<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Fri, 08 May 2026 02:43:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Your Cybersecurity Investment Reflects your Approach to Risk Management</title>
		<link>https://risk-academy.ru/your-cybersecurity-investment-reflects-your-approach-to-risk-management/</link>
					<comments>https://risk-academy.ru/your-cybersecurity-investment-reflects-your-approach-to-risk-management/#respond</comments>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 08 May 2026 02:43:24 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/your-cybersecurity-investment-reflects-your-approach-to-risk-management/</guid>

					<description><![CDATA[By Tony Anscombe Email, thecoastnewspaper@gmail.com Businesses routinely evolve alongside the challenges of their operating environments. If the challenge is power, they ensure they have a power backup.  Organisations that cannot [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>By Tony Anscombe</p>
<p>Email, thecoastnewspaper@gmail.com</p>
<p>Businesses routinely evolve alongside the challenges of their operating environments. If the challenge is power, they ensure they have a power backup. </p>
<p>Organisations that cannot afford downtime invest in connectivity failover. And yet, when it comes to digital infrastructure, many businesses treat “security” as a separate, IT-delegated silo rather than a core pillar of operational performance and, in the worst-case scenario, survival.</p>
<p>This is a mistake, because the era of viewing cybersecurity merely as a defensive IT function is well and truly over. Cyber risk is fundamentally a business risk, which means that true resilience demands a commercial, rather than a purely technical, approach.</p>
<p>What does this mean? If we are honest, security is often viewed as a grudge purchase. Imagine a boardroom where a Chief Information Security Officer requests a budget of about Ksh77 million based on detailed threat modelling.</p>
<p>The board reviews this and counters with approving Ksh46 million. That Ksh31 million difference is not a savings for the business. It is an unmitigated financial risk that the business&#8230;</p>
</div>
<p><a href="https://www.thecoast.co.ke/2026/05/08/your-cybersecurity-investment-reflects-your-approach-to-risk-management/07/23/opinion-commentary/thecoast/15601/00/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
					<wfw:commentRss>https://risk-academy.ru/your-cybersecurity-investment-reflects-your-approach-to-risk-management/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Волатильность рынков и управление рисками на Phemex 2026</title>
		<link>https://risk-academy.ru/%d0%b2%d0%be%d0%bb%d0%b0%d1%82%d0%b8%d0%bb%d1%8c%d0%bd%d0%be%d1%81%d1%82%d1%8c-%d1%80%d1%8b%d0%bd%d0%ba%d0%be%d0%b2-%d0%b8-%d1%83%d0%bf%d1%80%d0%b0%d0%b2%d0%bb%d0%b5%d0%bd%d0%b8%d0%b5-%d1%80%d0%b8/</link>
					<comments>https://risk-academy.ru/%d0%b2%d0%be%d0%bb%d0%b0%d1%82%d0%b8%d0%bb%d1%8c%d0%bd%d0%be%d1%81%d1%82%d1%8c-%d1%80%d1%8b%d0%bd%d0%ba%d0%be%d0%b2-%d0%b8-%d1%83%d0%bf%d1%80%d0%b0%d0%b2%d0%bb%d0%b5%d0%bd%d0%b8%d0%b5-%d1%80%d0%b8/#respond</comments>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 07 May 2026 22:13:35 +0000</pubDate>
				<category><![CDATA[Risk management]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/%d0%b2%d0%be%d0%bb%d0%b0%d1%82%d0%b8%d0%bb%d1%8c%d0%bd%d0%be%d1%81%d1%82%d1%8c-%d1%80%d1%8b%d0%bd%d0%ba%d0%be%d0%b2-%d0%b8-%d1%83%d0%bf%d1%80%d0%b0%d0%b2%d0%bb%d0%b5%d0%bd%d0%b8%d0%b5-%d1%80%d0%b8/</guid>

					<description><![CDATA[Глобальный финансовый ландшафт переживает период серьезной структурной перестройки. Сегодня, 3 марта 2026 года, по мере открытия торгов на Уолл-стрит, поисковый запрос &#8220;фондовый рынок сегодня&#8221; достиг максимальных значений. Инвесторы реагируют на [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id=""><!----></p>
<p>Глобальный финансовый ландшафт переживает период серьезной структурной перестройки. Сегодня, 3 марта 2026 года, по мере открытия торгов на Уолл-стрит, поисковый запрос &#8220;<strong>фондовый рынок сегодня</strong>&#8221; достиг максимальных значений. Инвесторы реагируют на значительные различия между восточными и западными рынками, где локальная волатильность начинает влиять на глобальную ликвидность.</p>
<p>Для современного участника рынка граница между &#8220;криптовалютой&#8221; и &#8220;традиционными акциями&#8221; становится все более размыта. Динамика сегодняшнего рынка показывает, что системные потрясения в одном регионе могут быстро передаваться на другие классы активов. Когда промышленные и&#8230;</p>
</div>
<p><a href="https://phemex.com/ru/blogs/stock-market-volatility-risk-management-mar-3-2026">Подробнее&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
					<wfw:commentRss>https://risk-academy.ru/%d0%b2%d0%be%d0%bb%d0%b0%d1%82%d0%b8%d0%bb%d1%8c%d0%bd%d0%be%d1%81%d1%82%d1%8c-%d1%80%d1%8b%d0%bd%d0%ba%d0%be%d0%b2-%d0%b8-%d1%83%d0%bf%d1%80%d0%b0%d0%b2%d0%bb%d0%b5%d0%bd%d0%b8%d0%b5-%d1%80%d0%b8/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ABS Acquires RMC Global To Strengthen Cybersecurity,</title>
		<link>https://risk-academy.ru/abs-acquires-rmc-global-to-strengthen-cybersecurity/</link>
					<comments>https://risk-academy.ru/abs-acquires-rmc-global-to-strengthen-cybersecurity/#respond</comments>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 07 May 2026 21:42:23 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/abs-acquires-rmc-global-to-strengthen-cybersecurity/</guid>

					<description><![CDATA[Photo Caption (L to R): Vince Kuchar, President, RMC Global, and David Wechsler, President and CEO, ABS Group. Credit: ABS ABS, through its affiliate ABSG Consulting Inc. (ABS Consulting), has [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
                    <img decoding="async" src="https://images.marinelink.com/images/maritime/w400/photo-caption-170430.jpg" alt="Photo Caption (L to R): Vince Kuchar, President, RMC Global, and David Wechsler, President and CEO, ABS Group. Credit: ABS"/></p>
<p class="meta">Photo Caption (L to R): Vince Kuchar, President, RMC Global, and David Wechsler, President and CEO, ABS Group. Credit: ABS</p>
</p></div>
<div itemprop="text">
<p>ABS, through its affiliate ABSG Consulting Inc. (ABS Consulting), has announced the acquisition of RMC Global (RMC), a provider of industrial cybersecurity, risk management and resiliency solutions.</p>
<p>The acquisition strengthens ABS Consulting’s capabilities and market position, bringing together two organizations with complementary expertise, shared values and a common mission. Combining RMC’s capabilities with ABS Consulting’s scale, technical depth and global resources, unlocks more integrated solutions for clients operating in increasingly complex risk environments.</p>
<p>“Clients are facing increasing operational risk, cyber threats, and regulatory pressure. Bringing together the expertise of RMC and ABS Consulting strengthens our ability to deliver even greater value and support for our clients through comprehensive, integrated solutions,&#8221; said ABS Chairman and CEO John McDonald.</p>
<p>He highlighted that the acquisition is both a strategic and cultural fit. RMC’s&#8230;</p>
</div>
<p><a href="https://www.marinelink.com/news/abs-acquires-rmc-global-strengthen-538951">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
					<wfw:commentRss>https://risk-academy.ru/abs-acquires-rmc-global-to-strengthen-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Важнейшие изменения GMP ЕС–2 &#8211; Аптека online</title>
		<link>https://risk-academy.ru/%d0%b2%d0%b0%d0%b6%d0%bd%d0%b5%d0%b9%d1%88%d0%b8%d0%b5-%d0%b8%d0%b7%d0%bc%d0%b5%d0%bd%d0%b5%d0%bd%d0%b8%d1%8f-gmp-%d0%b5%d1%81-2-%d0%b0%d0%bf%d1%82%d0%b5%d0%ba%d0%b0-online/</link>
					<comments>https://risk-academy.ru/%d0%b2%d0%b0%d0%b6%d0%bd%d0%b5%d0%b9%d1%88%d0%b8%d0%b5-%d0%b8%d0%b7%d0%bc%d0%b5%d0%bd%d0%b5%d0%bd%d0%b8%d1%8f-gmp-%d0%b5%d1%81-2-%d0%b0%d0%bf%d1%82%d0%b5%d0%ba%d0%b0-online/#respond</comments>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 07 May 2026 17:13:14 +0000</pubDate>
				<category><![CDATA[Risk management]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/%d0%b2%d0%b0%d0%b6%d0%bd%d0%b5%d0%b9%d1%88%d0%b8%d0%b5-%d0%b8%d0%b7%d0%bc%d0%b5%d0%bd%d0%b5%d0%bd%d0%b8%d1%8f-gmp-%d0%b5%d1%81-2-%d0%b0%d0%bf%d1%82%d0%b5%d0%ba%d0%b0-online/</guid>

					<description><![CDATA[24–25 февраля 2015 г. в Киеве состоялся семинар-практикум «Обзор важнейших изменений GMP ЕС 2014 и 2015 г.», организованный ООО «Укрмедсерт». Лектором выступил профессор, сертифицированный экспертами ЕС специалист, аудитор, преподаватель GMP Юрий Подпружников. [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="">
<div class="introduction">24–25 февраля 2015 г. в Киеве состоялся семинар-практикум «Обзор важнейших изменений GMP ЕС 2014 и 2015 г.», организованный ООО «Укрмедсерт». Лектором выступил профессор, сертифицированный экспертами ЕС специалист, аудитор, преподаватель GMP <span class="bold">Юрий Подпружников</span>. В рамках предыдущей публикации представлено рассмотрение новых требований надлежащей производственной практики (Good manufacturing Practice — GMP) ЕС в разделе 6 «Контроль качества». В данной статье предлагается вниманию обзор важнейших изменений раздела 8 «Претензии, дефекты качества, и отзывы продукции», раздела 3 «Помещения и оборудование», раздела 5 «Технологический процесс», а также руководства&#8230;</div>
</div>
<p><a href="https://www.apteka.ua/article/325934">Подробнее&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
					<wfw:commentRss>https://risk-academy.ru/%d0%b2%d0%b0%d0%b6%d0%bd%d0%b5%d0%b9%d1%88%d0%b8%d0%b5-%d0%b8%d0%b7%d0%bc%d0%b5%d0%bd%d0%b5%d0%bd%d0%b8%d1%8f-gmp-%d0%b5%d1%81-2-%d0%b0%d0%bf%d1%82%d0%b5%d0%ba%d0%b0-online/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Future Perspectives: Key Trends Shaping the Cloud Security</title>
		<link>https://risk-academy.ru/future-perspectives-key-trends-shaping-the-cloud-security/</link>
					<comments>https://risk-academy.ru/future-perspectives-key-trends-shaping-the-cloud-security/#respond</comments>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 07 May 2026 16:41:27 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/future-perspectives-key-trends-shaping-the-cloud-security/</guid>

					<description><![CDATA[Cloud Security Posture Management Market The cloud security posture management market is positioned for significant expansion over the coming years, driven by increasing demand for comprehensive cloud security solutions. As [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<div class="pm-img-container"><img decoding="async" class="pm-img-xl" src="https://cdn.open-pr.com/L/5/L507414447_g.jpg" alt="Cloud Security Posture Management Market"/></p>
<p class="pm-img-details">Cloud Security Posture Management Market</p>
</div>
<p>The cloud security posture management market is positioned for significant expansion over the coming years, driven by increasing demand for comprehensive cloud security solutions. As organizations continue to adopt cloud technologies, the need to monitor and manage security postures effectively becomes imperative. Let&#8217;s delve into the market&#8217;s growth forecast, leading players, emerging trends, and segmentation to gain a clearer understanding of this evolving sector.</p>
<p>Forecasted Expansion of the Cloud Security Posture Management Market Size by 2030 <br />&#13;<br />
The cloud security posture management market is projected to experience rapid growth, reaching a valuation of $12.39 billion by 2030. This rise will occur at a compound annual growth rate (CAGR) of 15.2%. Several factors contribute to this anticipated growth during the forecast period, including a heightened demand for unified cloud security visibility, increased investments in automated compliance tools, the broadening of multi-cloud governance frameworks, and rising adoption rates among small and medium-sized enterprises. Additionally, there is a growing&#8230;</p>
</div>
<p><a href="https://www.openpr.com/news/4504857/future-perspectives-key-trends-shaping-the-cloud-security">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
					<wfw:commentRss>https://risk-academy.ru/future-perspectives-key-trends-shaping-the-cloud-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Future of CISO Leadership and Cybersecurity Risk Management Strategy</title>
		<link>https://risk-academy.ru/future-of-ciso-leadership-and-cybersecurity-risk-management-strategy/</link>
					<comments>https://risk-academy.ru/future-of-ciso-leadership-and-cybersecurity-risk-management-strategy/#respond</comments>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 07 May 2026 11:40:41 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/future-of-ciso-leadership-and-cybersecurity-risk-management-strategy/</guid>

					<description><![CDATA[Topic: A Veteran CISO’s Perspective: 20 Years of Cyberthreat Evolution Register Now Abstract: Over the past two decades, the cybersecurity landscape has transformed dramatically, from opportunistic viruses and basic phishing attempts to highly organized [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><strong>Topic: </strong><span class="NormalTextRun SCXW124061967 BCX0">A Veteran CISO’s Perspective: 20 Years of </span><span class="NormalTextRun SCXW124061967 BCX0">Cyber</span><span class="NormalTextRun SCXW124061967 BCX0">t</span><span class="NormalTextRun SCXW124061967 BCX0">hreat</span><span class="NormalTextRun SCXW124061967 BCX0"> Evolution</span></p>
<p>Register Now</p>
<p><strong>Abstract:</strong></p>
<p><span class="NormalTextRun SCXW82197485 BCX0">Over the past</span><span class="NormalTextRun SCXW82197485 BCX0"> two</span><span class="NormalTextRun SCXW82197485 BCX0"> decades, the cybersecurity landscape has transformed dramatically, from opportunistic viruses and basic phishing attempts to highly organized ransomware groups, nation-state campaigns, supply-chain compromises, and AI-driven attacks. Th</span><span class="NormalTextRun SCXW82197485 BCX0">is</span><span class="NormalTextRun SCXW82197485 BCX0"> </span><span class="NormalTextRun SCXW82197485 BCX0">webinar</span><span class="NormalTextRun SCXW82197485 BCX0"> </span><span class="NormalTextRun SCXW82197485 BCX0">offers</span><span class="NormalTextRun SCXW82197485 BCX0"> a veteran CISO’s perspective on how cyberthreats, defense strategies, and the role of security leadership have evolved in response to these changes. Drawing from real-world experience managing incidents, building security programs, and </span><span class="NormalTextRun SCXW82197485 BCX0">advising</span><span class="NormalTextRun SCXW82197485 BCX0"> executive leadership, the session </span><span class="NormalTextRun SCXW82197485 BCX0">highlights</span><span class="NormalTextRun SCXW82197485 BCX0"> how security priorities have shifted from perimeter defense to resilience, risk management, and business alignment</span><span class="NormalTextRun SCXW82197485 BCX0">. It also explores</span><span class="NormalTextRun SCXW82197485 BCX0"> </span><span class="NormalTextRun SCXW82197485 BCX0">how modern CISOs balance emerging technologies such as cloud, AI, and IoT with growing regulatory pressures and increasingly sophisticated adversaries. </span><span class="NormalTextRun SCXW82197485 BCX0">Attendees will </span><span class="NormalTextRun SCXW82197485 BCX0">learn key lessons from two decades of cyber defense</span><span class="NormalTextRun SCXW82197485 BCX0">,</span><span class="NormalTextRun SCXW82197485 BCX0"> along with </span><span class="NormalTextRun SCXW82197485 BCX0">practical strategies </span><span class="NormalTextRun SCXW82197485 BCX0">to</span><span class="NormalTextRun SCXW82197485 BCX0"> strengthen </span><span class="NormalTextRun SCXW82197485 BCX0">their </span><span class="NormalTextRun SCXW82197485 BCX0">organization</span><span class="NormalTextRun SCXW82197485 BCX0">s</span><span class="NormalTextRun SCXW82197485 BCX0">’</span><span class="NormalTextRun SCXW82197485 BCX0"> security posture</span><span class="NormalTextRun SCXW82197485 BCX0">s</span><span class="NormalTextRun SCXW82197485 BCX0"> and predictions </span><span class="NormalTextRun SCXW82197485 BCX0">for </span><span class="NormalTextRun SCXW82197485 BCX0">how threats may evolve in the coming years.</span></p>
<p><strong>Key&#8230;</strong></p>
</div>
<p><a href="https://www.eccouncil.org/cybersecurity-exchange/cyber-talks/a-veteran-cisos-perspective-20-years-of-cyberthreat-evolution/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
					<wfw:commentRss>https://risk-academy.ru/future-of-ciso-leadership-and-cybersecurity-risk-management-strategy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>BI.Zone GRC</title>
		<link>https://risk-academy.ru/bi-zone-grc/</link>
					<comments>https://risk-academy.ru/bi-zone-grc/#respond</comments>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 07 May 2026 07:11:25 +0000</pubDate>
				<category><![CDATA[Risk management]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/bi-zone-grc/</guid>

					<description><![CDATA[2026 Модуль Audit and Road Maps Компания BI.ZONE 6 марта 2026 года представила обновленную версию платформы BI.ZONE GRC, которая позволяет компаниям с разветвленной структурой проводить аудиты, строить дорожные карты развития [&#8230;]]]></description>
										<content:encoded><![CDATA[<div itemprop="content">
<h2> <span class="mw-headline">2026</span></h2>
<h3> <span class="mw-headline">Модуль Audit and Road Maps</span></h3>
<p>Компания BI.ZONE 6 марта 2026 года представила обновленную версию платформы BI.ZONE GRC, которая позволяет  компаниям с разветвленной структурой проводить аудиты, строить дорожные карты развития и отслеживать выполнение стратегических планов.
</p>
<p>Управление кибербезопасностью в холдингах требует системного подхода. Разнородность дочерних обществ, не всегда единые стандарты кибербезопасности и прозрачные зоны ответственности у сотрудников усложняют контроль, а также снижают эффективность инвестиций в кибербезопасность.
</p>
<p>Платформа BI.ZONE GRC позволяет решить эти проблемы и выстроить вертикаль управления киберзащитой во всей&#8230;</p>
</div>
<p><a href="https://www.tadviser.ru/index.php/%D0%9F%D1%80%D0%BE%D0%B4%D1%83%D0%BA%D1%82:BI.Zone_GRC">Подробнее&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
					<wfw:commentRss>https://risk-academy.ru/bi-zone-grc/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Queensland education breach highlights third-party cyber risk concerns</title>
		<link>https://risk-academy.ru/queensland-education-breach-highlights-third-party-cyber-risk-concerns/</link>
					<comments>https://risk-academy.ru/queensland-education-breach-highlights-third-party-cyber-risk-concerns/#respond</comments>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 07 May 2026 06:39:28 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/queensland-education-breach-highlights-third-party-cyber-risk-concerns/</guid>

					<description><![CDATA[A third-party data breach disclosed by the Queensland Department of Education has renewed scrutiny on cyber risks tied to vendors and online learning platforms used across the education sector. In [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>            <img decoding="async" src="https://australiancybersecuritymagazine.com.au/wp-content/uploads/2026/05/k.jpg" class="alignright lazyload" width="300px" style="--smush-placeholder-width: 700px; --smush-placeholder-aspect-ratio: 700/500;"/></p>
<p>A third-party data breach disclosed by the Queensland Department of Education has renewed scrutiny on cyber risks tied to vendors and online learning platforms used across the education sector.</p>
<p>In commentary circulated after the department’s announcement, BlueVoyant managing director for ANZ Kash Sharma said incidents affecting education organisations are increasingly linked to suppliers and external service providers connected to school systems.</p>
<p>Sharma pointed to earlier reporting that more than 1,700 Victorian government schools were affected by a separate incident this year, which exposed student records, as an example of how breaches can spread through shared platforms and service ecosystems.</p>
<p>According to Sharma, schools and education departments are managing a growing “attack surface” as they expand their use of cloud services, online learning tools and third-party platforms that handle sensitive personal data of students and staff.</p>
<p>Sharma also cited BlueVoyant research claiming that only 30% of Australian organisations have established or optimised third-party risk management programs, while 99%&#8230;</p>
</div>
<p><a href="https://australiancybersecuritymagazine.com.au/queensland-education-breach-highlights-third-party-cyber-risk-concerns/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
					<wfw:commentRss>https://risk-academy.ru/queensland-education-breach-highlights-third-party-cyber-risk-concerns/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Bitdefender names Frank Koelmel Chief Revenue Officer</title>
		<link>https://risk-academy.ru/bitdefender-names-frank-koelmel-chief-revenue-officer/</link>
					<comments>https://risk-academy.ru/bitdefender-names-frank-koelmel-chief-revenue-officer/#respond</comments>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 07 May 2026 01:38:41 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/bitdefender-names-frank-koelmel-chief-revenue-officer/</guid>

					<description><![CDATA[JOSEPH GABRIEL LAGONSIN News Editor Bitdefender has appointed Frank Koelmel as Chief Revenue Officer for its Business Solutions Group, putting a veteran cybersecurity sales executive in charge of the company&#8217;s [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="">
              <img decoding="async" alt="Joseph Gabriel Lagonsin" class="size-12 shrink-0 rounded-full border border-slate-100 object-cover" src="https://itbrief.com.au/uploads/pages/team/Techday_Bio_Photo.webp"/></p>
<p>
              <span class="block text-xs font-bold uppercase tracking-wider text-slate-700"><br />
                JOSEPH GABRIEL LAGONSIN<br />
              </span></p>
<p>                <span class="block text-sm text-slate-600">News Editor</span></p>
</div>
<div>
<p>Bitdefender has appointed Frank Koelmel as Chief Revenue Officer for its Business Solutions Group, putting a veteran cybersecurity sales executive in charge of the company&#8217;s global revenue strategy.</p>
<p>Koelmel will lead business development and go-to-market efforts across the unit, with responsibility for revenue growth and for aligning sales, marketing and customer success. He joins as companies face rising cyber risks, tighter data regulation and increasing scrutiny over digital sovereignty.</p>
<p>He brings more than three decades of experience in cybersecurity and software. Most recently, he was Chief Revenue Officer at Logpoint, now Guardsix, where he led global customer teams focused on expansion and retention.</p>
<p>Earlier in his career, Koelmel was President and General Manager of the Americas and EMEA at Cybereason, overseeing revenue and customer organisations. He also held senior leadership roles at Palo Alto Networks and FireEye.</p>
<p>The appointment comes as cybersecurity vendors respond to a threat landscape shaped by&#8230;</p>
</div>
<p><a href="https://itbrief.com.au/story/bitdefender-names-frank-koelmel-chief-revenue-officer">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
					<wfw:commentRss>https://risk-academy.ru/bitdefender-names-frank-koelmel-chief-revenue-officer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top 5 AI-Driven Vendor Risk Management Solutions for Continuous Third-Party Security</title>
		<link>https://risk-academy.ru/top-5-ai-driven-vendor-risk-management-solutions-for-continuous-third-party-security/</link>
					<comments>https://risk-academy.ru/top-5-ai-driven-vendor-risk-management-solutions-for-continuous-third-party-security/#respond</comments>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 06 May 2026 20:37:32 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/top-5-ai-driven-vendor-risk-management-solutions-for-continuous-third-party-security/</guid>

					<description><![CDATA[IBM’s 2024 Cost of a Data Breach report found that 59 percent of breaches stemmed from third-party vendors, while the MOVEit hack spilled records from 2,700 firms and 90 million [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><span style="font-weight: 400;">IBM’s 2024 </span><i><span style="font-weight: 400;">Cost of a Data Breach</span></i><span style="font-weight: 400;"> report found that 59 percent of breaches stemmed from third-party vendors, while the MOVEit hack spilled records from 2,700 firms and 90 million people. Trust is thin, regulators are circling, and security teams feel the squeeze.</span></p>
<p><span style="font-weight: 400;">Most TPRM programs still run on annual spreadsheets. That leaves months of blind spots between reviews, right when vendor environments change fastest.</span></p>
<p><span style="font-weight: 400;">AI-driven TPRM platforms are replacing that point-in-time approach with continuous signals and faster evidence review. This guide compares five leaders, Vanta, OneTrust, UpGuard, Panorays, and Certa, so you can choose the right fit for your risk model, workflow, and scale.</span></p>
<h2><span style="font-weight: 400;">Why AI and continuous monitoring are changing vendor risk forever</span></h2>
<p><span style="font-weight: 400;">Annual questionnaires feel safe because they tick a box. The problem is they freeze your view of a fast-moving target. A vendor can sign off on controls today, then ship new code tomorrow, let a certificate lapse next week, or lose an admin who held the keys. For the next 12 months, your assessment stays “complete” while your real-world exposure keeps changing.</span></p>
<p><span style="font-weight: 400;">Security teams feel that gap in the work itself. One Reddit&#8230;</span></p>
</div>
<p><a href="https://aijourn.com/top-5-ai-driven-vendor-risk-management-solutions-for-continuous-third-party-security/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
					<wfw:commentRss>https://risk-academy.ru/top-5-ai-driven-vendor-risk-management-solutions-for-continuous-third-party-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
