Continuous controls monitoring

Results: 42



#Item
11Computing / Management / Risk / Federal Information Security Management Act / Risk management framework / Information security / Security controls / Continuous monitoring / Vulnerability / Computer security / Security / Data security

Information Security Continuous Monitoring (Ongoing Monitoring in Support of Organizational Risk Management) NIST SP[removed]December 14th, 2010

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-21 00:00:00
12Cyberwarfare / Management / Risk management / Risk management framework / Security Content Automation Protocol / Security controls / Information security / Continuous monitoring / Vulnerability / Computer security / Security / Data security

Continuous Monitoring in a Risk Management Framework US Census Bureau Oct 2012

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:32:05
13Federal Information Security Management Act / Information security / Security controls / Vulnerability / Consensus audit guidelines / Penetration test / Risk management / Security risk / Application security / Computer security / Security / Cyberwarfare

Creating More Effective – and Strategic – Solutions Information Security Continuous Monitoring (ISCM) Strategy and Program Implementation Introduction

Add to Reading List

Source URL: www.verisgroup.com

Language: English - Date: 2014-06-12 08:09:38
14Information technology management / Security Content Automation Protocol / Vulnerability / Information security / Configuration management / XML / Security controls / IT risk management / Computer security / Computing / Security

NISTIR 7800, Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains (DRAFT)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 16:40:08
15Risk / Internal control / Internal audit / Continuous monitoring / Audit / Business process / Committee of Sponsoring Organizations of the Treadway Commission / Information technology controls / Auditing / Accountancy / Business

REVIEW OF INTERNAL CONTROLS 1. EXECUTIVE SUMMARY ................................................................................................................... 1 2.

Add to Reading List

Source URL: www.ocol-clo.gc.ca

Language: English - Date: 2014-03-28 14:39:24
16Information technology audit / Risk / Computer-aided audit tools / Internal control / Continuous monitoring / ACL / Internal audit / Audit / Regulatory compliance / Auditing / Accountancy / Business

CASE STUDY B.C. GOVERNMENT MINISTRY OF FINANCE OFFICE OF THE COMPTROLLER GENERAL STRENGTHENS INTERNAL CONTROLS

Add to Reading List

Source URL: www.acl.com

Language: English - Date: 2013-12-09 17:29:58
17Public safety / National security / Computer network security / Security controls / Information security / Security Content Automation Protocol / United States Department of Homeland Security / Identity management / National Institute of Standards and Technology / Computer security / Security / Data security

NISTIR 7756, CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Model (Second Draft)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 16:36:38
18Risk / Risk management / Federal Information Security Management Act / Information security / Security risk / Risk management framework / Continuous monitoring / Vulnerability / Security controls / Computer security / Security / Data security

QSG - Categorize Organization

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-05-13 01:00:00
19Public safety / National security / Crime prevention / Information technology audit / Information security / Security controls / Risk management framework / Continuous monitoring / Security guard / Security / Data security / Computer security

Continuous Monitoring Roles and Responsibilities

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-05-13 01:00:00
20Risk / Risk management / Federal Information Security Management Act / Information security / Continuous monitoring / Vulnerability / Risk management framework / Security risk / Security controls / Computer security / Security / Data security

Monitor - Detailed Organizational Guide

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-05-13 01:00:00
UPDATE