{"id":22863,"date":"2026-04-02T09:00:00","date_gmt":"2026-04-02T16:00:00","guid":{"rendered":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/?p=22863"},"modified":"2026-04-01T17:07:58","modified_gmt":"2026-04-02T00:07:58","slug":"microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai","status":"publish","type":"post","link":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/","title":{"rendered":"Microsoft CISO advice: The most important thing to know about securing AI"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Using AI comes with inherent risks. In a recent video, Yonatan Zunger, CVP and deputy CISO for Microsoft, suggests thinking about AI as a new intern will help you naturally take the right approach to AI security.\u00a0<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Zunger and his team focus on AI safety and security. They consider all the different ways anything involving working with AI can go wrong.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cAn important thing to know about AI is that AI&#8217;s make mistakes,\u201d Zunger says. \u201cYou already know how to work with systems that make mistakes, get tricked.\u201d<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex has-2-columns\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:65px\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"95\" height=\"96\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Learn-how-p-g.png\" alt=\"\" class=\"wp-image-19668\" style=\"width:48px\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-4);margin-bottom:var(--wp--preset--spacing--spacing-4)\"><strong><strong>Explore Zero Trust for AI<\/strong><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-4);margin-bottom:var(--wp--preset--spacing--spacing-4)\"><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/security\/blog\/2026\/03\/19\/new-tools-and-guidance-announcing-zero-trust-for-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">Checkout our new Zero Trust for AI tools and guidance.<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/J6GxzP8iwsk?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span>\n<\/div><figcaption class=\"wp-element-caption\"><em>Watch this video to see Yonatan Zunger discuss his advice for working with AI. (For a transcript, please view the video on YouTube:&nbsp;<\/em><a href=\"https:\/\/www.youtube.com\/watch?v=J6GxzP8iwsk\" target=\"_blank\" rel=\"noreferrer noopener\"><em>https:\/\/www.youtube.com\/watch?v=J6GxzP8iwsk<\/em><\/a><em> .<\/em>)<\/figcaption><\/figure>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge.png\" alt=\"\" class=\"wp-image-19492\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge.png 190w, https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Try it out<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/security\/blog\/2026\/03\/19\/new-tools-and-guidance-announcing-zero-trust-for-ai\/?OCID=InsideTrack_Product_10869\" target=\"_blank\" rel=\"noreferrer noopener\">Explore how to extend Zero Trust principles to AI.<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge.png\" alt=\"\" class=\"wp-image-19491\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge.png 190w, https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Related links<\/p>\n<\/div>\n\n\n\n<ul style=\"margin-top:var(--wp--preset--spacing--spacing-20)\" class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/security\/blog\/2025\/08\/26\/securing-and-governing-the-rise-of-autonomous-agents\/\" target=\"_blank\" rel=\"noreferrer noopener\">Discover how to secure and govern autonomous agents.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/security\/blog\/2025\/05\/29\/how-to-deploy-ai-safely\/\" target=\"_blank\" rel=\"noreferrer noopener\">Find out how to deploy AI safely.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoft-security-blog\/governing-ai-agent-behavior-aligning-user-developer-role-and-organizational-inte\/4503551\" target=\"_blank\" rel=\"noreferrer noopener\">Learn about aligning user, developer role, and organizational intent in agent governance.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/security\/blog\/2025\/07\/08\/enhancing-microsoft-365-security-by-eliminating-high-privilege-access\/\" target=\"_blank\" rel=\"noreferrer noopener\">Review why it is important to eliminate high privilege access&nbsp;by applications.<\/a>&nbsp;<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/security\/blog\/2025\/04\/08\/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">Meet the Deputy CISOs who help shape Microsoft\u2019s approach to cybersecurity.<\/a>&nbsp;<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge.png\" alt=\"\" class=\"wp-image-19490\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge.png 190w, https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">We&#8217;d like to hear from you!<\/p>\n<\/div>\n\n\n\n<ul style=\"margin-top:var(--wp--preset--spacing--spacing-20)\" class=\"wp-block-list is-style-list-no-bullets\">\n<li class=\"wp-block-list-item\"><a href=\"mailto:msitstaff@microsoft.com\">Want more information? Email us and include a link to this story and we\u2019ll get back to you.<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Using AI comes with inherent risks. In a recent video, Yonatan Zunger, CVP and deputy CISO for Microsoft, suggests thinking about AI as a new intern will help you naturally take the right approach to AI security.\u00a0 Zunger and his team focus on AI safety and security. They consider all the different ways anything involving [&hellip;]<\/p>\n","protected":false},"author":228,"featured_media":22952,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_hide_featured_on_single":false,"_show_featured_caption_on_single":true,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[71,896],"tags":[864,199,868,897,263,848,419],"coauthors":[895],"class_list":["post-22863","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured","category-office-of-the-ciso","tag-agent","tag-ai","tag-ai-deployment-and-adoption","tag-cybersecurity","tag-microsoft-365","tag-security-and-risk-management","tag-zero-trust","m-blog-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft CISO advice: The most important thing to know about securing AI - Inside Track Blog<\/title>\n<meta name=\"description\" content=\"Corporate Vice President and Deputy Chief Information Security Officer Yonatan Zunger shares one step you can take to make AI more secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft CISO advice: The most important thing to know about securing AI - Inside Track Blog\" \/>\n<meta property=\"og:description\" content=\"Corporate Vice President and Deputy Chief Information Security Officer Yonatan Zunger shares one step you can take to make AI more secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/\" \/>\n<meta property=\"og:site_name\" content=\"Inside Track Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-02T16:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Social2_image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"742\" \/>\n\t<meta property=\"og:image:height\" content=\"417\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rani Lofstrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rani Lofstrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/\"},\"author\":{\"name\":\"Rani Lofstrom\",\"@id\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/#\/schema\/person\/a84c77f9cb72a705f03dfbc214dd817e\"},\"headline\":\"Microsoft CISO advice: The most important thing to know about securing AI\",\"datePublished\":\"2026-04-02T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/\"},\"wordCount\":252,\"image\":{\"@id\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Hero2_image.jpg\",\"keywords\":[\"Agent\",\"AI\",\"AI deployment and adoption\",\"Cybersecurity\",\"Microsoft 365\",\"Security and risk management\",\"Zero Trust\"],\"articleSection\":[\"Featured\",\"Office of the CISO\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/\",\"url\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/\",\"name\":\"Microsoft CISO advice: The most important thing to know about securing AI - Inside Track Blog\",\"isPartOf\":{\"@id\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Hero2_image.jpg\",\"datePublished\":\"2026-04-02T16:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/#\/schema\/person\/a84c77f9cb72a705f03dfbc214dd817e\"},\"description\":\"Corporate Vice President and Deputy Chief Information Security Officer Yonatan Zunger shares one step you can take to make AI more secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/#primaryimage\",\"url\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Hero2_image.jpg\",\"contentUrl\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Hero2_image.jpg\",\"width\":2300,\"height\":1293,\"caption\":\"Corporate Vice President and Deputy Chief Information Security Officer Yonatan Zunger shares one step you can take to make AI more secure.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft CISO advice: The most important thing to know about securing AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/#website\",\"url\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/\",\"name\":\"Inside Track Blog\",\"description\":\"How Microsoft does IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/#\/schema\/person\/a84c77f9cb72a705f03dfbc214dd817e\",\"name\":\"Rani Lofstrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g1f4b72779f158e872aad1ea503fc8b81\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g\",\"caption\":\"Rani Lofstrom\"},\"url\":\"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/author\/rlofstrom\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft CISO advice: The most important thing to know about securing AI - Inside Track Blog","description":"Corporate Vice President and Deputy Chief Information Security Officer Yonatan Zunger shares one step you can take to make AI more secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft CISO advice: The most important thing to know about securing AI - Inside Track Blog","og_description":"Corporate Vice President and Deputy Chief Information Security Officer Yonatan Zunger shares one step you can take to make AI more secure.","og_url":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/","og_site_name":"Inside Track Blog","article_published_time":"2026-04-02T16:00:00+00:00","og_image":[{"width":742,"height":417,"url":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Social2_image.jpg","type":"image\/jpeg"}],"author":"Rani Lofstrom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rani Lofstrom","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/#article","isPartOf":{"@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/"},"author":{"name":"Rani Lofstrom","@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/#\/schema\/person\/a84c77f9cb72a705f03dfbc214dd817e"},"headline":"Microsoft CISO advice: The most important thing to know about securing AI","datePublished":"2026-04-02T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/"},"wordCount":252,"image":{"@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Hero2_image.jpg","keywords":["Agent","AI","AI deployment and adoption","Cybersecurity","Microsoft 365","Security and risk management","Zero Trust"],"articleSection":["Featured","Office of the CISO"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/","url":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/","name":"Microsoft CISO advice: The most important thing to know about securing AI - Inside Track Blog","isPartOf":{"@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/#primaryimage"},"image":{"@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Hero2_image.jpg","datePublished":"2026-04-02T16:00:00+00:00","author":{"@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/#\/schema\/person\/a84c77f9cb72a705f03dfbc214dd817e"},"description":"Corporate Vice President and Deputy Chief Information Security Officer Yonatan Zunger shares one step you can take to make AI more secure.","breadcrumb":{"@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/#primaryimage","url":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Hero2_image.jpg","contentUrl":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Hero2_image.jpg","width":2300,"height":1293,"caption":"Corporate Vice President and Deputy Chief Information Security Officer Yonatan Zunger shares one step you can take to make AI more secure."},{"@type":"BreadcrumbList","@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft CISO advice: The most important thing to know about securing AI"}]},{"@type":"WebSite","@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/#website","url":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/","name":"Inside Track Blog","description":"How Microsoft does IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/#\/schema\/person\/a84c77f9cb72a705f03dfbc214dd817e","name":"Rani Lofstrom","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g1f4b72779f158e872aad1ea503fc8b81","url":"https:\/\/secure.gravatar.com\/avatar\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g","caption":"Rani Lofstrom"},"url":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/author\/rlofstrom\/"}]}},"jetpack_featured_media_url":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Hero2_image.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9hcZA-5WL","_links":{"self":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/22863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/users\/228"}],"replies":[{"embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/comments?post=22863"}],"version-history":[{"count":5,"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/22863\/revisions"}],"predecessor-version":[{"id":22950,"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/22863\/revisions\/22950"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/media\/22952"}],"wp:attachment":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/media?parent=22863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/categories?post=22863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/tags?post=22863"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/insidetrack\/blog\/wp-json\/wp\/v2\/coauthors?post=22863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}