{"id":40608,"date":"2023-01-19T04:53:50","date_gmt":"2023-01-19T09:53:50","guid":{"rendered":"https:\/\/wp266329.wpdns.ca\/la-fonction-detecter-de-la-cybersecurite\/"},"modified":"2025-09-23T04:40:40","modified_gmt":"2025-09-23T08:40:40","slug":"the-detect-function-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/","title":{"rendered":"The \u201cDetect\u201d function of cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"40608\" class=\"elementor elementor-40608 elementor-39644\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-88f6b86 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"88f6b86\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ac17f1e\" data-id=\"ac17f1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-17b5f9e elementor-widget elementor-widget-heading\" data-id=\"17b5f9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-xl\">The \u201cDetect\u201d function of cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6630e6b elementor-widget elementor-widget-image\" data-id=\"6630e6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1732\" height=\"684\" src=\"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/4-2.jpg\" class=\"attachment-full size-full wp-image-40611\" alt=\"The \u201cDetect\u201d function of cybersecurity\" srcset=\"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/4-2.jpg 1732w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/4-2-300x118.jpg 300w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/4-2-1024x404.jpg 1024w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/4-2-768x303.jpg 768w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/4-2-1536x607.jpg 1536w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/4-2-700x276.jpg 700w\" sizes=\"(max-width: 1732px) 100vw, 1732px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ee2b67f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ee2b67f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-11bbeb3\" data-id=\"11bbeb3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dc33408 elementor-widget elementor-widget-text-editor\" data-id=\"dc33408\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 17px;\">In previous articles in our cybersecurity for managers folder, we have discussed the &#8220;<strong><a href=\"https:\/\/eficio.ca\/blog\/the-identify-function-of-cybersecurity\/\">identify<\/a><\/strong>&#8221; and &#8220;<a href=\"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/\"><strong>protect<\/strong><\/a>&#8221; functions. This article will now cover the &#8220;detect&#8221; function. Our <a href=\"https:\/\/eficio.ca\/en\/digital-products\/ciso360-cyberrisk-control\/\"><strong>CISO-360 CyberRisk Control diagnostic<\/strong><\/a> and intervention plan identifies the detection controls necessary for proper cybersecurity risk management. These controls will be analyzed, and recommendations will be customized based on the internal capacity of your IT team. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd3baf9 elementor-widget elementor-widget-testimonial\" data-id=\"dd3baf9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"testimonial.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-wrapper\">\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-testimonial-meta elementor-has-image elementor-testimonial-image-position-aside\">\n\t\t\t\t<div class=\"elementor-testimonial-meta-inner\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio.png\" class=\"attachment-full size-full wp-image-39547\" alt=\"\" srcset=\"https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio.png 500w, https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio-300x300.png 300w, https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio-150x150.png 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-details\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-name\">Pierre Farley<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-job\">Eficio Partner and CIO<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4d36da elementor-widget elementor-widget-text-editor\" data-id=\"f4d36da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 17px;\">The &#8220;detect&#8221; function is a layer that overlaps the two functions previously discussed (&#8220;<strong><a href=\"https:\/\/eficio.ca\/blog\/the-identify-function-of-cybersecurity\/\">identify<\/a><\/strong>&#8221; and &#8220;<strong><a href=\"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/\">protect<\/a><\/strong>&#8220;). Detection consists of data collection, setting up an alert system, and event validation operations. The goal of detection is to quickly discover a cyberattack event. The key to successful detection relies on logging and automating controls.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">Law 25, which focuses on the protection of personal information, obliges organizations to inform individuals affected by an intrusion or theft of data. Therefore, the &#8220;Detect&#8221; function must put rigorous controls in place for the identification of personal data and access to this data.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">Since all organizations face cyberattacks daily, cybersecurity detection is a necessary and continuous task, even when performed in real-time.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">What are the key elements of the &#8220;detect&#8221; function?<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d65ee71 elementor-widget elementor-widget-text-editor\" data-id=\"d65ee71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left; padding-left: 40px;\"><span style=\"color: #000000; font-size: 17px;\"><strong>\u2022 Anomalies and Events<\/strong> &#8211; Collect and analyze data from your systems. This can represent a high volume of data to validate. You must ensure that your IT team has the knowledge and time required to perform the task. Data collection and centralization tools can simplify the task;<\/span><\/p><p style=\"padding-left: 40px;\"><span style=\"color: #000000; font-size: 17px;\"><strong>\u2022 Security and continuous monitoring &#8211;<\/strong> 24\/7 monitoring of your systems, preferably in an automated way. This can be accomplished by specialized solutions or partners who will have a real-time eye on your systems;<\/span><\/p><p style=\"text-align: left; padding-left: 40px;\"><span style=\"color: #000000; font-size: 17px;\"><strong>\u2022 Detection process \u2013<\/strong> How and what to detect\/validate. This aspect can be demanding. Not all alerts have the same level of risk and how to ensure that a legitimate alert is detected in time? Specialized solutions based on artificial intelligence are an important asset to consider.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-350c3c7 elementor-widget elementor-widget-text-editor\" data-id=\"350c3c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 17px;\">At Eficio, we have observed that while tools and controls are often implemented to fulfill the detection function at the data collection level, but they are frequently only briefly used during the validation and detection stages of cybersecurity events.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">Effective detection requires the logging of a high volume of data, and today&#8217;s smart tools use artificial intelligence (AI) to cross-check data and identify risky behavior in various systems. However, simply using the right tools is not enough. It is not uncommon for organizations to have deficient data validation, even when using such tools. Often, this task is delegated to an IT support team that prioritizes user support and project completion, leaving cybersecurity tasks neglected.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">Our cybersecurity experts can offer you solutions that go beyond simply identifying gaps in your detection function. There are various organizational solutions available that can help increase security monitoring. The <strong><a href=\"https:\/\/eficio.ca\/en\/digital-products\/ciso360-cyberrisk-control\/\">CISO-360 Cyber Risk Control<\/a><\/strong> is more than just a diagnosis; it is a solution-oriented approach that takes into account the realities of your organization. The management experience of our stakeholders is the cornerstone of our approach, and it sets us apart.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-712c5af elementor-widget elementor-widget-text-editor\" data-id=\"712c5af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 17px;\">If you would like to comment to this article or obtain further information, please do not hesitate to contact Eficio. You can access all the articles in our folder by following the links below:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-85f4286 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"85f4286\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7dcac8e\" data-id=\"7dcac8e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27b06ef elementor-widget elementor-widget-text-editor\" data-id=\"27b06ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"padding-left: 40px;\"><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/\">\u2022 A Cyber Risk control approach based on a financial control model<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/\">\u2022 The \u201cIdentify\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/\">\u2022 The \u201cProtect\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/\">\u2022 The \u201cDetect\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-response-function-in-cybersecurity\/\">\u2022 The \u201cResponse\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/\">\u2022 The \u201cRecover\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c9d2e8a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c9d2e8a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d2c7598\" data-id=\"d2c7598\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0e194f7 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0e194f7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-887982a\" data-id=\"887982a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b7e97cb elementor-widget elementor-widget-text-editor\" data-id=\"b7e97cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\"><span style=\"color: #ffffff;\">Subscribe to the Eficio newsletter and be the first to receive our updates!<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a382ea7\" data-id=\"a382ea7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7858e51 elementor-align-right elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"7858e51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/nut.sh\/ell\/forms\/201665\/wdp0yC\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Subscribe<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The \u201cDetect\u201d function of cybersecurity In previous articles in our cybersecurity for managers folder, we have discussed the &#8220;identify&#8221; and &#8220;protect&#8221; functions. This article will now cover the &#8220;detect&#8221; function. Our CISO-360 CyberRisk Control diagnostic and intervention plan identifies the detection controls necessary for proper&#8230;<\/p>\n","protected":false},"author":4,"featured_media":40700,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"_acf_changed":false,"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[215,727],"tags":[274,268,292,283,293,278,272,207,305,210,307,273,296,264],"class_list":["post-40608","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-cybersecurite","tag-audit-en","tag-audit","tag-cyberrisque-en","tag-cyberrisque","tag-cybersecurite-en","tag-cybersecurite","tag-data","tag-donnees","tag-donnees-en","tag-securite","tag-securite-en","tag-security","tag-transformation-numerique-en","tag-transformation-numerique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The \u201cDetect\u201d function of cybersecurity - Eficio<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The \u201cDetect\u201d function of cybersecurity\" \/>\n<meta property=\"og:description\" content=\"The \u201cDetect\u201d function of cybersecurity In previous articles in our cybersecurity for managers folder, we have discussed the &#8220;identify&#8221; and &#8220;protect&#8221; functions. This article will now cover the &#8220;detect&#8221; function. Our CISO-360 CyberRisk Control diagnostic and intervention plan identifies the detection controls necessary for proper...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Eficio\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Eficio.ca\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-19T09:53:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-23T08:40:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/4-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"684\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alain Marchildon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Marchildon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-detect-function-of-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-detect-function-of-cybersecurity\\\/\"},\"author\":{\"name\":\"Alain Marchildon\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/person\\\/87b4a66e70dfd073460fc0962d1d7093\"},\"headline\":\"The \u201cDetect\u201d function of cybersecurity\",\"datePublished\":\"2023-01-19T09:53:50+00:00\",\"dateModified\":\"2025-09-23T08:40:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-detect-function-of-cybersecurity\\\/\"},\"wordCount\":596,\"publisher\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-detect-function-of-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/4-3.jpg\",\"keywords\":[\"audit\",\"Audit\",\"cyberrisque\",\"cyberrisque\",\"Cybers\u00e9curit\u00e9\",\"Cybers\u00e9curit\u00e9\",\"data\",\"Donn\u00e9es\",\"Donn\u00e9es\",\"S\u00e9curit\u00e9\",\"S\u00e9curit\u00e9\",\"Security\",\"transformation num\u00e9rique\",\"transformation num\u00e9rique\"],\"articleSection\":[\"Articles\",\"Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-detect-function-of-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-detect-function-of-cybersecurity\\\/\",\"name\":\"The \u201cDetect\u201d function of cybersecurity - Eficio\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-detect-function-of-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-detect-function-of-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/4-3.jpg\",\"datePublished\":\"2023-01-19T09:53:50+00:00\",\"dateModified\":\"2025-09-23T08:40:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-detect-function-of-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-detect-function-of-cybersecurity\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-detect-function-of-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The \u201cDetect\u201d function of cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\",\"name\":\"Eficio\",\"description\":\"CIO disponibles selon vos besoins\",\"publisher\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eficio.ca\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\",\"name\":\"Eficio\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Eficio_logo_blanc_fond_orange@300ppi.jpg\",\"contentUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Eficio_logo_blanc_fond_orange@300ppi.jpg\",\"width\":880,\"height\":361,\"caption\":\"Eficio\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Eficio.ca\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/integra-co\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/person\\\/87b4a66e70dfd073460fc0962d1d7093\",\"name\":\"Alain Marchildon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568\",\"url\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568\",\"contentUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568\",\"caption\":\"Alain Marchildon\"},\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/author\\\/amarchildon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The \u201cDetect\u201d function of cybersecurity - Eficio","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"The \u201cDetect\u201d function of cybersecurity","og_description":"The \u201cDetect\u201d function of cybersecurity In previous articles in our cybersecurity for managers folder, we have discussed the &#8220;identify&#8221; and &#8220;protect&#8221; functions. This article will now cover the &#8220;detect&#8221; function. Our CISO-360 CyberRisk Control diagnostic and intervention plan identifies the detection controls necessary for proper...","og_url":"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/","og_site_name":"Eficio","article_publisher":"https:\/\/www.facebook.com\/Eficio.ca\/","article_published_time":"2023-01-19T09:53:50+00:00","article_modified_time":"2025-09-23T08:40:40+00:00","og_image":[{"width":1000,"height":684,"url":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/4-3.jpg","type":"image\/jpeg"}],"author":"Alain Marchildon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alain Marchildon","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/"},"author":{"name":"Alain Marchildon","@id":"https:\/\/eficio.ca\/en\/#\/schema\/person\/87b4a66e70dfd073460fc0962d1d7093"},"headline":"The \u201cDetect\u201d function of cybersecurity","datePublished":"2023-01-19T09:53:50+00:00","dateModified":"2025-09-23T08:40:40+00:00","mainEntityOfPage":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/"},"wordCount":596,"publisher":{"@id":"https:\/\/eficio.ca\/en\/#organization"},"image":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/4-3.jpg","keywords":["audit","Audit","cyberrisque","cyberrisque","Cybers\u00e9curit\u00e9","Cybers\u00e9curit\u00e9","data","Donn\u00e9es","Donn\u00e9es","S\u00e9curit\u00e9","S\u00e9curit\u00e9","Security","transformation num\u00e9rique","transformation num\u00e9rique"],"articleSection":["Articles","Cybers\u00e9curit\u00e9"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/","url":"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/","name":"The \u201cDetect\u201d function of cybersecurity - Eficio","isPartOf":{"@id":"https:\/\/eficio.ca\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/4-3.jpg","datePublished":"2023-01-19T09:53:50+00:00","dateModified":"2025-09-23T08:40:40+00:00","breadcrumb":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/eficio.ca\/en\/"},{"@type":"ListItem","position":2,"name":"The \u201cDetect\u201d function of cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/eficio.ca\/en\/#website","url":"https:\/\/eficio.ca\/en\/","name":"Eficio","description":"CIO disponibles selon vos besoins","publisher":{"@id":"https:\/\/eficio.ca\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eficio.ca\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eficio.ca\/en\/#organization","name":"Eficio","url":"https:\/\/eficio.ca\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eficio.ca\/en\/#\/schema\/logo\/image\/","url":"https:\/\/eficio.ca\/wp-content\/uploads\/2024\/12\/Eficio_logo_blanc_fond_orange@300ppi.jpg","contentUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2024\/12\/Eficio_logo_blanc_fond_orange@300ppi.jpg","width":880,"height":361,"caption":"Eficio"},"image":{"@id":"https:\/\/eficio.ca\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Eficio.ca\/","https:\/\/www.linkedin.com\/company\/integra-co\/"]},{"@type":"Person","@id":"https:\/\/eficio.ca\/en\/#\/schema\/person\/87b4a66e70dfd073460fc0962d1d7093","name":"Alain Marchildon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568","url":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568","contentUrl":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568","caption":"Alain Marchildon"},"url":"https:\/\/eficio.ca\/en\/blog\/author\/amarchildon\/"}]}},"_links":{"self":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40608","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/comments?post=40608"}],"version-history":[{"count":19,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40608\/revisions"}],"predecessor-version":[{"id":52415,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40608\/revisions\/52415"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/media\/40700"}],"wp:attachment":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/media?parent=40608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/categories?post=40608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/tags?post=40608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}