Sep 08 2025
Security

Does Your Bank’s SOC Team Have What It Takes?

With threats such as phishing powered by artificial intelligence, ransomware and insider threats, financial institutions must ensure their security operations centers can keep up.

With artificial intelligence enhancing ransomware attacks and making it more difficult to decern what’s a real email vs. a phishing attempt, security operations centers have plenty to be concerned about in today’s threat landscape. However, it’s not just new technology tools that can pose a challenge for SOCs at financial institutions.

Splunk CISO Michael Fanning says one of the top challenges SOCs at banks face are compliance and regulatory demands. Banks must comply with the Sarbanes-Oxley Act, the Gramm-Leach-Bliley Act, Payment Card Industry Data Security Standards, FFIEC standards and more. As a SOC is building its detection program, it will first prioritize the tools and procedures necessary to meet regulatory requirements, which is something unique to the finance industry.

Another challenge is bank infrastructure. Fanning points out that banks have ATMs and multiple branches, meaning that their networks are more exposed and require additional considerations such as detecting ATM tampering.

Due to the nature of their work, banks must also be extra watchful for insider threats and fraud compared to organizations in other industries.

With all of these challenges at play, along with the constantly increasing speed and sophistication of cyberattacks, banks’ SOC teams must be prepared to protect against these threats and beyond. As banks grow or combine through mergers or acquisitions, they must reconsider their security needs. To start, they must understand the capabilities of their SOC teams.

Click the banner below to learn why a comprehensive approach to cyber threats is best.

 

How Banks Can Identify Gaps in Their SOC Teams’ Capabilities

Fanning recommends that banks bring in a third-party assessor to do benchmarking against a control set to measure their SOCs’ maturity in certain security areas. This can help the institution understand where it functions well and where it may need some help. In some cases, the bank may be able to compare its benchmarks to that of industry peers who have opted in to confidentially share their own scores.

Penetration testing and red teaming are other important exercises for discovering weaknesses in an organization’s security posture.

“It’s real testing from an attacker’s perspective to understand if the controls and the assumptions you have are actually working,” says Fanning. “I really encourage staffing in-house pen testing and red teams while also bringing in external assessors for a neutral view into your organization.”

READ MORE: Customized security operations center training elevates cyber skills.

An in-house team should be doing routine pen testing to ensure the security strategy is working the way it should against new and existing threats. These teams should have their own objectives and goals throughout the entire fiscal year.

“They should have a defined area of their infrastructure that they plan to attack this month or this quarter,” adds Fanning.

He suggests that assessments from external experts should occur on a quarterly or biannual basis, which means that banks and SOC teams need to plan the budget and time for that. It’s important to plan testing and assessments well in advance because these engagements can create disruption to the organization in several different ways.

“One, they could break something and if that happens, you want to be prepared. You don’t want that to be a surprise,” says Fanning. “Two, they could find something incredibly critical requiring you to halt business operations to fix.”

KEEP READING: How to transform your security with modern solutions.

When Should a Bank Reskill or Restructure Its SOC Team?

From a foundational level, banks should have core documentation, run books and repeatable processes for their security operations and response.

“When an alert fires, your SOC team should know that they’re going to follow these specific steps every single time,” Fanning explains. “If that doesn’t exist, then you know there are definitely some problems that might require reskilling or reprioritization.”

As SOCs trend more toward automation, Fanning says team members will need to be assessed for a new set of capabilities. For example, security operations engineers should have a level of fluency in automation and programming.

“Or if they can’t do the automation themselves, they should be able to recognize that a task needs to be automated,” he adds. “Not every SOC analyst recognizes that they might walk through the same repetitive manual steps and processes. They might not recognize the fact that they need to automate.”

He recommends that organizational leaders take a step back and dig into how much manual work SOC analysts are doing that’s creating churn for the team. That’s where they’ll find automation opportunities. “Lastly, ask yourself the question, do the people on the SOC team have the skill set to implement the automation that I see as outstanding?” says Fanning. 

Click the banner below to keep reading stories from our new publication BizTech: Financial Services.

 

Setting Up SOCs for Success

When it comes to reskilling, Fanning recommends banks set up internal engagements rather than external training. He says that while going to an event can be educational, it’s not going to teach analysts the nuances of the infrastructure in which they operate.

“For example, it’s important for a SOC to understand how the systems and the environment they’re protecting work. So what I encourage are internal engagements such as brown bag sessions with IT and engineering to help them truly understand more about how these environments operate,” says Fanning.

Some of the key steps SOCs can take to better protect themselves against growing threats are to create a strong identity and access management program and to implement controls throughout the organization that make it more resistant to human error. If someone’s credentials are compromised because they entered their information into a malicious web page, having an authenticator such as a FIDO passkey can mitigate the risk of a lost or stolen credential.

As SOCs consider new tools, he warns against adding new technology just for technology’s sake because there’s a risk of creating additional churn. Instead, he suggests focusing on the fundamentals of security. “If you can patch on time, if you have a strong identity and access management program and if you have quality visibility across your environment, then you’re likely running a quality security program.”

UP NEXT: Financial services can follow these steps to navigate cybersecurity compliance.

Vladimir Vladimirov/Getty Images
Close

See How Your Peers Are Leveling Up Their IT

Sign up for our financial services newsletter and get the latest insights and expert tips.