<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Federal government of the United States &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/federal-government-of-the-united-states/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Wed, 02 Dec 2020 00:55:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Federal government of the United States &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>OMB should lead category management efforts to improve contract data, GAO says</title>
		<link>https://risk-academy.ru/omb-should-lead-category-management-efforts-to-improve-contract-data-gao-says/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 02 Dec 2020 00:54:59 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Technology assessment]]></category>
		<category><![CDATA[Government Accountability Office]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[office of Management and Budget]]></category>
		<category><![CDATA[Federal government of the United States]]></category>
		<category><![CDATA[Dave Nyczepir]]></category>
		<category><![CDATA[governmentwide solutions]]></category>
		<category><![CDATA[similar products]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/omb-should-lead-category-management-efforts-to-improve-contract-data-gao-says/</guid>

					<description><![CDATA[Written by Dave Nyczepir Dec 1, 2020 &#124; FEDSCOOP Efforts to improve contract data must be led by the Office of Management and Budget, if its category management initiative is to improve, [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
				      Written by</p>
<p>                Dave Nyczepir							<br /><span class="article__meta" style="border-top: 0px; border-bottom: 1px solid rgba(0,0,0,0.2);"> Dec 1, 2020 | FEDSCOOP</span></p>
<p>Efforts to improve contract data must be led by the Office of Management and Budget, if its category management initiative is to improve, according to the Government Accountability Office.</p>
<p>GAO found OMB‘s category management initiative focused too much on how to buy things<span style="font-weight: 400;"> — </span>at the expense of helping agencies determine what goods and services they actually need<span style="font-weight: 400;"> — </span>when it assessed data for 28 agencies, reviewed guidance for four and interviewed officials.</p>
<p>The category management initiative saved $27.3 billion in three years by having agencies use existing contracts to buy similar products and services like those in the IT Category, but billions more could be saved if OMB pursues governmentwide solutions to data challenges.</p>
<p>“Agency officials told GAO that data challenges—particularly challenges in collecting, analyzing, and sharing data on their spending and the prices they pay—have hindered implementation of the category management initiative,” reads GAO’s congressional report released Monday. “OMB is aware of these&#8230;</p>
</div>
<p><a href="https://www.fedscoop.com/omb-category-management-data/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DHS cyber chief out after debunking Trump’s election claims</title>
		<link>https://risk-academy.ru/dhs-cyber-chief-out-after-debunking-trumps-election-claims/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 05:31:36 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[United States Department of Homeland Security]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[Huawei]]></category>
		<category><![CDATA[Federal government of the United States]]></category>
		<category><![CDATA[Chris Krebs]]></category>
		<category><![CDATA[czar]]></category>
		<category><![CDATA[Biden]]></category>
		<category><![CDATA[DHS cyber chief]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/dhs-cyber-chief-out-after-debunking-trumps-election-claims/</guid>

					<description><![CDATA[&#8220;There were massive improprieties and fraud — including dead people voting, Poll Watchers not allowed into polling locations, &#8216;glitches&#8217; in the voting machines which changed &#8230; votes from Trump to [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p class=" story-text__paragraph">&#8220;There were massive improprieties and fraud — including dead people voting, Poll Watchers not allowed into polling locations, &#8216;glitches&#8217; in the voting machines which changed &#8230; votes from Trump to Biden, late voting, and many more,&#8221; Trump tweeted, though those claims are false. &#8220;Therefore, effective immediately, Chris Krebs has been terminated.&#8221;</p>
<p class=" story-text__paragraph">Krebs, one of the few Trump appointees with nearly universal bipartisan support, spent years navigating his new agency through DHS’s leadership turmoil and the administration’s political controversies. At the same time, he built relationships with fellow officials and private security experts to reform and promote the government’s cyber mission.</p>
<p class=" story-text__paragraph">After rising to become the United States&#8217; de-facto cyber czar in 2018, he became a familiar presence at security conferences, where he discussed threats such as the ransomware epidemic and the risks of Chinese telecom companies such as Huawei. In an administration that constantly defied democratic norms, Krebs became the public face of the government’s election security efforts, highlighting the collaboration between national security officials and election supervisors.</p>
<p class=" story-text__paragraph">But Krebs’&#8230;</p>
</div>
<p><a href="https://www.politico.com/news/2020/11/17/trump-fires-dhs-cybersecurity-chief-who-led-election-defense-437174">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>OMB sets new CDM data standards deadline for agencies</title>
		<link>https://risk-academy.ru/omb-sets-new-cdm-data-standards-deadline-for-agencies/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 16 Nov 2020 23:24:50 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Director]]></category>
		<category><![CDATA[office of Management and Budget]]></category>
		<category><![CDATA[CIO]]></category>
		<category><![CDATA[Federal government of the United States]]></category>
		<category><![CDATA[National Institute]]></category>
		<category><![CDATA[Chief Financial Officer (CFO)]]></category>
		<category><![CDATA[Russ Vought]]></category>
		<category><![CDATA[United States Office of Management and Budget]]></category>
		<category><![CDATA[Executive branch of the United States government]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/omb-sets-new-cdm-data-standards-deadline-for-agencies/</guid>

					<description><![CDATA[As with any discussion about cybersecurity, let’s start with the good news. The Office of Management and Budget continues to live up to its promise to keep new requirements under [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>As with any discussion about cybersecurity, let’s start with the good news.</p>
<p>The Office of Management and Budget continues to live up to its promise to keep new requirements under the Federal Information Security Management Act (FISMA) at a minimum to ensure consistent measurement from year-to-year.</p>
<p>The latest memo from OMB Director Russ Vought outlining requirements for fiscal 2021 is exactly the same as the 2019-2020 memo except for a section about the continuous diagnostics and mitigation (CDM) program.</p>
<p>“At a minimum, Chief Financial Officer (CFO) Act agencies must update their CIO metrics quarterly and non-CFO Act agencies must update their CIO metrics on a semiannual basis,” Vought wrote. “Reflecting the administration’s shift from compliance to risk management, as well as the guidance and requirements outlined in OMB Memorandum M-19-03, Strengthening the Cybersecurity o(Federal Agencies by Enhancing the High Value Asset Program, and Binding Operational Directive 18-02, Securing High Value Assets, CIO metrics are not limited to assessments and capabilities within National Institute of&#8230;</p>
</div>
<p><a href="https://federalnewsnetwork.com/reporters-notebook-jason-miller/2020/11/omb-sets-new-cdm-data-standards-deadline-for-agencies/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DHS Works to Protect National Critical Infrastructure</title>
		<link>https://risk-academy.ru/dhs-works-to-protect-national-critical-infrastructure/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 04 Oct 2020 15:58:12 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[United States Department of Homeland Security]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[u.s. department of homeland security]]></category>
		<category><![CDATA[Federal government of the United States]]></category>
		<category><![CDATA[Agencies of the United States government]]></category>
		<category><![CDATA[Thad Odderstol]]></category>
		<category><![CDATA[DHS Cyber Security Division]]></category>
		<category><![CDATA[National Cybersecurity and Critical Infrastructure Protection Act]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/dhs-works-to-protect-national-critical-infrastructure/</guid>

					<description><![CDATA[Last month, the Cybersecurity and Infrastructure Security Agency (CISA), which is part of the U.S. Department of Homeland Security (DHS), published two important resources that deserve special attention. While many [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Last month, the Cybersecurity and Infrastructure Security Agency (CISA), which is part of the U.S. Department of Homeland Security (DHS), published two important resources that deserve special attention. While many of these CISA status reports may seem a bit like “alphabet soup” to those not familiar with the process, the importance of this National Critical Function (NCF) topic is paramount to our joint efforts to protect our nation’s critical infrastructure from numerous threats.</p>
<p>The &#8220;NCF: Status Update to the Critical Infrastructure Community&#8221; was released directly to stakeholders in July 2020, and the NCF Fact Sheet is new.</p>
<p>The release of this NCF report on progress in protecting our National Critical Functions is ground-breaking. In order to better understand the importance of this topic and dive deeper into what it means, I interviewed Thad Odderstol,&#8230;</p>
</div>
<p><a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/dhs-works-to-protect-national-critical-infrastructure.html">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Memorandum on Space Policy Directive-5-Cybersecurity Principles for Space Systems</title>
		<link>https://risk-academy.ru/memorandum-on-space-policy-directive-5-cybersecurity-principles-for-space-systems/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 04 Sep 2020 18:09:27 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Space policy]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Federal government of the United States]]></category>
		<category><![CDATA[security applications]]></category>
		<category><![CDATA[ground networks]]></category>
		<category><![CDATA[radio-frequency-dependent wireless communication channels]]></category>
		<category><![CDATA[Space systems]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/memorandum-on-space-policy-directive-5-cybersecurity-principles-for-space-systems/</guid>

					<description><![CDATA[SUBJECT: Cybersecurity Principles for Space Systems Section 1. Background. The United States considers unfettered freedom to operate in space vital to advancing the security, economic prosperity, and scientific knowledge of [&#8230;]]]></description>
										<content:encoded><![CDATA[<div itemprop="articleBody">
<p>SUBJECT:    Cybersecurity Principles for Space Systems</p>
<p>Section 1. Background. The United States considers unfettered freedom to operate in space vital to advancing the security, economic prosperity, and scientific knowledge of the Nation. Space systems enable key functions such as global communications; positioning, navigation, and timing; scientific observation; exploration; weather monitoring; and multiple vital national security applications. Therefore, it is essential to protect space systems from cyber incidents in order to prevent disruptions to their ability to provide reliable and efficient contributions to the operations of the Nation’s critical infrastructure.</p>
<p>Space systems are reliant on information systems and networks from design conceptualization through launch and flight operations. Further, the transmission of command and control and mission information between space vehicles and ground networks relies on the use of radio-frequency-dependent wireless communication channels. These systems, networks, and channels can be vulnerable to malicious activities that can deny, degrade, or disrupt space operations, or even destroy satellites.</p>
<p>Examples of malicious&#8230;</p>
</div>
<p><a href="https://www.miragenews.com/memorandum-on-space-policy-directive-5-cybersecurity-principles-for-space-systems/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Information Sharing Success Stories</title>
		<link>https://risk-academy.ru/cybersecurity-information-sharing-success-stories/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 15 Jul 2020 22:20:44 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[New Jersey Cybersecurity and Communications Integration Cell]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[National Initiative for Cybersecurity Education]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[Workforce]]></category>
		<category><![CDATA[Federal government of the United States]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cybersecurity-information-sharing-success-stories/</guid>

					<description><![CDATA[The theory behind cybersecurity information sharing is clear and uncontroversial, even if the details of what to share, how best to do it and who to share with may sometimes [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p style="margin-bottom:11px">The theory behind cybersecurity information sharing is clear and uncontroversial, even if the details of what to share, how best to do it and who to share with may sometimes result in debate and disagreement. The theory goes that organizations are better off sharing information and improving situational awareness than trying to recognize and face cyber threats and challenges on their own. Some collective and coordinated efforts can help to identify, learn about and fend off threats and would-be attackers—as compared to acting individually with less information and situational awareness. That is also a reason why armies gather intelligence, where feasible, before going to battle.</p>
<p style="margin-bottom:11px">Sharing information about cyber threats, incidents and vulnerabilities has some similarities to the concepts of a “neighborhood watch.” For both, the idea is to observe, gather and share information—including about the tactics, techniques and procedures (TTPs) of attackers—to enable targets to recognize threats and defend better, reducing the likelihood that those attacks and attackers will succeed. In economic terms, we are seeking in part to raise the costs to attackers by using information&#8230;</p>
</div>
<p><a href="https://www.lawfareblog.com/cybersecurity-information-sharing-success-stories">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
