The Cyber Resilience Compass 2025

Page 17 of 26 · WEF_The_Cyber_Resilience_Compass_2025.pdf

–CISOs and technical teams evaluate tools to assess their effectiveness in achieving the desired outcomes and to ensure the best fit for the organization’s needs. This includes understanding case studies of similar organizations and conducting regular value assessments. Most experts acknowledged progress has been made in raising cyber hygiene, but several pointed out that basic practices were still not being implemented universally. Others highlighted the challenge of technical debt – systems and architectures that are no longer supported or lack mitigations to prevent incidents from propagating. Just as risk-owners may not fully understand the technology behind their critical business services, technical teams sometimes fail to grasp the business priorities of the front-line operations they are intended to support. Investments in technical controls are not always aligned with the most relevant risks to the business. We are thinking about potential disruptions when designing our systems. We take the premise that everything that can go wrong will go wrong, so we prepare our systems to withstand multiple points of failure and avoid single points of failure. Deryck Mitchelson, Global Chief Information Security Officer, Check Point Software I try to analyse the major attacks that occur both in the financial as well as other industries to understand the attack tactics and exploits, and if my controls would have failed in that situation to learn from it. Jeff Farinich, Senior Vice-President, Technology Services; Chief Information Security Officer, New American Funding Building a security operations centre (SOC) is a complex endeavour that requires the balancing of speed, efficiency and quality in threat detection and response. Building a SOC comes with challenges such as ensuring an outcome- driven approach rather than a tool-centric one, maintaining scalability and standardization across operations, managing resource limitations and integrating emerging technologies while ensuring interoperability and effectiveness. Splunk’s approach to SOC operations addresses these challenges by focusing on quality and operational outcomes rather than simply resolving tickets quickly or deploying the latest security tools. This encompasses: –Data-driven decision-making: Splunk ensures technology investments align with security outcomes, enhancing detection, response and resilience. –Automation for efficiency: Automated processes reduce human error, ensure consistent responses and allow analysts to focus on higher-level tasks. –Improved detection and response: Splunk achieves detection times of less than seven minutes for critical threats while enhancing collaboration and expanding services without adding resources. –Partnership-driven innovation: Collaborating with vendors, including non-Splunk solutions, ensures tools meet operational needs and contribute to a stronger security ecosystem. Building an effective SOC requires more than just assembling security tools – it demands a strategic approach focused on outcomes, automation and continuous improvement. Splunk’s operations centre exemplifies this by ensuring high-quality, scalable security operations while promoting innovation through partnerships, ultimately strengthening overall resilience by enhancing adaptability and operational consistency.CASE STUDY 9 Splunk – Beyond “tooling”: A focus on quality and ecosystem collaboration The Cyber Resilience Compass: Journeys Towards Resilience 17
Ask AI what this page says about a topic: