SlideShare a Scribd company logo
1 of 21
General
general
Government in Transformation: Cloud Powered Security,
Identity & Compliance
Cyber Security | Service Catalogue
Assessment
Services
Governance, Risk
& Compliance
Managed Security
Services
Microsoft
Security
Cloud Security Assessment
M365 Security Assessment
Vulnerability Assessment
Maturity & Gap Assessment
Penetration Testing
Web Application Testing
Wireless Security Testing
Phishing Testing
Maturity Assessment
ISO Implementation
ISO Certification Audit
ISO Internal Audit
Cloud Audit
SOC2 Certification Audit
24x7 Security Operation
Managed Security Services
Managed Azure Sentinel
Managed EDR/XDR
Managed Patching Service
Threat Hunting
M365 E5 Security
Data Classification & DLP
Defender for Endpoint
Defender for Identity
Defender for Cloud
Defender for Email
Endpoint Management
Microsoft Workshop
Architecture Review
Architecture Development
The technology landscape is constantly evolving, and with it, the
threat of information compromise. As the world becomes increasingly
digitized, the importance of cybersecurity in protecting our personal
and sensitive information becomes paramount. The need for robust
and dynamic cybersecurity measures has never been greater.
Governments
future
delivered
Today
The questions that (should)
worry the CISO
Changing landscape
• Do I have the right controls in place to prevent or
mitigate various types of cyber attacks?
• In this borderless Cloud world, with which
regulations and standards must my organization
comply?
• How can I secure my information and systems
across different environments?
• How can I simplify my security view? Am I using the
right solutions for my needs?
• How can I reduce the cost of all the security
products and services in my environment?
of employees say mobile busines
s apps change how they work
80%
of employees use non-approved
SaaS apps for work
41%
85%
of enterprise organizations keep s
ensitive information in the cloud
On-premises
Devices Apps
Identity Data
The security perimeter has changed
On-premises
The security perimeter has changed
On-premises
Cybersecurity Challenges
People
•Skills shortage
•Lack of senior management support
•Increasing Insider Threats
•Lack of awareness
Process
•No perceived value derived from security investments
•Security Architecture Flaws
•Myriad of compliance and regulatory requirements
•Disconnect between Information Security and GRC
structures
Technology
•Emergence of Disruptive Technologies
•Disparate point solutions that are not integrated
Other Factors
•Information Overload
•Highly resourced and skilled cyber criminals
•Limited investments in Information Security
The Journey is more Important than the Destination
Sentinel // Azure Automation // Advanced Threat Protection
How we work
Zero Trust Security with Azure
Identities
• Defender for DNS
• Azure Firewall
• Azure App Proxy
• VPN Gateway
• Front Door with
WAF
• App Gateway
• Defender for
Cloud
• Bastion
• Private Link / VPC
Peering
• Defender for
Servers
• Defender for
Container
• Defender for
Kubernetes
• Defender for M365
• Defender for
Cloud Apps
• Defender for
DevOps
• Azure Information
Protection P1/P2
• Purview
eDiscovery
• Defender for
Storage
• Defender for SQL
• Azure Purview
• Storage Encrypt
Sentinel // MS Cloud Security Benchmark // Azure Monitor
Azure AD Premium P1/P2 // Windows Hello, Credential Guard, & Direct Access // Defender for Identity
//Privileged Identity Manager
• Windows Autopilot
• Windows
AutoPatch
• Defender for
Endpoint P1/P2
• Intune
• Configuration
Manager
Automation &
orchestration
Visibility &
Analytics
** Based on US DoD Zero Trust Access Reference Architecture, and Microsoft Cybersecurity Reference Architecture
Governance
• Microsoft
Defender 365
• Privileged
Access
Management
• Customer
Lockbox
• Advanced Audit
• Records
Management
• Insider Risk
Management
• Information
Barriers
Perimeter Network
Compute /
Infrastructure
Application Data
User devices
w w w . p h a k a m o . c o . z a
About Us
 Managed Partner List
 Co-Sell Ready Partner
 Services Supplier
Phakamo believes Security & Enterprise Risk needs to be visioned with an
added dimension to counteract.
Phakamo believes Digital transformation & Security needs to be visioned with
an added dimension to counteract and thwart diverse attack vectors. No
longer is it sufficient to rely on traditional security defence mechanisms within
your infrastructure; with Phakamo you can count on our experience, expertise,
diverse knowledge and innovative solution offering to meet your business
objectives.
With Microsoft’s EMS, organisation will be empowered towards a resilient &
Compliant Security platform.
Information Protection and Governance Advanced Specialization
Identity and Access Management Advanced Specialization
Threat Protection Advance Specialization
Phakamo Intelligent Sec Ops & Analytics platform
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity & Compliance
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity & Compliance
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity & Compliance

More Related Content

Similar to Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity & Compliance

microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxGenericName6
 
Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Shahar Geiger Maor
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudAlert Logic
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alAlert Logic
 
Building a Secure and Compliant Azure Virtual Data Center
Building a Secure and Compliant Azure Virtual Data CenterBuilding a Secure and Compliant Azure Virtual Data Center
Building a Secure and Compliant Azure Virtual Data CenterPatrick Sklodowski
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureAbdul Khan
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Subscribed 2015: Architecture, Security, Scalability
Subscribed 2015: Architecture, Security, ScalabilitySubscribed 2015: Architecture, Security, Scalability
Subscribed 2015: Architecture, Security, ScalabilityZuora, Inc.
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud SecurityAlert Logic
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend MicroAWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend MicroAmazon Web Services
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Trupti Shiralkar, CISSP
 
Cloud security for financial services
Cloud security for financial servicesCloud security for financial services
Cloud security for financial servicesMoshe Ferber
 

Similar to Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity & Compliance (20)

microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
 
Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
 
Building a Secure and Compliant Azure Virtual Data Center
Building a Secure and Compliant Azure Virtual Data CenterBuilding a Secure and Compliant Azure Virtual Data Center
Building a Secure and Compliant Azure Virtual Data Center
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azure
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Subscribed 2015: Architecture, Security, Scalability
Subscribed 2015: Architecture, Security, ScalabilitySubscribed 2015: Architecture, Security, Scalability
Subscribed 2015: Architecture, Security, Scalability
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
CIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdfCIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdf
 
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend MicroAWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud security for financial services
Cloud security for financial servicesCloud security for financial services
Cloud security for financial services
 

More from itnewsafrica

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...itnewsafrica
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...itnewsafrica
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omniitnewsafrica
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023itnewsafrica
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retailitnewsafrica
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...itnewsafrica
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...itnewsafrica
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...itnewsafrica
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcareitnewsafrica
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcareitnewsafrica
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...itnewsafrica
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platformitnewsafrica
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Betteritnewsafrica
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...itnewsafrica
 

More from itnewsafrica (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omni
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retail
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcare
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcare
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platform
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Better
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity & Compliance

  • 1. General general Government in Transformation: Cloud Powered Security, Identity & Compliance
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Cyber Security | Service Catalogue Assessment Services Governance, Risk & Compliance Managed Security Services Microsoft Security Cloud Security Assessment M365 Security Assessment Vulnerability Assessment Maturity & Gap Assessment Penetration Testing Web Application Testing Wireless Security Testing Phishing Testing Maturity Assessment ISO Implementation ISO Certification Audit ISO Internal Audit Cloud Audit SOC2 Certification Audit 24x7 Security Operation Managed Security Services Managed Azure Sentinel Managed EDR/XDR Managed Patching Service Threat Hunting M365 E5 Security Data Classification & DLP Defender for Endpoint Defender for Identity Defender for Cloud Defender for Email Endpoint Management Microsoft Workshop Architecture Review Architecture Development
  • 8. The technology landscape is constantly evolving, and with it, the threat of information compromise. As the world becomes increasingly digitized, the importance of cybersecurity in protecting our personal and sensitive information becomes paramount. The need for robust and dynamic cybersecurity measures has never been greater.
  • 10. The questions that (should) worry the CISO Changing landscape • Do I have the right controls in place to prevent or mitigate various types of cyber attacks? • In this borderless Cloud world, with which regulations and standards must my organization comply? • How can I secure my information and systems across different environments? • How can I simplify my security view? Am I using the right solutions for my needs? • How can I reduce the cost of all the security products and services in my environment?
  • 11. of employees say mobile busines s apps change how they work 80% of employees use non-approved SaaS apps for work 41% 85% of enterprise organizations keep s ensitive information in the cloud On-premises
  • 12. Devices Apps Identity Data The security perimeter has changed On-premises
  • 13. The security perimeter has changed On-premises
  • 14. Cybersecurity Challenges People •Skills shortage •Lack of senior management support •Increasing Insider Threats •Lack of awareness Process •No perceived value derived from security investments •Security Architecture Flaws •Myriad of compliance and regulatory requirements •Disconnect between Information Security and GRC structures Technology •Emergence of Disruptive Technologies •Disparate point solutions that are not integrated Other Factors •Information Overload •Highly resourced and skilled cyber criminals •Limited investments in Information Security
  • 15. The Journey is more Important than the Destination
  • 16. Sentinel // Azure Automation // Advanced Threat Protection How we work Zero Trust Security with Azure Identities • Defender for DNS • Azure Firewall • Azure App Proxy • VPN Gateway • Front Door with WAF • App Gateway • Defender for Cloud • Bastion • Private Link / VPC Peering • Defender for Servers • Defender for Container • Defender for Kubernetes • Defender for M365 • Defender for Cloud Apps • Defender for DevOps • Azure Information Protection P1/P2 • Purview eDiscovery • Defender for Storage • Defender for SQL • Azure Purview • Storage Encrypt Sentinel // MS Cloud Security Benchmark // Azure Monitor Azure AD Premium P1/P2 // Windows Hello, Credential Guard, & Direct Access // Defender for Identity //Privileged Identity Manager • Windows Autopilot • Windows AutoPatch • Defender for Endpoint P1/P2 • Intune • Configuration Manager Automation & orchestration Visibility & Analytics ** Based on US DoD Zero Trust Access Reference Architecture, and Microsoft Cybersecurity Reference Architecture Governance • Microsoft Defender 365 • Privileged Access Management • Customer Lockbox • Advanced Audit • Records Management • Insider Risk Management • Information Barriers Perimeter Network Compute / Infrastructure Application Data User devices
  • 17. w w w . p h a k a m o . c o . z a About Us  Managed Partner List  Co-Sell Ready Partner  Services Supplier Phakamo believes Security & Enterprise Risk needs to be visioned with an added dimension to counteract. Phakamo believes Digital transformation & Security needs to be visioned with an added dimension to counteract and thwart diverse attack vectors. No longer is it sufficient to rely on traditional security defence mechanisms within your infrastructure; with Phakamo you can count on our experience, expertise, diverse knowledge and innovative solution offering to meet your business objectives. With Microsoft’s EMS, organisation will be empowered towards a resilient & Compliant Security platform. Information Protection and Governance Advanced Specialization Identity and Access Management Advanced Specialization Threat Protection Advance Specialization
  • 18. Phakamo Intelligent Sec Ops & Analytics platform

Editor's Notes

  1. Bring it home for ACSA around challenges and some of the challenges they may have
  2. The Phakamo Intelligent Security Operations & Analytics Platform is supported by a certified expert team as follows: 1. Certified Network Defenders 2. AZ 500 3. MS 500 4. Security + 5. Certified Information Security Manager 6. Certified Advanced Security Practitioner 7. Certified Ethical Hacker 8. Certified Information Systems Auditor This capability enables a service of high quality that marries security, compliance and risk management to drive clients' maturing security resilience.