GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Continuous Compliance is Your Best Protection

All organizations are vulnerable to cybersecurity attacks in some way. The common thread among all organizations, including the United States federal government, is the necessity to continuously validate and improve their security posture and prove their compliance year round. To achieve this state, organizations are moving away from point-in-time monitoring toward a more continuous approach to help identify and fix critical weaknesses in cyber defenses as they occur.

There are several accepted frameworks that can accelerate an organization’s ability to build-in security while simultaneously reducing risk. WWT used these frameworks for guidance in developing a Continuous Compliance solution. In Special Publication (SP) 800-137, the National Institute of Standards and Technology (NIST) defined information security continuous monitoring (ISCM) as maintaining ongoing awareness of information security, network vulnerabilities and threats.

  • Author(s):
  • World Wide Technology Inc.
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Continuous Compliance is Your Best Protection
Format:
  • White Paper
Topics:
Website:Visit Publisher Website
Publisher:World Wide Technology, Inc.
Published:January 1, 2020
License:Copyrighted
Copyright:© 2020 World Wide Technology. All Rights Reserved.

Featured Content

Contact Publisher

Claim Content