{"id":1211,"date":"2019-06-17T00:00:00","date_gmt":"2019-06-17T00:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/blog\/azure-security-expert-series-best-practices-from-ann-johnson"},"modified":"2025-06-24T10:57:24","modified_gmt":"2025-06-24T17:57:24","slug":"azure-security-expert-series-best-practices-from-ann-johnson","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/","title":{"rendered":"Azure Security Expert Series: Best practices from Ann Johnson"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\"><strong>June 19<sup>th<\/sup> 10 am \u2013 11 am PT (1 pm \u2013 2 pm ET)<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">With more computing environments moving to the cloud, the need for stronger cloud security has never been greater. But what constitutes effective cloud security, and what best practices should you be following?<\/p>\n\n\n<figure class=\"wp-block-image alignright size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/06\/dddba53b-18a5-4a70-83ef-181006d8f9ae.webp\" alt=\"Ann Johnson\" class=\"wp-image-17986 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/06\/dddba53b-18a5-4a70-83ef-181006d8f9ae.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">We are excited to launch the Azure security expert series on June 19th, for security operations and IT professionals. Kicking off with <strong>Ann Johnson<\/strong>, CVP Cybersecurity Solutions Group, Microsoft, and other industry experts in discussions on a wide range of cloud security topics.<br><p><a href=\"https:\/\/aka.ms\/AA5bvj6\">Save the date<\/a><\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-included-in-the-event\">What is included in the event?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">You&#8217;ll hear from Ann Johnson on the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Cloud security best practices with Hayden Hainsworth, GM and Partner, Cybersecurity Engineering at Microsoft.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">The latest Azure security innovations.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Partnership with Ran Nahmias, Head of Cloud Security at Check Point Software Technologies.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Security principles from a Microsoft enterprise customer.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">During the streaming event, you&#8217;ll have the opportunity to participate in a live chat with Microsoft cloud security experts.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">You will also have access to watch our new on-demand sessions at your own pace, all led by Microsoft security product experts, to gain practical knowledge from these topics:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Get started with Azure Sentinel a cloud-native SIEM.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">What is cloud-native Azure Network Security?<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Securing the hybrid cloud with Security Center .<\/li>\n\n\n\n<li class=\"wp-block-list-item\">What makes IoT Security different?<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>That\u2019s not all!<\/strong> You will have a chance to win a Microsoft Xbox One S after the event. All you have to do is: watch all the sessions, complete the knowledge check questions on the sweepstakes form, submit \u2013 and you are entered!**<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"tune-in\">Tune in<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">So <a href=\"https:\/\/aka.ms\/AA5bvj6\">mark your calendars today<\/a>, and we&#8217;ll see you online on Wednesday June 19th at 10 am PT (1 pm ET).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"ask-us-anything-with-azure-security-experts\">Ask Us Anything with Azure security experts<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Have more questions? Azure security team will be hosting an \u2018Ask Us Anything\u2019 session on Twitter, on <strong>Monday June 24, 2019<\/strong> from 10 am \u2013 11:30 am PT (1 pm \u2013 2:30 pm ET).&nbsp; Members of the product and engineering teams will be available to answer questions about Azure security services.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Post your questions to Twitter by mentioning <a href=\"https:\/\/twitter.com\/azuresupport\">@AzureSupport<\/a> and using the hashtag <a href=\"https:\/\/twitter.com\/search?q=%23AzureSecuritySeries&amp;src=typd\">#AzureSecuritySeries<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If there are follow-ups or additional questions that come up after the Twitter session, no problem! We\u2019re happy to continue the dialogue afterwards through Twitter or send your questions to <a href=\"mailto:Azuresecurityexpert@microsoft.com\">Azuresecurityexpert@microsoft.com<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-do-i-learn-more-about-azure-security-and-connect-with-the-tech-community\">How do I learn more about Azure security and connect with the tech community?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">There are several ways to stay connected and access new executive talks, on-demand sessions, or other types of valuable content covering a range of cloud security topics to help you get started or accelerate your cloud security plan.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Watch for content on: <a href=\"https:\/\/www.youtube.com\/playlist?list=PLLasX02E8BPA0ZNzg-BsHio7yTciN-UVu\">Azure Security Expert Series Page<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\">Visit <a href=\"https:\/\/azure.microsoft.com\/en-us\/overview\/security\/\">Microsoft Azure<\/a> for product details.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Follow the social channel for Azure security news and updates on <a href=\"https:\/\/twitter.com\/Azure?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor\">Microsoft Azure Twitter<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Join our <a href=\"https:\/\/techcommunity.microsoft.com\/plugins\/common\/feature\/oauth2sso\/sso_login_redirect?referer=https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FEnterprise-Mobility-Security%2Fct-p%2FEMS\">Security Community<\/a> to connect with the engineering teams and participate in previews, group discussions, give feedback etc.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Accelerate your knowledge on security capabilities within Azure with hands-on training courses on <a href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/\">Microsoft Learn<\/a> (watch out for new security training sessions in the coming months).<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Attend <a href=\"https:\/\/www.microsoft.com\/en-us\/ignite\">Microsoft Ignite<\/a> for specialized security learning paths to learn from the experts and connect with your peers.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><em>**The Sweepstakes will run exclusively between June 19 \u2013 June 26 11:59 PM Pacific Time. No purchase necessary. To enter, you must be a legal resident of the 50 United States (including the District of Columbia), and be 18 years of age or older. You will need to complete all the Knowledge Check questions in the entry form to quality for the sweepstakes. Please refer to our official rules for more details.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With more computing environments moving to the cloud, the need for stronger cloud security has never been greater. But what constitutes effective cloud security, and what best practices should you be following? We are excited to launch the Azure security expert series on June 19th, for security operations and IT professionals. Kicking off with Ann Johnson, CVP of Cybersecurity for Microsoft, and other industry experts in discussions on a wide range of cloud security topics.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1459],"tags":[],"audience":[3053,3056],"content-type":[1460],"product":[1798],"tech-community":[],"topic":[],"coauthors":[90],"class_list":["post-1211","post","type-post","status-publish","format-standard","hentry","category-security","audience-it-decision-makers","audience-it-implementors","content-type-events","product-azure-security-center","review-flag-1-1680286581-825","review-flag-2-1680286581-601","review-flag-iot-1680286585-835","review-flag-never-1680286580-606","review-flag-new-1680286579-546","review-flag-partn-1680286579-901","review-flag-partn-1680286579-300"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Azure Security Expert Series: Best practices from Ann Johnson | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"With more computing environments moving to the cloud, the need for stronger cloud security has never been greater. But what constitutes effective cloud security, and what best practices should you be following? We are excited to launch the Azure security expert series on June 19th, for security operations and IT professionals. Kicking off with Ann Johnson, CVP of Cybersecurity for Microsoft, and other industry experts in discussions on a wide range of cloud security topics.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Azure Security Expert Series: Best practices from Ann Johnson | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"With more computing environments moving to the cloud, the need for stronger cloud security has never been greater. But what constitutes effective cloud security, and what best practices should you be following? We are excited to launch the Azure security expert series on June 19th, for security operations and IT professionals. Kicking off with Ann Johnson, CVP of Cybersecurity for Microsoft, and other industry experts in discussions on a wide range of cloud security topics.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-17T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-24T17:57:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/06\/dddba53b-18a5-4a70-83ef-181006d8f9ae.png\" \/>\n<meta name=\"author\" content=\"Scott Woodgate\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Woodgate\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/scott-woodgate\/\",\"@type\":\"Person\",\"@name\":\"Scott Woodgate\"}],\"headline\":\"Azure Security Expert Series: Best practices from Ann Johnson\",\"datePublished\":\"2019-06-17T00:00:00+00:00\",\"dateModified\":\"2025-06-24T17:57:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/\"},\"wordCount\":597,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/06\/dddba53b-18a5-4a70-83ef-181006d8f9ae.png\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/\",\"name\":\"Azure Security Expert Series: Best practices from Ann Johnson | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/06\/dddba53b-18a5-4a70-83ef-181006d8f9ae.png\",\"datePublished\":\"2019-06-17T00:00:00+00:00\",\"dateModified\":\"2025-06-24T17:57:24+00:00\",\"description\":\"With more computing environments moving to the cloud, the need for stronger cloud security has never been greater. But what constitutes effective cloud security, and what best practices should you be following? We are excited to launch the Azure security expert series on June 19th, for security operations and IT professionals. Kicking off with Ann Johnson, CVP of Cybersecurity for Microsoft, and other industry experts in discussions on a wide range of cloud security topics.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/#primaryimage\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/06\/dddba53b-18a5-4a70-83ef-181006d8f9ae.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/06\/dddba53b-18a5-4a70-83ef-181006d8f9ae.webp\",\"width\":149,\"height\":210,\"caption\":\"Ann Johnson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Azure Security Expert Series: Best practices from Ann Johnson\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Azure Security Expert Series: Best practices from Ann Johnson | Microsoft Azure Blog","description":"With more computing environments moving to the cloud, the need for stronger cloud security has never been greater. But what constitutes effective cloud security, and what best practices should you be following? We are excited to launch the Azure security expert series on June 19th, for security operations and IT professionals. Kicking off with Ann Johnson, CVP of Cybersecurity for Microsoft, and other industry experts in discussions on a wide range of cloud security topics.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/","og_locale":"en_US","og_type":"article","og_title":"Azure Security Expert Series: Best practices from Ann Johnson | Microsoft Azure Blog","og_description":"With more computing environments moving to the cloud, the need for stronger cloud security has never been greater. But what constitutes effective cloud security, and what best practices should you be following? We are excited to launch the Azure security expert series on June 19th, for security operations and IT professionals. Kicking off with Ann Johnson, CVP of Cybersecurity for Microsoft, and other industry experts in discussions on a wide range of cloud security topics.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2019-06-17T00:00:00+00:00","article_modified_time":"2025-06-24T17:57:24+00:00","og_image":[{"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/06\/dddba53b-18a5-4a70-83ef-181006d8f9ae.png","type":"","width":"","height":""}],"author":"Scott Woodgate","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Scott Woodgate","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/scott-woodgate\/","@type":"Person","@name":"Scott Woodgate"}],"headline":"Azure Security Expert Series: Best practices from Ann Johnson","datePublished":"2019-06-17T00:00:00+00:00","dateModified":"2025-06-24T17:57:24+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/"},"wordCount":597,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/06\/dddba53b-18a5-4a70-83ef-181006d8f9ae.png","articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/","name":"Azure Security Expert Series: Best practices from Ann Johnson | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/#primaryimage"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/06\/dddba53b-18a5-4a70-83ef-181006d8f9ae.png","datePublished":"2019-06-17T00:00:00+00:00","dateModified":"2025-06-24T17:57:24+00:00","description":"With more computing environments moving to the cloud, the need for stronger cloud security has never been greater. But what constitutes effective cloud security, and what best practices should you be following? We are excited to launch the Azure security expert series on June 19th, for security operations and IT professionals. Kicking off with Ann Johnson, CVP of Cybersecurity for Microsoft, and other industry experts in discussions on a wide range of cloud security topics.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/#primaryimage","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/06\/dddba53b-18a5-4a70-83ef-181006d8f9ae.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/06\/dddba53b-18a5-4a70-83ef-181006d8f9ae.webp","width":149,"height":210,"caption":"Ann Johnson"},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-expert-series-best-practices-from-ann-johnson\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Azure Security Expert Series: Best practices from Ann Johnson"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/1211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=1211"}],"version-history":[{"count":1,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/1211\/revisions"}],"predecessor-version":[{"id":40042,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/1211\/revisions\/40042"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=1211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=1211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=1211"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=1211"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=1211"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=1211"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=1211"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=1211"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=1211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}