Last week we briefly discussed the identity and protect functions of the cybersecurity framework. This week we'll continue going through the framework with a discussion about the detect and respond functions. Detect is just that we must develop and implement the appropriate activities to identify that a cybersecurity event has actually happened or is in the process of happening. Some examples of outcome categories within this function can include things like anomalies and events. Continuous monitoring for cybersecurity events and the detection process itself. The response function guides us to develop and implement appropriate activities that enable us to act when a cybersecurity event actually is detected. The RESPOND function provides us the ability to contain and reduce the impact of a potential cybersecurity event. Some example outcome categories in the function include things like response planning, communications, analysis, mitigation, and improvements. #TechSageSolutions#NISTFramework#cybersecurity