PwC reimagining fusion center powered by Amazon Security Lake

Switch on possibility.

PwC’s Cyber, Risk, and Regulatory Practice brings knowledge and expertise to aid clients in implementing the fusion center to meet their individual needs. Built on AWS, the fusion center provides the ability to combine data from a variety of sources to create a centralized, near real-time view. The dashboard features visualizations, drill-down capabilities, and automated workflows, enabling teams to quickly identify, investigate, and respond to potential risks posed by the ever evolving threat actors.

Fusion center is a cutting edge customizable and scalable architecture composed of multiple layers that work together to connect, secure, and safeguard an organization's environment. This architecture can provide an organization the ability to leverage the capabilities of AWS security lake to monitor, respond, and recover from cyber, compliance, and fraud events in a more effective and efficient manner harnessing the power of AI/ML.

Playback of this video is not currently available

1:48

Reimagining fusion center powered by Amazon Security Lake

The time has come for fraud and cybersecurity teams to unite, thanks to PwC's cyber fraud fusion center, powered by AWS. Together, they achieve a common goal — keeping your organization safe.

Explore our fusion center modules

Learn more about how the fusion center helps connect, secure and safeguard an organization's environment.

{{filterContent.facetedTitle}}

{{contentList.loadingText}}

Example architecture of the fusion center built on AWS Security Lake

The fusion layer breakdown

Centralized interface

A singular dashboard provides a centralized place that visualizes the moving parts across the organization. The consolidated view allows users to visualize alerts, reports and trends across their tool stack enabling more visibility.

Centralized management

Centralized management enables users to build policies and posture, and configure standards with ongoing verification, all while remaining compliant. This layer works to inform the intelligence layer of policy and compliance requirements.

Security analytics and intelligence

The “brain” of the architecture. Its key capabilities ingest signals from products and data sources. It then analyzes them using a risk-based matrix and ML models to derive decision points and prioritize them for action.

OCSF normalization

The normalization layer transforms the data from different product points into the Open Cybersecurity Schema Framework (OCSF) format. This enables the client architecture to be treated as though it came from a singular source.

Client digital estate

Products and assets vary to support the unique client environment and are inclusive of use cases and technology from across cybersecurity and fraud. The Identity Fabric Dynamic Context is a distributed identity framework that frees IAM functions from traditional silos. This layer includes all of the source data.

Evolving and modernizing fusion centers

From disparate data
Where disparate data sources and platforms result in increased manual workloads for security, compliance, and fraud analysts to collect and analyze data.

To fused visibility 
Cyber, compliance, controls, and fraud data fused together, in a single pane of glass, to enhance ability to help prevent or detect malicious activity and reduce false positives.

From operational inefficiencies
There are opportunities for the cyber, compliance, and fraud teams to collaborate and share data to improve prevention and detection of malicious activities and reduce false positives.

To rapid response and recovery
The fusion center provides the ability for the cyber, fraud, compliance, controls teams to seamlessly collaborate, enhance communication, and reduce swivel chair activities to enable real-time response and recovery.

From voluminous and outdated technology
Many companies have numerous cyber security tools and fraud solutions in their environment that need to evolve to keep pace with the sophistication of the threat actors.

To advanced technology
Use of modern technology (Amazon Security Lake, ML, AI) to provide greater abilities to help prevent or detect malicious activity and focus efforts on value added activities. The technology advances can also provide the opportunity to implement auto response and “self healing” capabilities.

PwC and AWS: Switch on possibility.

We bring a multi-disciplinary team across the globe, with unparalleled depth and breadth of services, talent and relationships.

Learn more

Meet the team

Prakash Venkata

Principal, PwC US

Email

Jason Stauffenecker

Principal, Cybersecurity & Privacy, PwC US

Email

Alex Cherones

Managing Director, Cybersecurity, Privacy and Forensics, PwC US

Email

Required fields are marked with an asterisk(*)

By submitting your email address, you acknowledge that you have read the Privacy Statement and that you consent to our processing data in accordance with the Privacy Statement (including international transfers). If you change your mind at any time about wishing to receive the information from us, you can send us an email message using the Contact Us page.

Hide