<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>The Business Model of Security &#187; Inbound Logisitics</title>
	<atom:link href="http://businessmodelofsecurity.com/category/bmos/inbound-logisitics/feed/" rel="self" type="application/rss+xml" />
	<link>http://businessmodelofsecurity.com</link>
	<description>Demand Driven Security Program Management</description>
	<lastBuildDate>Wed, 31 Jul 2013 18:39:41 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.38</generator>
	<item>
		<title>Threat Monitoring</title>
		<link>http://businessmodelofsecurity.com/bmos/inbound-logisitics/threat-monitoring/</link>
		<comments>http://businessmodelofsecurity.com/bmos/inbound-logisitics/threat-monitoring/#comments</comments>
		<pubDate>Fri, 02 Mar 2012 20:18:06 +0000</pubDate>
		<dc:creator><![CDATA[Brandon Dunlap]]></dc:creator>
				<category><![CDATA[Inbound Logisitics]]></category>

		<guid isPermaLink="false">http://businessmodelofsecurity.com/?p=218</guid>
		<description><![CDATA[<p>What is Threat Monitoring? The ongoing collection, analysis, and review of attempted and/or successful compromises at the network, platform, data  and process levels. Process Overview The purpose of the Threat Monitoring Process is to standardize and explain the processing activities and steps involved in monitoring threat conditions to organization information assets. Supporting Technologies Network threat [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/inbound-logisitics/threat-monitoring/">Threat Monitoring</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<h2>What is Threat Monitoring?</h2>
<p>The ongoing collection, analysis, and review of attempted and/or successful compromises at the network, platform, data  and process levels.</p>
<h3>Process Overview</h3>
<p>The purpose of the Threat Monitoring Process is to standardize and explain the processing activities and steps involved in monitoring threat conditions to organization information assets.</p>
<h3>Supporting Technologies</h3>
<ul>
<li>Network threat detection software/hardware.</li>
<li>Platform threat detection software/hardware.  Limited support through platform event logging.</li>
<li>Application threat detection through application event logging.</li>
<li>Centralized threat report repository software/hardware.</li>
</ul>
<h3>Process Dependencies</h3>
<ul>
<li>Help Desk/Problem Management</li>
<li>Data Center Operations</li>
<li>Network Operations</li>
<li>Contingency Planning/Disaster Recovery</li>
</ul>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/inbound-logisitics/threat-monitoring/">Threat Monitoring</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://businessmodelofsecurity.com/bmos/inbound-logisitics/threat-monitoring/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
