|
|
|||
|
||||
OverviewInto the Mind of Microsoft Security - 2026 Compact EditionPreviously published as Into the Mind of Microsoft Security - 2026 Edition by Sameh Younis. The original 2026 Edition paperback remains available and is recommended for readers who prefer a more comfortable reading experience and easier viewing of detailed infographics and visual content. This 2026 Compact Edition contains the same content, page count, and overall layout in a smaller 6 x 9 inch trim size. Because of the reduced page size, text, diagrams, and infographics appear smaller on the page and may be less convenient for some readers, especially during extended reading or when viewing detailed figures. Security leaders are being asked to do two things at once: move faster than attackers, and prove they stayed in control while doing it. AI copilots and agents raise the stakes. It is no longer enough to say you have controls - you need a way to show how controls operated across prevention, detection, response, recovery, and governance, including when automation made the first move. Into the Mind of Microsoft Security is a strategy-led, verification-led field guide for CISOs and security architects who are building an operating model, not chasing features. It translates Microsoft Security capabilities into a set of durable decision models: unify the investigation story, treat AI as a first-class security surface, reason in paths instead of fragments, and produce evidence by default. How the book is structured Modern SecOps doctrine - narrative-led investigations, governed disruption, and human-on-the-loop execution Security for AI - guardrails for copilots and agents, including what changes when tools and connectors become actions The Security Graph - signals, context, and control at scale Data security and insider risk - the AI-ready data estate as the real battleground AI compliance, practically - moving from policy intent to proof Identity as the control plane - lifecycle and access for humans and agents Network and access for AI - controlling the paths and reducing unintended exposure AI supply chain security - trust, provenance, and third-party dependency risk AI-ready resilience and operating model - prove, improve, repeat What you will be able to do after reading Collapse investigation time by turning fragmented alerts into coherent, explainable narratives Stage response actions under policy so speed does not trade away accountability Identify which identities, permissions, and routes actually create blast radius Run data protection and insider risk as daily operational inputs, not periodic audits Produce evidence that controls held - continuously, not annually Adopt AI responsibly by governing how copilots and agents access data and take actions Who this is for Security leaders, architects, and engineering teams modernizing a Microsoft-based security stack - especially anyone responsible for SecOps outcomes, AI governance, data security, and compliance-grade assurance. What makes this different This is not a feature catalog. It is a set of repeatable mental models you can use in design reviews and executive conversations - including the 15-minute doctrine, the shift from signals to judgment, and the idea that governance is strongest when it is built into the moment of action. Each chapter closes with an Insights / Takeaway section that turns architecture into leadership decisions, plus practical guidance you can apply immediately. If you are adopting copilots, agents, and automation at scale, this book gives you a clear way to move fast without quietly losing control. Full Product DetailsAuthor: Sameh YounisPublisher: Sameh Younis Imprint: Sameh Younis Dimensions: Width: 15.20cm , Height: 2.20cm , Length: 22.90cm Weight: 0.549kg ISBN: 9781067442613ISBN 10: 1067442618 Pages: 414 Publication Date: 19 April 2026 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Available To Order We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||