Kabelo Sekele, Executive Director Strategy & New Business Development and Partnerships at Phakamo Tech delivered a presentation on Government in Transformation: Cloud Powered Security, Identity & Compliance at Public Sector Cybersecurity Summit 2023 on the 3rd of October 2023. #PublicSec2023 #Conference #Cybersecurity #PublicSector
7. Cyber Security | Service Catalogue
Assessment
Services
Governance, Risk
& Compliance
Managed Security
Services
Microsoft
Security
Cloud Security Assessment
M365 Security Assessment
Vulnerability Assessment
Maturity & Gap Assessment
Penetration Testing
Web Application Testing
Wireless Security Testing
Phishing Testing
Maturity Assessment
ISO Implementation
ISO Certification Audit
ISO Internal Audit
Cloud Audit
SOC2 Certification Audit
24x7 Security Operation
Managed Security Services
Managed Azure Sentinel
Managed EDR/XDR
Managed Patching Service
Threat Hunting
M365 E5 Security
Data Classification & DLP
Defender for Endpoint
Defender for Identity
Defender for Cloud
Defender for Email
Endpoint Management
Microsoft Workshop
Architecture Review
Architecture Development
8. The technology landscape is constantly evolving, and with it, the
threat of information compromise. As the world becomes increasingly
digitized, the importance of cybersecurity in protecting our personal
and sensitive information becomes paramount. The need for robust
and dynamic cybersecurity measures has never been greater.
10. The questions that (should)
worry the CISO
Changing landscape
• Do I have the right controls in place to prevent or
mitigate various types of cyber attacks?
• In this borderless Cloud world, with which
regulations and standards must my organization
comply?
• How can I secure my information and systems
across different environments?
• How can I simplify my security view? Am I using the
right solutions for my needs?
• How can I reduce the cost of all the security
products and services in my environment?
11. of employees say mobile busines
s apps change how they work
80%
of employees use non-approved
SaaS apps for work
41%
85%
of enterprise organizations keep s
ensitive information in the cloud
On-premises
14. Cybersecurity Challenges
People
•Skills shortage
•Lack of senior management support
•Increasing Insider Threats
•Lack of awareness
Process
•No perceived value derived from security investments
•Security Architecture Flaws
•Myriad of compliance and regulatory requirements
•Disconnect between Information Security and GRC
structures
Technology
•Emergence of Disruptive Technologies
•Disparate point solutions that are not integrated
Other Factors
•Information Overload
•Highly resourced and skilled cyber criminals
•Limited investments in Information Security
16. Sentinel // Azure Automation // Advanced Threat Protection
How we work
Zero Trust Security with Azure
Identities
• Defender for DNS
• Azure Firewall
• Azure App Proxy
• VPN Gateway
• Front Door with
WAF
• App Gateway
• Defender for
Cloud
• Bastion
• Private Link / VPC
Peering
• Defender for
Servers
• Defender for
Container
• Defender for
Kubernetes
• Defender for M365
• Defender for
Cloud Apps
• Defender for
DevOps
• Azure Information
Protection P1/P2
• Purview
eDiscovery
• Defender for
Storage
• Defender for SQL
• Azure Purview
• Storage Encrypt
Sentinel // MS Cloud Security Benchmark // Azure Monitor
Azure AD Premium P1/P2 // Windows Hello, Credential Guard, & Direct Access // Defender for Identity
//Privileged Identity Manager
• Windows Autopilot
• Windows
AutoPatch
• Defender for
Endpoint P1/P2
• Intune
• Configuration
Manager
Automation &
orchestration
Visibility &
Analytics
** Based on US DoD Zero Trust Access Reference Architecture, and Microsoft Cybersecurity Reference Architecture
Governance
• Microsoft
Defender 365
• Privileged
Access
Management
• Customer
Lockbox
• Advanced Audit
• Records
Management
• Insider Risk
Management
• Information
Barriers
Perimeter Network
Compute /
Infrastructure
Application Data
User devices
17. w w w . p h a k a m o . c o . z a
About Us
Managed Partner List
Co-Sell Ready Partner
Services Supplier
Phakamo believes Security & Enterprise Risk needs to be visioned with an
added dimension to counteract.
Phakamo believes Digital transformation & Security needs to be visioned with
an added dimension to counteract and thwart diverse attack vectors. No
longer is it sufficient to rely on traditional security defence mechanisms within
your infrastructure; with Phakamo you can count on our experience, expertise,
diverse knowledge and innovative solution offering to meet your business
objectives.
With Microsoft’s EMS, organisation will be empowered towards a resilient &
Compliant Security platform.
Information Protection and Governance Advanced Specialization
Identity and Access Management Advanced Specialization
Threat Protection Advance Specialization
Bring it home for ACSA around challenges and some of the challenges they may have
The Phakamo Intelligent Security Operations & Analytics Platform is supported by a certified expert team as follows:
1. Certified Network Defenders
2. AZ 500
3. MS 500
4. Security +
5. Certified Information Security Manager
6. Certified Advanced Security Practitioner
7. Certified Ethical Hacker
8. Certified Information Systems Auditor
This capability enables a service of high quality that marries security, compliance and risk management to drive clients' maturing security resilience.