“Are We Secure?” Lessons Learned From The CISO Of A Leading Saudi Bank

This week we have been in Dubai for Gartner’s Security Risk and Management Summit, where leaders across the middle east region came together to prepare their organizations for the future.

“Are We Secure?"

Rasha M. Abu AlSaud, SVP – Chief Information Security Officer, from a Leading Bank in Saudi Arabia explained how they overcame the challenge to report up to senior management, when they ask that tough question “Are we secure?”

The Challenge

Back in 2012 after the Saudi Aramco hack, a major shift happened within Saudi Arabia. Rasha mentioned the difference in attitude before the hack and now – forcing cybersecurity to mature, and a need for further capabilities to be established to keep digital services secure as well as ensure customer trust and satisfaction. To do so, Rasha’s team knew that many answers were hidden in their log data, but their SIEM solution only provided limited visibility as it wasn‘t designed for the volume and variety of data generated. The operations team maintaining the SIEM had concerns each time an additional system was on-boarded, due to the potential impact on performance.

The Evaluation

In 2014 Rasha and her team didn‘t want to just purchase the market leader in the region to refresh their program. Her team took their time, analyzed their requirements, defined use cases, and researched the market for the best fit. As the team came across Splunk, they got excited about the ease of onboarding new data, scaling the system and the ability to apply simple and advanced analytics, just like a clever Google search.

The Rollout

Within a year the team went through Splunk training, established a scalable Splunk architecture, and on boarded 100% of their network infrastructure devices and all Server OS data. The bank got rid of their old SIEM and multiple other departmental log repositories.

One year in, they have completely changed the way they worked. Conversations are either “We’ve seen this in Splunk” or “It’s not in Splunk, so we don‘t know”. Whatever threat comes up, whatever tactics are used - Rasha‘s team is now able to answer the question: “Are we secure?”

Supporting the business

The team didn’t stop at finding success for security. Knowing that there is so much more they can do with the data, they started to onboard machine data generated from their business applications. In a digital banking world, where your credit card can be printed on demand, there‘s a huge benefit for the business to gain visibility, utilize this data and deploy security monitoring at the core of the business. Rasha gave the following advice to the CISO community at Gartner: “The business understands the value you bring to them with application logs“

While understanding application data requires subject matter expertise - Rasha’s team mastered that along with the business and it brought the two teams closer together.

Collaboration with IT-Operations

Rasha encountered a mind-changing experience as her organization faced a major outage. The Head of IT reported that the issue was due to an application and not within the infrastructure. Rasha asked him how he knew so quickly, and where he takes his confidence from. His response? “I looked in Splunk!” Within a matter of hours, they could identify the root cause and solve the interruption, a problem which previously would take days.

Lessons learned

As usual in IT projects – there are also challenges along the way. In the early stages, the team struggled to find the right technical resources available in the region. Rasha recommended to start with onboarding OS Level Logs – the rest will then come. Dividing the onboarding into phases allowed her team to have time to digest the events reported, and allowed time for stabilizing the platform. Most importantly; before onboarding an asset, evaluate what is being logged so you start with the right configuration.

Thanks a lot to Rasha for sharing her expertise, and to her extended team for their open mindset to do things differently, enabling them to become data-driven security specialists, supporting the business and contributing to corporate priorities.

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.