• Thread Author
In the ever-evolving landscape of cybersecurity, few companies face the scope and scale of threats that Microsoft does. With a footprint that spans operating systems, productivity software, cloud computing, consumer AI, and enterprise hardware, Microsoft is a prime target on the global threat map. In response, the company has continuously fortified its defenses—not just with technology, but through leadership and culture. One significant development in this journey was the launch of Microsoft’s Cybersecurity Governance Council in 2024, a move that introduced a new tier of cybersecurity oversight, and, crucially, an influential cohort of deputy chief information security officers (Deputy CISOs).
This third installment in Microsoft’s Deputy CISO spotlight focuses on Kumar Srinivasamurthy, Geoff Belknap, and Ann Johnson, each entrusted with a portfolio that influences the cybersecurity posture not just for Microsoft, but arguably for the broader digital landscape. Their experiences, philosophies, and day-to-day decisions illuminate Microsoft’s approach to building resilient security cultures—a vision that other organizations, large and small, are wise to study.

Microsoft’s Cybersecurity Governance Council: Leadership in Action​

The introduction of the Cybersecurity Governance Council in 2024 was a strategic response to the increasing complexity of cyber threats facing the company and its global customer base. The council’s remit is to oversee risk, defense, and compliance across the entire Microsoft ecosystem, providing a framework through which accountability and continuous improvement are fostered. Rather than centralizing responsibility in a single CISO, Microsoft’s approach gives authority to a team of deputy CISOs, each focused on different strategic and operational domains. This multi-pronged model allows for tailored strategies in critical business areas—from consumer platforms to core infrastructure and customer engagement.

Meet the Leaders: Resumes that Resonate​

Kumar Srinivasamurthy: Upholding Consumer Trust​

As Vice President, Bing Fundamentals, and Deputy CISO for Consumer, Kumar Srinivasamurthy stands at the crossroads of user experience and security. His journey began with a natural curiosity for “breaking things,” evolving into penetration testing on Office and Exchange before transitioning to defending against those very threats. Having joined Microsoft through university recruiting, Srinivasamurthy’s tenure now outlasts many new recruits’ lifespans—a testament to his sustained impact.
At present, Kumar’s mandate spans security and compliance across products like Microsoft Edge, Bing, MSN, Ads, and the Copilot Consumer Division. His focus extends to improving end-to-end performance, bot detection, and traffic routing. This blend of functional oversight and security ensures that speed and safety coexist—a balancing act that most consumer tech companies strive for but few achieve at Microsoft’s scale.

Geoff Belknap: Fortifying the Core and Navigating M&A​

As Corporate Vice President and Deputy CISO, Core and Mergers & Acquisitions, Geoff Belknap plays a pivotal role in safeguarding Microsoft’s internal infrastructure and steering security outcomes during mergers, acquisitions, and divestitures. Having previously led security for LinkedIn, his transition to Microsoft in spring 2024 was driven by a desire to maximize impact.
Belknap’s philosophy highlights the necessity of blending trust, clarity of purpose, and cross-functional communication to drive accountability. He is acutely aware that "the value of security comes from creating, not just preventing," a mindset increasingly vital as digital transformation accelerates.

Ann Johnson: Bridging Microsoft and Its Customers​

Ann Johnson’s dual role as Corporate Vice President and Deputy CISO, Customer Security Management Office, positions her at the vital intersection of Microsoft’s security efforts and the broader community of customers, partners, and regulators. Her career was catalyzed by hands-on curiosity—an interest in RSA Security hardware tokens that led to a job and ultimately a leadership path with one of tech’s most influential security portfolios.
Johnson now leads the Customer Security Management Office (CSMO). Her team is responsible for direct customer communication around how Microsoft secures its assets, and for external engagement that allows Microsoft’s own security teams to focus on protecting the company and its ecosystem. Johnson’s perspective reinforces that security is a “team sport”—one that requires ongoing partnership inside and outside the company.

Cybersecurity as a People-First Discipline​

Although each deputy CISO’s path differs, they echo a common theme: cybersecurity resilience begins and ends with people. Technology, while essential, is only as strong as the culture that sustains it. The stories of Srinivasamurthy, Belknap, and Johnson show a seamless blend of technical mastery, emotional intelligence, and adaptive leadership.

Lessons from the Front Lines: Building Awareness and Accountability​

For Srinivasamurthy, learning from incidents—both internal and external—is foundational for raising awareness. By dissecting breaches and sharing “failure stories,” teams are encouraged to view mistakes as growth opportunities rather than career-limiting setbacks. This approach is especially forward-thinking for an industry where missteps often carry heavy consequences and little forgiveness.
Supporting this, Belknap points to trust as the bedrock for accountability. “Lack of accountability doesn’t stem from unwillingness, but from lack of connection to outcomes,” he notes. Leaders, he says, must bridge this gap—making it clear how individual efforts align with the company’s broader mission. Only when staff see the impact of their work, does consistent, self-sustaining accountability emerge.
For Johnson, continuous education is key. Her team relies on regular internal learning sessions and collaborations with Microsoft’s education and awareness teams. This layered approach not only fosters technical fluency but promotes empathy and responsibility—attributes paramount for those tasked with guarding against evolving threats.

Innovation and Security: Not a Zero-Sum Choice​

Perhaps the most powerful insight from Microsoft’s Deputy CISOs is the argument that security and innovation are inherently compatible. Historically, security was seen as the handbrake on creativity, a necessary but inconvenient drag on speed or functionality. The new model, as described by Srinivasamurthy, requires “security by default and by design.” In essence, the easiest path for developers and engineers should also be the most secure.
Belknap pushes this even further: the value of security lies not in naysaying, but in enabling risk-taking that competitors may be unable to match. When effectively implemented, security becomes a driver of innovation—a competitive differentiator rather than a constraint.
Johnson drives home the same message. “We are past the point where security is bolted on after the fact. Those who want to innovate no longer view security as a blocker.” This repositioning is not just a talking point; it represents a tectonic shift in how technology companies bring products to market, expand to new regions, or take experimental bets.

Human Sustainability in the Face of Cyber Crisis​

The toll of cybersecurity work—relentless threats, late nights, and the sometimes invisible nature of success—is rarely acknowledged outside the field. Yet all three leaders offer practical, deeply personal advice to their younger selves and, by extension, to the next generation of cybersecurity professionals.
Srinivasamurthy counsels methodical problem solving and a growth mindset, viewing all problems as learning opportunities rather than insurmountable obstacles. Belknap is candid about the need for self-care, noting that the burdens of security work eventually catch up to those who neglect their own well-being. Johnson, meanwhile, reflects on her earlier tendency to internalize mistakes; her advice is to “give yourself a break”—a reminder that even the most capable leaders are fallible humans first.
These perspectives signal a maturity in Microsoft’s security leadership: resilience is not just about technological redundancy or layered defenses, but about building healthy, sustainable work cultures. This is an industry still known for burnout, heroics, and volatility, so the emphasis is both timely and urgent.

The Broader Impact: Setting the Cybersecurity Agenda​

Microsoft’s size and ubiquity mean that its cybersecurity strategies set benchmarks for much of the world’s software and cloud infrastructure. The decisions made by its Cybersecurity Governance Council reverberate beyond Redmond. But what are the broader implications of this leadership approach for customers, partners, and the tech ecosystem at large?

Accountability as a Cultural Export​

By making accountability a central pillar—not just an aspiration—Microsoft effectively raises expectations for the entire tech industry. Cultural programs like "Share your fail," for instance, are rare among global enterprises of this scale, yet they drive a culture of psychological safety and innovation.

Security by Default: A Model for Others​

Microsoft’s move towards “security by default and by design” is a best practice increasingly reflected in guidance from organizations such as the National Institute of Standards and Technology (NIST) and the Center for Internet Security (CIS). This approach, which bakes security into development processes rather than treating it as a bolt-on, directly correlates with lower incident rates and faster incident response times, according to independent industry analyses. Microsoft’s ability to implement this at scale lends credence to its feasibility for other organizations.

Customer-Centric Engagement: Trust as a Product​

Ann Johnson’s work with the Customer Security Management Office sets a template for how large technology providers ought to engage with their customers. Transparency on “how Microsoft secures Microsoft” not only reassures corporate clients, but also drives more informed security discussions throughout the supply chain.
Industry assessments, including feedback from Fortune 500 IT leaders and third-party security audits, consistently cite Microsoft’s open communication around its own security processes as a market differentiator. Customers, especially those in highly regulated industries, reward this engagement with ongoing commitments and deeper integration.

Strengths and Strategic Advantages​

A critical analysis reveals several clear strengths in Microsoft’s Deputy CISO-led approach:
  • Scalable Accountability: Distributed leadership ensures that each business unit has a dedicated security advocate, creating tailored solutions rather than one-size-fits-all policies.
  • Shared Learning Culture: Emphasis on learning from failures, regular training, and open dialogue reduces stigma around mistakes and rapidly disseminates best practices company-wide.
  • Alignment of Security and Innovation: The narrative has shifted from security as obstruction to security as enabler, encouraging faster, safer innovation across teams.
  • Global Customer Engagement: By operating the Customer Security Management Office, Microsoft extends its influence beyond compliance, framing security as a mutual obligation between provider and client.

Potential Risks and Areas for Improvement​

No approach is without its risks and potential limitations. Microsoft’s distinctive structure also raises challenges that demand vigilance:
  • Organizational Complexity: Distributed responsibility, while adaptable, can obscure chain of command and create silos if not carefully managed. Effective collaboration between deputy CISOs is crucial.
  • Leadership Transitions: The impact of Microsoft’s security culture is largely dependent on the personalities and philosophies of its current deputies. Succession planning and knowledge transfer are essential to avoid disruptions as roles change.
  • Scaling Human-Centric Policies: Programs like “Share your fail” thrive in pockets of psychological safety but may be harder to embed in teams or regions with different cultural norms. Localization and contextual management are ongoing necessities.
  • Balancing Transparency and Disclosure: As the company increases transparency with external partners and customers, there’s a continual risk assessment to determine what should and shouldn’t be shared to avoid giving adversaries undue advantage.

Conclusion: Cybersecurity for the Next Era​

Microsoft’s Cybersecurity Governance Council and its cadre of deputy CISOs embody a new chapter in enterprise security leadership. Rather than relying purely on boundary technologies or compliance checklists, Microsoft is investing in cultural transformation: accountability by design, learning by default, and security embedded in every product and engagement.
The results are telling. Microsoft now moves faster to market, innovates across consumer and enterprise domains, and builds trust not only with users but with a global network of partners. Its leaders, seasoned by years in both defense and offense, advocate not just for technical hardening, but for a “human sustainability” that is rare in the cybersecurity conversation.
As digital threats become more systemic and the stakes continue to rise, organizations of every size and sector will find lessons here. Whether it's building resilient teams, aligning security with business innovation, or setting new norms for transparency, Microsoft’s example—while not without its challenges—sets a formidable standard for cybersecurity leadership in the age of cloud, AI, and beyond.
For those navigating the critical intersection of technology and trust, the stories and strategies of Kumar Srinivasamurthy, Geoff Belknap, and Ann Johnson offer a blueprint. Not just for Microsoft, but for anyone seeking to thrive in an era where the stakes have never been higher, and the opportunities—if approached with intention and humanity—remain boundless.

Source: Microsoft Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity: Part 3 | Microsoft Security Blog