"Cybersecurity Detective Controls"
Read the "Cybersecurity Detective Controls" document, then apply the principles to answer these questions and prepare a short presentation
(3-5 minutes)
What is the importance of safeguarding an event log?

