<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Co-Founder &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/co-founder/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sat, 05 Dec 2020 09:10:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Co-Founder &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Do cybersecurity like a boss: 35 experts to follow on Twitter</title>
		<link>https://risk-academy.ru/do-cybersecurity-like-a-boss-35-experts-to-follow-on-twitter/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 05 Dec 2020 09:10:36 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Dmitri Alperovitch]]></category>
		<category><![CDATA[Robert D. Atkinson]]></category>
		<category><![CDATA[Co-Founder]]></category>
		<category><![CDATA[President]]></category>
		<category><![CDATA[security specialist]]></category>
		<category><![CDATA[information technology]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[Washington, DC]]></category>
		<category><![CDATA[executive chairman]]></category>
		<category><![CDATA[Information Technology & Innovation Foundation]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/do-cybersecurity-like-a-boss-35-experts-to-follow-on-twitter/</guid>

					<description><![CDATA[Staying on top of security is a big job, and Twitter can help. Listed here, in alphabetical order, are 35 researchers, hackers, and gurus whose Twitter feeds will keep any [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><span><span><span><span>Staying on top of security is a big job, and Twitter can help. Listed here, in alphabetical order, are 35 researchers, hackers, and gurus whose Twitter feeds will keep any security specialist well informed on the latest developments and thinking in the industry.</span></span></span></span></p>
<p>Follow these folks and you will keep one step ahead.</p>
<h3>Dmitri Alperovitch</h3>
<h4><a href="https://twitter.com/DAlperovitch" target="_blank" rel="nofollow noopener noreferrer">@DAlperovitch</a></h4>
<p>Alperovitch is executive chairman of the Silverado Policy Accelerator and co-founder of CrowdStrike. He&#8217;s also on the boards of more than a half-dozen companies and has patents on more than two dozen of his cybersecurity creations. His most recent tweets are about election security and disinformation campaigns.</p>
<h3>Robert D. Atkinson</h3>
<h4><a href="https://twitter.com/RobAtkinsonITIF" target="_blank" rel="nofollow noopener noreferrer">@RobAtkinsonITIF</a></h4>
<p>Atkinson is president of the Information Technology &amp; Innovation Foundation, a tech policy think tank in Washington, DC. Many of his tweets focus on the international aspects of technology, such as European digital protectionism, as well as automation, industrial policy, and big tech antitrust issues.</p>
<h3>Paul Asadoorian</h3>
<h4><a href="https://twitter.com/securityweekly" target="_blank" rel="nofollow noopener noreferrer">@securityweekly</a></h4>
<p>Asadoorian is founder and CTO of <em>Security Weekly</em> and chief innovation officer at the CyberRisk Alliance&#8230;.</p>
</div>
<p><a href="https://techbeacon.com/security/do-cybersecurity-boss-35-experts-follow-twitter">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Exploring risk mitigation and cyber security for connected vehicles</title>
		<link>https://risk-academy.ru/exploring-risk-mitigation-and-cyber-security-for-connected-vehicles/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 07 Nov 2020 18:38:21 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Richard Wilding]]></category>
		<category><![CDATA[Co-Founder]]></category>
		<category><![CDATA[5G networks]]></category>
		<category><![CDATA[remote unlock services]]></category>
		<category><![CDATA[navigation systems]]></category>
		<category><![CDATA[infotainment systems]]></category>
		<category><![CDATA[ShieldsUp Fleet]]></category>
		<category><![CDATA[driver]]></category>
		<category><![CDATA[fleet management systems]]></category>
		<category><![CDATA[GPS]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/exploring-risk-mitigation-and-cyber-security-for-connected-vehicles/</guid>

					<description><![CDATA[Richard Wilding, co-founder of ShieldsUp Fleet operators are at the nexus of the digital and physical realms. Whilst more business is done online than ever before, just in time logistics [&#8230;]]]></description>
										<content:encoded><![CDATA[<div itemprop="articleBody" data-ads-body-copy="true" data-ads-first="2" data-ads-every="3">
<p><em>Richard Wilding, co-founder of ShieldsUp</em></p>
<p>Fleet operators are at the nexus of the digital and physical realms.</p>
<p>Whilst more business is done online than ever before, just in time logistics help keep modern supply chains lean and profitable, and form a critical part of many business operations transporting materials from A to B.</p>
<p>Internet of Things (IoT) technologies are improving vehicle and driver safety, finding more efficient routes, and delivering great customer experiences.</p>
<p>These connections, which will soon benefit from 5G networks, power the modern economy but can also be exploited for unintended purposes.</p>
<p>Essentially, as more devices and systems connect to the internet, the greater the amount of targets threat actors (hackers) have to exploit.</p>
<p>Indeed, the attack surface of a modern vehicle has never been larger: infotainment systems; OBD II dongles needed for telematics and insurance; GPS navigation systems; digital key fobs; fleet management systems; dashcams etc. plus connected apps offering tracking and remote unlock services &#8211; these are all connected devices or systems that have the potential to be exploited by threat actors.</p>
<p>Heavy vehicles have connected more widely&#8230;</p>
</div>
<p><a href="https://www.fleetnews.co.uk/news/latest-fleet-news/opinion/2020/11/05/exploring-risk-mitigation-and-cyber-security-for-connected-vehicles">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Vulcan Cyber Adds Remediation Analytics to Provide &#8230;</title>
		<link>https://risk-academy.ru/vulcan-cyber-adds-remediation-analytics-to-provide/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 04 Nov 2020 20:22:23 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Tal Morgenstern]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Economy]]></category>
		<category><![CDATA[Co-Founder]]></category>
		<category><![CDATA[Tel Aviv]]></category>
		<category><![CDATA[Business intelligence]]></category>
		<category><![CDATA[Analytics]]></category>
		<category><![CDATA[VULCAN]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/vulcan-cyber-adds-remediation-analytics-to-provide/</guid>

					<description><![CDATA[New Vulcan remediation analytics provides security and IT executives with unfettered visibility into the state of remediation campaigns. Tel Aviv – November 4, 2020 &#8211; Vulcan Cyber®, developers of the industry’s only [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="article-main">
<header/><span class="strong black" style="font-size: 1.083333em;">New Vulcan remediation analytics provides security and IT executives with unfettered visibility into the state of remediation campaigns.</span></p>
<p class="" style="margin-top: 0;"><strong><em>Tel Aviv – November 4, 2020 </em></strong><em>&#8211;</em><em> </em>Vulcan Cyber®, developers of the industry’s only end-to-end vulnerability remediation orchestration platform, today announced the addition of powerful business intelligence capabilities for cyber risk management. New Vulcan remediation analytics dashboarding capabilities provide security and IT leaders with a clear and comprehensive view into the state of vulnerability remediation efforts across the organization. Featuring fully customizable dashboards, Vulcan now delivers real-time visibility into the effectiveness and outcomes of remediation campaigns. </p>
<p>In related news, today Vulcan Cyber also announced the launch of Vulcan Remedy Cloud, a free service that helps vulnerability management teams expedite remediation.</p>
<p>“Remediation campaigns are fluid, as are the risks they seek to eliminate. Our customers want the ability to quickly source whatever data they might need to move remediation campaigns forward,” says Tal Morgenstern, co-founder and CPO, Vulcan Cyber. “They want to manage risk,&#8230;</p>
</div>
<p><a href="https://www.darkreading.com/cloud/vulcan-cyber-adds-remediation-analytics-to-provide-full-visibility-into-remediation-efficacy/d/d-id/1339376">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cowbell Cyber announces platform enhancements</title>
		<link>https://risk-academy.ru/cowbell-cyber-announces-platform-enhancements/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 26 Aug 2020 13:17:51 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[cyber insurance platform]]></category>
		<category><![CDATA[Rajeev Gupta]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Co-Founder]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[Fictional characters]]></category>
		<category><![CDATA[Insurance]]></category>
		<category><![CDATA[cyber insurance products]]></category>
		<category><![CDATA[cyber insurance product]]></category>
		<category><![CDATA[Cowbell Cyber]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cowbell-cyber-announces-platform-enhancements/</guid>

					<description><![CDATA[Cyber insurance provider Cowbell Cyber has announced enhancements to its cyber insurance platform which will allow for larger risk underwriting to be done with increased ease, accuracy, and speed. Clarity [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Cyber insurance provider Cowbell Cyber has announced enhancements to its cyber insurance platform which will allow for larger risk underwriting to be done with increased ease, accuracy, and speed.</p>
<p>Clarity over coverages and value has historically been a barrier to adoption of cyber insurance, Cowbell Cyber said.</p>
<div id="article_paywall" style="display: block;">
<div class="paywall_section">
<p>“Cowbell’s ongoing platform enhancements make cyber insurance approachable to all businesses and policyholders through Cowbell Prime, its standalone, admitted cyber insurance product,” the company said.</p>
<p>“Cyber has lacked transparency with paper-based applications, unverifiable data and policies and premiums offered based on industry and company size alone,” said Rajeev Gupta, co-founder and CPO of Cowbell Cyber. “Thanks to capabilities added to our platform on a weekly basis and new data sources, Cowbell Cyber continues to bring rapid innovation to its cyber insurance products, taking on larger underwriting capacities with extreme accuracy and speed, all while adding simplicity to the process for&#8230;</p>
</div>
</div>
<p><a href="https://www.insurancebusinessmag.com/us/news/cyber/cowbell-cyber-announces-platform-enhancements-231805.aspx">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sepio Systems Named a Cool Vendor in the 2020 Gartner Cool Vendors in Cyber-Physical Systems Security</title>
		<link>https://risk-academy.ru/sepio-systems-named-a-cool-vendor-in-the-2020-gartner-cool-vendors-in-cyber-physical-systems-security/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 14 May 2020 14:44:08 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Bentsi Ben-atar]]></category>
		<category><![CDATA[leader]]></category>
		<category><![CDATA[Gartner Inc.]]></category>
		<category><![CDATA[Maryland]]></category>
		<category><![CDATA[Sepio Systems]]></category>
		<category><![CDATA[Co-Founder]]></category>
		<category><![CDATA[ROCKVILLE]]></category>
		<category><![CDATA[cyber-physical systems]]></category>
		<category><![CDATA[pervasive devices]]></category>
		<category><![CDATA[Atar]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/sepio-systems-named-a-cool-vendor-in-the-2020-gartner-cool-vendors-in-cyber-physical-systems-security/</guid>

					<description><![CDATA[ROCKVILLE, Md., May 14, 2020 /PRNewswire/ &#8212; Sepio Systems, the leader in Rogue Device Mitigation (RDM), today announced it has been recognized  in the April 2020 Cool Vendors in Cyber-Physical [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><span class="xn-location">ROCKVILLE, Md.</span>, <span class="xn-chron">May 14, 2020</span> /PRNewswire/ &#8212; <u>Sepio Systems</u>, the leader in Rogue Device Mitigation (RDM), today announced it has been recognized  in the <span class="xn-chron">April 2020</span> Cool Vendors in Cyber-Physical Systems Security report by Gartner, Inc. </p>
<p>According to the report, &#8220;Gartner provides a sampling of Cool Vendors to security and risk management leaders responsible for technology, information and resilience risk. These providers have developed innovative tools and applications that improve security and safety to support the emergence of cyber-physical systems.&#8221;</p>
<p>&#8220;Organizations around the world are housing compromised devices like monitors, keyboards and routers without even knowing the devices have gone rogue. With the definition of IoT often excluding these very pervasive devices, most organizations have little to no visibility into device activity and how long the device has been compromised,&#8221; said Bentsi Ben-atar, Co-Founder &amp; CMO of Sepio Systems. &#8220;Sepio Systems is proud to be recognized as a Cool Vendor in Gartner&#8217;s Cool Vendors in Cyber-Physical Systems Security.&#8221;</p>
<p>The report recommends &#8220;to manage technology, information and resilience risk, SRM leaders who focus on the security of&#8230;</p>
</div>
<p><a href="https://www.prnewswire.com/news-releases/sepio-systems-named-a-cool-vendor-in-the-2020-gartner-cool-vendors-in-cyber-physical-systems-security-301059466.html">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
