《普华永道:2017年全球信息安全状况调查报告(30页).pdf》由会员分享,可在线阅读,更多相关《普华永道:2017年全球信息安全状况调查报告(30页).pdf(30页珍藏版)》请在三个皮匠报告上搜索。
1、 How businesses are embracing a modern approach to threat management and information sharing. Toward new possibilities in threat management Key findings from the Global State of Information Security Survey 2017 Table of contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2、. . . . . . . . . . . . . . . 2 Bold new combinations in the cloud . . . . . . . . . . . . . . . . . . . . . . . . . 5 Integrating key threat-management tools in the cloud . . . . . . . . . 7 Advanced authentication to catch phishers . . . . . . . . . . . . . . . . . . . 9 What cloud-based threat in
3、telligence looks like . . . . . . . . . . . . . . 13 The power of a centralized platform . . . . . . . . . . . . . . . . . . . . . . . . 14 Tapping into a network of information-sharing resources . . . . . . 16 How ISAOs improve prospects for information sharing . . . . . . . .20 A state of pioneeri
4、ng cybersecurity . . . . . . . . . . . . . . . . . . . . . . . . 22 Toward the future of threat intelligence . . . . . . . . . . . . . . . . . . . . . 23 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Contacts . . . . . . . . . . . . . . . . . .
5、. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Key findings from The Global State of Information Security Survey 2017 2016 PwCB Today, most business leaders know that they are responsible for cybersecurity and privacy threats, wherever they occur in disparate enterprise systems. What m
6、any do not understand is how to design, implement and manage a real-time threat-intelligence and information-sharing program. They are not alone. An integrated threat-intelligence and information-sharing platform can be a great unknown for even the most cybersavvy of executives. Threat management is