<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Information Age &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/information-age/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Wed, 05 Aug 2020 09:48:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Information Age &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>One Line Metalog in SIPmath</title>
		<link>https://risk-academy.ru/one-line-metalog-in-sipmath-3/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 05 Aug 2020 09:00:30 +0000</pubDate>
				<category><![CDATA[Официальная группа ИСАР]]></category>
		<category><![CDATA[decisionscience]]></category>
		<category><![CDATA[sipmath]]></category>
		<category><![CDATA[brianputt]]></category>
		<category><![CDATA[Information Age]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Sports]]></category>
		<category><![CDATA[One Line]]></category>
		<category><![CDATA[Line 18]]></category>
		<category><![CDATA[decisionmaking]]></category>
		<category><![CDATA[Line 1]]></category>
		<category><![CDATA[line]]></category>
		<category><![CDATA[data]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/one-line-metalog-in-sipmath-3/</guid>

					<description><![CDATA[One Line Metalog in SIPmath #decisionscience, #decisionmaking, #sipmath, #brianputt One Line Metalog in SIPmath Demonstrates generating 10 metalogs using the One-Line Metalog. Contact me Brian&#064;theputts.com for the Excel file. Присоеденяйтесь [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span></p>
<p>One Line Metalog in SIPmath <a class="cm cn" href="https://facebook.com/hashtag/decisionscience?refid=18&amp;_ft_=qid.6857434481598687227%3Amf_story_key.1159994424375490%3Agroup_id.412510262457247%3Atop_level_post_id.1159994424375490%3Atl_objid.1159994424375490%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1596618030%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1159994424375490%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="co cp">#decisionscience</span></a>, <a class="cm cn" href="https://facebook.com/hashtag/decisionmaking?refid=18&amp;_ft_=qid.6857434481598687227%3Amf_story_key.1159994424375490%3Agroup_id.412510262457247%3Atop_level_post_id.1159994424375490%3Atl_objid.1159994424375490%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1596618030%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1159994424375490%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="co cp">#decisionmaking</span></a>, <a class="cm cn" href="https://facebook.com/hashtag/sipmath?refid=18&amp;_ft_=qid.6857434481598687227%3Amf_story_key.1159994424375490%3Agroup_id.412510262457247%3Atop_level_post_id.1159994424375490%3Atl_objid.1159994424375490%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1596618030%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1159994424375490%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="co cp">#sipmath</span></a>, <a class="cm cn" href="https://facebook.com/hashtag/brianputt?refid=18&amp;_ft_=qid.6857434481598687227%3Amf_story_key.1159994424375490%3Agroup_id.412510262457247%3Atop_level_post_id.1159994424375490%3Atl_objid.1159994424375490%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1596618030%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1159994424375490%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="co cp">#brianputt</span></a></p>
<p></span>
</p>
<p><a href="https://buff.ly/2TFBFCg"><img decoding="async" alt="line" title="One Line Metalog in SIPmath" src="https://scontent-dfw5-1.xx.fbcdn.net/v/t1.0-0/c440.0.540.540a/p180x540/116582464_10156969587062142_4951948694971008285_o.jpg?_nc_cat=103&#038;_nc_sid=ca434c&#038;_nc_ohc=d-Oouz0eIBwAX_zPabc&#038;_nc_ht=scontent-dfw5-1.xx&#038;oh=3ab691ebe186a1bb9ddad5ba6c3e4e1c&#038;oe=5F51C2E4" /></a> </p>
<p><a href="https://buff.ly/2TFBFCg">One Line Metalog in SIPmath</a></p>
<p>Demonstrates generating 10 metalogs using the One-Line Metalog. Contact me Brian&#064;theputts.com for the Excel file.</p>
<p><a href="https://www.facebook.com/groups/412510262457247/permalink/1159994424375490">Присоеденяйтесь к официальной группе ИСАР в Facebook</a> </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Pandemic accelerating security at financial institutions</title>
		<link>https://risk-academy.ru/pandemic-accelerating-security-at-financial-institutions/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 03 Aug 2020 23:07:01 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Information Age]]></category>
		<category><![CDATA[cyber risk ad strategic risk services]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[Financial Services Information Sharing and Analysis Center]]></category>
		<category><![CDATA[Information Sharing and Analysis Center]]></category>
		<category><![CDATA[deloitte]]></category>
		<category><![CDATA[Analysis Center]]></category>
		<category><![CDATA[Computer security]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/pandemic-accelerating-security-at-financial-institutions/</guid>

					<description><![CDATA[Prior to the pandemic, financial institutions spent an average $2,700 on cybersecurity per full-time employee, up from $2,300 the previous year ), with COVID-19 now driving the need for companies [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Prior to the pandemic, financial institutions spent an average $2,700 on cybersecurity per full-time employee, up from $2,300 the previous year ), with COVID-19 now driving the need for companies to doubledown on cybersecurity going forward, according to a study from Deloitte’s cyber risk ad strategic risk services group in conjunction with the Financial Services Information Sharing and Analysis Center (FS-ISAC).</p>
<p>The allocation represents more than a tenth of organizations’ IT budgets, increasing slightly to 10.9 percent, up from 10.1 percent, according to data that was collected from 53 institutions late last year through January.</p>
<p>The third annual report from Deloitte and FS-ISAC also found that more than half of the spending went collectively to cyber monitoring and operations, endpoint and network security, and identity and access management.</p>
<p>COVID-19 has resulted in vast challenges for the financial sector’s cybersecurity challenges, the study noted.</p>
<p>“Looking ahead, given the tough macroeconomic conditions arising from the COVID-19 pandemic, many companies will likely be taking a hard look at whether they need to cut expenses across the board,”&#8230;</p>
</div>
<p><a href="https://www.scmagazine.com/home/security-news/pandemic-accelerating-security-at-financial-institutions/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protiviti Launches Microsoft 365, Azure Security Services</title>
		<link>https://risk-academy.ru/protiviti-launches-microsoft-365-azure-security-services/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 02 Aug 2020 16:59:58 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Protiviti]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[event management]]></category>
		<category><![CDATA[vulnerability assessment services]]></category>
		<category><![CDATA[Dan Kobialka]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[Information Age]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[security solutions]]></category>
		<category><![CDATA[Microsoft]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/protiviti-launches-microsoft-365-azure-security-services/</guid>

					<description><![CDATA[Global consulting firm Protiviti releases Microsoft 365 &#38; Microsoft Azure solutions to help organizations manage cyber risk &#38; meet security requirements. by Dan Kobialka • Aug 2, 2020 Global consulting [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="post-38026">
<div class="imgwrap">
			<img fetchpriority="high" decoding="async" title="Information Age" width="1024" height="294" src="https://www.msspalert.com/wp-content/uploads/2018/08/microsoft-azure-cloud.jpg" class="attachment-featureimg-nocol size-featureimg-nocol wp-post-image" alt="Information Age" />		</p>
<div class="titleby">
<p>
						Global consulting firm Protiviti releases Microsoft 365 &amp; Microsoft Azure solutions to help organizations manage cyber risk &amp; meet security requirements.					</p>
</p></div>
</div>
<div class="entrycontent clearfix">
<p class="byline">by Dan Kobialka • Aug 2, 2020</p>
<p>Global consulting firm Protiviti has announced Microsoft 365 and Azure security solutions to help organizations manage cyber risk and comply with data protection requirements, according to a prepared statement.</p>
<p>Protiviti’s Microsoft security offerings include:</p>
<ul>
<li><strong>Microsoft Security Workshop: </strong>Provides visibility into cyber threats across an organization’s emails, data and identities and offers personalized security recommendations.</li>
<li><strong>Microsoft Azure Security Management: </strong>Offers managed vulnerability assessment services to help organizations identify, evaluate and manage business and security risks.</li>
<li><strong>Microsoft Azure Sentinel Implementation Services: </strong>Enable organizations to use the Azure Sentinel security information and event management (SIEM) solution to evaluate their information security and privacy risks and determine the best ways to address these issues.</li>
</ul>
<p>Furthermore, Protiviti delivers real-time&#8230;</p>
</div>
</div>
<p><a href="https://www.msspalert.com/cybersecurity-services-and-products/protiviti-launches-microsoft-365-azure-security-services/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Culture of scientific exchange seen as a risk factor for life science cybersecurity &#8211; BioWorld Online</title>
		<link>https://risk-academy.ru/culture-of-scientific-exchange-seen-as-a-risk-factor-for-life-science-cybersecurity-bioworld-online/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 28 Jul 2020 21:33:43 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Information governance]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Information Age]]></category>
		<category><![CDATA[information technology]]></category>
		<category><![CDATA[Online Culture]]></category>
		<category><![CDATA[Health Medical Pharma]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Computer network security]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/culture-of-scientific-exchange-seen-as-a-risk-factor-for-life-science-cybersecurity-bioworld-online/</guid>

					<description><![CDATA[Culture of scientific exchange seen as a risk factor for life science cybersecurity&#160;&#160;BioWorld Online Read More&#8230;]]></description>
										<content:encoded><![CDATA[<p>Culture of scientific exchange seen as a risk factor for life science cybersecurity&nbsp;&nbsp;BioWorld Online</p>
<p><a href="https://www.bioworld.com/articles/496300-culture-of-scientific-exchange-seen-as-a-risk-factor-for-life-science-cybersecurity">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Release of co-designed Cloud Security Guidance</title>
		<link>https://risk-academy.ru/release-of-co-designed-cloud-security-guidance/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 27 Jul 2020 00:24:08 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Australian Cyber Security Centre]]></category>
		<category><![CDATA[cloud services]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[cloud solutions]]></category>
		<category><![CDATA[Cloud Security Guidance Australian Cyber Security Centre]]></category>
		<category><![CDATA[Digital Transformation Agency]]></category>
		<category><![CDATA[Information Age]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Digital technology]]></category>
		<category><![CDATA[Commonwealth Day]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/release-of-co-designed-cloud-security-guidance/</guid>

					<description><![CDATA[Australian Cyber Security Centre On 27 July 2020, following the closure of the Cloud Services Certification Program (CSCP) and the associated Certified Cloud Services List (CCSL), the Australian Cyber Security [&#8230;]]]></description>
										<content:encoded><![CDATA[<div itemprop="articleBody">
<p>Australian Cyber Security Centre</p>
<p>On 27 July 2020, following the closure of the Cloud Services Certification Program (CSCP) and the associated Certified Cloud Services List (CCSL), the Australian Cyber Security Centre (ACSC) and the Digital Transformation Agency (DTA) released new Cloud Security Guidance co-designed with industry to support the secure adoption of cloud services across government and industry.</p>
<p>The Cloud Security Guidance will guide organisations including government, Cloud Service Providers (CSP), and Information Security Registered Assessors Program (IRAP) assessors on how to perform a comprehensive assessment of a cloud service provider and its cloud services, so a risk-informed decision can be made about its suitability to handle an organisation’s data.</p>
<p>Commonwealth entities will continue to self-assess their cloud solutions in accordance with the Guidance. They will also continue to be responsible for their own assurance and risk management activities. Information Security Registered Assessors Program (IRAP) will continue to support government in maintaining their assurance and risk management activities.</p>
<p>A Ministerial statement on the new guidance can be found&#8230;</p>
</div>
<p><a href="https://www.miragenews.com/release-of-co-designed-cloud-security-guidance/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bitly &#124; Page Not Found &#124; 404</title>
		<link>https://risk-academy.ru/bitly-page-not-found-404-16/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 24 Jul 2020 09:00:00 +0000</pubDate>
				<category><![CDATA[Официальная группа ИСАР]]></category>
		<category><![CDATA[Computer errors]]></category>
		<category><![CDATA[HTTP 404]]></category>
		<category><![CDATA[Error message]]></category>
		<category><![CDATA[404]]></category>
		<category><![CDATA[Playlistify]]></category>
		<category><![CDATA[riskmanagement]]></category>
		<category><![CDATA[Information Age]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Digital technology]]></category>
		<category><![CDATA[bitly]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/bitly-page-not-found-404-16/</guid>

					<description><![CDATA[Вебинар: практика аудитов информационной безопасности #riskmanagement Bitly &#124; Page Not Found &#124; 404 This is a 404 error, which means you&#039;ve clicked on a bad link or entered an invalid [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span></p>
<p>Вебинар: практика аудитов информационной безопасности <a class="bz ca" href="https://facebook.com/hashtag/riskmanagement?refid=18&amp;_ft_=qid.6852972074909016189%3Amf_story_key.1151027008605565%3Agroup_id.412510262457247%3Atop_level_post_id.1151027008605565%3Atl_objid.1151027008605565%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1595581200%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1151027008605565%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="cb cc">#riskmanagement</span></a></p>
<p></span>
</p>
<p><a href="https://buff.ly/2slgafh"><img decoding="async" alt="Information Age" title="Bitly | Page Not Found | 404" src="https://scontent-dfw5-1.xx.fbcdn.net/v/t1.0-0/c247.0.540.540a/p180x540/109532157_10156931134822142_3633562883141960407_o.jpg?_nc_cat=101&#038;_nc_sid=ca434c&#038;_nc_ohc=NJWlM4HdTkEAX-AfP26&#038;_nc_ht=scontent-dfw5-1.xx&#038;oh=56232bb963aec25fde67c94f4f707fa7&#038;oe=5F3F4684" /></a> </p>
<p><a href="https://buff.ly/2slgafh">Bitly | Page Not Found | 404</a></p>
<p>This is a 404 error, which means you&#039;ve clicked on a bad link or entered an invalid URL. Maybe what you are looking for can be found at Bitly.com.</p>
<p><a href="https://www.facebook.com/groups/412510262457247/permalink/1151027008605565">Присоеденяйтесь к официальной группе ИСАР в Facebook</a> </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Just In Time Group steps up to protect customer businesses securing ISO/IEC 27001:2013</title>
		<link>https://risk-academy.ru/just-in-time-group-steps-up-to-protect-customer-businesses-securing-iso-iec-270012013/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 24 Jul 2020 02:05:37 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Time Group CEO]]></category>
		<category><![CDATA[Chrishan Mendis]]></category>
		<category><![CDATA[ISO/IEC 27001]]></category>
		<category><![CDATA[ISO/IEC 27000-series]]></category>
		<category><![CDATA[ISO/IEC 27001 Lead Implementer]]></category>
		<category><![CDATA[Business Finance]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Information Age]]></category>
		<category><![CDATA[Computing]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/just-in-time-group-steps-up-to-protect-customer-businesses-securing-iso-iec-270012013/</guid>

					<description><![CDATA[&#13; To further customer and business partner commitment with ISO Information Security Management System Just In Time Group CEO Chrishan Mendis    ISO 27001:2013 is one of the most popular information [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="">&#13;</p>
<ul>
<li><strong>To further customer and business partner commitment with ISO Information Security Management System</strong></li>
</ul>
<hr/>
<table align="right" border="0" cellpadding="1" cellspacing="1" style="width:320px;">
<tbody>
<tr>
<td>
<p><img decoding="async" title="Business Finance" alt="Business Finance" src="http://static.ft.lk/assets/uploads/image_7a7ae14af5.jpg"/></p>
<p style="text-align: center;"><em><strong>Just In Time Group CEO Chrishan Mendis</strong></em></p>
<hr/>
<p style="text-align: center;"> </p>
</td>
</tr>
</tbody>
</table>
<p> ISO 27001:2013 is one of the most popular information security standards in the world. Today, all over the world more and more companies are achieving ISO 27001 certification to highlight the robustness of their information security management. Compliance with ISO 27001 was previously about having a competitive edge, but now ISO 27001 certification has become the norm for best-practice information security. </p>
<p>With the rise of information security breaches currently, organisations increasingly have to show they can be trusted for information security and privacy management. Thus, having ISO 27001 demonstrates that an organisation has identified the risks, and put in place preventative measures to protect the organisation from information security breaches. </p>
<p>Keeping this in mind and their stakeholders who are increasingly interested in how their valuable information is handled and protected, Just In Time Group (JIT) took the initiative of obtaining the ISO certification. The risks&#8230;</p>
</div>
<p><a href="http://www.ft.lk/it-telecom-tech/Just-In-Time-Group-steps-up-to-protect-customer-businesses-securing-ISO-IEC-27001-2013/50-703600">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bitly &#124; Page Not Found &#124; 404</title>
		<link>https://risk-academy.ru/bitly-page-not-found-404-15/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 22 Jul 2020 08:00:27 +0000</pubDate>
				<category><![CDATA[Официальная группа ИСАР]]></category>
		<category><![CDATA[bitly]]></category>
		<category><![CDATA[Computer errors]]></category>
		<category><![CDATA[HTTP 404]]></category>
		<category><![CDATA[Error message]]></category>
		<category><![CDATA[404]]></category>
		<category><![CDATA[Playlistify]]></category>
		<category><![CDATA[riskmanagement]]></category>
		<category><![CDATA[Information Age]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Digital technology]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/bitly-page-not-found-404-15/</guid>

					<description><![CDATA[Вебинар: практика аудитов информационной безопасности #riskmanagement Bitly &#124; Page Not Found &#124; 404 This is a 404 error, which means you&#039;ve clicked on a bad link or entered an invalid [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span></p>
<p>Вебинар: практика аудитов информационной безопасности <a class="cm cn" href="https://facebook.com/hashtag/riskmanagement?refid=18&amp;_ft_=qid.6852215387551052803%3Amf_story_key.1149464865428446%3Agroup_id.412510262457247%3Atop_level_post_id.1149464865428446%3Atl_objid.1149464865428446%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1595404827%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1149464865428446%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="co cp">#riskmanagement</span></a></p>
<p></span>
</p>
<p><a href="https://buff.ly/2slgafh"><img decoding="async" alt="Information Age" title="Bitly | Page Not Found | 404" src="https://scontent-dfw5-1.xx.fbcdn.net/v/t1.0-0/c247.0.540.540a/p180x540/109532157_10156931134822142_3633562883141960407_o.jpg?_nc_cat=101&#038;_nc_sid=ca434c&#038;_nc_ohc=NJWlM4HdTkEAX-AfP26&#038;_nc_ht=scontent-dfw5-1.xx&#038;oh=56232bb963aec25fde67c94f4f707fa7&#038;oe=5F3F4684" /></a> </p>
<p><a href="https://buff.ly/2slgafh">Bitly | Page Not Found | 404</a></p>
<p>This is a 404 error, which means you&#039;ve clicked on a bad link or entered an invalid URL. Maybe what you are looking for can be found at Bitly.com.</p>
<p><a href="https://www.facebook.com/groups/412510262457247/permalink/1149464865428446">Присоеденяйтесь к официальной группе ИСАР в Facebook</a> </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Recuperation: Ensuring a Safe Return to Work</title>
		<link>https://risk-academy.ru/cybersecurity-recuperation-ensuring-a-safe-return-to-work/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 17 Jul 2020 09:28:54 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Information Age]]></category>
		<category><![CDATA[Recuperation]]></category>
		<category><![CDATA[Integrated Intelligence Center]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Labor]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cybersecurity-recuperation-ensuring-a-safe-return-to-work/</guid>

					<description><![CDATA[As the restoration of normal working life begins post-pandemic, cybersecurity teams have a new trial ahead: ensuring that employees return to work securely, without triggering a security incident. Even though [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="layout-" data-layout-id="2" data-edit-folder-name="text" data-index="0">
<p>As the restoration of normal working life begins post-pandemic, cybersecurity teams have a new trial ahead: ensuring that employees return to work securely, without triggering a security incident. Even though cybersecurity professionals have spent the past two months trying to secure the new borderless enterprise, no organization is immune from the threats of another shift in the network.  </p>
<p>Unlike the rushed, unexpected manner in which many organizations sent their employees home, the return to the office is something that can be planned and prepared for in a more organized and orderly fashion. Cybersecurity teams must not miss this window – they need to act now to ensure the necessary processes and tools are in place before employees head back to their workplace.</p>
<p><strong><u>Steps to ensure a safe return to work </u></strong></p>
<p>To reduce risk and facilitate a quick return to normal operations, cybersecurity teams need to consider what threats employees may bring back with them to the office environment. Once these are identified, cybersecurity teams must take proactive steps to mitigate these risks. Below, are three key factors to consider as organizations prepare to return to work.</p>
<p><strong>Patching:</strong>&#8230;</p>
</div>
<p><a href="https://www.infosecurity-magazine.com/opinions/cybersecurity-recuperation-return/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The biggest risk facing most organisations in the Knowledge Economy is people. T&#8230;</title>
		<link>https://risk-academy.ru/the-biggest-risk-facing-most-organisations-in-the-knowledge-economy-is-people-t-2/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 07 Jul 2020 10:00:21 +0000</pubDate>
				<category><![CDATA[Официальная группа ИСАР]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Health Medical Pharma]]></category>
		<category><![CDATA[Information Age]]></category>
		<category><![CDATA[Social information processing]]></category>
		<category><![CDATA[Knowledge economy]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/the-biggest-risk-facing-most-organisations-in-the-knowledge-economy-is-people-t-2/</guid>

					<description><![CDATA[The biggest risk facing most organisations in the Knowledge Economy is people. This session will explore how Behavioural Science, the study of what drives human decision-making, can help mitigate Human [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The biggest risk facing most organisations in the Knowledge Economy is people. This session will explore how Behavioural Science, the study of what drives human decision-making, can help mitigate Human Risk. By better understanding how people make decisions, we can manage risk by reference to how people actually behave, rather than how we would like them to.</p>
<p><img decoding="async" title="Articles" alt="Articles" src="https://scontent-dfw5-1.xx.fbcdn.net/v/t39.10505-6/fr/cp0/e15/q65/106827590_1281073712256597_5576182620460429259_n.jpg?_nc_cat=108&#038;_nc_sid=6cae0c&#038;_nc_ohc=goi13K0cfycAX8haCi1&#038;_nc_ht=scontent-dfw5-1.xx&#038;oh=e3bcb5ebd1e9bc0c969bf220f2ffa0fb&#038;oe=5F2B013F" class="l"></p>
<p><a href="https://www.facebook.com/groups/412510262457247/permalink/1138318509876415">Присоеденяйтесь к официальной группе ИСАР в Facebook</a> </p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
