Loading...
Loading...

Most organizations operate as disconnected silos of proactive and reactive security, a model that won't work in the new risk landscape. The good news is the current SOC can be the anchor point of a new unified and AI ready structure.
In most large enterprises, the SOC is focused on Threat Detection, Investigation and Response (TDIR). But what happens to the other security operations functions such as Penetration Testing (Pentesting) and Vulnerability Management (VM)? Today, security operations still function as three separate teams with different clocks and incentives.
Each contributes critical expertise, but each also operates with its own metrics, workflows, and priorities. This division is natural given specialization, but it fragments context and delays outcomes. Information travels slowly across silos, handoffs lose fidelity, and feedback loops stall.
The changing threat landscape is prompting a reconsideration of this model. More complex and sophisticated attacks demand a more integrated approach across the full lifecycle, before, during, and after an intrusion. As AI is used to execute more attacks, organizations need to move faster to surface security insights buried in terabytes of telemetry and then stop attacks once they are detected. There is not enough time to coordinate across human teams to detect and respond.
In this environment the SOC is well placed to become the "center of gravity" of security operations. The SOC is already the last safety net on the right of the bang, dealing with real incidents, adversary paths, and operational realities. From here it can be extended leftward without diluting its core mission. Pentesting and vulnerability management become more effective when informed by what the SOC actually observes. The SOC can credibly anchor an integrated operating model—if we evolve in phases. Here's a pragmatic framework for how to do this.
No reorg, better collaboration, shared language, minimal disruption
The first move is alignment without reorganization. Keep the three teams intact but establish reliable collaboration framework, communication channels and shared taxonomies so each team performs its own work better by consuming the others' signals. Practically, this looks like:
At this stage, KPIs remain specific to each team:
It is important at this stage to develop this "muscle memory" of better collaboration to prepare for Phase 2.
No reorg, intentional and explicit collaboration, new org-wide KPIs
Once better data is flowing, the next step is to change the KPIs to reflect security value at the enterprise level. Teams still report to their existing leaders, but they pursue common outcomes rather than optimizing for their team. Three shifts stand out:
These shifts enable new KPIs that align incentives such that "left of bang" and "right of bang" work as one system. For example:
One SOC, one scorecard, a Center of Excellence as the hub
The final step is organizational consolidation, bringing pentest, VM, and TDIR under a single leadership structure. The new organization operates with one set of KPIs, supported by a new Center of Excellence (CoE) function.
The role of the CoE is to provide oversight, integration, and continuous improvement. It is the hub that makes 1 + 1 + 1 = 5. This is not a large team, and in some enterprises it may be just a strong program manager. The mission is to ensure the same data is used many times for many purposes by standardizing taxonomies, enforcing data quality, curating libraries of adversary behaviors and response playbooks, orchestrating cross-team cadences, and tracking shared backlogs. The CoE oversees API-first integration to keep knowledge moving as quickly as incidents do.
In Phase 3 individual team scorecards are replaced with a single SOC scorecard that expresses business outcomes. These could include:
The SOC owns these outcomes, not just activities, and adjusts capacity across pentest, VM, and IR to meet them. Staff can rotate across functions, from attacking to defending to hardening, so that institutional knowledge compounds rather than being stuck in siloes.
Enterprises can expect faster time-to-effect (the delay between discovering an exploitable path and neutralizing it), lower critical incident recurrence, and tighter alignment between controls, detection, and remediation. Costs stabilize as overlapping workflows are replaced by shared platforms and standard content. Most importantly, security becomes a continuous, bidirectional system where intelligence from the right shapes priorities on the left and hardening on the left measurably reduces the work and impact on the right. The SOC stops being only the last safety net and becomes the operating system of security where prevention and response reinforce each other, and the enterprise measures progress in real, risk-weighted terms.
Read the full ebook → Security for Winners: The Art of Using AI to Secure Your Company and Get Yourself Promoted