<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Enterprise &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/enterprise/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Mon, 08 Jun 2020 06:52:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Enterprise &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Enterprise Risk Management in the eye of COVID-19 storm</title>
		<link>https://risk-academy.ru/enterprise-risk-management-in-the-eye-of-covid-19-storm/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 08 Jun 2020 06:52:52 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Certified Risk Analyst]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[Business Finance]]></category>
		<category><![CDATA[Health Medical Pharma]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Committee of Sponsoring Organisations]]></category>
		<category><![CDATA[MEGA International Srl.]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/enterprise-risk-management-in-the-eye-of-covid-19-storm/</guid>

					<description><![CDATA[Enterprise Risk Management [ERM] has come a long way. Since the mid-1990s, ERM has emerged as a concept and as a management function within organisations. Its emergence can be traced [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p class="p1"><span class="s1">E</span><span class="s1">nterprise Risk Management [ERM] has come a long way. Since the mid-1990s, ERM has emerged as a concept and as a management function within organisations.</span></p>
<p class="p3"><span class="s1">Its emergence can be traced to two main causes. First, following a number of high-profile company failures and avertible large losses, the latitude of corporate governance has widened to clasp the risks that a company takes.<span class="Apple-converted-space">  </span>Second, shareholder value modeis playing a greater role in </span></p>
<p class="p3"><span class="s1">strategic development. Early strategic planning models paid inadequate attention to risk. </span></p>
<p class="p3"><span class="s1">As business risks continue to surge, organizations are finding it essential to implement some sort of formal risk management system. An effective enterprise risk management (ERM) program can help organizations manage their risks and maximize opportunities. </span></p>
<p class="p3"><span class="s1">Organisations in all types of industries, public and private, have observed a variety of benefits from enhancing their risk management agendas.</span></p>
<p class="p3"><span class="s1">A committee of five organizations dedicated to thought leadership around risk management provided a definition of ERM in 2004. The Committee of Sponsoring Organisations (COSO) defined it as:</span></p>
<p class="p3"><span class="s1">“… a process, effected by the entity’s board of directors,&#8230;</span></p>
</div>
<p><a href="https://www.businessamlive.com/enterprise-risk-management-in-the-eye-of-covid-19-storm/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Dark Reading &#124; Security &#124; Protect The Business</title>
		<link>https://risk-academy.ru/dark-reading-security-protect-the-business/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 02 Jun 2020 15:23:44 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Information science]]></category>
		<category><![CDATA[reading]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[API]]></category>
		<category><![CDATA[exec.]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Enterprise architecture]]></category>
		<category><![CDATA[HP Enterprise Security Products]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/dark-reading-security-protect-the-business/</guid>

					<description><![CDATA[Enterprise Vulnerabilities From DHS/US-CERT&#8217;s National Vulnerability Database CVE-2020-13659PUBLISHED: 2020-06-02 address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer. CVE-2020-10703PUBLISHED: 2020-06-02 &#13; A NULL pointer [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<div style="margin:0 0.916666em;">
      <span class="allcaps black smaller">Enterprise Vulnerabilities</span><br />
      <span class="black smaller">From DHS/US-CERT&#8217;s National Vulnerability Database</span></p>
<p><span>CVE-2020-13659</span><br xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:foo="http://purl.org/rss/1.0/"/><span>PUBLISHED: </span><span>2020-06-02</span></p>
<p><span class="black smaller"/><span class="black smaller">address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.</span></p>
<p><span>CVE-2020-10703</span><br xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:foo="http://purl.org/rss/1.0/"/><span>PUBLISHED: </span><span>2020-06-02</span></p>
<p>&#13;<br />
<span/><span>A NULL pointer dereference was found in the libvirt API responsible introduced in upstream version 3.10.0, and fixed in libvirt 6.0.0, for fetching a storage pool based on its target path. In more detail, this flaw affects storage pools created without a target path such as network-based pools like &#8230;</span></p>
<p><span>CVE-2020-10739</span><br xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:foo="http://purl.org/rss/1.0/"/><span>PUBLISHED: </span><span>2020-06-02</span></p>
<p>&#13;<br />
<span/><span>Istio 1.4.x before 1.4.9 and Istio 1.5.x before 1.5.4 contain the following vulnerability when telemetry v2 is enabled: by sending a specially crafted packet, an attacker could trigger a Null Pointer Exception resulting in a Denial of Service. This could be sent to the ingress gateway or a sidecar, &#8230;</span></p>
<p><span>CVE-2020-10136</span><br xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:foo="http://purl.org/rss/1.0/"/><span>PUBLISHED: </span><span>2020-06-02</span></p>
<p>&#13;<br />
<span/><span>Multiple products that implement the IP Encapsulation within IP standard (RFC 2003, STD 1) decapsulate and route IP-in-IP traffic without any validation, which could allow an&#8230;</span></p>
</div>
</div>
<p><a href="http://www.darkreading.com/prnewswire2.asp?rkey=20200602NY22930&#038;filter=3923">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
