Team-Venti-white-logo.png

Team Venti’s e-book series part 3 of 5:

The NIST Cybersecurity Framework – The Detect Function

Download the e-book and learn about the categories within the Detect Function of the NIST framework: Anomalies and events,
continuous monitoring, detection processes

NIST framework ebook function detect cover

Team Venti has been working on an e-book series based on the National Institute of Standards and Technology (NIST) framework. This framework consists of five functions and includes categories within each. We have associated each of the categories that fall within the high-level functions to Microsoft technologies services to help mitigate risk and provide guidance for your environment.

Function 1: Identify

identify logo

In part one, we emphasized the importance of identifying and adhering to a process, as opposed to allowing security products to drive IT decision making. The categories touched upon in this volume are asset management, business environment, governance, risk assessment, risk management strategy, and supply chain risk management.

Function 2: Protect

detect logo

In the second part of this series, we have dived into the second function of the NIST CSF framework: Protect. The categories touched upon in this section are access control, data security, information protection processes and procedures, and maintenance

Function 3: Detect

protect logo

In this volume we recognize the possibility of an organization having successful cyberattacks and being able to detect and mitigate beforehand, rather than reacting at the moment. We delved into this function through a case study analysis.