This is a segment in our ongoing series on cyber risks. Part one of this segment about “Cyber Risk Assessments – Identifying Threats” delved into the detection phase of a cyber risk assessment. We evaluated important elements to consider when determining how to stay abreast of impending threats and what organizations should do to detect those threats including evaluating anomalies, instilling continuous monitoring tactics and dedicated detection methods.
This is the second part of the two-part series. This segment focuses on the types of Information Technology (IT) assets to consider when establishing detection processes, the concept of applied security and additional considerations for continuous monitoring and forensic analysis. We also look briefly at incident response – which is covered in greater detail in the segment on “Cyber Security Risk Assessment – Recover from Breaches”.
Training for all programs related to cyber security by this trainer are utilizing the framework of the National Institute of Standards and Technology (NIST) as a model. This information is freely available in the public domain. For more detailed information on the framework please refer to NIST.org.
Prerequisites
No Advanced Preparation or Prerequisites are needed for this course. However, it is recommended to take the other courses in the series prior to completing this one.
Learning Objective
- Review the high level “detect” concepts introduced in segment one.
- Explore the concept of applied security and preventative and detective controls.
- Explore additional concepts of security continuous monitoring.
- Explore the pillars of success for the detect phase of a cyber risk assessment.
- Explore the concepts of incident response and threat intelligence.
Last updated/reviewed: July 11, 2025
(0) Reviews
(95 rating)Lesson Questions and Answers0 Questions
Progress
INTRODUCTION AND OVERVIEW
- Introduction to Cyber Risk Assessment – Detect Threats Part Two 5:07
- Forensic Analysis 11:30
- Applied Security Preventative and Detective Controls 3:13
- Desktops and Laptops 6:25
- Mobile Devices, BYOD and Containerization 3:27
- Network Configuration and Firewalls 6:29
- Endpoint Products 4:16
- Security Continuous Monitoring & Event Logging 9:21
- Security Information and Even Management (SIEM) 8:49
- SOC and Incident Response and Threat Intelligence 3:38
- Hunt Teams and Insider Threat Concerns 6:36
- Pillars of Success Detect Contain Control 5:32
- Summary 2:45
CONTINUOUS PLAY
SUPPORTING MATERIALS
- Slides:Cyber Risk Assessment – Detect Threats Part Two PDF
- Cyber Risk Assessment – Detect Threats Part Two Glossary/Index PDF
REVIEW AND TEST
- REVIEW QUESTIONS quiz
- FINAL EXAM exam
Cyber Risk Framework - Detect Threats Part Two
Certified Public Accountant
Online
No advanced preparation or prerequisites are required for this course.
Chartered Accountant (IES8 CPD)
Online
Certified Management Accountant
Online
No advanced preparation or prerequisites are required for this course.
Certified Fraud Examiner
Online
No advanced preparation or prerequisites are required for this course.
Certified Government Financial Manager
Online
No advanced preparation or prerequisites are required for this course.
Certified Internal Auditor
Online
No advanced preparation or prerequisites are required for this course.
Certification in Risk Management Assurance
Online
No advanced preparation or prerequisites are required for this course.
Certified Information Security Manager
Online
Certified in Risk and Information Systems Control
Online
Certified Information Systems Auditor
Online
Certified Identity and Security Technologist
Online
Ask the instructor a question about this lesson