{"id":104489,"date":"2025-03-17T06:43:00","date_gmt":"2025-03-17T06:43:00","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/?p=104489"},"modified":"2025-03-23T14:38:17","modified_gmt":"2025-03-23T14:38:17","slug":"sarah-armstrong-smith-microsoft-from-the-millennium-bug","status":"publish","type":"post","link":"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/","title":{"rendered":"Sarah Armstrong-Smith, Microsoft: From the Millennium Bug to the latest cyber threats"},"content":{"rendered":"\n<p>Sarah Armstrong-Smith has built a career on risk management, resilience, and staying ahead of evolving cyber threats. As a leading cybersecurity speaker and chief security adviser at Microsoft Europe, she has spent more than two decades helping businesses navigate digital transformation while strengthening their security posture. We spoke with Sarah to explore the biggest cybersecurity challenges facing businesses today, the role of resilience in a digital world, and how organisations can foster greater inclusivity in tech.<\/p>\n\n\n\n<p><strong>What first sparked your interest in cybersecurity, data protection and digital transformation? And how did your journey in the field begin?<\/strong><\/p>\n\n\n\n<p>I&#8217;ve been working in the technology environment for more than 20 years now, and I trace this back to 1999. I was actually working for a water utility company during the Millennium Bug in 2000. Many companies were on large transformation programs to recode a lot of their computers and servers because the theory was that, at the stroke of midnight, a number of computers and servers would go into meltdown due to the way the Year 2000 was coded into various systems.<\/p>\n\n\n\n<p>From a young age I&#8217;ve always been driven to keep asking \u2018why\u2019 and abundant questions. What if the systems go down? What if we can&#8217;t get people to work? What if all of these things happen? At the time, I didn\u2019t realise I was looking at business continuity. It just felt like common sense to keep asking these questions. That was the start of my career.<\/p>\n\n\n\n<p>I always look at that moment as the point where my career began. From business continuity, I then pivoted over the next 20 years into disaster recovery, cybersecurity, fraud, crisis management, and all of that falls under the banner of resilience. That\u2019s how my career has evolved, and it&#8217;s been fantastic.<\/p>\n\n\n\n<p><strong>Diversity in the workplace is crucial for innovation and progress. From your perspective, what more can be done to foster gender diversity and inclusion in business, particularly in tech and cybersecurity?<\/strong><\/p>\n\n\n\n<p>We need people who can think outside the box, and that\u2019s why diversity is so important. It\u2019s not just about gender; it\u2019s about diversity of background, experience, and culture. Inclusion is about removing false barriers &#8211; like the idea that tech is only for men or that you need to be highly technical to work in cybersecurity. That\u2019s not true.<\/p>\n\n\n\n<p>We also need to rethink how we support young people. Expecting them to decide their career path so early is unrealistic. People should try different things, pivot through their careers, and that should be encouraged. Life expectancy is increasing, meaning careers will be longer.<\/p>\n\n\n\n<p>People will take breaks, start families, and shift industries. It\u2019s about enabling flexibility and options.<\/p>\n\n\n\n<p><strong>Reflecting on your experience with the Millennium Bug, what key lessons did you take away from managing such a significant potential threat?<\/strong><\/p>\n\n\n\n<p>I think having a background in business continuity has enabled me to think about the big picture. I was always thinking about worst-case scenarios &#8211; what is the worst thing that could happen? But we also need to think more broadly. We need to consider incidents that are not just relevant to our own company but those that impact cross-sector and even global changes.<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/sarah-armstrong-smith.png\" alt=\"\" class=\"wp-image-104493 lazyload\" style=\"width:454px;height:auto\"\/><noscript><img fetchpriority=\"high\" decoding=\"async\" width=\"680\" height=\"373\" src=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/sarah-armstrong-smith.png\" alt=\"\" class=\"wp-image-104493 lazyload\" style=\"width:454px;height:auto\" srcset=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/sarah-armstrong-smith.png 680w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/sarah-armstrong-smith-300x165.png 300w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/><\/noscript><\/figure>\n\n\n\n<p>I think back to 9\/11 as a really good example of a major incident on a massive scale that we probably never saw before. The way it was televised and the shock that came with it really brought home the impact of terrorism and how important business continuity is at that kind of scale.<\/p>\n\n\n\n<p>Bringing that forward to now, the global pandemic has really emphasised how interconnected and dependent we all are. That applies to small businesses as well as large enterprises. When we consider these threats, it&#8217;s not just about business continuity but also cybersecurity and attacks. We have to think holistically, much wider. This is where resilience to all of these types of threats comes to the forefront.<\/p>\n\n\n\n<p><strong>The media plays a powerful role in shaping public perception of threats. Do you think the Millennium Bug was exaggerated by the media, and how can we ensure accurate reporting on cybersecurity risks today?<\/strong><\/p>\n\n\n\n<p>Potentially. Sometimes the media can really help, but they can also hinder. The problem is scaremongering, blowing things out of proportion. People have a tendency to believe what they read on the internet without fact-checking, and that has become more difficult due to the number of information sources available.<\/p>\n\n\n\n<p>Where do you go to get factual information? People read things on social media &#8211; Facebook, Twitter &#8211; and it\u2019s really hard to decipher fact from fiction. The media can sometimes blow things out of proportion. It\u2019s important to find the right sources of information and utilise intelligence to cut through the noise and get real, actionable insights.<\/p>\n\n\n\n<p><strong>Since stepping into your role as chief security adviser at Microsoft Europe in 2020, what has been your proudest achievement, especially given the challenges of a rapidly evolving digital landscape?<\/strong><\/p>\n\n\n\n<p>I actually joined Microsoft one week after the UK went into lockdown. So, my entire Microsoft career to date has been from this very office. It\u2019s been interesting to be in the middle of a global pandemic, joining a new company, but also seeing the inner workings of Microsoft.<\/p>\n\n\n\n<p>Microsoft is a massive organisation with more than 160,000 employees worldwide. Beyond keeping the company running, we also had to ensure our customers were operational. There was also the massive acceleration to the cloud, particularly collaboration tools like Teams.<\/p>\n\n\n\n<p>It was incredible to see how Microsoft rose to the occasion, supporting customers and new users. In my role, I work with strategic and major customers across Europe, acting as an executive sponsor across different sectors. It allows me to understand their challenges, especially around cloud adoption and digital transformation.<\/p>\n\n\n\n<p>No matter how bad things get &#8211; and we\u2019ve had major crises over the years &#8211; I always focus on opportunities. What can we learn? What can we do better? That\u2019s why I\u2019m proud to work at Microsoft.<\/p>\n\n\n\n<p><strong>With cyber threats constantly evolving, what do you see as the biggest risk businesses face today, and what essential steps should they take to strengthen their security?<\/strong><\/p>\n\n\n\n<p>Cybercriminals are opportunistic and thrive in a crisis. Over the last 12\u201318 months, we\u2019ve seen a massive increase in phishing attacks preying on people\u2019s fears and emotions. Attackers pretend to be your bank, a charity, or an organisation offering support. They try to trick you into giving up credentials or clicking malicious links.<\/p>\n\n\n\n<p>We\u2019ve also seen a rise in ransomware attacks, particularly targeting healthcare and critical infrastructure. It was shocking to us that during a pandemic, attackers still targeted hospitals and emergency services because they believed those institutions would be more likely to pay.<\/p>\n\n\n\n<p>Businesses need to adopt an \u2018assume compromise\u2019 mindset. No matter how strong your cybersecurity is, attackers will try to find a way in. The focus should be on preparedness: what happens if someone accesses your systems? If your data is leaked, what\u2019s the impact? Where should you prioritise your security efforts?<\/p>\n\n\n\n<p>Cybersecurity isn\u2019t just about defences &#8211; it\u2019s also about crisis response. If your network goes down, can your business revert to manual processes? How do you communicate with customers and partners? The response strategy is just as important as prevention.<\/p>\n\n\n\n<p><strong>Looking back on your career, what is one piece of advice you would give to your younger self, or to anyone aspiring to build a career in tech and cybersecurity?<\/strong><\/p>\n\n\n\n<p>Don\u2019t be afraid to keep pushing yourself forward. When I was younger, I had a habit of volunteering for things I didn\u2019t fully understand, but it always led to growth. People hesitate to apply for roles if they don\u2019t meet 100% of the requirements &#8211; but you don\u2019t have to know everything. You learn on the job.<\/p>\n\n\n\n<p>I never planned to work in tech. I originally wanted to be a graphic designer because I loved art. Careers aren\u2019t linear, and that\u2019s okay. Just take opportunities, keep learning, and enjoy the journey.<\/p>\n\n\n\n<p>Photo by <a href=\"https:\/\/unsplash.com\/@edhardie?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash\">Ed Hardie<\/a> on <a href=\"https:\/\/unsplash.com\/photos\/a-close-up-of-a-cell-phone-with-icons-on-it-xG02JzIBf7o?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash\">Unsplash<\/a>, and <a href=\"https:\/\/champions-speakers.co.uk\/\">Champions Speakers<\/a>.<\/p>\n\n\n\n<p>This interview with <a href=\"https:\/\/champions-speakers.co.uk\/speaker-agent\/sarah-armstrong-smith\">Sarah Armstrong-Smith<\/a> was conducted by <a href=\"https:\/\/champions-speakers.co.uk\/news\/author\/mark-matthews\">Mark Matthews<\/a>.<\/p>\n\n\n\n<p><strong><em>Want to learn more about cybersecurity and the cloud from industry leaders? Check out&nbsp;<a target=\"_blank\" href=\"https:\/\/www.cybersecuritycloudexpo.com\/\" rel=\"noreferrer noopener\">Cyber Security &amp; Cloud Expo<\/a>&nbsp;taking place in Amsterdam, California, and London.<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>Explore other upcoming enterprise technology events and webinars powered by TechForge&nbsp;<a target=\"_blank\" href=\"https:\/\/techforge.pub\/events\/\" rel=\"noreferrer noopener\">here<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sarah Armstrong-Smith has built a career on risk management, resilience, and staying ahead of evolving cyber threats. As a leading cybersecurity speaker and chief security adviser at Microsoft Europe, she has spent more than two decades helping businesses navigate digital transformation while strengthening their security posture. We spoke with Sarah to explore the biggest cybersecurity [&hellip;]<\/p>\n","protected":false},"author":57372,"featured_media":104495,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,497,1969,48,3],"tags":[185,232],"ppma_author":[882],"class_list":["post-104489","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing","category-cloud-computing-companies","category-interviews","category-cloud-computing-microsoft","category-cloud-computing-security","tag-cybersecurity","tag-microsoft"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.9 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sarah Armstrong-Smith, Microsoft: From the Millennium Bug to the latest cyber threats<\/title>\n<meta name=\"description\" content=\"Microsoft&#039;s Sarah Armstrong-Smith explores the biggest cybersecurity challenges facing businesses today, the role of resilience in a digital world, and how organisations can foster greater inclusivity in tech.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sarah Armstrong-Smith, Microsoft: From the Millennium Bug to the latest cyber threats\" \/>\n<meta property=\"og:description\" content=\"Microsoft&#039;s Sarah Armstrong-Smith explores the biggest cybersecurity challenges facing businesses today, the role of resilience in a digital world, and how organisations can foster greater inclusivity in tech.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/\" \/>\n<meta property=\"og:site_name\" content=\"Cloud Computing News\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/CT\/210614738995040\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-17T06:43:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-23T14:38:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/ed-hardie-xG02JzIBf7o-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1279\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Duncan MacRae\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cloud_comp_news\" \/>\n<meta name=\"twitter:site\" content=\"@cloud_comp_news\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Duncan MacRae\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/\"},\"author\":{\"name\":\"Duncan MacRae\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/1579de5d21ad7a9b5d437a2b642cf870\"},\"headline\":\"Sarah Armstrong-Smith, Microsoft: From the Millennium Bug to the latest cyber threats\",\"datePublished\":\"2025-03-17T06:43:00+00:00\",\"dateModified\":\"2025-03-23T14:38:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/\"},\"wordCount\":1425,\"publisher\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/ed-hardie-xG02JzIBf7o-unsplash.jpg\",\"keywords\":[\"cybersecurity\",\"microsoft\"],\"articleSection\":[\"Cloud Computing\",\"Companies\",\"Interviews\",\"Microsoft\",\"Security\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/\",\"name\":\"Sarah Armstrong-Smith, Microsoft: From the Millennium Bug to the latest cyber threats\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/ed-hardie-xG02JzIBf7o-unsplash.jpg\",\"datePublished\":\"2025-03-17T06:43:00+00:00\",\"dateModified\":\"2025-03-23T14:38:17+00:00\",\"description\":\"Microsoft's Sarah Armstrong-Smith explores the biggest cybersecurity challenges facing businesses today, the role of resilience in a digital world, and how organisations can foster greater inclusivity in tech.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/#primaryimage\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/ed-hardie-xG02JzIBf7o-unsplash.jpg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/ed-hardie-xG02JzIBf7o-unsplash.jpg\",\"width\":1920,\"height\":1279},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cloudcomputing-news.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sarah Armstrong-Smith, Microsoft: From the Millennium Bug to the latest cyber threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#website\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/\",\"name\":\"Cloud Computing News\",\"description\":\"IaaS, SaaS, PaaS, Data Security, CIO, Analysis\",\"publisher\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cloudcomputing-news.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\",\"name\":\"Cloud Computing News\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg\",\"width\":1920,\"height\":1080,\"caption\":\"Cloud Computing News\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/pages\/CT\/210614738995040\",\"https:\/\/x.com\/cloud_comp_news\",\"https:\/\/www.linkedin.com\/groups\/45151\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/1579de5d21ad7a9b5d437a2b642cf870\",\"name\":\"Duncan MacRae\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/image\/895f18375558aad26b5923eae11cf44f\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg\",\"caption\":\"Duncan MacRae\"},\"description\":\"Duncan is an award-winning technology industry analyst, specialising in cloud computing, blockchain, martech and edge computing.\",\"sameAs\":[\"duncan@techforge.pub\"],\"url\":\"https:\/\/www.cloudcomputing-news.net\/news\/author\/duncan1\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Sarah Armstrong-Smith, Microsoft: From the Millennium Bug to the latest cyber threats","description":"Microsoft's Sarah Armstrong-Smith explores the biggest cybersecurity challenges facing businesses today, the role of resilience in a digital world, and how organisations can foster greater inclusivity in tech.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/","og_locale":"en_GB","og_type":"article","og_title":"Sarah Armstrong-Smith, Microsoft: From the Millennium Bug to the latest cyber threats","og_description":"Microsoft's Sarah Armstrong-Smith explores the biggest cybersecurity challenges facing businesses today, the role of resilience in a digital world, and how organisations can foster greater inclusivity in tech.","og_url":"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/","og_site_name":"Cloud Computing News","article_publisher":"https:\/\/www.facebook.com\/pages\/CT\/210614738995040","article_published_time":"2025-03-17T06:43:00+00:00","article_modified_time":"2025-03-23T14:38:17+00:00","og_image":[{"width":1920,"height":1279,"url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/ed-hardie-xG02JzIBf7o-unsplash.jpg","type":"image\/jpeg"}],"author":"Duncan MacRae","twitter_card":"summary_large_image","twitter_creator":"@cloud_comp_news","twitter_site":"@cloud_comp_news","twitter_misc":{"Written by":"Duncan MacRae","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/#article","isPartOf":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/"},"author":{"name":"Duncan MacRae","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/1579de5d21ad7a9b5d437a2b642cf870"},"headline":"Sarah Armstrong-Smith, Microsoft: From the Millennium Bug to the latest cyber threats","datePublished":"2025-03-17T06:43:00+00:00","dateModified":"2025-03-23T14:38:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/"},"wordCount":1425,"publisher":{"@id":"https:\/\/www.cloudcomputing-news.net\/#organization"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/ed-hardie-xG02JzIBf7o-unsplash.jpg","keywords":["cybersecurity","microsoft"],"articleSection":["Cloud Computing","Companies","Interviews","Microsoft","Security"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/","url":"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/","name":"Sarah Armstrong-Smith, Microsoft: From the Millennium Bug to the latest cyber threats","isPartOf":{"@id":"https:\/\/www.cloudcomputing-news.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/#primaryimage"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/ed-hardie-xG02JzIBf7o-unsplash.jpg","datePublished":"2025-03-17T06:43:00+00:00","dateModified":"2025-03-23T14:38:17+00:00","description":"Microsoft's Sarah Armstrong-Smith explores the biggest cybersecurity challenges facing businesses today, the role of resilience in a digital world, and how organisations can foster greater inclusivity in tech.","breadcrumb":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/#primaryimage","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/ed-hardie-xG02JzIBf7o-unsplash.jpg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/ed-hardie-xG02JzIBf7o-unsplash.jpg","width":1920,"height":1279},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudcomputing-news.net\/news\/sarah-armstrong-smith-microsoft-from-the-millennium-bug\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudcomputing-news.net\/"},{"@type":"ListItem","position":2,"name":"Sarah Armstrong-Smith, Microsoft: From the Millennium Bug to the latest cyber threats"}]},{"@type":"WebSite","@id":"https:\/\/www.cloudcomputing-news.net\/#website","url":"https:\/\/www.cloudcomputing-news.net\/","name":"Cloud Computing News","description":"IaaS, SaaS, PaaS, Data Security, CIO, Analysis","publisher":{"@id":"https:\/\/www.cloudcomputing-news.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudcomputing-news.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.cloudcomputing-news.net\/#organization","name":"Cloud Computing News","url":"https:\/\/www.cloudcomputing-news.net\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg","width":1920,"height":1080,"caption":"Cloud Computing News"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/CT\/210614738995040","https:\/\/x.com\/cloud_comp_news","https:\/\/www.linkedin.com\/groups\/45151\/"]},{"@type":"Person","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/1579de5d21ad7a9b5d437a2b642cf870","name":"Duncan MacRae","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/image\/895f18375558aad26b5923eae11cf44f","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg","caption":"Duncan MacRae"},"description":"Duncan is an award-winning technology industry analyst, specialising in cloud computing, blockchain, martech and edge computing.","sameAs":["duncan@techforge.pub"],"url":"https:\/\/www.cloudcomputing-news.net\/news\/author\/duncan1\/"}]}},"authors":[{"term_id":882,"user_id":0,"is_guest":1,"slug":"duncan1","display_name":"Duncan MacRae","avatar_url":{"url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg","url2x":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg"},"author_category":"","user_url":"","last_name":"MacRae","first_name":"Duncan","job_title":"Editor-in-Chief","description":"Duncan is an award-winning technology industry analyst, specialising in cloud computing, blockchain, martech and edge computing."}],"_links":{"self":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts\/104489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/users\/57372"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/comments?post=104489"}],"version-history":[{"count":0,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts\/104489\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/media\/104495"}],"wp:attachment":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/media?parent=104489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/categories?post=104489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/tags?post=104489"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/ppma_author?post=104489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}