<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Auditing vulnerability Management process in Member Support</title>
    <link>https://community.isc2.org/t5/Member-Support/Auditing-vulnerability-Management-process/m-p/20394#M3952</link>
    <description>&lt;P&gt;For Internal audit or another supervisor entity, Have you ever been in the obligation of demostrate that your risks associated to infrastructure vulnerabilities have not been materialized? How have you done it? Which logs or documental supports May I use?&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:09:35 GMT</pubDate>
    <dc:creator>A2jacomel</dc:creator>
    <dc:date>2023-10-09T09:09:35Z</dc:date>
    <item>
      <title>Auditing vulnerability Management process</title>
      <link>https://community.isc2.org/t5/Member-Support/Auditing-vulnerability-Management-process/m-p/20394#M3952</link>
      <description>&lt;P&gt;For Internal audit or another supervisor entity, Have you ever been in the obligation of demostrate that your risks associated to infrastructure vulnerabilities have not been materialized? How have you done it? Which logs or documental supports May I use?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:09:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Auditing-vulnerability-Management-process/m-p/20394#M3952</guid>
      <dc:creator>A2jacomel</dc:creator>
      <dc:date>2023-10-09T09:09:35Z</dc:date>
    </item>
  </channel>
</rss>

