The SOC of 2030 Roadmap
SupportInteractive Report: The SOC of 2030
1000 alerts/day): Donut Chart (Chart.js). Goal: Inform. Justification: Highlights operational burden.
- SOC 2030 Vision:
- Automation Target (80-90%): Donut Chart (Chart.js). Goal: Inform. Justification: Key objective visualization.
- Operating Principles: Interactive List/Cards (HTML/CSS/JS for potential expansion). Goal: Organize. Justification: Clear presentation of principles.
- Processes & Frameworks:
- IR, TI, VM, SAO details: Tabbed content or expandable cards (HTML/CSS/JS). Goal: Organize. Justification: Structured presentation of dense info.
- Frameworks (NIST CSF 2.0, MITRE ATT&CK): Expandable cards/sections. Goal: Organize. Justification: Detailed explanation.
- AI Agents & Automation:
- AI Agent Roles: List/Cards (HTML/CSS). Goal: Organize. Justification: Clear examples.
- Ethical Considerations: List/Cards. Goal: Organize.
- Implementation Plan:
- 5-Year Phases: Tabbed interface (HTML/CSS/JS). Goal: Organize/Change. Justification: Interactive exploration of timeline.
- Metrics & KPIs:
- MTTD/MTTR Targets (
body { font-family: 'Inter', sans-serif; background-color: #FAF7F0; /* Light Beige / color: #525252; / Neutral-700 / } .nav-link { transition: color 0.3s ease; } .nav-link.active, .nav-link:hover { color: #0D9488; / Teal-600 / border-bottom-color: #0D9488; } .section-title { color: #404040; / Neutral-800 / } .card { background-color: #F5F0E1; / Darker Beige / border: 1px solid #D4D4D4; / Neutral-300 / } .accent-text { color: #0D9488; / Teal-600 / } .accent-bg { background-color: #0D9488; / Teal-600 / } .chart-container { position: relative; width: 100%; max-width: 500px; / Adjusted for better fit in columns / margin-left: auto; margin-right: auto; height: 300px; max-height: 350px; } @media (min-width: 768px) { .chart-container { height: 320px; max-height: 400px; } } .tab-button { transition: background-color 0.3s ease, color 0.3s ease; } .tab-button.active { background-color: #0D9488; / Teal-600 / color: white; } .stat-value { color: #0D9488; / Teal-600 / font-weight: 700; } .table th, .table td { border: 1px solid #D4D4D4; / Neutral-300 / padding: 0.75rem; text-align: left; } .table th { background-color: #EAE5D9; / Lighter beige for table headers / color: #404040; / Neutral-800 / } .timeline { position: relative; padding-left: 2rem; / Space for the line and dots / } .timeline::before { content: ''; position: absolute; left: 0.45rem; / Adjust to center the line with dots / top: 0; bottom: 0; width: 4px; background-color: #0D9488; / Teal-600 / border-radius: 2px; } .timeline-item { position: relative; margin-bottom: 2rem; } .timeline-dot { position: absolute; left: -2.2rem; / Adjust to align dot with the line / top: 0.25rem; / Align dot vertically with text / width: 1rem; height: 1rem; background-color: #0D9488; / Teal-600 / border-radius: 50%; border: 2px solid #FAF7F0; / Match body background / } .timeline-content { background-color: #F5F0E1; / Darker Beige */ padding: 1rem; border-radius: 0.5rem; border: 1px solid #D4D4D4; }
SOC 2030
Overview Threats Vision Processes AI Playbooks Roadmap Risks KPIs ROI Talent
Overview Threat Landscape SOC 2030 Vision Processes & Frameworks AI & Automation Future SOC Playbook Implementation Plan Challenges & Risks Metrics & KPIs Cost Analysis & ROI Skills Gap & Talent
The SOC of 2030: An Interactive Roadmap
Explore the strategic evolution towards an AI-driven, proactive, and resilient Security Operations Center. This application translates key insights from the comprehensive report into an accessible and interactive experience.
Executive Summary Insights
The Security Operations Center (SOC) of 2030 will be a proactive, autonomous, and highly resilient cyber defense ecosystem. Driven by AI-powered attacks and quantum computing threats, this transformation leverages advanced AI agents, hyper-automation, and adaptive security frameworks. This interactive guide explores this vision, detailing streamlined operations, the technological backbone (Next-Gen SIEM, XDR, SOAR), ethical AI adoption, a 5-year implementation plan, KPIs, ROI, and talent development strategies critical for this evolution.
Navigate through the sections to understand how the SOC will detect, respond to, and anticipate cyber threats with unprecedented speed and efficiency.
The Evolving Threat Landscape & Imperative for Change
The cybersecurity world is dynamic, with escalating threats demanding a fundamental SOC transformation. This section highlights the key challenges and the strategic urgency for evolution by 2030.
📈
44%
YoY increase in cyberattacks, overwhelming traditional defenses. (Source: Check Point [1])
💰
$10.5T
Projected annual cost of cybercrime by 2025. (Source: Cybersecurity Ventures [2,3,33])
👥
15.4M
Estimated unfilled cybersecurity jobs by 2030. (Source: Cybersecurity Ventures, ISC² [3,18])
Legacy SIEM Limitations
56% of organizations report coverage gaps due to legacy SIEM constraints. [1]
Overwhelming Alert Fatigue
61.37% of security teams deal with over 1,000 alerts per day. [1]
Emerging Mega-Threats Driving Change
🤖 AI-Powered Attacks
Adversaries use AI for sophisticated malware, automated attacks, and convincing phishing, demanding AI-driven defenses. [2,3,6,26,27]
⚛️ Quantum Computing
“Q Day” by 2030 threatens current encryption. “Harvest Now, Decrypt Later” tactics are an active risk, requiring Post-Quantum Cryptography (PQC). [18,29,30,31]
SOC 2030 Vision: Autonomous, Proactive, Resilient
The SOC of 2030 moves beyond reactive defense to an intelligent, adaptive, and automated ecosystem, proactively neutralizing threats and ensuring organizational resilience.
Overall Mission
To establish an intelligent, adaptive, and highly automated cyber defense ecosystem that proactively identifies, predicts, and neutralizes advanced threats, ensuring continuous resilience against the evolving threat landscape of 2030.
Key Objective: Hyper-Efficiency
Targeting 80-90% automation of Tier 1 & Tier 2 operations. [4,5]
Core Operating Principles
- 💡 AI-First, Human-Augmented
- 🔄 Continuous Learning & Adaptation
- 🛡️ Zero Trust by Default
- 🎯 Threat-Informed Defense (MITRE ATT&CK)
- 📊 Data-Driven Decision Making
- 🤝 Collaboration & Integration
Advanced Processes & Adaptive Frameworks
Core SOC processes and foundational frameworks will significantly evolve, driven by AI and automation. Explore the transformations in Incident Response, Threat Intelligence, Vulnerability Management, SAO, and key frameworks like NIST and MITRE.
Incident Response Threat Intelligence Vulnerability Mgmt SAO
Incident Response (IR) in an AI-Driven Era
IR will be characterized by unprecedented speed, context, and autonomy.
- Automated Triage & Enrichment: AI agents autonomously enrich alerts with telemetry (user behavior, network activity, TI) from SIEM, EDR, identity tools, cloud logs, providing unified context in seconds. [4,40]
- Hyper-Automation SOAR: Platforms like Tines and Torq handle most Tier 1 tasks, using AI filtering to correlate logs, reduce false positives, and streamline initial responses. [4]
- Human-in-the-Loop (Complex Cases): Tier 2 (investigations) & Tier 3 (threat hunting) demand experienced judgment. Tools like CommandZero augment analysts with guided queries. AI provides dynamic remediation suggestions. [4,40,52]
- Example: Phishing Campaign: AI detects surges, correlates to actors, suggests/executes blocking. NLP analyzes emails, quarantines, blocks URLs, generates user notifications. [40,42,57]
Predictive Threat Intelligence
Threat intelligence evolves from reactive feeds to proactive, predictive insights.
- AI/ML for Proactive Analysis: AI/ML indispensable for predictive analysis, anticipating attacks by identifying emerging vectors and likelihood of threats (phishing, DDoS). [6,19,28,34,48]
- Enhanced Context: AI dynamically enriches alerts with real-time TI from external feeds, correlating IOCs with internal telemetry for detailed, actionable reports. [42,57]
- Quantum-Enabled TI: Emerging use of quantum algorithms for advanced TI, potentially detecting zero-day vulnerabilities. [29]
Proactive Vulnerability Management
VM transitions from periodic scans to continuous, predictive, automated remediation.
- AI-Powered Scanning & Prioritization: AI automates vulnerability discovery, OSINT, CVE scanning, attack vector identification, and prioritization based on severity/exploitability. [29,58]
- Smarter Attack Path Analysis: ML-enhanced ASCA tools map security configurations, correlate with vulnerabilities, and prioritize critical fixes by simulating attack paths. [59]
- Agentic Remediation: AI agents analyze risks, identify root causes, and safely execute remediation actions, with growing potential for critical fixes. [59]
Security Automation and Orchestration (SAO)
SAO will be the backbone of efficient SOC operations.
- SOAR Evolution & Market Growth: Security automation market CAGR 14.0% (2025-2030); SOAR CAGR 15.6% (2023-2030). SOAR aggregates data, automates low-level event handling, standardizes responses. [20,21]
- Key Benefits: Alleviates alert fatigue, automates routine tasks, simplifies TDIR, frees teams for strategic projects. Minimizes attacker dwell time. [20,21]
- Hyper-Automation & No-Code: Platforms like Tines, Torq handle most Tier 1 tasks. No-code empowers non-technical users to create automated workflows. [4,20]
- IT Ops Integration: Future SAO tools integrate security with IT ops, automating broader processes like ticketing and incident management. [4]
NIST Cybersecurity Framework 2.0
NIST CSF 2.0 (Feb 2024) helps all organizations manage cyber risks, expanding beyond critical infrastructure. It’s a living document evolving with AI needs and addresses AI privacy/security risks. [50,51,60]
- Automation Examples: Continuous monitoring (DE.CM), adverse event analysis (DE.AE), incident management (RS.MA, RS.MI), platform security (PR.PS), asset management (ID.AM). [50]
- “Govern” Function: Integrates cyber risk into enterprise decision-making, aligning technical controls with business objectives. Vital for AI adoption (“governance by design”). [35,49,50,51]
MITRE ATT&CK
Remains a cornerstone for threat-informed defense. [26,43,44,45]
- AI-Powered Tagging: Automates alignment of detection rules with ATT&CK, enhancing clarity, streamlining workflows, and improving threat coverage visibility. [43]
- Continuous Security Validation: Automation enables simulation of real-world attacks based on ATT&CK techniques without manual intervention. AI/ML power dynamic, adaptive threat simulations. [61]
- Advanced Use Cases: APT simulation, red team exercises, proactive threat hunting, integrated with real-time TI. [44,45]
AI Agents & Automation: The New SOC Workforce
AI agents will transform the SOC by redefining roles and operational capabilities. This section explores their responsibilities, specific applications, and crucial ethical considerations.
Roles & Responsibilities of AI Agents
Intelligent digital assistants autonomously understanding context, making decisions, and taking actions. [52]
- Autonomous Alert Enrichment: Correlates telemetry (user behavior, network activity, TI) from SIEM, EDR, identity, cloud logs for unified incident context. [40]
- Threat Correlation: Links disparate security events across vectors (e.g., credential stuffing with unusual file downloads). [40]
- Dynamic Recommendation Engine: Provides context-aware remediation suggestions based on historical data, business context, active threats. [40,52]
- Automated Incident Response: Executes actions for containment, eradication, recovery (e.g., quarantine mailboxes, block IPs, isolate systems). [41,42,57]
- Vulnerability Scanning & Prioritization: Automates discovery, scanning, prioritization of vulnerabilities. [58]
- Continuous Learning: Adapts over time, identifies patterns, learns from interactions, refines performance via reinforcement learning. [40,52]
- Tier 1 & 2 Task Automation: Handles repetitive, high-volume, low-complexity tasks (log analysis, alert triage, false positive reduction). [4,5]
Ethical Considerations
Responsible AI adoption requires addressing bias, privacy, transparency, and AI vulnerabilities.
- Bias in Algorithms: Validate dataset representativeness, audit for hidden biases before training/deployment. Ensure fairness and non-discrimination. [8,35]
- Data Privacy: Obtain explicit consent, maintain transparency, adopt “privacy-by-design,” conduct privacy audits, use encryption, minimize data collection. [7,8,35]
- Transparency & Accountability (“Black Box”): Embed explainability and interpretability. Enable human oversight at critical decision points. Establish ethical guidelines. [13,35,67]
- AI Agent Vulnerabilities: Address hallucination exploitation, direct control hijacking, permission escalation, LLM vulnerabilities (jailbreaking, prompt injection) through comprehensive testing, adversarial training, system isolation, and AI security audits. [67,68,69]
The SOC Playbook of the Future: Dynamic & AI-Augmented
Future SOC playbooks will be living, adaptive systems, leveraging AI for creation, execution, and continuous improvement, drastically enhancing incident response.
Key Characteristics
-
Dynamic & Adaptive: Shift from static documents to fluid playbooks incorporating continuous feedback from incident outcomes and analyst input. [40,41]
-
AI-Driven Creation & Execution: Generative AI (GenAI) automates playbook creation and execution, suggesting and autonomously performing actions like system isolation or patching. [14,42] Enhanced Core Components:
- Trigger: Automated initiation by real-time alerts or predefined conditions. [41,42]
- Threat ID & Context: GenAI correlates alerts, enriches with TI, AI agents pull telemetry. [40,42]
- Investigation Steps: AI guides log gathering, data analysis, threat confirmation. [4,41]
- Response Actions: Automated containment, mitigation, remediation with custom rules. [41,57]
- Escalation: GenAI assigns severity, auto-escalates high-risk incidents, closes false positives. [41,42]
- Communication: AI generates user notifications and awareness prompts. [42]
- Post-Incident Review & Learning: AI facilitates documentation, reporting; feedback loops refine AI suggestions. [40,41,42]
-
Strategic Benefits: Dramatically reduced Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) through rapid AI analysis and automated actions. [14,42,70]
Phased Implementation Plan (5-Year Timeline: 2025-2030)
Transforming the SOC requires a strategic, phased approach. Explore the 5-year roadmap detailing key activities, milestones, and change management strategies.
Phase 1 (2025-26) Phase 2 (2027-28) Phase 3 (2029-30) Change Management
Phase 1: Assessment & Foundation (Year 1: 2025-2026)
Current State & AI Readiness Assessment
Assess existing SOC capabilities, tools, processes, security gaps, and organizational AI readiness (strategy, data, tech, talent, culture, governance, ethics). [5,11,71] Milestone (Q4 2025): Assessments complete, top 3 critical gaps identified.
Data Governance & Infrastructure
Establish robust data governance, security measures, and AI-supportive data infrastructure. Deploy telemetry pipelines. [1,4,71] Milestone (Q2 2026): Foundational data governance & pipelines operational.
Strategic Alignment & Platform Selection
Define modernized SOC objectives aligned with business goals. Select next-gen SIEM/XDR platform. [5,10,11] Milestone (Q4 2026): SIEM/XDR platform selected, initial integration plan finalized.
Phase 2: Pilot & Expansion (Years 2-3: 2027-2028)
Initial AI/Automation Deployments
Automate basic tasks, implement AI-powered filtering for false positive reduction, deploy AI agents for alert enrichment. [4,40,57] Milestone (Q4 2027): Pilot AI-driven phishing triage, 20% FPR reduction for category.
Next-Gen SIEM/XDR Integration
Pilot XDR deployment, integrate with SIEM/SOAR/EDR, conduct simulated attack testing. [5,11] Milestone (Q2 2028): XDR deployed across 50% critical assets.
Playbook Development & Workforce Upskilling (Phase 1)
Automate initial SOC playbooks (phishing, malware). Launch AI literacy and foundational SOC training. [24,27,35,40,42,57,71] Milestone (Q4 2028): 5 automated playbooks, 30% MTTR reduction for these types.
Phase 3: Optimization & Integration (Years 4-5: 2029-2030)
Full-Scale AI-Driven Operations & Advanced Threat Hunting
Expand AI agent deployment (IR, VM, TI). Leverage reinforcement learning. Reallocate human analysts to proactive threat hunting with AI augmentation. [4,5,29,40,42,52] Milestone (Q4 2029): 75% Tier 1/2 automation, 50% overall alert reduction.
Quantum Preparedness & Continuous Improvement
Implement PQC for critical data. Implement continuous AI monitoring/auditing, refine playbooks, establish formal AI governance. [8,23,30,31,41,71] Milestone (Q2 2030): PQC implemented for sensitive long-term data.
Workforce Development (Phase 2) & Full Operationalization
Advanced training in AI oversight, strategic analysis. Foster continuous learning culture. [13,17,24] Milestone (Q4 2030): AI-driven threat hunting fully operational, 20% reduction in undetected APT dwell time.
Change Management Strategies
Successful SOC transformation hinges on managing human change effectively.
- Communication: Early, clear, consistent communication on rationale, benefits, role impacts. Emphasize AI as augmentation. [13,16]
- Employee Involvement: Actively involve employees in pilots, feedback, playbook refinement. Use AI tools for sentiment analysis. Foster “security-first” culture. [12,13,39]
- Training & Development: Comprehensive AI literacy and specialized SOC training. Upskill existing IT workforce. [11,13,24,25,27,35]
- Culture of Continuous Learning: Promote curiosity, innovation, growth. Treat human AI acceptance as a KPI. [13,35]
- Ethical & Practical Concerns: Proactively address data privacy, bias, accountability with clear guidelines and governance. [13]
- Celebrate Wins & Learn from Failures: Recognize successes, discuss challenges openly, view failures as learning opportunities. [13]
Challenges, Risks, and Mitigation Strategies
The path to the SOC of 2030 involves navigating technological, operational, and human-related risks. This section outlines key challenges and their mitigation strategies.
Technological Risks
- AI Vulnerabilities (Data Poisoning, Model Inversion, Prompt Injection, Hallucinations): Mitigate with comprehensive testing, adversarial training, output consistency checks, robust data governance. [67,68,69,72]
- Quantum Computing Threats (“Q Day”, “Harvest Now, Decrypt Later”): Mitigate with multi-layered defense, PQC investment, crypto-agility, expert partnerships. [18,20,29,30,31]
- Integration Complexities (Legacy Systems, Disparate Tools): Mitigate with open APIs, phased implementation, pilot deployments, integration platforms. [5,11,57]
Operational Risks
- Over-reliance on AI (Skill Decline): Mitigate with “human-in-the-loop” model, redefine human roles (strategic analysis, AI oversight), continuous training. [1,4,5,6,11,13,35,52]
- Data Quality Issues (Incomplete, Biased Data): Mitigate with strict data governance, integrity validation, bias audits, traceable data provenance. [8,35,48,67]
- Persistent Alert Fatigue (Poor AI Tuning): Mitigate with continuous AI rule fine-tuning, alert consolidation, AI-driven prioritization, human feedback loops. [1,4,14,40,42]
Human Element Risks
- Skills Gap (AI Security, Cloud, Quantum): Mitigate with talent development programs, university partnerships, AI for talent democratization. [3,17,18,25]
- Ethical Dilemmas (Surveillance, Autonomous Decisions): Mitigate with clear ethical guidelines, robust governance, transparency, accountability, prioritizing human rights and privacy. [7,8,13,35,62,63,71]
- Resistance to Change (Fear of Displacement, Lack of Understanding): Mitigate with proactive change management, clear communication, employee involvement, comprehensive training. [12,13,16]
Measuring Success: Metrics & KPIs for SOC 2030
Effective measurement requires a blend of operational, AI performance, and strategic impact KPIs to ensure alignment with business objectives and cyber resilience.
MTTD Target
<15 min
Mean Time to Detect critical incidents. [70]
MTTR Target
<1 hour
Mean Time to Respond to critical incidents. [70]
False Positive Rate
<5%
Target for AI-filtered alerts. [14,70]
AI Escalation Rate
<5%
Alerts AI routes to humans. [73,74]
Additional Key Metrics
Category Metric/KPI Target (2030) Strategic Value
AI PerformanceTrue Positive (TP) Accuracy>95%Ensures effective threat detection. AI PerformanceAverage Investigation Time (by AI)<30s (median)Quicker containment and response. Strategic ImpactReturn on Investment (ROI)Positive in 3-5 yrsJustifies investment, shows business value. Strategic ImpactCompliance Adherence100% (critical regs)Avoids fines, builds trust. Strategic ImpactCyber Resilience ScoreAdaptive (NIST Tier 4)Ensures business continuity.
Cost Analysis & Return on Investment (ROI)
Justifying the SOC 2030 investment is crucial. This section outlines the cost components, quantifiable benefits, and the ROI calculation approach, emphasizing the “cost of inaction.”
Cybersecurity Market Growth (Projected)
Global Cybersecurity Market to reach $500.7B by 2030 (CAGR 12.9%). [32]
AI in Cybersecurity Market Growth (Projected)
AI in Cybersecurity Market to reach $60.5B by 2030 (CAGR 19.1%). [48]
Key Financial Drivers & Benefits
- Cost of Cybercrime: $10.5 trillion annually by 2025, escalating by 2030. The “cost of inaction” far outweighs proactive defense investment. [2,3,33]
- Reduced Breach Costs: AI-driven security automation saves an average of $2.2 million per breach. Minimized attacker dwell time reduces incident impact. [15,20]
- Operational Efficiencies: Automation frees human analysts for strategic tasks, streamlines workflows, reduces manual effort, and can lower cloud storage costs. [1,4,5,19,77]
- ROI Target: Positive ROI typically achieved within 3-5 years of SOC modernization.
Cost Components: Technology (Next-Gen SIEM, XDR, SOAR, AI, PQC), infrastructure upgrades, personnel & training, consulting, and R&D for emerging tech. [4,11,15,20,21,30,32,71]
Skills Gap & Talent Development for SOC 2030
AI will shift job tasks, not eliminate them. Addressing the skills gap and fostering “human-AI teaming” are critical. This section covers evolving roles, required skills, and talent strategies.
AI’s Impact on Workforce Tasks
80% of US workers will have at least 10% of tasks affected by AI; 19% see 50%+ automated. [16]
Evolving SOC Roles & Required Skills
New roles include AI Trainers, Strategic Threat Hunters, AI Security Specialists, Security Data Scientists, Quantum Security Experts, Ethical AI Governance Specialists. [4,5,6,18,25,30,58,62,63,67,68,69]
Key Skills:
- AI Literacy & Fluency [24]
- Critical Thinking & Problem Solving [23,77]
- Advanced Analytical Skills [1,23]
- Adaptability & Continuous Learning [13,16,24]
- Communication & Collaboration [25,77]
- Ethical Reasoning [13,25]
- Domain Expertise [58]
Talent Development & Recruitment Strategies
- Recruitment: Leverage AI for talent democratization, nearshoring/staff augmentation, university partnerships, focus on potential over experience, diversify talent pool. [3,17,24,25]
- Retention: Provide meaningful work (AI automates mundane tasks), continuous learning, clear career pathways, support work-life balance, competitive compensation & culture. [13,17,23,71,77]
- Training: AI literacy programs, specialized AI security training, cloud security certs, PQC training, advanced threat hunting, ethical hacking, adaptive security awareness, cross-functional understanding, leadership development. [11,18,24,25,27,30,35,56,67,71,72]
© 2025 Interactive SOC 2030 Report. All rights reserved.
Based on “The Security Operations Center of 2030: A Strategic Roadmap for AI-Driven Cyber Resilience.”
const chartTextColor = '#525252'; // Neutral-700 const chartGridColor = '#D4D4D4'; // Neutral-300 const accentColor1 = '#0D9488'; // Teal-600 const accentColor2 = '#5EEAD4'; // Teal-300 (lighter for contrast) const accentColor3 = '#14B8A6'; // Teal-500
function wrapLabel(label, maxWidth = 16) { if (typeof label !== 'string' || label.length maxWidth && currentLine.length > 0) { lines.push(currentLine.trim()); currentLine = ''; } currentLine += word + ' '; } if (currentLine.trim().length > 0) { lines.push(currentLine.trim()); } return lines.length > 0 ? lines : [label]; }
const tooltipTitleCallback = function(tooltipItems) { const item = tooltipItems[0]; if (!item || !item.chart || !item.chart.data || !item.chart.data.labels || typeof item.dataIndex === 'undefined') { return ''; } let label = item.chart.data.labels[item.dataIndex]; if (Array.isArray(label)) { return label.join(' '); } return label || ''; };
const defaultChartOptions = { responsive: true, maintainAspectRatio: false, plugins: { legend: { display: true, position: 'bottom', labels: { color: chartTextColor, font: { size: 10 } } }, tooltip: { callbacks: { title: tooltipTitleCallback }, bodyFont: { size: 10 }, titleFont: { size: 12 } } }, scales: { y: { ticks: { color: chartTextColor, font: { size: 10 } }, grid: { color: chartGridColor } }, x: { ticks: { color: chartTextColor, font: { size: 10 } }, grid: { display: false } } } };
// Chart Initializations document.addEventListener('DOMContentLoaded', () => { // SIEM Coverage Chart const siemCtx = document.getElementById('siemCoverageChart')?.getContext('2d'); if (siemCtx) { new Chart(siemCtx, { type: 'doughnut', data: { labels: [wrapLabel('Coverage Gaps (Legacy SIEM)'), wrapLabel('Adequate Coverage')], datasets: [{ data: [56, 44], backgroundColor: [accentColor1, accentColor2], borderWidth: 1 }] }, options: {...defaultChartOptions, plugins: {...defaultChartOptions.plugins, legend: {...defaultChartOptions.plugins.legend, display: true}}} }); }
// Alert Fatigue Chart const alertCtx = document.getElementById('alertFatigueChart')?.getContext('2d'); if (alertCtx) { new Chart(alertCtx, { type: 'doughnut', data: { labels: [wrapLabel('>1000 Alerts/Day'), wrapLabel('=10% tasks affected by AI'), wrapLabel('Workers with >=50% tasks affected by AI')], datasets: [{ label: '% of Workforce', data: [80, 19], backgroundColor: [accentColor1, accentColor2], borderColor: [accentColor1, accentColor2], borderWidth: 1 }] }, options: {...defaultChartOptions, indexAxis: 'y', scales: {...defaultChartOptions.scales, x: {...defaultChartOptions.scales.x, beginAtZero: true, max: 100}}, plugins: {...defaultChartOptions.plugins, legend: {...defaultChartOptions.plugins.legend, display: false}}} }); }
// Navigation scroll highlighting const sections = document.querySelectorAll('section'); const navLinks = document.querySelectorAll('nav a.nav-link'); const mobileNavLinks = document.querySelectorAll('#mobile-menu a.nav-link');
function changeNav(entries) {
entries.forEach(entry => {
if (entry.isIntersecting) {
const id = entry.target.id;
navLinks.forEach(link => {
link.classList.toggle('active', link.getAttribute('href') === #$\{id\});
});
mobileNavLinks.forEach(link => {
link.classList.toggle('active', link.getAttribute('href') === #$\{id\});
});
}
});
}
const observer = new IntersectionObserver(changeNav, { rootMargin: '-20% 0px -80% 0px', // Adjust active section based on viewport position threshold: 0.1 });
sections.forEach(section => observer.observe(section));
// Mobile menu toggle const mobileMenuButton = document.getElementById('mobile-menu-button'); const mobileMenu = document.getElementById('mobile-menu'); if (mobileMenuButton && mobileMenu) { mobileMenuButton.addEventListener('click', () => { mobileMenu.classList.toggle('hidden'); }); mobileNavLinks.forEach(link => { link.addEventListener('click', () => mobileMenu.classList.add('hidden')); }); }
// Tab functionality for Processes const processTabButtons = document.querySelectorAll('.process-tab'); const processTabContents = document.querySelectorAll('.process-tab-content');
processTabButtons.forEach(button => { button.addEventListener('click', () => { processTabButtons.forEach(btn => btn.classList.remove('active', 'accent-bg', 'text-white')); button.classList.add('active', 'accent-bg', 'text-white');
const targetId = button.dataset.target; processTabContents.forEach(content => { content.classList.toggle('hidden', content.id !== targetId); }); }); });
// Tab functionality for Implementation Timeline const timelineTabButtons = document.querySelectorAll('.timeline-tab'); const timelineTabContents = document.querySelectorAll('.timeline-tab-content');
timelineTabButtons.forEach(button => { button.addEventListener('click', () => { timelineTabButtons.forEach(btn => btn.classList.remove('active', 'accent-bg', 'text-white')); button.classList.add('active', 'accent-bg', 'text-white');
const targetId = button.dataset.target; timelineTabContents.forEach(content => { content.classList.toggle('hidden', content.id !== targetId); }); }); }); });
DjimIT Nieuwsbrief
AI updates, praktijkcases en tool reviews — tweewekelijks, direct in uw inbox.