<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Barack Obama &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/barack-obama/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Mon, 31 Aug 2020 08:14:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Barack Obama &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cybersecurity and risk mitigation &#8211; National Accord Newspaper</title>
		<link>https://risk-academy.ru/cybersecurity-and-risk-mitigation-national-accord-newspaper/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 30 Aug 2020 22:44:41 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Central Intelligence Agency]]></category>
		<category><![CDATA[Barack Obama]]></category>
		<category><![CDATA[Vice President]]></category>
		<category><![CDATA[Bill Gates]]></category>
		<category><![CDATA[Kanye West]]></category>
		<category><![CDATA[Sony PlayStation]]></category>
		<category><![CDATA[Sony]]></category>
		<category><![CDATA[Kim Kardashian West]]></category>
		<category><![CDATA[social media site]]></category>
		<category><![CDATA[NEWS Corp]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cybersecurity-and-risk-mitigation-national-accord-newspaper/</guid>

					<description><![CDATA[Austin Okere By AUSTIN OKERE “Twitter hack: 130 accounts targeted in attack” was the screaming headline on the BBC’s website on July 17, 2020. Two days earlier, the social media [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
      <!-- image --></p>
<div class="td-post-featured-image">
<figure><img fetchpriority="high" decoding="async" width="696" height="1044" class="entry-thumb td-modal-image" src="https://i1.wp.com/nationalaccordnewspaper.com/wp-content/uploads/2020/08/Austin-Okere.jpeg?resize=696%2C1044&amp;ssl=1" alt="Barack Obama" title="Austin Okere" /><figcaption class="wp-caption-text">Austin Okere</figcaption></figure>
</div>
<p>      <!-- content --></p>
<div class="td-a-rec td-a-rec-id-content_top td_uid_60_5f4c2b96412da_rand td_block_template_9">
<div class="td-visible">
  <img decoding="async" title="Vice President" src="" alt="Vice President" />
</div>
</div>
<p style="text-align: justify"><em><strong><span style="font-size: 12pt">By AUSTIN OKERE</span></strong></em></p>
<p style="text-align: justify"><span style="font-size: 12pt"><strong><em>“Twitter hack: 130 accounts targeted in attack” </em></strong><em>was the screaming headline on the BBC’s website on July 17, 2020.</em></span></p>
<p style="text-align: justify"><span style="font-size: 12pt"><em>Two days earlier, the social media site had admitted a major cyber-attack of celebrity accounts.</em> <em>The security breach saw accounts including those of Barack Obama, Elon Musk, Kanye West and Bill Gates tweet a Bitcoin scam to millions of followers. Several Bitcoin-related accounts began tweeting what appeared to be a simple Bitcoin scam, promising to “give back” to the community by doubling any Bitcoin sent to their address. Then, the apparent scam spread to mainstream celebrity accounts such as Kim Kardashian West and former vice-president Joe Biden, and those of corporations Apple and Uber.<img decoding="async" data-attachment-id="49478" data-permalink="https://nationalaccordnewspaper.com/cybersecurity-and-risk-mitigation/obama-twitter-hank/" data-orig-file="https://i0.wp.com/nationalaccordnewspaper.com/wp-content/uploads/2020/08/obama-twitter-hank.png?fit=976%2C549&amp;ssl=1" data-orig-size="976,549" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="obama twitter hank" data-image-description="" data-medium-file="https://i0.wp.com/nationalaccordnewspaper.com/wp-content/uploads/2020/08/obama-twitter-hank.png?fit=300%2C169&amp;ssl=1" data-large-file="https://i0.wp.com/nationalaccordnewspaper.com/wp-content/uploads/2020/08/obama-twitter-hank.png?fit=696%2C392&amp;ssl=1" loading="lazy" class="aligncenter size-medium wp-image-49478" src="https://i0.wp.com/nationalaccordnewspaper.com/wp-content/uploads/2020/08/obama-twitter-hank.png?resize=300%2C169&amp;ssl=1" alt="Bill Gates" width="300" height="169" data-recalc-dims="1" /></em></span></p>
<p style="text-align: justify"><span style="font-size: 12pt">Twitter is not the only high-profile company that has been hit. Just about every other company you can think about has suffered similar fate. The roll call of victims includes Rupert Murdock’s News Corp, Sony PlayStation Network, Government of turkey, Britain’s Serious Organized Crime Agency, and the CIA amongst others.</span></p>
<p style="text-align: justify"><span style="font-size: 12pt">The story of hacking will not be complete without <strong><em>Anonymous</em></strong>; a sophisticated group of&#8230;</span></p>
</div>
<p><a href="https://nationalaccordnewspaper.com/cybersecurity-and-risk-mitigation/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Wake-Up Call for Security</title>
		<link>https://risk-academy.ru/a-wake-up-call-for-security/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 12 Aug 2020 12:56:59 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[senior manager for security solutions]]></category>
		<category><![CDATA[Barack Obama]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[Bill Gates]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[manager for security solutions at Lookout]]></category>
		<category><![CDATA[U.S. Justice Department]]></category>
		<category><![CDATA[Hank Schless]]></category>
		<category><![CDATA[Joe Biden]]></category>
		<category><![CDATA[social media platforms]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/a-wake-up-call-for-security/</guid>

					<description><![CDATA[It started with a phone call, moved on to scamming unsuspecting victims out of Bitcoin, and ended in the arrests of three people, including a Florida teenager. The July 15 [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>It started with a phone call, moved on to scamming unsuspecting victims out of Bitcoin, and ended in the arrests of three people, including a Florida teenager.</p>
<p>The July 15 hijacking of about 130 high-profile and verified Twitter accounts, including those of Bill Gates, Elon Musk, Barack Obama and Joe Biden, scammed dozens of people out of about $120,000 worth of bitcoin. The incident, which gained worldwide attention, contained a bit of everything, including a celebrity element and questions about the reliability of messages posted on one of the world’s largest social media platforms.</p>
<p>The arrests of a 17-year-old and two others in connection with the hacking case by the U.S. Justice Department and state prosecutors in Florida also reveal how rather basic hacking techniques, such as phone phishing and SIM swapping, can affect the security of an entire organization, leaving employees and internal resources open to attack.</p>
<p>“We still don’t know exactly what happened with Twitter, however, they’ve acknowledged that the incident was started by a phone spear phishing attack,” Hank Schless, a senior manager for security solutions at Lookout, told Dice&#8230;.</p>
</div>
<p><a href="https://insights.dice.com/2020/08/12/twitter-crypto-hacking-scandal-wake-up-call-security/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Work from Home: Cyber security, contact-tracing apps are serious threats. What&#8217;s the way forward?</title>
		<link>https://risk-academy.ru/work-from-home-cyber-security-contact-tracing-apps-are-serious-threats-whats-the-way-forward/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 19 Jul 2020 01:36:52 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[Barack Obama]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[Jeff Bezos]]></category>
		<category><![CDATA[Bill Gates]]></category>
		<category><![CDATA[social networking platform]]></category>
		<category><![CDATA[principal research scientist]]></category>
		<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Shriya Roy Earlier]]></category>
		<category><![CDATA[Kanye West]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/work-from-home-cyber-security-contact-tracing-apps-are-serious-threats-whats-the-way-forward/</guid>

					<description><![CDATA[Sadness company agent woman finding working computer getting blackmail virus attack thinking solution at office desk and feeling depression. By Shriya Roy Earlier this week, social networking platform Twitter suffered [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<div class="article-image">
<figure><img decoding="async" title="Barack Obama" class="lazy lazy-hidden size-large wp-image-2028262" data-lazy-type="image" src="https://images.financialexpress.com/2020/07/cyber-crime-620x413.jpg" alt="Barack Obama" width="620" height="413" srcset="" sizes="(max-width: 620px) 100vw, 620px"/><noscript><img decoding="async" title="Barack Obama" class="lazy lazy-hidden size-large wp-image-2028262" data-lazy-type="image" src="https://images.financialexpress.com/2020/07/cyber-crime-620x413.jpg" alt="Barack Obama" width="620" height="413" srcset="" sizes="(max-width: 620px) 100vw, 620px"/><noscript><img decoding="async" title="Jeff Bezos" class="size-large wp-image-2028262" src="https://images.financialexpress.com/2020/07/cyber-crime-620x413.jpg" alt="Jeff Bezos" width="620" height="413" srcset="https://images.financialexpress.com/2020/07/cyber-crime-620x413.jpg 620w, https://images.financialexpress.com/2020/07/cyber-crime-300x200.jpg 300w, https://images.financialexpress.com/2020/07/cyber-crime-401x267.jpg 401w, https://images.financialexpress.com/2020/07/cyber-crime-440x293.jpg 440w, https://images.financialexpress.com/2020/07/cyber-crime-80x54.jpg 80w, https://images.financialexpress.com/2020/07/cyber-crime-313x209.jpg 313w, https://images.financialexpress.com/2020/07/cyber-crime.jpg 660w" sizes="(max-width: 620px) 100vw, 620px"/></noscript></noscript><span class="article-caption">Sadness company agent woman finding working computer getting blackmail virus attack thinking solution at office desk and feeling depression.</span></figure>
</div>
<p><strong>By Shriya Roy</strong></p>
<p>Earlier this week, social networking platform Twitter suffered a major security breach when hackers took control of the accounts of some major public figures such as Barack Obama, Elon Musk, Joe Biden, Bill Gates, Jeff Bezos and Kanye West, and companies like Uber and Apple. The hackers sent a series of tweets through these accounts urging followers to make donations in cryptocurrency in exchange for double the money back. Twitter attributed the hack to a “serious breach in the company’s internal system” and shut down parts of its service. “If a message sounds too good to be true, it is too good to be true. If Musk, Gates, Apple, Biden or any well-known person or company wanted to hand out huge amounts of money on a whim, they wouldn’t demand that you hand them money first. It’s a trick and an obvious sign that the person’s account has been hacked,” says Paul Ducklin, principal research scientist at security software and hardware firm Sophos.</p>
<p>Last month, the government of India, too, had issued a warning of a&#8230;</p>
</div>
<p><a href="https://www.financialexpress.com/industry/technology/work-from-home-cyber-security-contact-tracing-apps-are-serious-threats-whats-the-way-forward/2028260/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Top 25 Cyber Execs to Watch in 2020: AppGate Federal Group&#8217;s Greg Touhill</title>
		<link>https://risk-academy.ru/top-25-cyber-execs-to-watch-in-2020-appgate-federal-groups-greg-touhill/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 31 May 2020 23:15:51 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[President]]></category>
		<category><![CDATA[Barack Obama]]></category>
		<category><![CDATA[Carnegie Mellon Universitys Heinz College]]></category>
		<category><![CDATA[secure infrastructure solutions]]></category>
		<category><![CDATA[U.S. Air Force]]></category>
		<category><![CDATA[first federal chief information security officer]]></category>
		<category><![CDATA[U . S . Transportation]]></category>
		<category><![CDATA[adviser]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/top-25-cyber-execs-to-watch-in-2020-appgate-federal-groups-greg-touhill/</guid>

					<description><![CDATA[Greg Touhill, AppGate Federal Group Retired U.S. Air Force Brig. Gen. Greg Touhill currently serves as president of AppGate’s Federal Division, supporting agencies across the federal government with secure infrastructure [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="post-208868">
<p>	<!-- .post-header --></p>
<div class="post-content post-dynamic">
<div id="attachment_189923" style="width: 230px" class="wp-caption alignleft"><img loading="lazy" decoding="async" title="United States" aria-describedby="caption-attachment-189923" class="size-full wp-image-189923" src="https://washingtonexec.com/wp-content/uploads/2018/06/Chairman-Poster_Greg-Touhill.jpg" alt="Greg Touhill, President of AppGate Federal Group" width="220" height="220" srcset="https://washingtonexec.com/wp-content/uploads/2018/06/Chairman-Poster_Greg-Touhill.jpg 220w, https://washingtonexec.com/wp-content/uploads/2018/06/Chairman-Poster_Greg-Touhill-200x200.jpg 200w" sizes="auto, (max-width: 220px) 100vw, 220px"/></p>
<p id="caption-attachment-189923" class="wp-caption-text">Greg Touhill, AppGate Federal Group</p>
</div>
<p><span style="font-weight: 400;">Retired U.S. Air Force Brig. Gen. Greg Touhill currently serves as president of AppGate’s Federal Division, supporting agencies across the federal government with secure infrastructure solutions delivered from data centers.</span></p>
<p><span style="font-weight: 400;">Appointed by President Barack Obama as the nation’s first federal chief information security officer in 2016, Touhill was tasked with ensuring proper digital security policies, strategies and practices were adopted across government. </span><span style="font-weight: 400;">During his earlier time in the Air Force, he served in the U.S. Transportation, Central and Strategic commands, and led the creation of the Air Force’s cyberspace operations training programs.</span></p>
<p><span style="font-weight: 400;">He’s also an adviser to organizations, institutions and corporations on cybersecurity, and is known for his tireless public efforts to teach and inform good cyber hygiene to the next generation. In fact, he’s a faculty member at Carnegie Mellon University’s Heinz College, where he teaches cyber risk management. He’s also the author of “Cybersecurity for Executives: A Practical Guide,” which is used at colleges and universities across the country.</span></p>
<p><b>Why Watch:</b></p>
<p><span style="font-weight:...</span></p>
</div>
</div>
<p><a href="https://washingtonexec.com/2020/05/top-25-cyber-execs-to-watch-in-2020-appgate-federal-groups-greg-touhill/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
