<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Department of Homeland Security &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/department-of-homeland-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sun, 13 Dec 2020 10:24:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Department of Homeland Security &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CDM Program&#8217;s Success Relies on Data Standardization</title>
		<link>https://risk-academy.ru/cdm-programs-success-relies-on-data-standardization/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 23 Oct 2020 17:03:24 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[Identity management]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[asset management]]></category>
		<category><![CDATA[Mitigation]]></category>
		<category><![CDATA[Homeland Securitys Continuous Diagnostics]]></category>
		<category><![CDATA[deputy chief information security officer]]></category>
		<category><![CDATA[Hemant Baidwan]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cdm-programs-success-relies-on-data-standardization/</guid>

					<description><![CDATA[Using more automation can help federal agencies improve quality of data. For the Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) program to work, federal agencies need to ensure [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Using more automation can help federal agencies improve quality of data.</p>
<div>
<p><span><span><span><span><span><span>For the Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) program to work, federal agencies need to ensure their data quality is top notch. Otherwise, their dashboards won’t offer an accurate picture of current assets and users on a federal agency’s network.</span></span></span></span></span></span></p>
<p><span><span><span><span><span><span>“Data quality can definitely cause issues,” said Hemant Baidwan, DHS deputy chief information security officer, at a FedInsider webinar discussing federal agencies’ progress on CDM implementation this week. “The dashboard is as good as what feeds it. If the data is not there and the quality and correlation are not there, whatever you&#8217;re seeing on the dashboard is not really actionable from a risk management standpoint. It makes it difficult to make decisions.”</span></span></span></span></span></span></p>
<p><span><span><span><span><span><span>The CDM program focuses on four key areas of cyber risk: asset management, identity management and credentialing, network security and data protection.</span></span></span></span></span></span></p>
<p><span><span><span><span><span><span>Baidwan encouraged federal agencies to focus on standardizing and normalizing their data before using the CDM dashboard to monitor their networks.</span></span></span></span></span></span></p>
<p><span><span><span><span><span><span>“The CDM program is a collaborative vehicle,”&#8230;</span></span></span></span></span></span></p>
</div>
<p><a href="https://governmentciomedia.com/cdm-programs-success-relies-data-standardization">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DHS funds risk assessment modeling tool development</title>
		<link>https://risk-academy.ru/dhs-funds-risk-assessment-modeling-tool-development/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 05 Oct 2020 02:00:19 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Utah]]></category>
		<category><![CDATA[Texas]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[technology solutions]]></category>
		<category><![CDATA[software tool suite]]></category>
		<category><![CDATA[Orem]]></category>
		<category><![CDATA[San Antonio]]></category>
		<category><![CDATA[SHUTTERSTOCK]]></category>
		<category><![CDATA[Achilles Heel Technologies]]></category>
		<category><![CDATA[modeling tool]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/dhs-funds-risk-assessment-modeling-tool-development/</guid>

					<description><![CDATA[© Shutterstock The Department of Homeland Security’s (DHS) Small Business Innovation Research (SBIR) Program has awarded $1.96 million to a pair of businesses to aid emergency communication network risk management [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<div class="storyCaption">
<div class="storyThumb">
                    <img decoding="async" class="storyFeatured" src="https://homelandprepnews.com/wp-content/uploads/2020/10/shutterstock_588813473.jpg" alt="Texas"  title="Texas" /></p>
<p>© Shutterstock</p>
</p></div>
</p></div>
<p>The Department of Homeland Security’s (DHS) Small Business Innovation Research (SBIR) Program has awarded $1.96 million to a pair of businesses to aid emergency communication network risk management assessments.</p>
<p>Orem, Utah-based Achilles Heel Technologies and SecureLogix, of San Antonio, Texas, were selected to participate in Phase II of the program based on demonstration of feasibility in Phase I for Network Modeling for Risk Assessment technology solutions.</p>
<p>During Phase II, each company is slated to continue its research and development efforts. Achilles Heel Technologies would further develop a software tool suite for holistic cyber risk management of Next-Generation 9-1-1 (NG9-1-1) systems. SecureLogix would continue developing a modeling tool aiding 9-1-1 decision makers in planning&#8230;</p>
</div>
<p><a href="https://homelandprepnews.com/stories/56260-dhs-funds-risk-assessment-modeling-tool-development/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DHS Taps Two Companies for Network Modeling Tech Dev’t – Executive Gov</title>
		<link>https://risk-academy.ru/dhs-taps-two-companies-for-network-modeling-tech-devt-executive-gov/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 21:38:18 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[technology directorate]]></category>
		<category><![CDATA[Executive]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Achilles Heel Technologies]]></category>
		<category><![CDATA[risk management networks]]></category>
		<category><![CDATA[Ann Cox]]></category>
		<category><![CDATA[SBIR topic manager]]></category>
		<category><![CDATA[SecureLogix]]></category>
		<category><![CDATA[software tools]]></category>
		<category><![CDATA[telephony denial]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/dhs-taps-two-companies-for-network-modeling-tech-devt-executive-gov/</guid>

					<description><![CDATA[DHS The Department of Homeland Security (DHS) has awarded SecureLogix and Achilles Heel Technologies a total of $1.96 million in funds through Phase II of the Small Business Innovation Research [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<div class="entry-thumb" style="float: left;padding: 0 15px 15px 0">
<img decoding="async" title="Executive" width="150" height="150" src="https://executivegov-media.s3.amazonaws.com/2020/07/07/a9/14/07/b2/4b/63/23/44/dhs_logo_20200131.png" class="img-responsive wp-post-image" alt="DHS Taps Two Companies for Network Modeling Tech Dev’t" loading="lazy" />	</p>
<p>DHS</p>
</div>
<p>The Department of Homeland Security (DHS) has awarded SecureLogix and Achilles Heel Technologies a total of $1.96 million in funds through Phase II of the Small Business Innovation Research program to build technologies that will support dynamic network modeling capabilities for emergency communication and risk management networks. </p>
<p>SecureLogix will continue the development of a modeling tool that will assist 911 decision makers in planning prevention approaches for telephony denial of service attacks, DHS said Tuesday.</p>
<p>Achilles Heel will build a suite of software tools designed to perform cyber risk management activities for Next-Generation 911 platforms such as dynamic network models.</p>
<p>&#8220;Now, many new data types are accepted by NG9-1-1 centers, such as text, video, images, and even information directly from an automobile in the event of an accident. All these data types increase the attack surface in cyberspace, in addition to the traditional TDoS and other attacks that originate in the phone system at 9-1-1 centers,&#8221; said Ann Cox, SBIR topic manager at DHS&#8217; science and technology directorate.</p>
<p>The awardees may compete for Phase III contracts after the completion of their&#8230;</p>
</div>
<p><a href="https://www.executivegov.com/2020/09/dhs-taps-two-companies-for-network-modeling-tech-devt/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5G Mobile Network Security: U.S. Government&#8217;s Strategy</title>
		<link>https://risk-academy.ru/5g-mobile-network-security-u-s-governments-strategy-2/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 20:34:18 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Telecommunications]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Internet of things]]></category>
		<category><![CDATA[U.S. government]]></category>
		<category><![CDATA[5G supply chain]]></category>
		<category><![CDATA[5G mobile network infrastructure]]></category>
		<category><![CDATA[Mobile telecommunications]]></category>
		<category><![CDATA[Wireless]]></category>
		<category><![CDATA[5G]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/5g-mobile-network-security-u-s-governments-strategy-2/</guid>

					<description><![CDATA[by DH Kass • Aug 28, 2020 The Department of Homeland Security’s cyber wing has released a five point plan to safeguard the nation’s budding 5G mobile network infrastructure against [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p class="byline">by DH Kass • Aug 28, 2020</p>
<p>The Department of Homeland Security’s cyber wing has released a five point plan to safeguard the nation’s budding 5G mobile network infrastructure against cyber threats.</p>
<p>The document, entitled <em>CISA 5G Strategy: Ensuring the Security and Resilience of 5G Infrastructure in Our Nation</em>, details five “strategic initiatives” the Cybersecurity and Infrastructure Security Agency (CISA) is focused on:</p>
<ul>
<li>Support 5G policy and standards development by emphasizing security and resilience.</li>
<li>Expand situational awareness of 5G supply chain risks and promote security measures.</li>
<li>Partner with stakeholders to strengthen and secure existing infrastructure to support future 5G deployments.</li>
<li>Encourage innovation in the 5G marketplace to foster trusted 5G vendors.</li>
<li>Analyze potential 5G use cases and share information on risk management strategies.</li>
</ul>
<p>Of the strategic initiatives, each addresses “critical risks to secure 5G deployment, such as physical security concerns, attempts by threat actors to influence the design and architecture of the network, vulnerabilities within the 5G supply chain, and an increased attack surface for malicious actors to exploit&#8230;</p>
</div>
<p><a href="https://www.msspalert.com/cybersecurity-news/5g-doh-strategy/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5G Mobile Network Security: U.S. Government&#8217;s Strategy</title>
		<link>https://risk-academy.ru/5g-mobile-network-security-u-s-governments-strategy/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 20:34:18 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Telecommunications]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Internet of things]]></category>
		<category><![CDATA[U.S. government]]></category>
		<category><![CDATA[5G supply chain]]></category>
		<category><![CDATA[5G mobile network infrastructure]]></category>
		<category><![CDATA[Mobile telecommunications]]></category>
		<category><![CDATA[Wireless]]></category>
		<category><![CDATA[5G]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/5g-mobile-network-security-u-s-governments-strategy/</guid>

					<description><![CDATA[by DH Kass • Aug 28, 2020 The Department of Homeland Security’s cyber wing has released a five point plan to safeguard the nation’s budding 5G mobile network infrastructure against [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p class="byline">by DH Kass • Aug 28, 2020</p>
<p>The Department of Homeland Security’s cyber wing has released a five point plan to safeguard the nation’s budding 5G mobile network infrastructure against cyber threats.</p>
<p>The document, entitled <em>CISA 5G Strategy: Ensuring the Security and Resilience of 5G Infrastructure in Our Nation</em>, details five “strategic initiatives” the Cybersecurity and Infrastructure Security Agency (CISA) is focused on:</p>
<ul>
<li>Support 5G policy and standards development by emphasizing security and resilience.</li>
<li>Expand situational awareness of 5G supply chain risks and promote security measures.</li>
<li>Partner with stakeholders to strengthen and secure existing infrastructure to support future 5G deployments.</li>
<li>Encourage innovation in the 5G marketplace to foster trusted 5G vendors.</li>
<li>Analyze potential 5G use cases and share information on risk management strategies.</li>
</ul>
<p>Of the strategic initiatives, each addresses “critical risks to secure 5G deployment, such as physical security concerns, attempts by threat actors to influence the design and architecture of the network, vulnerabilities within the 5G supply chain, and an increased attack surface for malicious actors to exploit&#8230;</p>
</div>
<p><a href="https://www.msspalert.com/cybersecurity-news/5g-doh-strategy/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Federal CISO Schneider plans to reinvigorate CyberStat in fiscal 2021</title>
		<link>https://risk-academy.ru/federal-ciso-schneider-plans-to-reinvigorate-cyberstat-in-fiscal-2021/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 16 Aug 2020 07:17:51 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Chief information security officer]]></category>
		<category><![CDATA[federal chief information security officer]]></category>
		<category><![CDATA[office of Management and Budget]]></category>
		<category><![CDATA[Grant Schneider]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[CIO]]></category>
		<category><![CDATA[Department of Justice]]></category>
		<category><![CDATA[National security of the United States]]></category>
		<category><![CDATA[United States government secrecy]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/federal-ciso-schneider-plans-to-reinvigorate-cyberstat-in-fiscal-2021/</guid>

					<description><![CDATA[The Office of Management and Budget has tried at least two other times to get agencies to consolidate and optimize their security operations centers (SOC). At some departments, there are [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><iframe src="https://www.podcastone.com/episodewidget?episodeID=5b102c05-d272-462d-8290-4eb935c46c88&amp;logo=true" width="100%" height="70" frameborder="0" scrolling="no"></iframe></p>
<p>The Office of Management and Budget has tried at least two other times to get agencies to consolidate and optimize their security operations centers (SOC).</p>
<p>At some departments, there are eight or 10 SOCs, meaning there is no single pane of glass for the chief information security officer, the Department of Homeland Security, or OMB to understand what’s really going on.</p>
<p>Grant Schneider, the federal chief information security officer (CISO), said the latest attempt to improve the value and reduce the number of security operations centers is well underway.</p>
<figure id="attachment_3009237" style="width: 544px" class="wp-caption alignright"><img fetchpriority="high" decoding="async" title="Chief information security officer" src="https://federalnewsnetwork.com/wp-content/uploads/2020/08/grant-schneider-2-e1597435379314.jpg" class="wp-image-3009237 size-full" alt="Chief information security officer" width="544" height="333" srcset="https://federalnewsnetwork.com/wp-content/uploads/2020/08/grant-schneider-2-e1597435379314.jpg 544w, https://federalnewsnetwork.com/wp-content/uploads/2020/08/grant-schneider-2-e1597435379314-300x184.jpg 300w, https://federalnewsnetwork.com/wp-content/uploads/2020/08/grant-schneider-2-e1597435379314-196x120.jpg 196w, https://federalnewsnetwork.com/wp-content/uploads/2020/08/grant-schneider-2-e1597435379314-327x200.jpg 327w" sizes="(max-width: 544px) 100vw, 544px"/><noscript><img decoding="async" title="federal chief information security officer" class="wp-image-3009237 size-full" src="https://federalnewsnetwork.com/wp-content/uploads/2020/08/grant-schneider-2-e1597435379314.jpg" alt="federal chief information security officer" width="544" height="333" srcset="https://federalnewsnetwork.com/wp-content/uploads/2020/08/grant-schneider-2-e1597435379314.jpg 544w, https://federalnewsnetwork.com/wp-content/uploads/2020/08/grant-schneider-2-e1597435379314-300x184.jpg 300w, https://federalnewsnetwork.com/wp-content/uploads/2020/08/grant-schneider-2-e1597435379314-196x120.jpg 196w, https://federalnewsnetwork.com/wp-content/uploads/2020/08/grant-schneider-2-e1597435379314-327x200.jpg 327w" sizes="(max-width: 544px) 100vw, 544px"/></noscript><figcaption class="wp-caption-text">Grant Schneider, federal chief information security officer</figcaption></figure>
<p>“We have been looking for all agencies to raise the bar. One of the ways we know we want to do that is the focus on shared services,” Schneider said in recent interview on Ask the CIO. “With SOC-as-a-service, DHS is in the process now, as the management office, of setting the standards for what would any service provider in this space need to deliver, and what would they need to be able to achieve. This doesn’t mean DHS will be the only service provider in this space. The Department of Justice is already working to be a service provider in this space as&#8230;</p>
</div>
<p><a href="https://federalnewsnetwork.com/ask-the-cio/2020/08/federal-ciso-schneider-plans-to-reinvigorate-cyberstat-in-fiscal-2021/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Athens State receives designation for cyber defense education &#124; Local News</title>
		<link>https://risk-academy.ru/athens-state-receives-designation-for-cyber-defense-education-local-news/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 01 Aug 2020 15:53:09 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[the national security agency]]></category>
		<category><![CDATA[National Security Agency]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[instructor of information assurance management]]></category>
		<category><![CDATA[information systems management]]></category>
		<category><![CDATA[information infrastructure]]></category>
		<category><![CDATA[Local News Athens State University]]></category>
		<category><![CDATA[National Center of Academic Excellence]]></category>
		<category><![CDATA[Darren Waldrep]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/athens-state-receives-designation-for-cyber-defense-education-local-news/</guid>

					<description><![CDATA[Athens State University has received a national designation for one of its areas of study. According to the university, the National Security Agency and Department of Homeland Security have designated [&#8230;]]]></description>
										<content:encoded><![CDATA[<div itemprop="articleBody">
                <meta itemprop="isAccessibleForFree" content="true"/></p>
<p>Athens State University has received a national designation for one of its areas of study.</p>
<p>According to the university, the National Security Agency and Department of Homeland Security have designated the school as a National Center of Academic Excellence in Cyber Defense Education through the 2025 academic year for its bachelors of science degree in management of cybersecurity operations and minor in information systems management.</p>
<p>The university said the recognition has come as the result of two years of “specifically-targeted” work by Darren Waldrep, an instructor of information assurance management.</p>
<p>“The goal of the CAE-CD program is to reduce vulnerability in our national information infrastructure by promoting higher education and research in cyber defense and producing professionals with cyber defense expertise,” according to a release from Athens State. “It addresses the critical shortage of professionals with cybersecurity skills and highlights the importance of higher education as a&#8230;</p>
</div>
<p><a href="https://www.enewscourier.com/news/local_news/athens-state-receives-designation-for-cyber-defense-education/article_48161354-d37a-11ea-ab67-af913ff9c500.html">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CISA hires cyber risk experts to meet emerging threats &#8212; FCW</title>
		<link>https://risk-academy.ru/cisa-hires-cyber-risk-experts-to-meet-emerging-threats-fcw/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 23 Jul 2020 00:59:04 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Christopher Krebs]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[Director]]></category>
		<category><![CDATA[Infrastructure Security Agency]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[cybersecurity and risk management advisor]]></category>
		<category><![CDATA[researcher]]></category>
		<category><![CDATA[Rob Arnold]]></category>
		<category><![CDATA[Mark Rockwell]]></category>
		<category><![CDATA[Josh Corman]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cisa-hires-cyber-risk-experts-to-meet-emerging-threats-fcw/</guid>

					<description><![CDATA[Cybersecurity CISA hires cyber risk experts to meet emerging threats &#13; By Mark Rockwell Jul 22, 2020 &#13;   The Department of Homeland Security&#8217;s Cybersecurity and Infrastructure Security Agency brought [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="article">
<p id="ph_pcontent2_0_KickerText" class="kicker">Cybersecurity</p>
<h3 id="ph_pcontent2_0_MainHeading" class="title">CISA hires cyber risk experts to meet emerging threats</h3>
<ul id="ph_pcontent2_0_ByAuthor" class="byline">&#13;</p>
<li class="author">By Mark Rockwell</li>
<li class="date">Jul 22, 2020</li>
<p>&#13;
		</ul>
<div class="remove imageCap">
<img loading="lazy" decoding="async" title="Cybersecurity and Infrastructure Security Agency" height="300" alt="cybersecurity (Rawpixel/Shutterstock.com)" width="620" src="https://fcw.com/-/media/GIG/EDIT_SHARED/Cyber/execssecurity.png"/> 
</div>
<p>The Department of Homeland Security&#8217;s Cybersecurity and Infrastructure Security Agency brought on two hired hands to help it grapple with shifting infrastructure cyber risks as the COVID-19 crisis grinds ahead.</p>
<p>The agency brought on Josh Corman as a visiting researcher and Rob Arnold to join CISA&#8217;s National Risk Management Center as a senior cybersecurity and risk management advisor. The positions are temporary and set up under CARES Act authority, according to a July 22 CISA statement.</p>
<p>&#8220;The COVID-19 pandemic has resulted in noticeable shifts in cyber risk calculations for organizations of all sizes,&#8221; said CISA Director Christopher Krebs in the statement. &#8220;The hardware, software, and services that underpin our connected infrastructure have absolutely been tested and stressed in this telework-heavy environment. At the same time, certain organizations and sectors of our economy have become more attractive targets for adversaries.&#8221;</p>
<p>Krebs said the shifting threats require an&#8230;</p>
</div>
<p><a href="https://fcw.com/articles/2020/07/22/rockwell-cisa-pandemic-hires.aspx">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>U.S. Cybersecurity Legislation: What Three Newly Proposed Bills Mean</title>
		<link>https://risk-academy.ru/u-s-cybersecurity-legislation-what-three-newly-proposed-bills-mean/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 18 Jul 2020 15:35:06 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[John Katko]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[bipartisan]]></category>
		<category><![CDATA[Cyberspace Solarium Commission]]></category>
		<category><![CDATA[Director Act]]></category>
		<category><![CDATA[Director and Assistant]]></category>
		<category><![CDATA[House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/u-s-cybersecurity-legislation-what-three-newly-proposed-bills-mean/</guid>

					<description><![CDATA[by DH Kass • Jul 18, 2020 Three newly introduced bills would add weight and influence to the Department of Homeland Security’s cyber wing through increased stability in leadership positions, [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p class="byline">by DH Kass • Jul 18, 2020</p>
<p>Three newly introduced bills would add weight and influence to the Department of Homeland Security’s cyber wing through increased stability in leadership positions, additional resources and a public-private workforce exchange program.</p>
<p>The package of bipartisan legislation, sponsored by Rep. John Katko (R-NY), the ranking member of the House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation, includes:</p>
<ul>
<li>The Cybersecurity and Infrastructure Security Agency Director and Assistant Directors Act.</li>
<li>Strengthening the Cybersecurity and Infrastructure Security Agency Act of 2020.</li>
<li>The CISA Public-Private Talent Exchange Act.</li>
</ul>
<p>Taken together, the measures aim to enrich the Cybersecurity and Infrastructure Security Agency’s (CISA) national cybersecurity profile. Of note, all three Katko bills are tied to the Cyberspace Solarium Commission’s (CSC) report delivered last March that offered dozens of cybersecurity-related recommendations to improve the nation’s defenses. Along those lines, Katko was also among a bipartisan group of legislators who recently proposed the CSC-inspired National Cyber Director Act&#8230;</p>
</div>
<p><a href="https://www.msspalert.com/cybersecurity-markets/americas/us-legislation/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Axonius Officially Added to DHS CDM APL and Receives CAVP Validation, Accelerating Expansion of its Federal Program</title>
		<link>https://risk-academy.ru/axonius-officially-added-to-dhs-cdm-apl-and-receives-cavp-validation-accelerating-expansion-of-its-federal-program/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 16 Jul 2020 13:24:44 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[NEW YORK]]></category>
		<category><![CDATA[Programming languages]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[APL]]></category>
		<category><![CDATA[Axonius]]></category>
		<category><![CDATA[General Services Administration]]></category>
		<category><![CDATA[Computer languages]]></category>
		<category><![CDATA[APL programming language family]]></category>
		<category><![CDATA[Cryptographic Module Validation Program]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/axonius-officially-added-to-dhs-cdm-apl-and-receives-cavp-validation-accelerating-expansion-of-its-federal-program/</guid>

					<description><![CDATA[&#13; NEW YORK (PRWEB)&#13; July 16, 2020&#13; Axonius, the cybersecurity asset management company, today announced it has been added to the Department of Homeland Security (DHS) Continuous Diagnostics and Mitigation [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<div class="middle-column">
<div class="news-image"><img loading="lazy" decoding="async" title="NEW YORK" itemprop="image" alt="News Image" class="qa-news-image" src="http://ww1.prweb.com/prfiles/2020/07/15/17260991/gI_73957_NewsImage_vcsPRAsset_3537720_73957_ae70e832-38c1-4c78-a88b-caafe51b8ad0_0.png" width="250" height="49"/></div>
</p></div>
<p class="article-date">&#13;<br />
                <span itemprop="contentLocation">NEW YORK (PRWEB)</span>&#13;<br />
                <span itemprop="datePublished">July 16, 2020</span>&#13;
              </p>
<p class="responsiveNews"> Axonius, the cybersecurity asset management company, today announced it has been added to the Department of Homeland Security (DHS) Continuous Diagnostics and Mitigation (CDM) Program Approved Products List (APL), allowing for purchase through the General Services Administration (GSA). The company has also received Cryptographic Algorithm Validation Program (CAVP) certification for its product&#8217;s use of the OpenSSL Federal Information Processing Standard (FIPS) Object Module. </p>
<p class="responsiveNews">Prior to the COVID-19 pandemic, federal, state, and local governments were already investing in IT modernization and digitization. Now, with the explosion of remote work, agencies face an increasing proliferation of devices and more assets hosted in the cloud. This is generating immediate urgency for federal CISOs to make quick and large strides to gain a comprehensive view of assets and activity within their infrastructure. By adopting a solution like Axonius, federal agencies immediately gain this&#8230;</p>
</div>
<p><a href="http://www.prweb.com/releases/axonius_officially_added_to_dhs_cdm_apl_and_receives_cavp_validation_accelerating_expansion_of_its_federal_program/prweb17260991.htm">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
