This is a segment in our ongoing series on cyber risks.  In this session we begin to delve into the detection phase of a cyber risk assessment.  

Once assets are identified, the National Institute of Standards and Technology (NIST) framework suggests organizations then protect those assets. The next element is to detect threats against those assets.  Some may correlate this to the “Monitoring” phase of the Committee of Sponsoring Organizations (COSO) internal control framework, but there is much more involved in detection than simple monitoring.

In this segment we discuss important elements to consider when determining how to stay abreast of impending threats and what organizations should do to detect those threats. We also discuss the types of Information Technology (IT) assets you should consider when establishing your detection processes.  Our discussion on the detect phase is divided into two separate courses.  This is course one.

Training for all programs related to cyber security by this trainer are utilizing the framework of the National Institute of Standards and Technology (NIST) as a model. This information is freely available in the public domain. For more detailed information on the framework please refer to NIST.org.

Learning Objectives
  • Identify cybersecurity threats that should be understood in order to detect inappropriate activity.
  • Explore the detect function of a cyber risk assessment and its components.
  • Identify the concepts of anomalies and events in order to detect cyber threats.
  • Identify the concept of security continuous monitoring.
  • Identify detection processes.
  • Explore challenges to detecting and defending against cyber threats.
Last updated/reviewed: March 22, 2024

Included In Certifications

This course is included in the following Certification Programs:

13 CoursesCorporate Cyber Security Certification

  1. Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  2. A Primer on Cyber Security Programs and Roles
  3. Cyber Risk Frameworks And Concepts
  4. Cyber Risk Framework - Identify Assets
  5. Cyber Risk Framework - Prioritize Assets
  6. Cyber Risk Framework - Protect Assets
  7. Cyber Risk Framework - Detect Part One
  8. Cyber Risk Framework - Detect Threats Part Two
  9. Cyber Risk Framework - Respond
  10. Cyber Risk Framework - Recover
  11. Cyber Risk Framework - Utilizing The Tier Approach
  12. Fraud and Personal Identity Theft
  13. Fraud and Business Identity Theft
21 Reviews (96 ratings)

Reviews

4
Anonymous Author
Good content and relevant to my role. Would recommend.

5
Member's Profile
Great course over Cyber Security related information and how organizations are standing up formal control processes. I would recommend this course to an associate level position.

5
Member's Profile
well presented and the test questions made me think- also, it would be helpful if a transcript of each course was provided as well.

5
Anonymous Author
The course provides a good, easy-understanding overview on Detect function of NIST framework. Recommend for the beginners

4
Anonymous Author
This is like a refresher course to me. nothing surprised me. New performance auditors will gain a lot from this training.

4
Anonymous Author
This course provides a good understanding of the detect phase/aspect of cyber risk and identifies detection techniques.

5
Anonymous Author
I like the clear organization on 3 topics: Anomalies and Events Security Continuous Monitoring Detection Processes

5
Anonymous Author
Implementation of cybersecurity controls is crucial for manuy if not every business. Good presentation on the topic.

5
Anonymous Author
Great course! Program materials were relevant and contributed to the achievement of the learning objectives.

5
Anonymous Author
The course provides useful insights on cyber risk assessment, with a focus on detecting threats.

4
Member's Profile
This Detect course gives a good overview of the detect function within the NIST Framework.

4
Anonymous Author
A good course on the third step in the NIST Framework, one part of a series of courses.

5
Member's Profile
Good training. Lynn could present technical aspects into a easy reading materials.

5
Anonymous Author
Great course of cyber risk framework - detect part one which added value to me

3
Anonymous Author
The course was good, however I believe that part 1 and 2 could be combined.

5
Member's Profile
This was a great course on detective threats. Recommend it to others.

5
Anonymous Author
Thanks, great training with updated samples and explanation, thanks.

4
Anonymous Author
COmprehensive course for the risk managers and aspiring IT Auditors

5
Anonymous Author
The course met my expectations to learn cyber risk framework.

3
Anonymous Author
well done lynn a very good course and well done to everyone

3
Anonymous Author
well thought out and acceptable for cpe review purposes

Prerequisites
Course Complexity: Intermediate

No Advanced Preparation or Prerequisites are needed for this course. However, it is recommended to take the other courses in the series prior to completing this one.

Education Provider Information
Company: Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact: For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Instructor for this course
Course Syllabus
INTRODUCTION AND OVERVIEW
  Introduction to Cyber Risk Assessment – Detect Threats Part One5:46
  Threat17:52
  Detect and Three Techniques18:12
  Aggregate8:10
  Impact2:52
  Incident Thresholds and Alerts5:44
  Continuous Monitoring7:49
  Detection Processes & Challenges11:20
  Summary2:26
CONTINUOUS PLAY
  Cyber Risk Assessment – Detect Threats Part One 1:20:11
SUPPORTING MATERIALS
  Slides: Cyber Risk Assessment – Detect Threats Part OnePDF
  Cyber Risk Assessment – Detect Threats Part One Glossary/IndexPDF
REVIEW AND TEST
  REVIEW QUESTIONSquiz
 FINAL EXAMexam