Talk:Continuous monitoring

Continuous Monitoring and Policy and Processes
While it is all good to have continuous monitoring from a operational standpoint, is also equally important to perform continuous monitoring of the policies and processes in place to ensure that they do not introduce risk or vulnerabilities to the systems and applications involved. Often organizations forget to perform root cause analysis after events or vulnerability discovery to determine IF the event or vulnerability may have been caused by a gap in a policy or procedure. Additionally, reviews of policy and procedures should be performed to ensure that the impact of new technology is accounted for in updating these documents. —Preceding unsigned comment added by 209.22.99.34 (talk) 17:59, 29 May 2009 (UTC)

External links modified
Hello fellow Wikipedians,

I have just modified one external link on Continuous monitoring. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
 * Added archive https://web.archive.org/web/20120806051608/http://www.soxlaw.com/s404.htm to http://www.soxlaw.com/s404.htm

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

Cheers.— InternetArchiveBot  (Report bug) 16:25, 12 August 2017 (UTC)

Wiki Education assignment: National and International Cybersecurity Policy
— Assignment last updated by Joebanny (talk) 23:05, 3 April 2023 (UTC)