Table of contents Introduction ............................................2 Bold new combinations in the cloud .........................5 Integrating key threat-management tools in the cloud .........7 Advanced authentication to catch phishers ...................9 What cloud-based threat intelligence looks like ..............13 The power of a centralized platform ........................14 Tapping into a network of information-sharing resources ......16 How ISAOs improve prospects for information sharing . . . . . . . .20 A state of pioneering cybersecurity ........................22 Toward the future of threat intelligence .....................23 Methodology ...........................................24 Contacts ...............................................25 B Key findings from The Global State of Information Security® Survey 2017 © 2016 PwC

Toward new possibilities in threat management - Page 2 Toward new possibilities in threat management Page 1 Page 3