<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cryptography &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/cryptography/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sat, 12 Dec 2020 05:37:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Cryptography &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Crossword Cybersecurity supporting Sultan Qaboos University in Oman on capture the flag cybersecurity competition</title>
		<link>https://risk-academy.ru/crossword-cybersecurity-supporting-sultan-qaboos-university-in-oman-on-capture-the-flag-cybersecurity-competition/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 10:41:31 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Oman]]></category>
		<category><![CDATA[Ilube CBE]]></category>
		<category><![CDATA[Sultan Qaboos University in Oman]]></category>
		<category><![CDATA[Sultan Qaboos University]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[ceo]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[Tom Ilube]]></category>
		<category><![CDATA[technology commercialisation]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/crossword-cybersecurity-supporting-sultan-qaboos-university-in-oman-on-capture-the-flag-cybersecurity-competition/</guid>

					<description><![CDATA[11 December 2020 – London, UK &#8211; Crossword Cybersecurity Plc (AIM:CCS, “Crossword”, the “Company” or the “Group”), the technology commercialisation company focused on cyber security and risk management, is pleased [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="col1">
<p><!--sub heading here h2--></p>
<article><!-- Article Start --></p>
<p><strong>11 December 2020 – London, UK</strong> &#8211; Crossword Cybersecurity Plc (AIM:CCS, “Crossword”, the “Company” or the “Group”), the technology commercialisation company focused on cyber security and risk management, is pleased to announce its first consulting client in the Sultanate of Oman. Working with Sultan Qaboos University and the UK Oman Digital Hub, Crossword is developing a series of technical cyber security challenges for the qualifying rounds of the national cybersecurity capture the flag tournament, taking place on 14 January 2021.</p>
<p>&#013;</p>
<p>The competition will see students from across the region exercising their cybersecurity skills and learning from their peers. Cybersecurity topics in the competition will include web security, digital forensics, reverse engineering, network security and cryptography. The competition forms part of a wider programme in Oman to promote cybersecurity as a career, and to build a cyber eco-system through coherent initiatives across education, economy and Government.</p>
<p>&#013;</p>
<p>Tom Ilube CBE, CEO at Crossword Cybersecurity PLC, said: “Crossword is delighted to be working on such an exciting initiative and competition in the Sultanate&#8230;</p>
</article>
</div>
<p><a href="https://www.realwire.com/releases/Crossword-Cybersecurity-supporting-Sultan-Qaboos-University-in-Oman">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Giacom adds usecure security awareness training platform in fight against cyber risks – PCR</title>
		<link>https://risk-academy.ru/giacom-adds-usecure-security-awareness-training-platform-in-fight-against-cyber-risks-pcr/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 02 Dec 2020 10:56:38 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[PCR Giacom]]></category>
		<category><![CDATA[Business Finance]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cryptography]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/giacom-adds-usecure-security-awareness-training-platform-in-fight-against-cyber-risks-pcr/</guid>

					<description><![CDATA[ Giacom is partnering with usecure, a security awareness platform, to offer its customers access to Security Awareness Training and Simulated Phishing resources to help mitigate end-user cyber risk and drive [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><strong> </strong>Giacom is partnering with usecure, a security awareness platform, to offer its customers access to Security Awareness Training and Simulated Phishing resources to help mitigate end-user cyber risk and drive secure user behaviour.</p>
<p>With many businesses still working from home, it’s crucial for companies to ensure they continuously educate their employees to become more security conscious and be able to spot cyber attacks. But even with the most advanced endpoint protection, it only takes one user to accidentally open the backdoor to a cyber attack, ultimately putting the whole organisation at risk.</p>
<p>With 95% of cybersecurity breaches caused by human error, usecure’s intelligent training platform identifies users’ individual cybersecurity knowledge gaps by enrolling them onto a training programme unique to their risk profile. It then crafts a personalised programme which addresses their unique learning needs, prioritising courses covering their most vulnerable areas of cybersecurity.</p>
<p>The simplified solution is easy-to-use and offers a range of short video, blog-style and interactive cybersecurity content which is designed to engage every type of learner&#8230;.</p>
</div>
<p><a href="https://www.pcr-online.biz/2020/12/02/giacom-adds-usecure-security-awareness-training-platform-in-fight-against-cyber-risks/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>APRA targets cyber hygiene and board oversight with new security strategy &#8211; Finance &#8211; Security</title>
		<link>https://risk-academy.ru/apra-targets-cyber-hygiene-and-board-oversight-with-new-security-strategy-finance-security/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 29 Nov 2020 07:39:57 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[APRA]]></category>
		<category><![CDATA[Geoff Summerhayes]]></category>
		<category><![CDATA[connected network]]></category>
		<category><![CDATA[executive board member]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Data security]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/apra-targets-cyber-hygiene-and-board-oversight-with-new-security-strategy-finance-security/</guid>

					<description><![CDATA[APRA has unveiled a new cyber security strategy and flagged it will step up its review of current cyber compliance, holding boards accountable for shortfalls.  The prudential regulator’s cyber security [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="article-body" itemprop="articleBody">
<p>APRA has unveiled a new cyber security strategy and flagged it will step up its review of current cyber compliance, holding boards accountable for shortfalls. </p>
<p>The prudential regulator’s cyber security strategy for 2020 to 2024 seeks to lift cyber security standards and introduce heightened accountability where companies fail to meet their legally binding requirements. </p>
<p>In a speech to the Financial Services Assurance Forum yesterday, Geoff Summerhayes, executive board member of APRA said the new strategy seeks to safeguard an increasingly connected network of financial entities, increase board oversight and improve basic cyber hygiene practices.  </p>
<p>Summerhayes said APRA wants to “eradicate unnecessary or careless cyber exposures” by establishing a baseline of cyber controls. It is starting with sharpening its enforcement CPS 234 compliance. </p>
<p>CPS 234 was introduced last year to shore up the sector&#8217;s cyber resilience and requires banks, insurers and superannuation funds to maintain security capabilities, conduct regular tests and notify the regulator if incidents occur. </p>
<p>Boards will be required to engage an external audit firm to review CPS&#8230;</p>
</div>
<p><a href="https://www.itnews.com.au/news/apra-targets-cyber-hygiene-and-board-oversight-with-new-security-strategy-558317">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Securing the &#8216;next normal&#8217; through improved cybersecurity (Includes interview)</title>
		<link>https://risk-academy.ru/securing-the-next-normal-through-improved-cybersecurity-includes-interview/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 29 Nov 2020 02:38:44 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Detox Technologies]]></category>
		<category><![CDATA[Shitesh Sachan]]></category>
		<category><![CDATA[Certified Information Security Auditor]]></category>
		<category><![CDATA[ceo]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Data security]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/securing-the-next-normal-through-improved-cybersecurity-includes-interview/</guid>

					<description><![CDATA[To gain an insight as to the suitable cybersecurity priorities, Digital Journal conducted an interview with Shitesh Sachan, CEO of Detox Technologies. Shitesh Sachan is a white hat hacker and [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>To gain an insight as to the suitable cybersecurity priorities, Digital Journal conducted an interview with Shitesh Sachan, CEO of Detox Technologies. Shitesh Sachan is a white hat hacker and a Certified Information Security Auditor (CISA) with over 20 years’ experience. </p>
<p><strong>Digital Journal: Since the COVID-19 Pandemic began and teams have become more dispersed, cybersecurity and privacy has become a priority for many businesses. But what steps should they be taking to protect ourselves? </strong></p>
<p><strong>Shitesh Sachan:</strong> At the outset of the global COVID-19 pandemic, many organisations decided to enforce social distancing by encouraging their employees to work from home. This decision created new security challenges for many organizations, who now had larger remote workforces. As people have started to work remotely, businesses are, quite rightly, concerned about their data privacy. Social engineering attacks and ransomware attacks have become 4 times more common during lockdown. Most of those attacks are a result of a lack of cybersecurity awareness and in-competent or incomplete security policies. There are five key steps all businesses should take to protect themselves. These&#8230;</em></div>
<p><a href="http://www.digitaljournal.com/business/q-a-securing-the-next-normal-through-improved-cybersecurity/article/581637">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What&#8217;s New in NIST SP 800 53 Rev 5</title>
		<link>https://risk-academy.ru/whats-new-in-nist-sp-800-53-rev-5/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 28 Nov 2020 01:31:10 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[NIST Special Publication 800-53]]></category>
		<category><![CDATA[NIST SP 800-90B]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[federal government]]></category>
		<category><![CDATA[federal information systems]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/whats-new-in-nist-sp-800-53-rev-5/</guid>

					<description><![CDATA[NIST Special Publication (SP) 800-53 offers regulatory guidelines and controls for federal information systems except those relating to national security. This catalog of security and privacy controls has been used [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="hs_cos_wrapper_post_body">
<p>NIST Special Publication (SP) 800-53 offers regulatory guidelines and controls for federal information systems except those relating to national security. This catalog of security and privacy controls has been used and adopted by a range of organizations both apart of the federal government and beyond due to the comprehensive nature of the control set. </p>
<p>Back in 2017, NIST released the first public draft of SP 800-53 Revision 5. In September of 2020, NIST released the official version of Rev 5, following what NIST describes as “a multi-year effort to develop the next generation of security and privacy controls needed to strengthen and support the Federal Government and every sector of critical infrastructure,” and with it has come a monumental sweep of changes for federal agencies and non-governmental organizations alike to use in an effort to protect the critical systems, components, and services that defend the United States.</p>
<h2>Many of the major changes in NIST Special Publication 800-53 include, but are not limited to…</h2>
<p>Controls for information systems and security controls are integrated into a seamless catalog for information systems and organizations. Privacy elements are&#8230;</p>
</div>
<p><a href="https://securityboulevard.com/2020/11/whats-new-in-nist-sp-800-53-rev-5/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>IDG’s 2020 Security Priorities Research Outlines New Security Practices &#038; Investments</title>
		<link>https://risk-academy.ru/idgs-2020-security-priorities-research-outlines-new-security-practices-investments/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 19 Nov 2020 16:42:13 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[IDG Communications Inc.]]></category>
		<category><![CDATA[Investments Boston]]></category>
		<category><![CDATA[tech media]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Information governance]]></category>
		<category><![CDATA[Massachusetts]]></category>
		<category><![CDATA[Data security]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/idgs-2020-security-priorities-research-outlines-new-security-practices-investments/</guid>

					<description><![CDATA[Boston, MA, Nov. 19, 2020 (GLOBE NEWSWIRE) &#8212; IDG Communications, Inc. – the world’s leading tech media, data, and marketing services company – releases the 2020 IDG Security Priorities study, [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="">
<p align="left">Boston, MA, Nov. 19, 2020 (GLOBE NEWSWIRE) &#8212; <u>IDG Communications, Inc.</u> – the world’s leading tech media, data, and marketing services company – releases the <u>2020 IDG Security Priorities study</u>, which outlines the security projects organizations are focused on, the factors driving security spending, and the security-related challenges that organizations are experiencing. In its fourth year, this study also explores issues that will demand the most time and strategic thinking from IT and security teams, with an increased focus on security strategy during the COVID-19 pandemic.</p>
<p><strong>Security and the Pandemic</strong><br />The majority of security/IT executives (62%) say they expect the pandemic to impact the way their organization evaluates and responds to risks moving forward. This has stabilized some since March, when 73% of respondents to the <u>2020 CSO Pandemic Impact survey</u> said that the impact of this pandemic will alter the way their business evaluates risk for at least the next five years. This additional focus on security includes investing more in people to enable their response to risk (43%), increasing investment in response planning resources to address risk (38%), and updating&#8230;</p>
</div>
<p><a href="https://www.globenewswire.com/news-release/2020/11/19/2130383/0/en/IDG-s-2020-Security-Priorities-Research-Outlines-New-Security-Practices-Investments.html">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Key Strategies for Managing New Risks in Cybersecurity &#8211; BankInfoSecurity.com</title>
		<link>https://risk-academy.ru/key-strategies-for-managing-new-risks-in-cybersecurity-bankinfosecurity-com/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 17 Nov 2020 04:25:38 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[National Initiative for Cybersecurity Education]]></category>
		<category><![CDATA[New Jersey Office of Homeland Security and Preparedness]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Computing]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/key-strategies-for-managing-new-risks-in-cybersecurity-bankinfosecurity-com/</guid>

					<description><![CDATA[Key Strategies for Managing New Risks in Cybersecurity&#160;&#160;BankInfoSecurity.com Read More&#8230;]]></description>
										<content:encoded><![CDATA[<p>Key Strategies for Managing New Risks in Cybersecurity&nbsp;&nbsp;<font color="#6f6f6f">BankInfoSecurity.com</font></p>
<p><a href="https://www.bankinfosecurity.com/whitepapers/key-strategies-for-managing-new-risks-in-cybersecurity-w-7138">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DOD Must Expand Its Mission-Critical Cybersecurity Focus to Include Connected Weapons</title>
		<link>https://risk-academy.ru/dod-must-expand-its-mission-critical-cybersecurity-focus-to-include-connected-weapons/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 12 Nov 2020 04:01:03 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[open-source search]]></category>
		<category><![CDATA[weapons systems]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Government Accountability Office]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Data security]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/dod-must-expand-its-mission-critical-cybersecurity-focus-to-include-connected-weapons/</guid>

					<description><![CDATA[As military and defense industry leaders came together in October for the AUSA Annual Meeting &#38; Expo, they learned about the new and innovative systems available to the nation’s military. [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>As military and defense industry leaders came together in October for the AUSA Annual Meeting &amp; Expo, they learned about the new and innovative systems available to the nation’s military. Many of these systems will be smart, connected weapons, which give our fighters a greater advantage on the battlefield. But they also pose serious cybersecurity risks that must be addressed. </p>
<p>Indeed, in a report released by the Government Accountability Office nearly two years ago, it was revealed that DOD security researchers gained access to nearly all major weapons systems currently in use and under development. Once, because the system was still using the default password visible through an open-source search. In another instance, researchers were able to disable an entire weapons system without detection, later to learn the system crashed so often on its own that it was difficult for officials to detect a breach. Perhaps most concerning is that one test team found that only one of 20 previously identified vulnerabilities had been fixed. </p>
<p>These are shocking lapses in cyber hygiene that could have real-world consequences. These weaknesses should not be difficult to address; changing the&#8230;</p>
</div>
<p><a href="https://www.nextgov.com/ideas/2020/11/dod-must-expand-its-mission-critical-cybersecurity-focus-include-connected-weapons/169963/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Audit committee best practices for understanding and acting on cyber-threats &#124; Article</title>
		<link>https://risk-academy.ru/audit-committee-best-practices-for-understanding-and-acting-on-cyber-threats-article/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 05 Nov 2020 21:28:49 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[BAE Systems]]></category>
		<category><![CDATA[David Kessler]]></category>
		<category><![CDATA[Chief information security officer]]></category>
		<category><![CDATA[Executive]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Information governance]]></category>
		<category><![CDATA[VP]]></category>
		<category><![CDATA[S&P 500 INDEX - CBOE]]></category>
		<category><![CDATA[General Counsel , IT and Cyber-Security]]></category>
		<category><![CDATA[Audit committee]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/audit-committee-best-practices-for-understanding-and-acting-on-cyber-threats-article/</guid>

					<description><![CDATA[Disclosures related to the audit committee’s responsibility for cyber-security risk oversight have increased significantly over the past five years. Thirty-nine percent of S&#38;P 500 companies made such disclosures in 2020, [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Disclosures related to the audit committee’s responsibility for cyber-security risk oversight have increased significantly over the past five years. Thirty-nine percent of S&amp;P 500 companies made such disclosures in 2020, up from 19 percent in 2018 and 11 percent in 2016. Further, 28 percent of S&amp;P 500 companies disclosed whether their board has a cyber-security expert in 2020, up from 14 percent in 2018 and 7 percent in 2016. There were also significant increases in these disclosures over the same timeframe for S&amp;P mid- and small-cap companies.</p>
<blockquote><p>&#013;</p>
<p>“Traditionally, corporate cyber-security programs were primarily the responsibility of the chief information security officer (CISO), and boards only had a fundamental understanding because it was somewhat a ‘black box.’ But the need for visibility into the cyber-security spectrum by the executive team and board is increasing as boards are facing questions from investors, customers, and regulators, and they have to educate themselves.”</p>
<p>&#013;</p>
<p class="quotesource">David Kessler, VP and Associate General Counsel, IT and Cyber-Security, BAE Systems</p>
<p>&#013;
</p></blockquote>
<p>The barometer includes specific examples of best practice cyber-security disclosures, which provide&#8230;</p>
</div>
<p><a href="https://www.complianceweek.com/cyber-security/audit-committee-best-practices-for-understanding-and-acting-on-cyber-threats/29697.article">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Practical tips and resources to improve the cybersecurity posture of your business &#124; 2020-11-04</title>
		<link>https://risk-academy.ru/practical-tips-and-resources-to-improve-the-cybersecurity-posture-of-your-business-2020-11-04/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 04 Nov 2020 05:19:18 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[New Jersey Office of Homeland Security and Preparedness]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Data security]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/practical-tips-and-resources-to-improve-the-cybersecurity-posture-of-your-business-2020-11-04/</guid>

					<description><![CDATA[Practical tips and resources to improve the cybersecurity posture of your business &#124; 2020-11-04 &#124; Security Magazine This website requires certain cookies to work and uses other cookies to help [&#8230;]]]></description>
										<content:encoded><![CDATA[<div> <!--<![endif]--><br />
 <head></p>
<link href="https://www.securitymagazine.com/blogs/14-security-blog/post/93792-practical-tips-and-resources-to-improve-the-cybersecurity-posture-of-your-business" rel="canonical"/>
<p>  <meta name="csrf-param" content="authenticity_token"/><br />
<meta name="csrf-token" content="krOCYODzA18jlCw7iAd+8R2aAgTrfupRaJ3DmTNQIi218zrb2WacR3Q0fD+co8mBAA6hX9CwqAlj+SpO1AYX4A=="/><br />
  <meta name="viewport" content="width=device-width, initial-scale=1.0"/><br />
  <meta name="description" content="Eight years ago, I started providing cybersecurity workshops for SMBs across the country. It was difficult to get anyone in the room back then. Most business owners did not understand the threats, or they believed their business was not big enough to be a target. Fast forward to 2020, it would be difficult to find a business owner who doesn&#x2019;t understand that her business is targeted by cybercriminals on a regular basis. The awareness of the problem has grown, but I am not convinced that . . ."/><br />
  <meta name="keywords" content="Small to Medium Business (SMB) security,cyber security"/></p>
<link rel="alternate" type="application/xml" title="Security Magazine RSS Feed" href="https://www.securitymagazine.com/rss/articles"/>
<p>  <meta property="og:title" content="Practical tips and resources to improve the cybersecurity posture of your business"/><br />
<meta property="og:description" content="Here are practical tools small- to medium-sized businesses can implement to improve and respond to cybersecurity."/><br />
<meta property="og:author" content="Kristin Judge"/><br />
<meta property="og:url" content="https://www.securitymagazine.com/blogs/14-security-blog/post/93792-practical-tips-and-resources-to-improve-the-cybersecurity-posture-of-your-business?v=preview"/><br />
<meta property="og:image" content="https://www.securitymagazine.com/ext/resources/store-4156934_1280.png?height=635&amp;t=1604069746&amp;width=1200"/><br />
<meta property="og:image:width" content="900"/><br />
<meta property="og:image:height" content="550"/><br />
<meta property="og:type" content="Article"/><br />
<meta name="twitter:title" content="Practical tips and resources to improve the cybersecurity posture of your business"/><br />
<meta name="twitter:description" content="Here are practical tools small- to medium-sized businesses can implement to improve and respond to cybersecurity."/><br />
<meta name="twitter:card" content="summary"/><br />
<meta name="twitter:image" content="https://www.securitymagazine.com/ext/resources/store-4156934_1280.png?1604069746"/></p>
<p> <meta name="msapplication-TileColor" content="#FFFFFF"/><br />
<meta name="msapplication-TileImage" content="/images/favicon/mstile-144.png"/>
<link rel="icon" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/favicons.ico" sizes="16x16 32x32 48x48 64x64"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-152.png" sizes="152x152"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-144.png" sizes="144x144"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-120.png" sizes="120x120"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-72.png" sizes="72x72"/>
<p><meta content="true" name="has-log-view"/><br />
  <title>Practical tips and resources to improve the cybersecurity posture of your business | 2020-11-04 | Security Magazine</title>
  <link rel="stylesheet" media="screen" href="https://www.securitymagazine.com/stylesheets/application.css"/>
   <link rel="stylesheet" media="print" href="https://www.securitymagazine.com/stylesheets/print.css"/>
 <link rel="dns-prefetch" href="https://fonts.googleapis.com"/>
 <link rel="preconnect" href="https://fonts.gstatic.com/" crossorigin=""/>
  <link href="https://fonts.googleapis.com/css?family=PT+Serif|Open+Sans:400,700|Open+Sans+Condensed:300" rel="stylesheet"/>
<link rel="stylesheet" media="screen" href="https://www.securitymagazine.com/ext/resources/securitymagazine.css"/>
<p><!-- dataLayer scripts, place in head before GTM snippet --></p>
<p><!-- End dataLayer --></p>
<p><!-- Google Tag Manager --></p>
<p><!-- End Google Tag Manager --></p>
<p> <!--[if lt IE 9]><![endif]--></p>
<p> </head><br />
 <body data-controller="blogs" data-action="show_post" data-article-requires-registration="true" data-article-requires-subscription="false" data-prestitial-ad="false" data-poststitial-ad="false" data-dfp-prefix="/52040140/sec" data-ad-unit-prefix="null" data-is-microsite="0" id="wp_automatic_ReadabilityBody"></p>
<p><!-- Google Tag Manager (noscript) --><br />
<noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-KNK327G" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript><br />
<!-- End Google Tag Manager (noscript) --></p>
<section class="cookie-policy" id="cookie-policy">
<div class="cookie-policy__body">
<div class="mobileHide">
<span style="font-family:verdana,geneva,sans-serif;"><span style="font-size:12px;"><strong><span style="color:#696969;">This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated <span style="color:#696969;">privacy and cookie policy to learn more. </span></span></strong></span></span></div>
<div class="mobileShow">
<details>&#13;</p>
<summary>This Website Uses Cookies<br />By closing this message or continuing to use our site, you agree to our cookie policy. <u>Learn More</u></summary>
<p>&#13;<br />
<span style="font-family:verdana,geneva,sans-serif;"><span style="font-size:12px;"><strong><span style="color:#696969;">This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated <span style="color:#696969;">privacy and cookie policy to learn more. </span></span></strong></span></span></details>
</div>
</div>
<p><span class="cookie-policy__close" id="cookie-policy-close"/></section>
<p>   <!-- google structured data --></p>
<p> &#8230;</body></div>
<p><a href="https://www.securitymagazine.com/blogs/14-security-blog/post/93792-practical-tips-and-resources-to-improve-the-cybersecurity-posture-of-your-business">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
