Compromised Assessment & Threat Hunting: 6 Weeks

Phakamo Holdings (Pty) Ltd

We provide a team of certified cybersecurity threat hunters, leveraging Microsoft Security Arsenal, to detect threat activity across a client's environment and advising on maturing security controls.

The aim is to outsmart attackers, leveraging our extensive experience and investigative techniques to look for signs of a compromise in conjunction with our IT GRC expertise, providing visibility to the client's level of exposure, the presence of existing threats and the risk associated to business digital assets.

Our Approach: Week 1: Understand actual threat reality - we will undertake a compromise assessment and threat hunting across the client's digital landscape, leveraging existing Microsoft / Azure security solutions. Week 2: Understand where to strengthen the organisation's security - we will undertake an ISMS questionnaire with the client to better understand the security objectives of the client against the security controls deployed from a Microsoft perspective. week 3 - 4: Advise on what Azure Security investment capability to make or leverage - Provide an architecture overview of how the Microsoft's Azure security capabilities can empower the client's security resilience. Week 5: Provide recommendations towards a trusted and compliant digital landscape - Provide a security program that would enable the achievement of the set objectives by the client leveraging Azure Security solutions. week 6: Provide a continuous threat detection and response management maturity roadmap.

The outcome of this assessment is to:

  1. Empower clients to enhance their adoption and drive of a multitude of Azure workloads, as a basis of providing the necessary cyber risk confidence that business requires in order to sponsor and own the digital transformation journey.

  2. Provide an Azure Cloud Security Maturity Roadmap that will be a formal directive for the client's Cloud resilience, addressing Data Governance, Threat Management, Compliance and Risk Management.

https://store-images.s-microsoft.com/image/apps.25.215df2d4-f046-432c-9fc2-a5e031a46f25.119a3e67-8159-47d1-b3fe-13d68f654a64.a0804a6e-eb5b-4d3a-9893-72ae8f73f5f9
https://store-images.s-microsoft.com/image/apps.25.215df2d4-f046-432c-9fc2-a5e031a46f25.119a3e67-8159-47d1-b3fe-13d68f654a64.a0804a6e-eb5b-4d3a-9893-72ae8f73f5f9
https://store-images.s-microsoft.com/image/apps.62481.215df2d4-f046-432c-9fc2-a5e031a46f25.119a3e67-8159-47d1-b3fe-13d68f654a64.8ca74f29-1843-4c48-b264-b90fa9563b80
https://store-images.s-microsoft.com/image/apps.43902.215df2d4-f046-432c-9fc2-a5e031a46f25.119a3e67-8159-47d1-b3fe-13d68f654a64.c2986285-0c81-4adf-aec0-7c38de73ea7f
https://store-images.s-microsoft.com/image/apps.52906.215df2d4-f046-432c-9fc2-a5e031a46f25.add61b36-ca3d-4899-8c90-14e61d69b1dc.170ff21c-085f-4452-8407-3dabfa4cb64d
https://store-images.s-microsoft.com/image/apps.26047.215df2d4-f046-432c-9fc2-a5e031a46f25.add61b36-ca3d-4899-8c90-14e61d69b1dc.ea6202b6-9158-477f-a3fe-edccf5019cd1