From f33e305b3aeff59783d9fd8573aaf683208e05ce Mon Sep 17 00:00:00 2001 From: Stephen Strudwick Date: Wed, 12 Jun 2024 11:02:12 +0100 Subject: [PATCH] Update threat_management.md --- standards/threat_management.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/standards/threat_management.md b/standards/threat_management.md index e570bc1..060a374 100644 --- a/standards/threat_management.md +++ b/standards/threat_management.md @@ -12,7 +12,9 @@ The protect function covers much of the technical and physical security controls ### Detect The detect function implements measures that alert an organization to cyberattacks. Detect categories include anomalies and events, continuous security monitoring and early detection processes. ### Respond -The respond function ensures an appropriate response to cyberattacks and other cybersecurity events. Categories include response planning, communications, analysis, mitigation and improvements.“ [https://www.ibm.com/topics/threat-management](https://www.ibm.com/topics/threat-management) +The respond function ensures an appropriate response to cyberattacks and other cybersecurity events. Categories include response planning, communications, analysis, mitigation and improvements. + +See also: [https://www.ibm.com/topics/threat-management](https://www.ibm.com/topics/threat-management) ## Identify ### Risk Management