title" ocr-telemetry-name ocr-en-title="<h2>Key findings include:</h2> "> <div data-oc-token-text> <h2>Key findings include:</h2> </div> </div> <div class="parsys block-heading__slot"> <div ocr-component-name="editorial-article-subsection-paragraphs" data-component-id="17ccf6951975d20d644034fe6d2ff5ad" class="editorial-article-subsection editorial-article-subsection--paragraphs"> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc585f" id="richtext-oc585f"> <div data-oc-token-text> <p>1. 75% of the most common industrial controllers in customer OT networks have unpatched, high-severity vulnerabilities.</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc5d2d" id="richtext-oc5d2d"> <div data-oc-token-text> <p>2. From 2020 to 2022, there was a 78% increase in disclosures of high-severity vulnerabilities in industrial control equipment produced by popular vendors.</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="ocd62c" id="richtext-ocd62c"> <div data-oc-token-text> <p>3. Many devices publicly visible on the internet are running unsupported software. For example, the outdated software Boa is still widely used in IoT devices and software development kits (SDKs).</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc731d" id="richtext-oc731d"> <div data-oc-token-text> <p>IoT devices often represent the weakest link in the digital estate. Because they are not managed, updated, or patched the same way that traditional IT devices are, they can serve as a convenient gateway for attackers seeking to infiltrate the IT network. Once accessed, IoT devices are vulnerable to remote code executions. An attacker can gain control and exploit vulnerabilities to implant botnets or malware in an IoT device. At that point, the device can serve as an open door to the entire network.</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="ocd3fa" id="richtext-ocd3fa"> <div data-oc-token-text> <p>Operational Technology devices pose an even more sinister risk, with many being critical to the operation of the organization. Historically offline or physically isolated from corporate IT network, OT networks are increasingly blended with IT and IoT systems. Our November 2021 study conducted with Ponemon Institute,&nbsp;<a href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2262338" target="_blank" class="ms-rte-link">The State of IoT/OT Cybersecurity in the Enterprise</a>, found that over half of OT networks are now connected to corporate IT (business) networks. A similar proportion of companies—56 percent—have internet-connected devices on their OT network for scenarios like remote access.</p> </div> </section> </div> </div> </div> </div> </div> <div ocr-component-name="editorial-article-subsection-heading" data-component-id="f60d1aa103c8a805e55155e769f08cbc" class="editorial-article-subsection editorial-article-subsection--article-detail"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading block-heading--size-l"> <div class=" block-heading__title" ocr-telemetry-name ocr-en-title="<blockquote>“Almost every attack we’ve seen in the last year started from initial access to an IT network that was leveraged into the OT environment.”</blockquote> "> <div data-oc-token-text> <blockquote> “Almost every attack we’ve seen in the last year started from initial access to an IT network that was leveraged into the OT environment.” </blockquote> </div> </div> <div class=" block-heading__paragraph"> <div data-oc-token-text> David Atch, Microsoft Threat Intelligence, Head of IoT/OT Security Research </div> </div> </div> </div> <div ocr-component-name="editorial-article-subsection-paragraphs" data-component-id="17ccf6951975d20d644034fe6d2ff5ad" class="editorial-article-subsection editorial-article-subsection--paragraphs"> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc585f" id="richtext-oc585f"> <div data-oc-token-text> <p>OT connectivity exposes organizations to the risk of major disruption and downtime in the event of an attack. OT is often core to the business, providing attackers with an enticing target they can exploit to cause significant damage. The devices themselves can be easy targets, as they often involve brownfield or legacy equipment that isn’t secure by design, pre-dates modern security practices, and may have proprietary protocols that elude visibility by standard IT monitoring tools. Attackers tend to exploit these technologies by discovering exposed internet-facing systems, gaining access through employee login credentials, or exploiting the access granted to third-party suppliers and contractors. Unmonitored ICS protocols are one common entry point for OT-specific attacks (<a href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2262339" target="_blank" class="ms-rte-link">Microsoft Digital Defense Report 2022</a>).</p> </div> </section> </div> </div> </div> </article> </div> </div> </div> </div> </div> </div> </div> </div> <div ocr-component-name="section-master" data-component-id="2b9a710ec7952a9e39aaccb62b93dcee" class="section-master section-master--breadth-none section-master--density-none"> <div class="container" data-oc="ocd8a3" id="section-master-ocd8a3"> </div> <div class="row section-master__slot"> <div class="col"> <div ocr-component-name="editorial-article-article-chapter" data-component-id="27d83c8af12200311e6e98dcf45ce868" class="editorial-article__templates-item editorial-article--chapter"> <div class="container" data-oc="oc3795" id="chapter-oc3795"> <div class="row"> <div class="col"> <div class="ocr-divider ocr-divider--size-xs editorial-article__title-divider"> </div> <div class="layout layout--cols-2 layout--editorial"> <aside class="editorial-article__left-rail layout__col"> <div class="editorial-article__left-rail-item"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__eyebrow"> <div data-oc-token-text> Securing IoT </div> </div> </div> </div> </aside> <article class="editorial-article__main layout__col"> <div class="editorial-article__main__header"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__title" ocr-telemetry-name ocr-en-title="<h2>To tackle the unique challenge of managing IoT and OT security across this blended continuum of different devices connected in different ways to the IT network, security leaders are following these best practices:</h2> "> <div data-oc-token-text> <h2>To tackle the unique challenge of managing IoT and OT security across this blended continuum of different devices connected in different ways to the IT network, security leaders are following these best practices:</h2> </div> </div> </div> </div> <div ocr-component-name="editorial-article-article-slot" data-component-id="30dac58d9f8596a1c923c2643d4143ef" class="editorial-article__slot"> <div ocr-component-name="editorial-article-subsection-paragraphs" data-component-id="17ccf6951975d20d644034fe6d2ff5ad" class="editorial-article-subsection editorial-article-subsection--paragraphs"> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc585f" id="richtext-oc585f"> <div data-oc-token-text><strong>1. Achieve comprehensive device visibility.</strong><br> Understanding all the assets you have in a network, how everything is interconnected, and the business risk and exposure involved at each connection point is a critical foundation for effective IoT/OT management. An IoT- and OT-aware network detection and response (NDR) solution and a SIEM like Microsoft Sentinel can also help give you deeper visibility into IoT/OT devices on your network and monitor them for anomalous behaviors such as communication with unfamiliar hosts. (For more information on managing exposed ICS protocols in OT, see “The Unique Security Risk of IOT Devices,”&nbsp;<a href="https://www-microsoft-com.translate.goog/en-us/security/business/security-insider/wp-content/uploads/2022/12/1214142_MDDR_FY23_Infographic_v5.pdf?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" target="_self" class="ms-rte-link">Microsoft Security</a>). </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc5d2d" id="richtext-oc5d2d"> <div data-oc-token-text><strong>2. Segment networks and employ&nbsp;</strong><a href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2262421" target="_blank" class="ms-rte-link"><strong>Zero Trust principles</strong></a><strong>.</strong><br> Wherever possible, segment networks to inhibit lateral movement in the event of an attack. IoT devices and OT networks should be air-gapped or isolated from the corporate IT network through firewalls. That said, it’s also important to assume your OT and IT are converged and build Zero Trust protocols across the attack surface. Increasingly, network segmentation isn’t feasible. For regulated organizations like healthcare, utilities, and manufacturing, for example, OT-IT connectivity is core to the business function—take for example, mammogram machines or smart MRIs connecting to electronic health records (EHR) systems; smart manufacturing lines or water purification requiring remote monitoring. In these cases, Zero Trust is critical. </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="ocd62c" id="richtext-ocd62c"> <div data-oc-token-text><strong>3. Employ IoT/OT security management hygiene.</strong><br> Security teams can close the gaps through some basic hygiene practices like: </div> </section> </div> </div> <div ocr-component-name="editorial-article-subsection-bullet-list" data-component-id="587d34da65be688dabf456c79639e194" class="editorial-article-subsection editorial-article-subsection--bullet-list"> <ul ocr-component-name="editorial-article-subsection-bullet-list-slot" data-component-id="4d277c361cff99c1e7da1471ca0cbe27" class="bullet-list-slot"> <li ocr-component-name="editorial-article-subsection-bullet-list-item" data-component-id="80377f0a1c437fa83da27be626557d2f" class="bullet-list-item"> <div data-oc-token-text> Eliminating unnecessary internet connections and open ports, restricting or denying remote access, and using VPN services </div></li> <li ocr-component-name="editorial-article-subsection-bullet-list-item" data-component-id="80377f0a1c437fa83da27be626557d2f" class="bullet-list-item"> <div data-oc-token-text> <div> Managing device security by applying patches and changing default passwords and ports </div> </div></li> <li ocr-component-name="editorial-article-subsection-bullet-list-item" data-component-id="80377f0a1c437fa83da27be626557d2f" class="bullet-list-item"> <div data-oc-token-text> Ensure ICS protocols are not directly exposed to the internet </div></li> </ul> </div> <div ocr-component-name="editorial-article-subsection-paragraphs" data-component-id="17ccf6951975d20d644034fe6d2ff5ad" class="editorial-article-subsection editorial-article-subsection--paragraphs"> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc585f" id="richtext-oc585f"> <div data-oc-token-text> <p>For actionable guidance on how to achieve this level of insight and management, see “The Unique Risk of IoT/OT Devices,”&nbsp;<a href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2262235" target="_blank" class="ms-rte-link">Microsoft Security Insider</a>.</p> </div> </section> </div> </div> </div> </article> </div> </div> </div> </div> </div> </div> </div> </div> <div ocr-component-name="section-master" data-component-id="2b9a710ec7952a9e39aaccb62b93dcee" class="section-master section-master--breadth-none section-master--density-none"> <div class="container" data-oc="oca42a" id="section-master-oca42a"> </div> <div class="row section-master__slot"> <div class="col"> <div ocr-component-name="editorial-article-article-chapter" data-component-id="27d83c8af12200311e6e98dcf45ce868" class="editorial-article__templates-item editorial-article--chapter"> <div class="container" data-oc="ocf843" id="chapter-ocf843"> <div class="row"> <div class="col"> <div class="ocr-divider ocr-divider--size-xs editorial-article__title-divider"> </div> <div class="layout layout--cols-2 layout--editorial"> <aside class="editorial-article__left-rail layout__col"> <div class="editorial-article__left-rail-item"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> </div> </div> </aside> <article class="editorial-article__main layout__col"> <div class="editorial-article__main__header"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class=" block-heading__title" ocr-telemetry-name ocr-en-title="<h2>Actionable insights</h2> "> <div data-oc-token-text> <h2>Actionable insights</h2> </div> </div> </div> </div> <div ocr-component-name="editorial-article-article-slot" data-component-id="30dac58d9f8596a1c923c2643d4143ef" class="editorial-article__slot"> <div ocr-component-name="editorial-article-subsection-paragraphs" data-component-id="17ccf6951975d20d644034fe6d2ff5ad" class="editorial-article-subsection editorial-article-subsection--paragraphs"> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc585f" id="richtext-oc585f"> <div data-oc-token-text> <p>1. Use an IoT/OT-aware network detection and response (NDR) solution and a security information and event management (SIEM)/security orchestration and response (SOAR) solution to gain deeper visibility into IoT/OT devices on your network, monitor devices for anomalous or unauthorized behaviors, such as communication with unfamiliar hosts</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc5d2d" id="richtext-oc5d2d"> <div data-oc-token-text> <p>2. Protect engineering stations by monitoring with endpoint detection and response (EDR) solutions</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="ocd62c" id="richtext-ocd62c"> <div data-oc-token-text> <p>3. Reduce the attack surface by eliminating unnecessary internet connections and open ports, restricting remote access by blocking ports, denying remote access, and using VPN services</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="occ6cb" id="richtext-occ6cb"> <div data-oc-token-text> <p>4. Ensure ICS protocols are not exposed directly to the internet</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="ocbf29" id="richtext-ocbf29"> <div data-oc-token-text> <p>5. Segment networks to limit an attacker’s ability to move laterally and compromise assets after initial intrusion. IoT devices and OT networks should be isolated from corporate IT networks through firewalls</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="ocaf58" id="richtext-ocaf58"> <div data-oc-token-text> <p>6. Ensure devices are robust by applying patches, changing default passwords and ports</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc4b9c" id="richtext-oc4b9c"> <div data-oc-token-text> <p>7. Assume your OT and IT are converged and build Zero Trust protocols into your attack surface</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc38d7" id="richtext-oc38d7"> <div data-oc-token-text> <p>8. Ensure organizational alignment between OT and IT by promoting greater visibility and team integration</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc5790" id="richtext-oc5790"> <div data-oc-token-text> <p>9. Always follow best IoT/OT security practices based on fundamental threat intelligence</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc1acb" id="richtext-oc1acb"> <div data-oc-token-text> <p>As security leaders seize the opportunity to streamline their digital estate amid escalating threats and pressure to do more with fewer resources, the cloud is emerging as the foundation of the modern security strategy. As we have seen, the benefits of a cloud-centric approach greatly outweigh the risks—especially for organizations that employ best practices to manage their cloud environments through a robust cloud security strategy, comprehensive posture management, and specific tactics to close gaps at the IoT/OT edge.</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="oc082e" id="richtext-oc082e"> <div data-oc-token-text><strong>Look to our next issue for more security analysis and insights. Thanks for reading the CISO Insider!</strong> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="ocb17f" id="richtext-ocb17f"> <div data-oc-token-text> <p>For actionable guidance on how to achieve this level of insight and management, see “The Unique Risk of IoT/OT Devices,”&nbsp;<a href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2262235" target="_blank" class="ms-rte-link">Microsoft Security Insider</a>.</p> </div> </section> </div> <div ocr-component-name="richtext" class="richtext" data-component-id="9b992e252846bf14b532f40bd58c2fbe"> <section data-oc="ocfae5" id="richtext-ocfae5"> <div data-oc-token-text> <p>All cited Microsoft research uses independent research firms to contact security professionals for both quantitative and qualitative studies, ensuring privacy protections and analytical rigor. Quotes and findings included in this document, unless specified otherwise, are a result of Microsoft research studies.</p> </div> </section> </div> </div> </div> </article> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div ocr-component-name="section-master" data-component-id="2b9a710ec7952a9e39aaccb62b93dcee" class="section-master section-master--breadth-comfortable section-master--density-none"> <div class="container" data-oc="occa49" id="section-master-occa49"> </div> <div class="row section-master__slot"> <div class="col"> <div ocr-component-name="editorial-article-summary" data-component-id="5e90471f5f41552beaf5afb67f556d11" class="editorial-article__templates-item editorial-article--summary"> <div class="container" data-oc="oc0c15" id="summary-oc0c15"> <div class="row"> <div class="col"> <div class="layout layout--cols-2 layout--editorial"> <aside class="editorial-article__left-rail layout__col"> <div class="editorial-article__left-rail-item"> </div> </aside> <article class="editorial-article__main layout__col"> <div ocr-component-name="editorial-article-article-slot" data-component-id="30dac58d9f8596a1c923c2643d4143ef" class="editorial-article__slot"> <div ocr-component-name="editorial-article-subsection-footnote" data-component-id="cc87e190f7002a51127b25f4ab0cda12" class="editorial-article--footnote"> <div class="footnote" data-component-id="90f410e46dab75f685faffe8f751000c"> <div class="footnote__divider"> <div ocr-component-name="divider" data-component-id="467e35e809075d121962a1d239c316b5" class="ocr-divider"> </div> </div> <script src="/etc.clientlibs/onecloud/components/content/reimagine/atomic/footnote/v2/footnote/clientlibs/site.min.ACSHASH8f1b786599ddd1d6c94a1d907f2cb5fd.js"></script> </div> <div ocr-component-name="action-group" data-component-id="e44de352c999ca6efd7a58dc4a5d7a5b" class="button-group"><a class="btn btn--tag " data-bi-ecn="CISO Insider" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-bi-cn="CISO Insider" target="_self" data-oc="oc9f0f" id="action-oc9f0f" href="https://www-microsoft-com.translate.goog/en-us/security/business/security-insider/tag/ciso-insider/?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" aria-label="Security Insider External attack surface" data-isenvauthor="false"> <span class="btn__text">CISO Insider</span> </a> <a class="btn btn--tag " data-bi-ecn="Cloud Threats" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-bi-cn="Cloud Threats" target="_self" data-oc="occ545" id="action-occ545" href="https://www-microsoft-com.translate.goog/en-us/security/business/security-insider/tag/cloud-threats/?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" aria-label="Security Insider External attack surface" data-isenvauthor="false"> <span class="btn__text">Cloud Threats</span> </a> <a class="btn btn--tag " data-bi-ecn="IoT and OT" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-bi-cn="IoT and OT" target="_self" data-oc="oc6004" id="action-oc6004" href="https://www-microsoft-com.translate.goog/en-us/security/business/security-insider/tag/iot-and-ot/?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" aria-label="Security Insider External attack surface" data-isenvauthor="false"> <span class="btn__text">IoT and OT</span> </a> <a class="btn btn--tag " data-bi-ecn="Vulnerabilities" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-bi-cn="Vulnerabilities" target="_self" data-oc="oc7812" id="action-oc7812" href="https://www-microsoft-com.translate.goog/en-us/security/business/security-insider/tag/vulnerabilities/?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" aria-label="Security Insider External attack surface" data-isenvauthor="false"> <span class="btn__text">Vulnerabilities</span> </a> </div> </div> </div> </article> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div ocr-component-name="section-master" data-component-id="2b9a710ec7952a9e39aaccb62b93dcee" class="section-master bg--accent-strong-pressed aem-GridColumn aem-GridColumn--default--12"> <div class="container" data-oc="ocbc30" id="section-master-ocbc30"> <div class="row"> <div class="col"> <div class="layout section-master__layout"> <div class="layout__col"> <div class="section-master__layout-header"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> <div class="fg--accent-strong-normal block-heading__title" ocr-telemetry-name ocr-en-title="<h2>Related articles</h2> "> <div data-oc-token-text> <h2>Related articles</h2> </div> </div> </div> </div> </div> </div> </div> </div> <div class="row section-master__slot"> <div class="col"> <div ocr-component-name="three-up-cards" data-component-id="bb3c6b0b0eda6b639abbfd2e9d327f01" class="three-up-cards layout layout--cols-3"> <div class="three-up-cards__card layout__col"> <div ocr-component-name="card" data-component-id="2da121e2913e674ad2851c7c98030a80" class="card"> <div class="card__content"> <div ocr-component-name="block-feature" data-component-id="9290bbb697f35c37e989109584e9d258" class="block-feature d-flex align-items-start block-feature--2xs block-feature--align-stacked"> <div class="block-feature__body d-flex flex-column align-items-start"> <div class="block-feature__headings d-flex flex-column align-items-start"> <div class=" block-feature__title"> <div data-oc-token-text> <h3>The unique security risk of IoT/OT devices</h3> </div> </div> </div> <div class=" base block-feature__paragraph"> <div data-oc-token-text><span style="font-weight: normal;">In our latest report, we explore how increasing IoT/OT connectivity is leading to greater and more-severe vulnerabilities for organized cyber threat actors to exploit.</span> </div> </div> </div> </div> <div ocr-component-name="block-slim" class="block-slim" data-component-id="b5cd651a36e54e9fc71a183b4ad18be8"> <div ocr-component-name="action" data-component-id="467e35e809075d121962a1d239c316b2" class="action d-contents"><a class="link " data-bi-ecn="Learn more" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-bi-cn="Learn more" target="_self" data-oc="oc8cc5" id="action-oc8cc5" href="https://www-microsoft-com.translate.goog/en-us/security/business/security-insider/threat-briefs/the-unique-security-risk-of-iot-devices/?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" aria-label="Learn more about The unique security risk of IoT/OT devices"> <span class="btn btn--icon-only btn--sm "> <span class="glyph-prepend" aria-hidden="true"></span> </span> <span class="link__text">Learn more</span> </a> </div> </div> </div> </div> </div> <div class="three-up-cards__card layout__col"> <div ocr-component-name="card" data-component-id="2da121e2913e674ad2851c7c98030a80" class="card"> <div class="card__content"> <div ocr-component-name="block-feature" data-component-id="9290bbb697f35c37e989109584e9d258" class="block-feature d-flex align-items-start block-feature--2xs block-feature--align-stacked"> <div class="block-feature__body d-flex flex-column align-items-start"> <div class="block-feature__headings d-flex flex-column align-items-start"> <div class=" block-feature__title"> <div data-oc-token-text> <h3>The convergence of IT and OT</h3> </div> </div> </div> <div class=" base block-feature__paragraph"> <div data-oc-token-text><span style="font-weight: normal;">The increasing circulation of IoT is putting OT at risk, with an array of potential vulnerabilities and exposure to threat actors. Find out how to keep your organization protected.</span> </div> </div> </div> </div> <div ocr-component-name="block-slim" class="block-slim" data-component-id="b5cd651a36e54e9fc71a183b4ad18be8"> <div ocr-component-name="action" data-component-id="467e35e809075d121962a1d239c316b2" class="action d-contents"><a class="link " data-bi-ecn="Learn more" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-bi-cn="Learn more" target="_self" data-oc="ocbf12" id="action-ocbf12" href="https://www-microsoft-com.translate.goog/en-us/security/business/security-insider/reports/cyber-signals/cyber-signals-issue-3-the-convergence-of-it-and-ot/?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" aria-label="Learn more about The convergence of IT and OT"> <span class="btn btn--icon-only btn--sm "> <span class="glyph-prepend" aria-hidden="true"></span> </span> <span class="link__text">Learn more</span> </a> </div> </div> </div> </div> </div> <div class="three-up-cards__card layout__col"> <div ocr-component-name="card" data-component-id="2da121e2913e674ad2851c7c98030a80" class="card"> <div class="card__content"> <div ocr-component-name="block-feature" data-component-id="9290bbb697f35c37e989109584e9d258" class="block-feature d-flex align-items-start block-feature--2xs block-feature--align-stacked"> <div class="block-feature__body d-flex flex-column align-items-start"> <div class="block-feature__headings d-flex flex-column align-items-start"> <div class=" block-feature__title"> <div data-oc-token-text> <h3>Anatomy of an external attack surface</h3> </div> </div> </div> <div class=" base block-feature__paragraph"> <div data-oc-token-text><span style="font-weight: normal;">The cybersecurity world continues to become more complex as organizations move to the cloud and shift to decentralized work. Today, the external attack surface spans multiple clouds, complex digital supply chains, and massive third-party ecosystems.</span> </div> </div> </div> </div> <div ocr-component-name="block-slim" class="block-slim" data-component-id="b5cd651a36e54e9fc71a183b4ad18be8"> <div ocr-component-name="action" data-component-id="467e35e809075d121962a1d239c316b2" class="action d-contents"><a class="link " data-bi-ecn="Learn more" data-bi-tags="{}" tabindex="0" data-bi-bhvr="0" data-bi-cn="Learn more" target="_self" data-oc="oc19a8" id="action-oc19a8" href="https://www-microsoft-com.translate.goog/en-us/security/business/security-insider/threat-briefs/anatomy-of-an-external-attack-surface/?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" aria-label="Learn more about Anatomy of an external attack surface"> <span class="btn btn--icon-only btn--sm "> <span class="glyph-prepend" aria-hidden="true"></span> </span> <span class="link__text">Learn more</span> </a> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div ocr-component-name="section-master" data-component-id="2b9a710ec7952a9e39aaccb62b93dcee" class="section-master section-master--breadth-none section-master--density-compact aem-GridColumn aem-GridColumn--default--12"> <div class="container" data-oc="oc4676" id="section-master-oc4676"> <div class="row"> <div class="col"> <div class="layout section-master__layout"> <div class="layout__col"> <div class="section-master__layout-header"> <div ocr-component-name="block-heading" data-component-id="6ead05f340b941df5109567514e89a43" class="block-heading"> </div> </div> </div> </div> </div> </div> <div class="row section-master__slot"> <div class="col"> <div class="experiencefragment" data-component-id="581db1ec198007e2a00cbac3e44e3de9" oc-component-name="experiencefragment"> <div class="cmp-experiencefragment"> <div class="xf-content-height"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="responsivegrid aem-GridColumn aem-GridColumn--default--12"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="socialfollow aem-GridColumn aem-GridColumn--default--12" data-component-id="8750c09f740a85b8d0b862206e9781be" oc-component-name="socialfollow"> <div class="col"> <div class="d-flex justify-content-between flex-wrap" data-oc="oc8d02" id="socialfollow-uidc4c9"> <div class="row"> <section class="col-12"> <h2 class=" base font-weight-normal align-middle mr-g d-inline">Follow Microsoft Security</h2> <ul class="list-inline d-inline-block align-middle my-2"> <li data-m="{&quot;bhvr&quot;: 126, &quot;cN&quot;: &quot;LinkedIn&quot;, &quot;ecn&quot;: &quot;LinkedIn&quot;, &quot;socchn&quot;: &quot;LinkedIn&quot;, &quot;cT&quot;: &quot;Social Button&quot;, &quot;pa&quot;: &quot;body&quot;, &quot;compnm&quot;: &quot;Social Follow - horizontal&quot;}" class="list-inline-item mr-g"><a class="d-inline-block" aria-label="Follow Microsoft Security on LinkedIn" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2142600" target="_blank"> <img src="https://cdn-dynmedia-1.microsoft.com/is/image/microsoftcorp/Linkedin-logo-light-1?scl=1" class="" alt="LinkedIn logo" title="LinkedIn" width="32" height="32"> </a></li> <li data-m="{&quot;bhvr&quot;: 126, &quot;cN&quot;: &quot;Twitter&quot;, &quot;ecn&quot;: &quot;Twitter&quot;, &quot;socchn&quot;: &quot;Twitter&quot;, &quot;cT&quot;: &quot;Social Button&quot;, &quot;pa&quot;: &quot;body&quot;, &quot;compnm&quot;: &quot;Social Follow - horizontal&quot;}" class="list-inline-item mr-g"><a class="d-inline-block" aria-label="Follow Microsoft Security on Twitter" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2142504" target="_blank"> <img src="https://cdn-dynmedia-1.microsoft.com/is/image/microsoftcorp/Icon-Twitter-Grey?scl=1" class="" alt="Twitter logo" title="Twitter" width="32" height="32"> </a></li> <li data-m="{&quot;bhvr&quot;: 126, &quot;cN&quot;: &quot;Blog&quot;, &quot;ecn&quot;: &quot;Blog&quot;, &quot;socchn&quot;: &quot;Blog&quot;, &quot;cT&quot;: &quot;Social Button&quot;, &quot;pa&quot;: &quot;body&quot;, &quot;compnm&quot;: &quot;Social Follow - horizontal&quot;}" class="list-inline-item mr-g"><a class="d-inline-block" aria-label="Follow Microsoft Security Blog" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2222305" target="_blank"> <img src="https://cdn-dynmedia-1.microsoft.com/is/image/microsoftcorp/Icon-Blog-Grey?scl=1" class="" alt="Microsoft security Blog" title="Blog" width="32" height="32"> </a></li> </ul> </section> </div> <div class="row"> </div> </div> </div> </div> </div> </div> </div> </div> </div><span style="display:none"> </span> </div> </div> </div> </div> </div> </div> </div> </div> </main> </div> <div class="universalfooter aem-GridColumn aem-GridColumn--default--12" data-component-id="873fa1f863becf63b38092282d4ea0b1"> <div id="footerArea" class="uhf" data-m="{&quot;cN&quot;:&quot;footerArea&quot;,&quot;cT&quot;:&quot;Area_coreuiArea&quot;,&quot;id&quot;:&quot;a2Body&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;Body&quot;}"> <div id="footerRegion" data-region-key="footerregion" data-m="{&quot;cN&quot;:&quot;footerRegion&quot;,&quot;cT&quot;:&quot;Region_coreui-region&quot;,&quot;id&quot;:&quot;r1a2&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;a2&quot;}"> <div id="footerUniversalFooter" data-m="{&quot;cN&quot;:&quot;footerUniversalFooter&quot;,&quot;cT&quot;:&quot;Module_coreui-universalfooter&quot;,&quot;id&quot;:&quot;m1r1a2&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;r1a2&quot;}" data-module-id="Category|footerRegion|coreui-region|footerUniversalFooter|coreui-universalfooter"> <footer id="uhf-footer" class="c-uhff context-uhf" data-uhf-mscc-rq="false" data-footer-footprint="/MSSecurity/MSSecurityFooter, fromService: True" data-m="{&quot;cN&quot;:&quot;Uhf footer_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c1m1r1a2&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;m1r1a2&quot;}"> <nav class="c-uhff-nav" aria-label="Footer Resource links" data-m="{&quot;cN&quot;:&quot;Footer nav_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c1c1m1r1a2&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c1m1r1a2&quot;}"> <div class="c-uhff-nav-row"> <div class="c-uhff-nav-group" data-m="{&quot;cN&quot;:&quot;footerNavColumn1_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c1c1c1m1r1a2&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c1c1m1r1a2&quot;}"> <div class="c-heading-4" role="heading" aria-level="2"> What's new </div> <ul class="c-list f-bare"> <li><a aria-label="Surface Pro What's new" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/surface/devices/surface-pro-11th-edition?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_WhatsNew_NewSurfacePro_nav&quot;,&quot;id&quot;:&quot;n1c1c1c1m1r1a2&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c1c1c1m1r1a2&quot;}">Surface Pro</a></li> <li><a aria-label="Surface Laptop What's new" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/surface/devices/surface-laptop-7th-edition?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_WhatsNew_SurfaceLaptop_nav&quot;,&quot;id&quot;:&quot;n2c1c1c1m1r1a2&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c1c1c1m1r1a2&quot;}">Surface Laptop</a></li> <li><a aria-label="Surface Laptop Studio 2 What's new" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/d/Surface-Laptop-Studio-2/8rqr54krf1dz?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_WhatsNew_SurfaceLaptopStudio2_nav&quot;,&quot;id&quot;:&quot;n3c1c1c1m1r1a2&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c1c1c1m1r1a2&quot;}">Surface Laptop Studio 2</a></li> <li><a aria-label="Surface Laptop Go 3 What's new" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/d/Surface-Laptop-Go-3/8p0wwgj6c6l2?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_WhatsNew_SurfaceLaptopGo3_nav&quot;,&quot;id&quot;:&quot;n4c1c1c1m1r1a2&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c1c1c1m1r1a2&quot;}">Surface Laptop Go 3</a></li> <li><a aria-label="Microsoft Copilot What's new" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/microsoft-copilot?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_WhatsNew_CopilotMicrosoft_nav&quot;,&quot;id&quot;:&quot;n5c1c1c1m1r1a2&quot;,&quot;sN&quot;:5,&quot;aN&quot;:&quot;c1c1c1m1r1a2&quot;}">Microsoft Copilot</a></li> <li><a aria-label="AI in Windows What's new" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/windows/copilot-ai-features?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Whatsnew_AIinWindows_nav&quot;,&quot;id&quot;:&quot;n6c1c1c1m1r1a2&quot;,&quot;sN&quot;:6,&quot;aN&quot;:&quot;c1c1c1m1r1a2&quot;}">AI in Windows</a></li> <li><a aria-label="Explore Microsoft products What's new" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/microsoft-products-and-apps?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_WhatsNew_ExploreMicrosoftProducts_nav&quot;,&quot;id&quot;:&quot;n7c1c1c1m1r1a2&quot;,&quot;sN&quot;:7,&quot;aN&quot;:&quot;c1c1c1m1r1a2&quot;}">Explore Microsoft products</a></li> <li><a aria-label="Windows 11 apps What's new" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/windows/windows-11-apps?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_WhatsNew_Windows_11_apps_nav&quot;,&quot;id&quot;:&quot;n8c1c1c1m1r1a2&quot;,&quot;sN&quot;:8,&quot;aN&quot;:&quot;c1c1c1m1r1a2&quot;}">Windows 11 apps</a></li> </ul> </div> <div class="c-uhff-nav-group" data-m="{&quot;cN&quot;:&quot;footerNavColumn2_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c2c1c1m1r1a2&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c1c1m1r1a2&quot;}"> <div class="c-heading-4" role="heading" aria-level="2"> Microsoft Store </div> <ul class="c-list f-bare"> <li><a aria-label="Account profile Microsoft Store" class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://account.microsoft.com/" data-m="{&quot;cN&quot;:&quot;Footer_StoreandSupport_AccountProfile_nav&quot;,&quot;id&quot;:&quot;n1c2c1c1m1r1a2&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c2c1c1m1r1a2&quot;}">Account profile</a></li> <li><a aria-label="Download Center Microsoft Store" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/download?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_StoreandSupport_DownloadCenter_nav&quot;,&quot;id&quot;:&quot;n2c2c1c1m1r1a2&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c2c1c1m1r1a2&quot;}">Download Center</a></li> <li><a aria-label="Microsoft Store support Microsoft Store" class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2139749" data-m="{&quot;cN&quot;:&quot;Footer_StoreandSupport_SalesAndSupport_nav&quot;,&quot;id&quot;:&quot;n3c2c1c1m1r1a2&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c2c1c1m1r1a2&quot;}">Microsoft Store support</a></li> <li><a aria-label="Returns Microsoft Store" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/store/b/returns?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_StoreandSupport_Returns_nav&quot;,&quot;id&quot;:&quot;n4c2c1c1m1r1a2&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c2c1c1m1r1a2&quot;}">Returns</a></li> <li><a aria-label="Order tracking Microsoft Store" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/store/b/order-tracking?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_StoreandSupport_OrderTracking_nav&quot;,&quot;id&quot;:&quot;n5c2c1c1m1r1a2&quot;,&quot;sN&quot;:5,&quot;aN&quot;:&quot;c2c1c1m1r1a2&quot;}">Order tracking</a></li> <li><a aria-label="Certified Refurbished Microsoft Store" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/store/b/certified-refurbished-products?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_StoreandSupport_StoreLocations_nav&quot;,&quot;id&quot;:&quot;n6c2c1c1m1r1a2&quot;,&quot;sN&quot;:6,&quot;aN&quot;:&quot;c2c1c1m1r1a2&quot;}">Certified Refurbished</a></li> <li><a aria-label="Microsoft Store Promise Microsoft Store" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/store/b/why-microsoft-store?icid=footer_why-msft-store_7102020&amp;_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_StoreandSupport_MicrosoftPromise_nav&quot;,&quot;id&quot;:&quot;n7c2c1c1m1r1a2&quot;,&quot;sN&quot;:7,&quot;aN&quot;:&quot;c2c1c1m1r1a2&quot;}">Microsoft Store Promise</a></li> <li><a aria-label="Flexible Payments Microsoft Store" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/store/b/payment-financing-options?icid=footer_financing_vcc&amp;_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_StoreandSupport_Financing_nav&quot;,&quot;id&quot;:&quot;n8c2c1c1m1r1a2&quot;,&quot;sN&quot;:8,&quot;aN&quot;:&quot;c2c1c1m1r1a2&quot;}">Flexible Payments</a></li> </ul> </div> <div class="c-uhff-nav-group" data-m="{&quot;cN&quot;:&quot;footerNavColumn3_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c1c1m1r1a2&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c1c1m1r1a2&quot;}"> <div class="c-heading-4" role="heading" aria-level="2"> Education </div> <ul class="c-list f-bare"> <li><a aria-label="Microsoft in education Education" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/education?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_Education_MicrosoftInEducation_nav&quot;,&quot;id&quot;:&quot;n1c3c1c1m1r1a2&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c3c1c1m1r1a2&quot;}">Microsoft in education</a></li> <li><a aria-label="Devices for education Education" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/education/devices/overview?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_Education_DevicesforEducation_nav&quot;,&quot;id&quot;:&quot;n2c3c1c1m1r1a2&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c3c1c1m1r1a2&quot;}">Devices for education</a></li> <li><a aria-label="Microsoft Teams for Education Education" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/education/products/teams?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_Education_MicrosoftTeamsforEducation_nav&quot;,&quot;id&quot;:&quot;n3c3c1c1m1r1a2&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c3c1c1m1r1a2&quot;}">Microsoft Teams for Education</a></li> <li><a aria-label="Microsoft 365 Education Education" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/education/products/microsoft-365?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_Education_Microsoft365Education_nav&quot;,&quot;id&quot;:&quot;n4c3c1c1m1r1a2&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c3c1c1m1r1a2&quot;}">Microsoft 365 Education</a></li> <li><a aria-label="How to buy for your school Education" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/education/how-to-buy?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_Howtobuyforyourschool_nav&quot;,&quot;id&quot;:&quot;n5c3c1c1m1r1a2&quot;,&quot;sN&quot;:5,&quot;aN&quot;:&quot;c3c1c1m1r1a2&quot;}">How to buy for your school</a></li> <li><a aria-label="Educator training and development Education" class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://education.microsoft.com/" data-m="{&quot;cN&quot;:&quot;Footer_Education_EducatorTrainingDevelopment_nav&quot;,&quot;id&quot;:&quot;n6c3c1c1m1r1a2&quot;,&quot;sN&quot;:6,&quot;aN&quot;:&quot;c3c1c1m1r1a2&quot;}">Educator training and development</a></li> <li><a aria-label="Deals for students and parents Education" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/store/b/education?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_Education_DealsForStudentsandParents_nav&quot;,&quot;id&quot;:&quot;n7c3c1c1m1r1a2&quot;,&quot;sN&quot;:7,&quot;aN&quot;:&quot;c3c1c1m1r1a2&quot;}">Deals for students and parents</a></li> <li><a aria-label="Azure for students Education" class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://azure.microsoft.com/en-us/free/students/" data-m="{&quot;cN&quot;:&quot;Footer_Education_Azureforstudents_nav&quot;,&quot;id&quot;:&quot;n8c3c1c1m1r1a2&quot;,&quot;sN&quot;:8,&quot;aN&quot;:&quot;c3c1c1m1r1a2&quot;}">Azure for students</a></li> </ul> </div> </div> <div class="c-uhff-nav-row"> <div class="c-uhff-nav-group" data-m="{&quot;cN&quot;:&quot;footerNavColumn4_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c4c1c1m1r1a2&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c1c1m1r1a2&quot;}"> <div class="c-heading-4" role="heading" aria-level="2"> Business </div> <ul class="c-list f-bare"> <li><a aria-label="Microsoft Cloud Business" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/microsoft-cloud?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_Business_Microsoft_Cloud_nav&quot;,&quot;id&quot;:&quot;n1c4c1c1m1r1a2&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c4c1c1m1r1a2&quot;}">Microsoft Cloud</a></li> <li><a aria-label="Microsoft Security Business" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/security?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_Business_Microsoft Security_nav&quot;,&quot;id&quot;:&quot;n2c4c1c1m1r1a2&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c4c1c1m1r1a2&quot;}">Microsoft Security</a></li> <li><a aria-label="Dynamics 365 Business" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/dynamics-365?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_Business_MicrosoftDynamics365_nav&quot;,&quot;id&quot;:&quot;n3c4c1c1m1r1a2&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c4c1c1m1r1a2&quot;}">Dynamics 365</a></li> <li><a aria-label="Microsoft 365 Business" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/microsoft-365/business?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_Business_M365_nav&quot;,&quot;id&quot;:&quot;n4c4c1c1m1r1a2&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c4c1c1m1r1a2&quot;}">Microsoft 365</a></li> <li><a aria-label="Microsoft Power Platform Business" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/power-platform?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_DeveloperAndIT_Power Platform_nav&quot;,&quot;id&quot;:&quot;n5c4c1c1m1r1a2&quot;,&quot;sN&quot;:5,&quot;aN&quot;:&quot;c4c1c1m1r1a2&quot;}">Microsoft Power Platform</a></li> <li><a aria-label="Microsoft Teams Business" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/microsoft-teams/group-chat-software?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_Business_Microsoft365_nav&quot;,&quot;id&quot;:&quot;n6c4c1c1m1r1a2&quot;,&quot;sN&quot;:6,&quot;aN&quot;:&quot;c4c1c1m1r1a2&quot;}">Microsoft Teams</a></li> <li><a aria-label="Microsoft 365 Copilot Business" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/microsoft-365/copilot/copilot-for-work?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_CopilotMicrosoft365_nav&quot;,&quot;id&quot;:&quot;n7c4c1c1m1r1a2&quot;,&quot;sN&quot;:7,&quot;aN&quot;:&quot;c4c1c1m1r1a2&quot;}">Microsoft 365 Copilot</a></li> <li><a aria-label="Small Business Business" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/store/b/business?icid=CNavBusinessStore&amp;_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_Business-SmallBusiness_nav&quot;,&quot;id&quot;:&quot;n8c4c1c1m1r1a2&quot;,&quot;sN&quot;:8,&quot;aN&quot;:&quot;c4c1c1m1r1a2&quot;}">Small Business</a></li> </ul> </div> <div class="c-uhff-nav-group" data-m="{&quot;cN&quot;:&quot;footerNavColumn5_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c5c1c1m1r1a2&quot;,&quot;sN&quot;:5,&quot;aN&quot;:&quot;c1c1m1r1a2&quot;}"> <div class="c-heading-4" role="heading" aria-level="2"> Developer &amp; IT </div> <ul class="c-list f-bare"> <li><a aria-label="Azure Developer &amp; IT" class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://azure.microsoft.com/en-us/" data-m="{&quot;cN&quot;:&quot;Footer_DeveloperAndIT_MicrosoftAzure_nav&quot;,&quot;id&quot;:&quot;n1c5c1c1m1r1a2&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c5c1c1m1r1a2&quot;}">Azure</a></li> <li><a aria-label="Developer Center Developer &amp; IT" class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://developer.microsoft.com/en-us/" data-m="{&quot;cN&quot;:&quot;Footer_DeveloperAndIT_DeveloperCenter_nav&quot;,&quot;id&quot;:&quot;n2c5c1c1m1r1a2&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c5c1c1m1r1a2&quot;}">Developer Center</a></li> <li><a aria-label="Documentation Developer &amp; IT" class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://learn.microsoft.com/docs/" data-m="{&quot;cN&quot;:&quot;Footer_DeveloperAndIT_Documentation_nav&quot;,&quot;id&quot;:&quot;n3c5c1c1m1r1a2&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c5c1c1m1r1a2&quot;}">Documentation</a></li> <li><a aria-label="Microsoft Learn Developer &amp; IT" class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://learn.microsoft.com/" data-m="{&quot;cN&quot;:&quot;Footer_DeveloperAndIT_MicrosoftLearn_nav&quot;,&quot;id&quot;:&quot;n4c5c1c1m1r1a2&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c5c1c1m1r1a2&quot;}">Microsoft Learn</a></li> <li><a aria-label="Microsoft Tech Community Developer &amp; IT" class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://techcommunity.microsoft.com/" data-m="{&quot;cN&quot;:&quot;Footer_DeveloperAndIT_MicrosoftTechCommunity_nav&quot;,&quot;id&quot;:&quot;n5c5c1c1m1r1a2&quot;,&quot;sN&quot;:5,&quot;aN&quot;:&quot;c5c1c1m1r1a2&quot;}">Microsoft Tech Community</a></li> <li><a aria-label="Azure Marketplace Developer &amp; IT" class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://azuremarketplace.microsoft.com/en-us/" data-m="{&quot;cN&quot;:&quot;Footer_DeveloperAndIT_AzureMarketplace_nav&quot;,&quot;id&quot;:&quot;n6c5c1c1m1r1a2&quot;,&quot;sN&quot;:6,&quot;aN&quot;:&quot;c5c1c1m1r1a2&quot;}">Azure Marketplace</a></li> <li><a aria-label="AppSource Developer &amp; IT" class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://appsource.microsoft.com/en-us/" data-m="{&quot;cN&quot;:&quot;Footer_DeveloperAndIT_AppSource_nav&quot;,&quot;id&quot;:&quot;n7c5c1c1m1r1a2&quot;,&quot;sN&quot;:7,&quot;aN&quot;:&quot;c5c1c1m1r1a2&quot;}">AppSource</a></li> <li><a aria-label="Visual Studio Developer &amp; IT" class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://visualstudio.microsoft.com/" data-m="{&quot;cN&quot;:&quot;Footer_DeveloperAndIT_MicrosoftVisualStudio_nav&quot;,&quot;id&quot;:&quot;n8c5c1c1m1r1a2&quot;,&quot;sN&quot;:8,&quot;aN&quot;:&quot;c5c1c1m1r1a2&quot;}">Visual Studio</a></li> </ul> </div> <div class="c-uhff-nav-group" data-m="{&quot;cN&quot;:&quot;footerNavColumn6_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c6c1c1m1r1a2&quot;,&quot;sN&quot;:6,&quot;aN&quot;:&quot;c1c1m1r1a2&quot;}"> <div class="c-heading-4" role="heading" aria-level="2"> Company </div> <ul class="c-list f-bare"> <li><a aria-label="Careers Company" class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://careers.microsoft.com/" data-m="{&quot;cN&quot;:&quot;Footer_Company_Careers_nav&quot;,&quot;id&quot;:&quot;n1c6c1c1m1r1a2&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c6c1c1m1r1a2&quot;}">Careers</a></li> <li><a aria-label="About Microsoft Company" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/about?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_Company_AboutMicrosoft_nav&quot;,&quot;id&quot;:&quot;n2c6c1c1m1r1a2&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c6c1c1m1r1a2&quot;}">About Microsoft</a></li> <li><a aria-label="Company news Company" class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://news.microsoft.com/" data-m="{&quot;cN&quot;:&quot;Footer_Company_CompanyNews_nav&quot;,&quot;id&quot;:&quot;n3c6c1c1m1r1a2&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c6c1c1m1r1a2&quot;}">Company news</a></li> <li><a aria-label="Privacy at Microsoft Company" class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://privacy.microsoft.com/en-us" data-m="{&quot;cN&quot;:&quot;Footer_Company_PrivacyAtMicrosoft_nav&quot;,&quot;id&quot;:&quot;n4c6c1c1m1r1a2&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c6c1c1m1r1a2&quot;}">Privacy at Microsoft</a></li> <li><a aria-label="Investors Company" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/investor/default.aspx?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_Company_Investors_nav&quot;,&quot;id&quot;:&quot;n5c6c1c1m1r1a2&quot;,&quot;sN&quot;:5,&quot;aN&quot;:&quot;c6c1c1m1r1a2&quot;}">Investors</a></li> <li><a aria-label="Diversity and inclusion Company" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/diversity/?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_Company_DiversityAndInclusion_nav&quot;,&quot;id&quot;:&quot;n6c6c1c1m1r1a2&quot;,&quot;sN&quot;:6,&quot;aN&quot;:&quot;c6c1c1m1r1a2&quot;}">Diversity and inclusion</a></li> <li><a aria-label="Accessibility Company" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/accessibility?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_Company_Accessibility_nav&quot;,&quot;id&quot;:&quot;n7c6c1c1m1r1a2&quot;,&quot;sN&quot;:7,&quot;aN&quot;:&quot;c6c1c1m1r1a2&quot;}">Accessibility</a></li> <li><a aria-label="Sustainability Company" class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/sustainability/?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;Footer_Company_Sustainability_nav&quot;,&quot;id&quot;:&quot;n8c6c1c1m1r1a2&quot;,&quot;sN&quot;:8,&quot;aN&quot;:&quot;c6c1c1m1r1a2&quot;}">Sustainability</a></li> </ul> </div> </div> </nav> <div class="c-uhff-base"><a id="locale-picker-link" aria-label="Content Language Selector. Currently set to English (United States)" class="c-uhff-link c-uhff-lang-selector c-glyph glyph-world" href="https://www-microsoft-com.translate.goog/en-us/security/locale?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-m="{&quot;cN&quot;:&quot;locale_picker(US)_nav&quot;,&quot;id&quot;:&quot;n7c1c1m1r1a2&quot;,&quot;sN&quot;:7,&quot;aN&quot;:&quot;c1c1m1r1a2&quot;}">English (United States)</a> <a data-m="{&quot;id&quot;:&quot;n8c1c1m1r1a2&quot;,&quot;sN&quot;:8,&quot;aN&quot;:&quot;c1c1m1r1a2&quot;}" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://aka.ms/yourcaliforniaprivacychoices" class="c-uhff-link c-uhff-ccpa"> <svg role="img" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 30 14" xml:space="preserve" height="16" width="43"> <title>Your Privacy Choices Opt-Out Icon</title><path d="M7.4 12.8h6.8l3.1-11.6H7.4C4.2 1.2 1.6 3.8 1.6 7s2.6 5.8 5.8 5.8z" style="fill-rule:evenodd;clip-rule:evenodd;fill:#fff" /> <path d="M22.6 0H7.4c-3.9 0-7 3.1-7 7s3.1 7 7 7h15.2c3.9 0 7-3.1 7-7s-3.2-7-7-7zm-21 7c0-3.2 2.6-5.8 5.8-5.8h9.9l-3.1 11.6H7.4c-3.2 0-5.8-2.6-5.8-5.8z" style="fill-rule:evenodd;clip-rule:evenodd;fill:#06f" /> <path d="M24.6 4c.2.2.2.6 0 .8L22.5 7l2.2 2.2c.2.2.2.6 0 .8-.2.2-.6.2-.8 0l-2.2-2.2-2.2 2.2c-.2.2-.6.2-.8 0-.2-.2-.2-.6 0-.8L20.8 7l-2.2-2.2c-.2-.2-.2-.6 0-.8.2-.2.6-.2.8 0l2.2 2.2L23.8 4c.2-.2.6-.2.8 0z" style="fill:#fff" /> <path d="M12.7 4.1c.2.2.3.6.1.8L8.6 9.8c-.1.1-.2.2-.3.2-.2.1-.5.1-.7-.1L5.4 7.7c-.2-.2-.2-.6 0-.8.2-.2.6-.2.8 0L8 8.6l3.8-4.5c.2-.2.6-.2.9 0z" style="fill:#06f" /> </svg><span>Your Privacy Choices</span> </a> <noscript><a data-m="{&quot;id&quot;:&quot;n9c1c1m1r1a2&quot;,&quot;sN&quot;:9,&quot;aN&quot;:&quot;c1c1m1r1a2&quot;}" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://aka.ms/yourcaliforniaprivacychoices" class="c-uhff-link c-uhff-ccpa"> <svg role="img" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 30 14" xml:space="preserve" height="16" width="43"> <title>Your Privacy Choices Opt-Out Icon</title><path d="M7.4 12.8h6.8l3.1-11.6H7.4C4.2 1.2 1.6 3.8 1.6 7s2.6 5.8 5.8 5.8z" style="fill-rule:evenodd;clip-rule:evenodd;fill:#fff" /> <path d="M22.6 0H7.4c-3.9 0-7 3.1-7 7s3.1 7 7 7h15.2c3.9 0 7-3.1 7-7s-3.2-7-7-7zm-21 7c0-3.2 2.6-5.8 5.8-5.8h9.9l-3.1 11.6H7.4c-3.2 0-5.8-2.6-5.8-5.8z" style="fill-rule:evenodd;clip-rule:evenodd;fill:#06f" /> <path d="M24.6 4c.2.2.2.6 0 .8L22.5 7l2.2 2.2c.2.2.2.6 0 .8-.2.2-.6.2-.8 0l-2.2-2.2-2.2 2.2c-.2.2-.6.2-.8 0-.2-.2-.2-.6 0-.8L20.8 7l-2.2-2.2c-.2-.2-.2-.6 0-.8.2-.2.6-.2.8 0l2.2 2.2L23.8 4c.2-.2.6-.2.8 0z" style="fill:#fff" /> <path d="M12.7 4.1c.2.2.3.6.1.8L8.6 9.8c-.1.1-.2.2-.3.2-.2.1-.5.1-.7-.1L5.4 7.7c-.2-.2-.2-.6 0-.8.2-.2.6-.2.8 0L8 8.6l3.8-4.5c.2-.2.6-.2.9 0z" style="fill:#06f" /> </svg><span>Your Privacy Choices</span> </a> </noscript><a data-m="{&quot;id&quot;:&quot;n10c1c1m1r1a2&quot;,&quot;sN&quot;:10,&quot;aN&quot;:&quot;c1c1m1r1a2&quot;}" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2259814" class="c-uhff-link c-uhff-consumer"> <span>Consumer Health Privacy</span> </a> <nav aria-label="Microsoft corporate links"> <ul class="c-list f-bare" data-m="{&quot;cN&quot;:&quot;Corp links_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c11c1c1m1r1a2&quot;,&quot;sN&quot;:11,&quot;aN&quot;:&quot;c1c1m1r1a2&quot;}"> <li id="c-uhff-footer_sitemap"><a class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/sitemap1.aspx?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-mscc-ic="false" data-m="{&quot;cN&quot;:&quot;Footer_Sitemap_nav&quot;,&quot;id&quot;:&quot;n1c11c1c1m1r1a2&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c11c1c1m1r1a2&quot;}">Sitemap</a></li> <li id="c-uhff-footer_contactus"><a class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://support.microsoft.com/contactus" data-mscc-ic="false" data-m="{&quot;cN&quot;:&quot;Footer_ContactUs_nav&quot;,&quot;id&quot;:&quot;n2c11c1c1m1r1a2&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c11c1c1m1r1a2&quot;}">Contact Microsoft</a></li> <li id="c-uhff-footer_privacyandcookies"><a class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?LinkId%3D521839" data-mscc-ic="false" data-m="{&quot;cN&quot;:&quot;Footer_PrivacyandCookies_nav&quot;,&quot;id&quot;:&quot;n3c11c1c1m1r1a2&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c11c1c1m1r1a2&quot;}">Privacy </a></li> <li class=" x-hidden" id="c-uhff-footer_managecookies"><a class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/security/security-insider/practical-cyber-defense/ciso-insider-issue-3?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB#" data-mscc-ic="false" data-m="{&quot;cN&quot;:&quot;Footer_ManageCookies_nav&quot;,&quot;id&quot;:&quot;n4c11c1c1m1r1a2&quot;,&quot;sN&quot;:4,&quot;aN&quot;:&quot;c11c1c1m1r1a2&quot;}">Manage cookies</a></li> <li id="c-uhff-footer_termsofuse"><a class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?LinkID%3D206977" data-mscc-ic="false" data-m="{&quot;cN&quot;:&quot;Footer_TermsOfUse_nav&quot;,&quot;id&quot;:&quot;n5c11c1c1m1r1a2&quot;,&quot;sN&quot;:5,&quot;aN&quot;:&quot;c11c1c1m1r1a2&quot;}">Terms of use</a></li> <li id="c-uhff-footer_trademarks"><a class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2196228" data-mscc-ic="false" data-m="{&quot;cN&quot;:&quot;Footer_Trademarks_nav&quot;,&quot;id&quot;:&quot;n6c11c1c1m1r1a2&quot;,&quot;sN&quot;:6,&quot;aN&quot;:&quot;c11c1c1m1r1a2&quot;}">Trademarks</a></li> <li id="c-uhff-footer_safetyandeco"><a class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://go.microsoft.com/fwlink/?linkid%3D2196227" data-mscc-ic="false" data-m="{&quot;cN&quot;:&quot;Footer_SafetyAndEco_nav&quot;,&quot;id&quot;:&quot;n7c11c1c1m1r1a2&quot;,&quot;sN&quot;:7,&quot;aN&quot;:&quot;c11c1c1m1r1a2&quot;}">Safety &amp; eco</a></li> <li id="c-uhff-recycling"><a class="c-uhff-link" href="https://www-microsoft-com.translate.goog/en-us/legal/compliance/recycling?_x_tr_sl=pl&amp;_x_tr_tl=cs&amp;_x_tr_hl=en-GB" data-mscc-ic="false" data-m="{&quot;cN&quot;:&quot;Recycling_nav&quot;,&quot;id&quot;:&quot;n8c11c1c1m1r1a2&quot;,&quot;sN&quot;:8,&quot;aN&quot;:&quot;c11c1c1m1r1a2&quot;}">Recycling</a></li> <li id="c-uhff-footer_aboutourads"><a class="c-uhff-link" href="https://translate.google.com/website?sl=pl&amp;tl=cs&amp;hl=en-GB&amp;u=https://choice.microsoft.com" data-mscc-ic="false" data-m="{&quot;cN&quot;:&quot;Footer_AboutourAds_nav&quot;,&quot;id&quot;:&quot;n9c11c1c1m1r1a2&quot;,&quot;sN&quot;:9,&quot;aN&quot;:&quot;c11c1c1m1r1a2&quot;}">About our ads</a></li> <li>© Microsoft 2024</li> </ul> </nav> </div> </footer> <script id="uhf-footer-ccpa"> const globalPrivacyControlEnabled = navigator.globalPrivacyControl; const GPC_DataSharingOptIn = (globalPrivacyControlEnabled) ? false : checkThirdPartyAdsOptOutCookie(); function checkThirdPartyAdsOptOutCookie() { try { const ThirdPartyAdsOptOutCookieName = '3PAdsOptOut'; var cookieValue = getCookie(ThirdPartyAdsOptOutCookieName); return cookieValue != 1; } catch { return true; } } function getCookie(cookieName) { var cookieValue = document.cookie.match('(^|;)\\s*' + cookieName + '\\s*=\\s*([^;]+)'); return (cookieValue) ? cookieValue[2] : ''; } </script> </div> </div> </div> <script src="https://wcpstatic.microsoft.com/mscc/lib/v2/wcp-consent.js"></script> <script src="https://www.microsoft.com/onerfstatics/marketingsites-eas-prod/shell/_scrf/js/themes=default/54-af9f9f/d4-fb1f57/e1-a50eee/e7-954872/d8-97d509/f0-251fe2/46-be1318/77-04a268/11-240c7b/63-077520/a4-34de62/f9-a5b2ce/db-bc0148/dc-7e9864/6d-c07ea1/6f-dafe8c/f6-aa5278/73-a24d00/6d-1e7ed0/b7-cadaa7/c4-898cf2/ca-40b7b0/4e-ee3a55/3e-f5c39b/c3-6454d7/f9-7592d3/d0-e64f3e/92-10345d/79-499886/7e-cda2d3/58-ab4971/74-d51c79/e0-3c9860/de-884374/1f-100dea/33-abe4df/2b-8e0ae6?ver=2.0&amp;_cf=02242021_3231&amp;iife=1"></script> </div> </div> </div> <link rel="stylesheet" href="/etc.clientlibs/onecloud/clientlibs/reimagine/clientlib-reimagine-base.min.ACSHASH81b1ef0c4a6b80454291234fcd6e45b0.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/cascade.component.authoring/clientlibs/clientlib-reimagine-base.min.ACSHASH81b1ef0c4a6b80454291234fcd6e45b0.css" type="text/css"> <script src="/etc.clientlibs/onecloud/clientlibs/reimagine/clientlib-reimagine-base.min.ACSHASH08c5f9cb4220e78ff920dae3a7a8ed53.js"></script> <script src="/etc.clientlibs/cascade.component.authoring/clientlibs/clientlib-reimagine-base.min.ACSHASH2b143bed0ff34bc70bc0703346f70e08.js"></script> <script src="/etc.clientlibs/onecloud/clientlibs/clientlib-click-group-telemetry.min.ACSHASHf25fec6821f63d701a6b6291a4011894.js"></script> <script src="/etc.clientlibs/microsoft/clientlibs/clientlib-httpclient.min.ACSHASH5ee9e4e4e0a5fd39092e63d2d102b12b.js"></script> <script src="/etc.clientlibs/cascade.component.authoring/clientlibs/clientlib-cookieconsent.min.ACSHASH96f0c5b1219e39b8788028f5c17a5ad9.js"></script> <script src="/etc.clientlibs/onecloud/clientlibs/clientlib-cookievalidator.min.ACSHASH3db5cf9fd3fab92b3889302c8de78d1b.js"></script> <script src="/etc.clientlibs/microsoft/components/structure/page/clientlibs/featurecontrol.min.ACSHASHc22ea5b46f3fcad90da0abcc0a3f73d4.js"></script> <div id="customFeatureControl" enabledfeatures="contentbackfillgenerate,esiproductcards,feature-controlled-mwf,uhf-ms-io-endpoint,uhf-esi-cv,uhf-esi-cache,fraud-greenid,contentsquare,mediapixel,holiday-themer,lazyload-static-components,clientlibDefer,upsellEnabled,contentbackfillpkgdelete,healthcheck,contentbackfillhttpgenerate,perf-tracker-1ds,dynamic-bundle,cvIncrementer,tentingEnabled,chatCookiesImplemented,alertCountDownWithoutServerTime,pdpDynamicRendering,bundlesDynamicRendering,contentbackfillmetadatachangesvideo,contentbackfillmetadatachangesnonvideo,listDynamicRendering,experimentation-without-personalization,generic-list-importer,combinedUHF,cvCallEnabled,m365ProductCatalog,support-unsupported-locales,deferClickTale,videoLazyLoad,prefetchFontsEnabled,enable-code-isolation,imageLinkTag,fetchPriority,contentIngestionAgent,enableClickgroupTelemetry,imageLazyLoad,contentIngestionAgent-dispatcher2westus2Agent,isCacheControlFeatureEnabled,feature-controlled-content-card,lcpPrioritizationPhase1,ocReimagineTelemetry,deferScriptsEnabled,lcpPrioritizationPhase2,ocReimagineSlotNumberTelemetry,contentIngestionAgent-dispatcher1westus2Agent,ocReimagineComponentNameTelemetry,ocReimagineTemplateNameTelemetry,ptePhase1,extended-html-minification-sites,dynamicPrice,gl-auto-config,displayV35Toggle,chatCustomEndpoint,enableBoostPersonalization,ocReimagineTelemetryTemplateNameSwap,enableEmailConnector,enable-eventingService,ocReimagineAIAssistant,acsPMEFeatureEnabled,ocReimagineCustomerApiUrl,ocReimagineCustomerFilterApiUrl,ocProductPricePrimaryLocale"></div> <div class="oneds-config" data-instrumentationkey="4b750dbe749b46e2959497d740d6e794-318cab16-e108-40c9-a14e-c8c6187e60ca-7018" data-isenabled="true" data-env="prod" data-market="en-us" data-pagename="CISO Insider: Issue 3 | Security Insider" data-urlcollectquery="true" data-urlcollecthash="false" data-autocapturelineage="false" data-autocaptureresize="false" data-autocapturescroll="false" data-initialize1dseventname="none" data-tenantname="bade" data-tenanttitle="Brand, Advocacy, Digital and Experiences" data-tenantdomain="microsoft" data-tenantsitename="microsoft" data-tenantnameproperty="tenantName" data-tenanttitleproperty="tenantTitle" data-tenantdomainproperty="tenantDomain" data-tenantsitenameproperty="tenantSiteName" data-max1dsinitializedelayinseconds="1"> </div> <script src="/etc.clientlibs/microsoft/components/structure/page/clientlibs/custom-oneds.min.ACSHASHc3aec3d03bc5447975e3ee25b53f6c32.js"></script> <script id="onecloud-body-script" type="text/javascript" src="/msonecloudapi/assets/msocbody.js" async></script> <link rel="stylesheet" href="/etc.clientlibs/onecloud/clientlibs/clientlib-chat.min.ACSHASHfa6f56b2d3037982772378233706c9af.css" type="text/css"> <meta name="chat-default-config" value="{&quot;checkForAgentAvailability&quot;:&quot;false&quot;,&quot;srcFmt&quot;:&quot;https://publisher.liveperson.net/iframe-le-tag/iframe-cs.html?lpsite={0}&amp;lpsection={1}&amp;buttons=hiddenchat&quot;,&quot;innerContainerId&quot;:&quot;lp-iframe-container&quot;,&quot;siteId&quot;:&quot;60270350&quot;,&quot;topic&quot;:&quot;Office365&quot;,&quot;suppressProactive&quot;:&quot;false&quot;,&quot;domainUrl&quot;:&quot;https://publisher.liveperson.net&quot;}"> <meta name="chat-default-locale-chat" value="{&quot;market&quot;:&quot;en-us&quot;,&quot;checkForAgentAvailability&quot;:&quot;false&quot;,&quot;suppressProactive&quot;:&quot;false&quot;}"> <meta name="chat-default-site-type-chat"> <meta name="chat-specific-site-type-locale-chat"> <meta name="chat-oc-opts" value="{&quot;chatDialogDescription&quot;: &quot;chat with Sales window&quot;, &quot;isChatDisabled&quot;: &quot;&quot;, &quot;siteType&quot;: &quot;&quot;, &quot;disableProactiveChat&quot;: &quot;false&quot;, &quot;debugHostNames&quot;: [&quot;localhost&quot;, &quot;sites-author.adobeppe.microsoft.com&quot;]}"> <script src="/etc.clientlibs/onecloud/clientlibs/clientlib-chat.min.ACSHASHb2193ee3d1a572c4de0275bb103c5293.js"></script> <script src="/etc.clientlibs/onecloud/clientlibs/clientlib-market-layer.min.ACSHASH551a5d1b5ebf715e3f78c311a57fa1d7.js"></script> <link rel="stylesheet" href="/etc.clientlibs/onecloud/clientlibs/clientlib-contact-sales.min.ACSHASH4a1a21c1176e98acf994a206329519ba.css" type="text/css"> <script src="/etc.clientlibs/onecloud/clientlibs/clientlib-contact-sales.min.ACSHASHbf8bebdf5d622f993d074a7e2534fe88.js"></script> <section id="oc-contact-sales"> </section> <script type="text/javascript" src="/etc.clientlibs/cascade.component.authoring/clientlibs/clientlib-greenid.min.ACSHASH383b23d12df0d9265d7569a7102c2f96.js" async></script> </div> <script>function gtElInit() {var lib = new google.translate.TranslateService();lib.translatePage('pl', 'cs', function () {});}</script> <script src="https://translate.google.com/translate_a/element.js?cb=gtElInit&amp;hl=en-GB&amp;client=wt" type="text/javascript"></script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10