{"id":5793,"date":"2026-02-08T15:53:18","date_gmt":"2026-02-08T15:53:18","guid":{"rendered":"https:\/\/cwsisecurity.com\/?p=5793"},"modified":"2026-04-09T14:24:12","modified_gmt":"2026-04-09T13:24:12","slug":"from-strategy-to-security-managing-ai-risks","status":"publish","type":"post","link":"https:\/\/cwsisecurity.com\/nl\/from-strategy-to-security-managing-ai-risks\/","title":{"rendered":"From Strategy to Security: Managing AI Risks using the Microsoft Ecosystem"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>On demand webinar<\/strong><\/h3>\n\n\n\n<p><\/p>\n\n\n\n<p>AI is rewriting the rules of work, and with it, the rules of security. The productivity gains promised by generative AI come with new realities: employees experimenting with unsanctioned tools, sensitive data being shared in prompts, and compliance teams racing to keep up.<\/p>\n\n\n\n<p>Across industries, these risks are no longer hypothetical, they\u2019re becoming part of everyday life for IT and security teams. Without the right guardrails, the same technology driving innovation can also lead to reputational damage, regulatory breaches, and loss of intellectual property.<\/p>\n\n\n\n<p>In this on-demand webinar, <strong>CWSI\u2019s Paul Conaty<\/strong> and <strong>Ivo Kazimirs<\/strong> explore how Microsoft Defender and Microsoft Purview work together to help organisations discover, monitor and control AI usage\u2014without slowing the business down.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What to Expect<\/h3>\n\n\n\n<p>In this session, you\u2019ll learn:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The most common AI-related security and compliance risks organisations face today<\/li>\n\n\n\n<li>How to identify and manage unsanctioned AI usage across your environment<\/li>\n\n\n\n<li>How Microsoft Defender supports visibility and threat protection for AI activity<\/li>\n\n\n\n<li>How Microsoft Purview strengthens governance, compliance and data protection<\/li>\n\n\n\n<li>Practical steps to build guardrails that enable secure AI adoption at scale<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Webinar | From Strategy to Security: Managing AI Risk Using The Microsoft Ecosystem\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/K-DY9AHB_b4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>On demand webinar AI is rewriting the rules of work, and with it, the rules of security. The productivity gains promised by generative AI come with new realities: employees experimenting with unsanctioned tools, sensitive data being shared in prompts, and compliance teams racing to keep up. Across industries, these risks are no longer hypothetical, they\u2019re [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[7,6],"tags":[],"class_list":["post-5793","post","type-post","status-publish","format-standard","hentry","category-event","category-webinar"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>From Strategy to Security: Managing AI Risks using the Microsoft Ecosystem - CWSI<\/title>\n<meta name=\"description\" content=\"Discover how to manage AI security risks with Microsoft Defender and Microsoft Purview. Learn how CWSI experts Paul Conaty and Ivo Kazimirs help organisations monitor and control AI use while protecting sensitive data and compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwsisecurity.com\/nl\/from-strategy-to-security-managing-ai-risks\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Strategy to Security: Managing AI Risks using the Microsoft Ecosystem\" \/>\n<meta property=\"og:description\" content=\"Security made human. Compliance made simple. Protect your business without slowing it down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwsisecurity.com\/nl\/from-strategy-to-security-managing-ai-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"CWSI\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-08T15:53:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-09T13:24:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-security-made-human-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lucy Freeman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/from-strategy-to-security-managing-ai-risks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/from-strategy-to-security-managing-ai-risks\\\/\"},\"headline\":\"From Strategy to Security: Managing AI Risks using the Microsoft Ecosystem\",\"datePublished\":\"2026-02-08T15:53:18+00:00\",\"dateModified\":\"2026-04-09T13:24:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/from-strategy-to-security-managing-ai-risks\\\/\"},\"wordCount\":205,\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"articleSection\":[\"Events\",\"Webinar\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/from-strategy-to-security-managing-ai-risks\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/from-strategy-to-security-managing-ai-risks\\\/\",\"name\":\"From Strategy to Security: Managing AI Risks using the Microsoft Ecosystem - CWSI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\"},\"datePublished\":\"2026-02-08T15:53:18+00:00\",\"dateModified\":\"2026-04-09T13:24:12+00:00\",\"description\":\"Discover how to manage AI security risks with Microsoft Defender and Microsoft Purview. Learn how CWSI experts Paul Conaty and Ivo Kazimirs help organisations monitor and control AI use while protecting sensitive data and compliance.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/from-strategy-to-security-managing-ai-risks\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/from-strategy-to-security-managing-ai-risks\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/from-strategy-to-security-managing-ai-risks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From Strategy to Security: Managing AI Risks using the Microsoft Ecosystem\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"name\":\"CWSI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\",\"name\":\"CWSI\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"width\":125,\"height\":30,\"caption\":\"CWSI\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cwsi\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@cwsimobileandcloudsecurity361\"],\"description\":\"Security made human. Compliance made simple. Protect your business without slowing it down.\",\"email\":\"info.uk@cwsisecurity.com\",\"telephone\":\"+44 1189 344 300\",\"legalName\":\"CWSI Security\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/person\\\/a5ef6c58f83cd6e6789f60764ae501cd\",\"name\":\"Lucy Freeman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e6d31fc9f3a15bcbfa95c389c7cf8bc25b70b8c5eb8204c2dca0327c4b1ad244?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e6d31fc9f3a15bcbfa95c389c7cf8bc25b70b8c5eb8204c2dca0327c4b1ad244?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e6d31fc9f3a15bcbfa95c389c7cf8bc25b70b8c5eb8204c2dca0327c4b1ad244?s=96&d=mm&r=g\",\"caption\":\"Lucy Freeman\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"From Strategy to Security: Managing AI Risks using the Microsoft Ecosystem - CWSI","description":"Discover how to manage AI security risks with Microsoft Defender and Microsoft Purview. Learn how CWSI experts Paul Conaty and Ivo Kazimirs help organisations monitor and control AI use while protecting sensitive data and compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwsisecurity.com\/nl\/from-strategy-to-security-managing-ai-risks\/","og_locale":"nl_NL","og_type":"article","og_title":"From Strategy to Security: Managing AI Risks using the Microsoft Ecosystem","og_description":"Security made human. Compliance made simple. Protect your business without slowing it down.","og_url":"https:\/\/cwsisecurity.com\/nl\/from-strategy-to-security-managing-ai-risks\/","og_site_name":"CWSI","article_published_time":"2026-02-08T15:53:18+00:00","article_modified_time":"2026-04-09T13:24:12+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-security-made-human-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"Lucy Freeman","Geschatte leestijd":"1 minuut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwsisecurity.com\/nl\/from-strategy-to-security-managing-ai-risks\/#article","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/from-strategy-to-security-managing-ai-risks\/"},"headline":"From Strategy to Security: Managing AI Risks using the Microsoft Ecosystem","datePublished":"2026-02-08T15:53:18+00:00","dateModified":"2026-04-09T13:24:12+00:00","mainEntityOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/from-strategy-to-security-managing-ai-risks\/"},"wordCount":205,"publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"articleSection":["Events","Webinar"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/cwsisecurity.com\/nl\/from-strategy-to-security-managing-ai-risks\/","url":"https:\/\/cwsisecurity.com\/nl\/from-strategy-to-security-managing-ai-risks\/","name":"From Strategy to Security: Managing AI Risks using the Microsoft Ecosystem - CWSI","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/#website"},"datePublished":"2026-02-08T15:53:18+00:00","dateModified":"2026-04-09T13:24:12+00:00","description":"Discover how to manage AI security risks with Microsoft Defender and Microsoft Purview. Learn how CWSI experts Paul Conaty and Ivo Kazimirs help organisations monitor and control AI use while protecting sensitive data and compliance.","breadcrumb":{"@id":"https:\/\/cwsisecurity.com\/nl\/from-strategy-to-security-managing-ai-risks\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwsisecurity.com\/nl\/from-strategy-to-security-managing-ai-risks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cwsisecurity.com\/nl\/from-strategy-to-security-managing-ai-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwsisecurity.com\/nl\/"},{"@type":"ListItem","position":2,"name":"From Strategy to Security: Managing AI Risks using the Microsoft Ecosystem"}]},{"@type":"WebSite","@id":"https:\/\/cwsisecurity.com\/nl\/#website","url":"https:\/\/cwsisecurity.com\/nl\/","name":"CWSI","description":"","publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwsisecurity.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/cwsisecurity.com\/nl\/#organization","name":"CWSI","url":"https:\/\/cwsisecurity.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","width":125,"height":30,"caption":"CWSI"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cwsi\/","https:\/\/www.youtube.com\/@cwsimobileandcloudsecurity361"],"description":"Security made human. Compliance made simple. Protect your business without slowing it down.","email":"info.uk@cwsisecurity.com","telephone":"+44 1189 344 300","legalName":"CWSI Security","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/person\/a5ef6c58f83cd6e6789f60764ae501cd","name":"Lucy Freeman","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/e6d31fc9f3a15bcbfa95c389c7cf8bc25b70b8c5eb8204c2dca0327c4b1ad244?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e6d31fc9f3a15bcbfa95c389c7cf8bc25b70b8c5eb8204c2dca0327c4b1ad244?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e6d31fc9f3a15bcbfa95c389c7cf8bc25b70b8c5eb8204c2dca0327c4b1ad244?s=96&d=mm&r=g","caption":"Lucy Freeman"}}]}},"_links":{"self":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/5793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/comments?post=5793"}],"version-history":[{"count":1,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/5793\/revisions"}],"predecessor-version":[{"id":8365,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/5793\/revisions\/8365"}],"wp:attachment":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media?parent=5793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/categories?post=5793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/tags?post=5793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}