a process for continuous risk assessment, track anything that can be involved in security incident, anything related to network traffic, data exposure, host endpoints, business operations, a proactive method that is costly and cost well trained and well paid staff, keep most staff at bay