Few capabilities are more fundamental to proactive threat intelligence than real-time monitoring and analytics. This year, more than half (51%) of respondents say they actively monitor and analyze threat intelligence to help detect risks and incidents. Businesses have traditionally focused on internal information such as log files and access activity. But recently the cybersecurity and privacy capabilities of external business partners became a priority after several high-profile breaches were attributed to the compromise of vendors’ systems. As the scope of monitoring and analytics expands, solutions should include capabilities to ingest and interpret raw data to provide contextual awareness of threats and an understanding of the tactics, techniques and procedures of adversaries. When analytics and threat intelligence are synthesized in the cloud, it becomes possible to create a single source of enterprise-wide data that is seamlessly correlated, can be quickly searched and can be managed in real time. 8 Key findings from The Global State of Information Security® Survey 2017 © 2016 PwC
