Welcome to next-gen Illumeo platform. All individual and corporate users are required to reset their account passwords before accessing the new platform. Click login and then 'Lost my Password' and follow the simple process. For any assistance, please email us at support@illumeo.com

Contact Info

  • 96 Queen Park, Los Vegas, USA
  • +1 800 555 44 00
  • mail@illumeo.com
  • Office Hrs: Today 9.00am to 6.00pm

Cyber Risk Framework – Detect Threats Part Two

$48.00

SKU: crs-1652982 Category:

Description

This is a segment in our ongoing series on cyber risks. Part one of this segment about “Cyber Risk Assessments – Identifying Threats” delved into the detection phase of a cyber risk assessment. We evaluated important elements to consider when determining how to stay abreast of impending threats and what organizations should do to detect those threats including evaluating anomalies, instilling continuous monitoring tactics and dedicated detection methods.

This is the second part of the two-part series. This segment focuses on the types of Information Technology (IT) assets to consider when establishing detection processes, the concept of applied security and additional considerations for continuous monitoring and forensic analysis. We also look briefly at incident response – which is covered in greater detail in the segment on “Cyber Security Risk Assessment – Recover from Breaches”.

Training for all programs related to cyber security by this trainer are utilizing the framework of the National Institute of Standards and Technology (NIST) as a model. This information is freely available in the public domain. For more detailed information on the framework please refer to NIST.org.

LOGIN