<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>distance learning &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/distance-learning/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Fri, 11 Dec 2020 05:40:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>distance learning &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cyber actors target K-12 distance learning education to cause disruptions and steal data &#124; 2020-12-11</title>
		<link>https://risk-academy.ru/cyber-actors-target-k-12-distance-learning-education-to-cause-disruptions-and-steal-data-2020-12-11/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 05:40:19 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[National security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Educational technology]]></category>
		<category><![CDATA[distance learning]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cyber-actors-target-k-12-distance-learning-education-to-cause-disruptions-and-steal-data-2020-12-11/</guid>

					<description><![CDATA[Cyber actors target K-12 distance learning education to cause disruptions and steal data &#124; 2020-12-11 &#124; Security Magazine This website requires certain cookies to work and uses other cookies to [&#8230;]]]></description>
										<content:encoded><![CDATA[<div> <!--<![endif]--><br />
 <head></p>
<link href="https://www.securitymagazine.com/articles/94140-cyber-actors-target-k-12-distance-learning-education-to-cause-disruptions-and-steal-data" rel="canonical"/>
<p>  <meta name="csrf-param" content="authenticity_token"/><br />
<meta name="csrf-token" content="nL6JVpySD7rTvwaWMWHghWcbaBeEI89Asa+IVbgabLhCIykuw2W7y7Dh0Vn8tBJB4XD+C6z6qcgDmT/epU2Vaw=="/><br />
  <meta name="viewport" content="width=device-width, initial-scale=1.0"/><br />
  <meta name="description" content="A new Joint Cybersecurity Advisory, coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC), assess malicious cyber actors are targeting kindergarten through twelfth grade (K-12) educational institutions, leading to ransomware attacks, the theft of data, and the disruption of distance learning services."/><br />
  <meta name="keywords" content="cyber security,malware,k-12 security,ransomware"/></p>
<link rel="alternate" type="application/xml" title="Security Magazine RSS Feed" href="https://www.securitymagazine.com/rss/articles"/>
<p>  <meta property="og:title" content="Cybercriminals targeting K-12 distance learning education to cause disruptions and steal data"/><br />
<meta property="og:description" content="A new Joint Cybersecurity Advisory, coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC), assess malicious cyber actors are targeting kindergarten through twelfth grade (K-12) educational institutions, leading to ransomware attacks, the theft of data, and the disruption of distance learning services."/><br />
<meta property="og:url" content="https://www.securitymagazine.com/articles/94140-cyber-actors-target-k-12-distance-learning-education-to-cause-disruptions-and-steal-data?v=preview"/><br />
<meta property="og:image" content="https://www.securitymagazine.com/ext/resources/images/schools-remote-learning.jpg?height=635&amp;t=1604076956&amp;width=1200"/><br />
<meta property="og:image:width" content="900"/><br />
<meta property="og:image:height" content="550"/><br />
<meta property="og:type" content="Article"/><br />
<meta name="twitter:title" content="Cybercriminals targeting K-12 distance learning education to cause disruptions and steal data"/><br />
<meta name="twitter:description" content="A new Joint Cybersecurity Advisory, coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC), assess malicious cyber actors are targeting kindergarten through twelfth grade (K-12) educational institutions, leading to ransomware attacks, the theft of data, and the disruption of distance learning services."/><br />
<meta name="twitter:card" content="summary"/><br />
<meta name="twitter:image" content="https://www.securitymagazine.com/ext/resources/images/schools-remote-learning.jpg?1604076956"/></p>
<p> <meta name="msapplication-TileColor" content="#FFFFFF"/><br />
<meta name="msapplication-TileImage" content="/images/favicon/mstile-144.png"/>
<link rel="icon" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/favicons.ico" sizes="16x16 32x32 48x48 64x64"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-152.png" sizes="152x152"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-144.png" sizes="144x144"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-120.png" sizes="120x120"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-72.png" sizes="72x72"/>
<p><meta content="true" name="has-log-view"/><br />
  <title>Cyber actors target K-12 distance learning education to cause disruptions and steal data | 2020-12-11 | Security Magazine</title>
  <link rel="stylesheet" media="screen" href="https://www.securitymagazine.com/stylesheets/application.css"/>
   <link rel="stylesheet" media="print" href="https://www.securitymagazine.com/stylesheets/print.css"/>
 <link rel="dns-prefetch" href="https://fonts.googleapis.com"/>
 <link rel="preconnect" href="https://fonts.gstatic.com/" crossorigin=""/>
  <link href="https://fonts.googleapis.com/css?family=PT+Serif|Open+Sans:400,700|Open+Sans+Condensed:300" rel="stylesheet"/>
<link rel="stylesheet" media="screen" href="https://www.securitymagazine.com/ext/resources/securitymagazine.css"/>
<p><!-- dataLayer scripts, place in head before GTM snippet --></p>
<p><!-- End dataLayer --></p>
<p><!-- Google Tag Manager --></p>
<p><!-- End Google Tag Manager --></p>
<p> <!--[if lt IE 9]><![endif]--></p>
<p> </head><br />
 <body data-controller="articles" data-action="show" data-article-requires-registration="true" data-article-requires-subscription="false" data-prestitial-ad="false" data-poststitial-ad="false" data-dfp-prefix="/52040140/sec" data-ad-unit-prefix="null" data-is-microsite="0" id="wp_automatic_ReadabilityBody"></p>
<p><!-- Google Tag Manager (noscript) --><br />
<noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-KNK327G" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript><br />
<!-- End Google Tag Manager (noscript) --></p>
<section class="cookie-policy" id="cookie-policy">
<div class="cookie-policy__body">
<div class="mobileHide">
<span style="font-family:verdana,geneva,sans-serif;"><span style="font-size:12px;"><strong><span style="color:#696969;">This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated <span style="color:#696969;">privacy and cookie policy to learn more. </span></span></strong></span></span></div>
<div class="mobileShow">
<details>&#13;</p>
<summary>This Website Uses Cookies<br />By closing this message or continuing to use our site, you agree to our cookie policy. <u>Learn More</u></summary>
<p>&#13;<br />
<span style="font-family:verdana,geneva,sans-serif;"><span style="font-size:12px;"><strong><span style="color:#696969;">This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated <span style="color:#696969;">privacy and cookie policy to learn more. </span></span></strong></span></span></details>
</div>
</div>
<p><span class="cookie-policy__close" id="cookie-policy-close"/></section>
<p>   <!-- google structured data --><br />
 &#8230;</body></div>
<p><a href="https://www.securitymagazine.com/articles/94140-cyber-actors-target-k-12-distance-learning-education-to-cause-disruptions-and-steal-data">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PerpetuityARC Training relaunches MSc International Security and Risk Management qualification</title>
		<link>https://risk-academy.ru/perpetuityarc-training-relaunches-msc-international-security-and-risk-management-qualification/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 10 Dec 2020 09:36:07 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[online/distance learning course]]></category>
		<category><![CDATA[Actuarial science]]></category>
		<category><![CDATA[Academic disciplines]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Security management]]></category>
		<category><![CDATA[distance learning]]></category>
		<category><![CDATA[University of West London]]></category>
		<category><![CDATA[online/distance learning academic qualification]]></category>
		<category><![CDATA[Design Strategic Security Management]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/perpetuityarc-training-relaunches-msc-international-security-and-risk-management-qualification/</guid>

					<description><![CDATA[Training and development IFSEC Global Applications are now open for the online/distance learning academic qualification, available from PerpetuityARC Training and in partnership with the University of West London (UWL). Intakes [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="ec-postContent">
<h3 class="ec-strapline">Training and development</h3>
<div id="ec-postAuthorMobile">
<img decoding="async" title="Actuarial science" width="96" height="96" src="https://s33644.pcdn.co/wp-content/uploads/2020/06/IFSEC-Global-logo-96x96.jpg" class="avatar avatar-96 photo" alt="Actuarial science" loading="lazy" srcset="https://s33644.pcdn.co/wp-content/uploads/2020/06/IFSEC-Global-logo-96x96.jpg 96w, https://s33644.pcdn.co/wp-content/uploads/2020/06/IFSEC-Global-logo-300x300.jpg 300w, https://s33644.pcdn.co/wp-content/uploads/2020/06/IFSEC-Global-logo-150x150.jpg 150w, https://s33644.pcdn.co/wp-content/uploads/2020/06/IFSEC-Global-logo-24x24.jpg 24w, https://s33644.pcdn.co/wp-content/uploads/2020/06/IFSEC-Global-logo-48x48.jpg 48w, https://s33644.pcdn.co/wp-content/uploads/2020/06/IFSEC-Global-logo.jpg 358w" sizes="auto, (max-width: 96px) 100vw, 96px"/> </p>
<h6 id="ec-authorName">IFSEC Global</h6>
</div>
<p><strong><em>Applications are now open for the online/distance learning academic qualification, available from PerpetuityARC Training and in partnership with the University of West London (UWL). Intakes will be in February and October 2021. </em></strong></p>
<p>The MSc International Security and Risk Management course is designed to address critical issues in security management, combining theoretical knowledge with professional best practice, and refines research methods. It is delivered as an online/distance learning course and can be undertaken in one year full-time or two years part-time study. Students will progress through five modules, and then complete a dissertation on a related topic of their choice to complete the degree. The modules are:</p>
<ul>
<li>Security Management: Prevention and Design</li>
<li>Strategic Security Management and Leadership</li>
<li>Security Management: Risk Management and Loss Prevention</li>
<li>Security Management and Delivering Value</li>
<li>Research Methods</li>
<li>Dissertation</li>
</ul>
<p>PerpetuityARC Training and UWL share a combined objective to develop practitioner standards within the security sector, and the MSc represents a pinnacle of academic excellence in security management&#8230;</p>
</div>
<p><a href="https://www.ifsecglobal.com/security/perpetuityarc-training-relaunches-msc-international-security-and-risk-management-qualification/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Colleges Can Strengthen Security with a Defense-in-Depth Strategy</title>
		<link>https://risk-academy.ru/how-colleges-can-strengthen-security-with-a-defense-in-depth-strategy/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 01 Oct 2020 17:43:07 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[technology environment]]></category>
		<category><![CDATA[deloitte]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[National security]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[security specialist]]></category>
		<category><![CDATA[distance learning]]></category>
		<category><![CDATA[regulatory compliance solutions]]></category>
		<category><![CDATA[Richard Rudnicki]]></category>
		<category><![CDATA[internet use]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/how-colleges-can-strengthen-security-with-a-defense-in-depth-strategy/</guid>

					<description><![CDATA[By necessity, universities have evolved beyond the old castle-and-moat approach to cybersecurity. In today’s highly distributed technology environment, firewalls alone cannot ensure student privacy or secure critical data. With a [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>By necessity, universities have evolved beyond the old castle-and-moat approach to cybersecurity. In today’s highly distributed technology environment, firewalls alone cannot ensure student privacy or secure critical data.</p>
<p>With a proliferation of endpoints, the present push toward remote work and distance learning has heightened existing cyber risks for colleges and universities. “Traditional, ‘monolithic,’ approaches to cybersecurity are becoming less reliable,” says Richard Rudnicki, a Deloitte security specialist with 15 years of experience delivering cyber-risk and regulatory compliance solutions to higher education. “To address evolving risks, institutions should adopt multilayered approaches that involve people, process and technology.”</p>
<p>Known as defense in depth, this multilayered approach centers on redundancy. Having multiple layers of security controls is likely more effective than ensuring one layer is perfectly secure. Above all, the first layer of security starts with user education: Make sure all students and faculty understand the basics of safe internet use. Let’s examine some further solutions that can help enhance your DiD strategy.</p>
<p><strong><em>MORE ON&#8230;</em></strong></p>
</div>
<p><a href="https://edtechmagazine.com/higher/article/2020/10/defense-depth-did-strategies-protect-higher-ed-users-against-cyberthreats-perfcon">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
