Which of Gartner’s 2019 Top 7 Security and Risk Management Trends Are Impacting Your Business? - Part II

In my most recent article, I blogged about the Gartner Top 7 Security and Risk Trends for 2019 and explained how Splunk, Splunk Customers and Splunk Partners address trend No. 1. I also talked about how leaders in security and risk management create pragmatic risk appetite and link their statements to business outcomes.

This blog is a review of trend No. 2 and No 3.

TREND NO. 1: Leading SRM leaders are creating pragmatic risk appetite statements linked to business outcomes to engage their stakeholders more effectively.
TREND NO. 2: There is renewed interest in implementing or maturing security operations centers (SOCs) with a focus on threat detection and response.
Best Practices From Top Organizations
How Splunk & Partners Can Help

At SplunkLive! Germany 2019, Dachser Logistics shared why it selected Splunk to implement threat detection and response. The company talked about how it exchanges threat intelligence with the German government and how it tied the investment into its ISO27001 efforts.

Fresenius utilizes Splunk Phantom for TIER 1 & Tier 2 analyst work automation as it wasn’t able to find enough talent (even though Fresenius created a company cyber risk index, whose own management and CFO loved - ref. Trend No. 1).

The University of Exeter uses the MITRE ATT&CK Framework and Splunk Enterprise Security in its SOC to strengthen its detection capabilities.

At .conf 2019, you’ll hear Datev talk about how it supercharges its security operations center with Splunk and MITRE ATT&CK among others, such as Charles Schwab, Kaiser Permanente, Texas Instruments, Publix Supermarkets or Deloitte’s own Olaf Hartong on his Threat Hunting App mapped to MITRE ATT&CK.

We've introduced the

Splunk Security Operations Suite

which includes threat detection with Splunk UBA and Splunk Enterprise Security (ES) content subscription. The investigation workflows in ES and the automation capabilities in Splunk Phantom cover the response aspects to modernize and mature security operations centers.

This trend drives the adoption, from vendors as well as organizations’ security teams, of the MITRE ATT&CK Framework. We have also prepared a webinar together with ISC2 to explain what it is, why and how you should use it. Our analytical stories in Splunk Enterprise Security are all mapped to MITRE ATT&CK.

With an open eco system for security operations we have joined with industry peers such as Crowdstrike, PaloAlto, Cisco or Symantec.

There are many partners who provide either fully managed or very successful hybrid managed security operations. For example Accenture and Airbus. You can find them and many more in our partner locator.

TREND NO. 3: Leading organizations are utilizing a data security governance framework to prioritize data security investments.
Best Practices From Top Organizations
How Splunk & Partners Can Help
At last year’s .conf, Deloitte’s Risk and Financial Advisory Group shared how Splunk & Machine Data is used in Deloitte Consulting Engagements for privacy and data governance. Everything from data in-transition monitoring to consent revocation monitoring and data erasure verification.

Knowing where sensitive data is stored and who has access to it is mandatory as stipulated by data protection laws. Ensuring a proper audit trail to address any kind of breach has to be the highest priority for security managers. We walked through a whole data security scenario in a day in a life of a breach.

To track and measure the effectiveness of data security governance, firewall data isn’t what you need. - You would most likely need to get to the application level which showcases Splunk’s strength for collecting and processing data from any kind of technology. For monitoring and tracking access, it is essential to collect data from business applications such as CRM or HR apps.

Addons, like Workday, SAP, SalesForce or more generic ones to connect to rest API’s or invoke Webhooks are in very high demand.

Our Partner Digital Guardian, who is providing a DLP and EDR solution, has created an awesome app integration.

TREND NO. 4: “Passwordless” authentication is achieving market traction, driven by demand and the availability of biometrics and strong hardware-based authentication methods.
TREND NO. 5: Security product vendors are increasingly offering premium services to help customers get more immediate value and to assist in skills training.
TREND NO. 6: Leading organizations are investing in and maturing their cloud security competency as it becomes the mainstream computing platform.
TREND NO. 7: The strategic CARTA approach to security is starting to appear in more traditional security markets.

Looking forward to seeing you at Gartner’s Security and Risk Management Summit in London from the 9th to the 11th of September.

Until next time,

Matthias

Read part I & part III here.

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.