Microsoft Threat Intelligence Podcast

Microsoft’s CVP of Fraud on Combating Ecosystem Abuse


Listen Later

In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by two expert guests to explore critical challenges in today’s evolving threat landscape. 


First, Sherrod sits down with Kelly Bissell, CVP of Fraud at Microsoft, to discuss the complexities of combating fraud and product abuse. Kelly digs into the unique challenges Microsoft faces, highlighting prevalent schemes such as crypto mining, tech support scams, and the exploitation of deepfakes. Kelly also shares insights into Microsoft’s proactive approach, including recent Azure policy changes and efforts to detect and prevent fraud across its services, especially those attempting to use the compute power for crypto mining. 


Later, Sherrod is joined by Priyanka Ramesha, Senior Threat Researcher on the Defender Experts team, to examine the rising risks of cloud-native attacks. They unpack why threat actors are increasingly targeting the cloud, exploiting its complexity, scalability, and common misconfigurations. Priyanka explains how attackers gain initial access through tactics like phishing, API exploitation, and OAuth abuse, and outlines their methods for credential theft, lateral movement, and data exfiltration. 



In this episode you’ll learn:      

  • What crypto mining looks like in Azure and how Microsoft detects and prevents it 
  • The five main areas of fraud and product abuse that Microsoft focuses on 
  • How attackers exploit the complexity and misconfigurations in cloud infrastructures 
  •  

    Some questions we ask:     

      

    • How long do crypto mining operations run unnoticed in a customer's environment? 
    • What changes did Microsoft make to its policy regarding crypto mining? 
    • Why are legitimate apps sometimes compromised and used in attacks? 
    •  

      Resources:  

      View Kelly Bissell on LinkedIn   

      View Priyanka Ramesha on LinkedIn  

      View Sherrod DeGrippo on LinkedIn  

       

      Related Microsoft Podcasts:                   

      • Afternoon Cyber Tea with Ann Johnson 
      • The BlueHat Podcast 
      • Uncovering Hidden Risks     

         

        Discover and follow other Microsoft podcasts at microsoft.com/podcasts  

         

        Get the latest threat intelligence insights and guidance at Microsoft Security Insider 

         


        The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  

        ...more
        View all episodesView all episodes
        Download on the App Store

        Microsoft Threat Intelligence PodcastBy Microsoft

        • 5
        • 5
        • 5
        • 5
        • 5

        5

        19 ratings


        More shows like Microsoft Threat Intelligence Podcast

        View all
        Security Now (Audio) by TWiT

        Security Now (Audio)

        1,972 Listeners

        Risky Business by Patrick Gray

        Risky Business

        361 Listeners

        SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

        SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

        628 Listeners

        Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

        Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

        366 Listeners

        CyberWire Daily by N2K Networks

        CyberWire Daily

        1,007 Listeners

        Smashing Security by Graham Cluley & Carole Theriault

        Smashing Security

        311 Listeners

        Click Here by Recorded Future News

        Click Here

        400 Listeners

        Malicious Life by Malicious Life

        Malicious Life

        927 Listeners

        Darknet Diaries by Jack Rhysider

        Darknet Diaries

        7,864 Listeners

        Cybersecurity Today by Jim Love

        Cybersecurity Today

        171 Listeners

        CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

        CISO Series Podcast

        187 Listeners

        Hacking Humans by N2K Networks

        Hacking Humans

        315 Listeners

        Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

        Defense in Depth

        74 Listeners

        Cyber Security Headlines by CISO Series

        Cyber Security Headlines

        129 Listeners

        Risky Bulletin by risky.biz

        Risky Bulletin

        33 Listeners