Which of Gartner’s 2019 Top 7 Security and Risk Management Trends Are Impacting Your Business? - Part III

If you followed my recent blogs about the Gartner Top 7 Security and Risk Trends for 2019, you probably read my take on trend no. 1, as well as no. 2 and 3.

In this part of the series I am going to review trend no. 5, 6 and 7. You may notice that I skipped trend no. 4 - it’s an important one but not something we at Splunk are addressing at the moment. Enjoy!

TREND NO. 1: Leading SRM leaders are creating pragmatic risk appetite statements linked to business outcomes to engage their stakeholders more effectively.
TREND NO. 2: There is renewed interest in implementing or maturing security operations centers (SOCs) with a focus on threat detection and response.
TREND NO. 3: Leading organizations are utilizing a data security governance framework to prioritize data security investments.
TREND NO. 4: “Passwordless” authentication is achieving market traction, driven by demand and the availability of biometrics and strong hardware-based authentication methods.
TREND NO. 5: Security product vendors are increasingly offering premium services to help customers get more immediate value and to assist in skills training.
How Splunk Can Help

Our customer success organization includes services such as customer success manager and admin on-demand services to ensure that value is created . Because even though there may be similarities, each data journey at every organization is unique . Splunk customer success managers offer support on anything from use case development and data lifecycle to user enablement and building a center of excellence.

In addition to our online training, we offer educational workshops such as “Phantom for Rookies”, building automation playbooks for phishing or our top-notch capture the flag blue team exercise: Boss of the SOC - investigating and responding to a breach at Frothly - our favorite Beer Brewery whose brewing secrets have been stolen by an APT Group.

Hundreds of security teams have participated at Boss of the SOC over the years, making it one of the largest and most successful red and blue team exercises in the industry.

TREND NO. 6: Leading organizations are investing in and maturing their cloud security competency as it becomes the mainstream computing platform.
TREND NO. 7: The strategic CARTA approach to security is starting to appear in more traditional security markets.
Best Practices From Top Organizations
How Splunk Can Help

Siemens shared how it has been using a prevent, detect, investigate, respond approach for years to continuously improve its cybersecurity program.

The Bank of England moved from a vendor-lead strategy to an adversary-lead strategy. It is doing so by focusing on the tactics and techniques cyber attackers apply. Moreover, the SOC was modernized and refined, enabling the security team of the Bank of England to spend 80% of its time to create new analytics rather than spending time on incident response. The security team is able to get a turnaround within 2 hours - from learning about a new attacker tactic to implementing the analytics for detection and validation in its environment.

As we work with security teams across different industries, we observed that many organizations mature from a block/prevent strategy to continuous risk evaluation and trust assessment by detecting & responding with the right context in mind.

Thanks for reading! Looking forward to seeing you at Gartner’s Security and Risk Management Summit in London from the September 9th - 11th.

Matthias

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.