All organizations are vulnerable to cybersecurity attacks in some way. The common thread among all organizations, including the United States federal government, is the necessity to continuously validate and improve their security posture and prove their compliance year round. To achieve this state, organizations are moving away from point-in-time monitoring toward a more continuous approach to help identify and fix critical weaknesses in cyber defenses as they occur.
There are several accepted frameworks that can accelerate an organization’s ability to build-in security while simultaneously reducing risk. WWT used these frameworks for guidance in developing a Continuous Compliance solution. In Special Publication (SP) 800-137, the National Institute of Standards and Technology (NIST) defined information security continuous monitoring (ISCM) as maintaining ongoing awareness of information security, network vulnerabilities and threats.
Format: |
|
Topics: | |
Website: | Visit Publisher Website |
Publisher: | World Wide Technology, Inc. |
Published: | January 1, 2020 |
License: | Copyrighted |
Copyright: | © 2020 World Wide Technology. All Rights Reserved. |