This is a segment in our ongoing series on cyber risks. Part one of this segment about “Cyber Risk Assessments – Identifying Threats” delved into the detection phase of a cyber risk assessment. We evaluated important elements to consider when determining how to stay abreast of impending threats and what organizations should do to detect those threats including evaluating anomalies, instilling continuous monitoring tactics and dedicated detection methods.
This is the second part of the two-part series. This segment focuses on the types of Information Technology (IT) assets to consider when establishing detection processes, the concept of applied security and additional considerations for continuous monitoring and forensic analysis. We also look briefly at incident response – which is covered in greater detail in the segment on “Cyber Security Risk Assessment – Recover from Breaches”.
Training for all programs related to cyber security by this trainer are utilizing the framework of the National Institute of Standards and Technology (NIST) as a model. This information is freely available in the public domain. For more detailed information on the framework please refer to NIST.org.
Learning Objectives
- Review the high level “detect” concepts introduced in segment one.
- Explore the concept of applied security and preventative and detective controls.
- Explore additional concepts of security continuous monitoring.
- Explore the pillars of success for the detect phase of a cyber risk assessment.
- Explore the concepts of incident response and threat intelligence.
Included In Certifications
This course is included in the following Certification Programs:
13 CoursesCorporate Cyber Security Certification
- Cyber Threat – The Modern-Day Fraud: Breaches and Actions
- A Primer on Cyber Security Programs and Roles
- Cyber Risk Frameworks And Concepts
- Cyber Risk Framework - Identify Assets
- Cyber Risk Framework - Prioritize Assets
- Cyber Risk Framework - Protect Assets
- Cyber Risk Framework - Detect Part One
- Cyber Risk Framework - Detect Threats Part Two
- Cyber Risk Framework - Respond
- Cyber Risk Framework - Recover
- Cyber Risk Framework - Utilizing The Tier Approach
- Fraud and Personal Identity Theft
- Fraud and Business Identity Theft
17 Reviews (95 ratings)
Prerequisites
No Advanced Preparation or Prerequisites are needed for this course. However, it is recommended to take the other courses in the series prior to completing this one.