"Cybersecurity Detective Controls"

Read the "Cybersecurity Detective Controls" document, then apply the principles to answer these questions and prepare a short presentation (3-5 minutes) What is the importance of safeguarding an event log?