To do so, the centralized solution leverages scalable machine learning techniques and enterprise-class cloud technology to rapidly aggregate and analyze enormous volumes of structured and unstructured data. It correlates this data with a massive global database of threat intelligence to identify threats in real time and prioritize responses based on impact to the business. The Secure Terrain™ solution is supported by PwC’s global Terrain Operations Centers (TOCs), which provide security monitoring and support that go beyond the alerts, including hunt team analysis, threat research and remediation. PwC has also addressed the other aspect of the challenge: an integrated threat-sharing platform, called Terrain Intelligence, that aggregates threat intelligence sources into a single, searchable location. The use of Google’s data centers and high-speed global fiber backbone allows for almost instantaneous analysis and correlation of indicators of compromise—which can provide an invaluable time advantage when businesses are in the thick of managing cybersecurity incidents. The power of a centralized platform The architectural and operating advantages of the cloud model enable service providers to deliver powerful, centralized threat management and information sharing. An integrated cloud solution has the compute and storage capability to ingest and analyze open and closed data, as well as commercial sources of threat indicators. It also has the horsepower to monitor enterprise-wide network and user data for unusual activity to detect potentially dangerous, but previously unknown, anomalies. To yield maximum value, threat intelligence must be actionable. That means the information must be appropriately prioritized, highly accurate and meaningful to the business—and delivered in real time. When actionable intelligence is shared, it can enhance the defenses of an individual business and ultimately improve the defense of an entire ecosystem, be it an industry, peer group or a geographically oriented organization. 14 Key findings from The Global State of Information Security® Survey 2017 © 2016 PwC

Toward new possibilities in threat management - Page 15 Toward new possibilities in threat management Page 14 Page 16