<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Infrastructure Security Agency &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/infrastructure-security-agency/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Tue, 06 Oct 2020 08:14:40 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Infrastructure Security Agency &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CISA Reveals Timeline for Improving Anemic Information Sharing Program</title>
		<link>https://risk-academy.ru/cisa-reveals-timeline-for-improving-anemic-information-sharing-program/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 05 Oct 2020 22:22:52 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Cybersecurity Information Sharing Act]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[Infrastructure Security Agency]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Department of Homeland Security Inspector General]]></category>
		<category><![CDATA[information sharing law]]></category>
		<category><![CDATA[Zisa]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cisa-reveals-timeline-for-improving-anemic-information-sharing-program/</guid>

					<description><![CDATA[The Cybersecurity and Infrastructure Security Agency plans to have a national strategy in place to increase the quality of cyber threat information shared by all parties within the year. “CISA [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>The Cybersecurity and Infrastructure Security Agency plans to have a national strategy in place to increase the quality of cyber threat information shared by all parties within the year.</p>
<p>“CISA will build its national cyber threat information sharing strategy in collaboration and coordination with its partners and stakeholders,” reads the agency’s response to a recent Department of Homeland Security Inspector General report on the issue. “This national strategy is projected to be completed during the fourth quarter of FY 2021. The estimated completion date is September 30, 2021.”</p>
<p>The IG found that while CISA had implemented the basic requirements of a 2015 information sharing law—critics at the time decried the Cybersecurity Information Sharing Act as being more about surveillance than security—it made “limited progress” on that front during 2017 and 2018. While there were a lot of participants willing to take relevant information, there were very few willing to give it, the report said, leading to poor overall quality of the data in CISA’s Automated Indicator Sharing system.</p>
<p>“The limited number of participants that share cyber threat information in AIS is&#8230;</p>
</div>
<p><a href="https://www.nextgov.com/cybersecurity/2020/10/cisa-reveals-timeline-improving-anemic-information-sharing-program/169021/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CISA working on cyber-risk framework to prioritize emerging threats</title>
		<link>https://risk-academy.ru/cisa-working-on-cyber-risk-framework-to-prioritize-emerging-threats/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 11 Aug 2020 21:53:45 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Department of Energy]]></category>
		<category><![CDATA[acting deputy assistant director]]></category>
		<category><![CDATA[CISAs National Risk Management Center]]></category>
		<category><![CDATA[finance]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Telecommunications]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[energy]]></category>
		<category><![CDATA[Infrastructure Security Agency]]></category>
		<category><![CDATA[Daniel Kroese]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cisa-working-on-cyber-risk-framework-to-prioritize-emerging-threats/</guid>

					<description><![CDATA[Whether it’s protecting a government-supported effort to produce coronavirus vaccines and treatments, or preventing interference in this November’s election, the Cybersecurity and Infrastructure Security Agency is working with industry partners [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Whether it’s protecting a government-supported effort to produce coronavirus vaccines and treatments, or preventing interference in this November’s election, the Cybersecurity and Infrastructure Security Agency is working with industry partners to stay on top of the latest cyber threats.</p>
<p>In order to get a better sense of the biggest threats to national critical infrastructure, CISA is working with an Energy Department national laboratory to create a new cyber-risk framework.</p>
<p>Daniel Kroese, the acting deputy assistant director of CISA’s National Risk Management Center, said the National Critical Functions Risk Architecture won’t be the “perfect formula that predicts the future” of major cyber risks, but the big-data platform will identify some of the “common pathways” of cyber attacks on sectors such as energy, telecommunications and finance.</p>
<p>CISA’s rollout of its cyber framework comes at a time when the agency has shifted to emerging areas in need of protection, and better to quantify the “cyber loss” from incidents in the private sector.</p>
<p><!-- AMP AdSlot 1 for Ad Unit 'fnr_mobile_right' ### Size: 300x250 --></p>
<p>          <!-- End --></p>
<p>Kroese said those impacts can&#8230;</p>
</div>
<p><a href="https://federalnewsnetwork.com/cybersecurity/2020/08/cisa-working-on-cyber-risk-framework-to-prioritize-emerging-threats/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CISA hires cyber risk experts to meet emerging threats &#8212; FCW</title>
		<link>https://risk-academy.ru/cisa-hires-cyber-risk-experts-to-meet-emerging-threats-fcw/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 23 Jul 2020 00:59:04 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Josh Corman]]></category>
		<category><![CDATA[Christopher Krebs]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[Director]]></category>
		<category><![CDATA[Infrastructure Security Agency]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[cybersecurity and risk management advisor]]></category>
		<category><![CDATA[researcher]]></category>
		<category><![CDATA[Rob Arnold]]></category>
		<category><![CDATA[Mark Rockwell]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cisa-hires-cyber-risk-experts-to-meet-emerging-threats-fcw/</guid>

					<description><![CDATA[Cybersecurity CISA hires cyber risk experts to meet emerging threats &#13; By Mark Rockwell Jul 22, 2020 &#13;   The Department of Homeland Security&#8217;s Cybersecurity and Infrastructure Security Agency brought [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="article">
<p id="ph_pcontent2_0_KickerText" class="kicker">Cybersecurity</p>
<h3 id="ph_pcontent2_0_MainHeading" class="title">CISA hires cyber risk experts to meet emerging threats</h3>
<ul id="ph_pcontent2_0_ByAuthor" class="byline">&#13;</p>
<li class="author">By Mark Rockwell</li>
<li class="date">Jul 22, 2020</li>
<p>&#13;
		</ul>
<div class="remove imageCap">
<img fetchpriority="high" decoding="async" title="Cybersecurity and Infrastructure Security Agency" height="300" alt="cybersecurity (Rawpixel/Shutterstock.com)" width="620" src="https://fcw.com/-/media/GIG/EDIT_SHARED/Cyber/execssecurity.png"/> 
</div>
<p>The Department of Homeland Security&#8217;s Cybersecurity and Infrastructure Security Agency brought on two hired hands to help it grapple with shifting infrastructure cyber risks as the COVID-19 crisis grinds ahead.</p>
<p>The agency brought on Josh Corman as a visiting researcher and Rob Arnold to join CISA&#8217;s National Risk Management Center as a senior cybersecurity and risk management advisor. The positions are temporary and set up under CARES Act authority, according to a July 22 CISA statement.</p>
<p>&#8220;The COVID-19 pandemic has resulted in noticeable shifts in cyber risk calculations for organizations of all sizes,&#8221; said CISA Director Christopher Krebs in the statement. &#8220;The hardware, software, and services that underpin our connected infrastructure have absolutely been tested and stressed in this telework-heavy environment. At the same time, certain organizations and sectors of our economy have become more attractive targets for adversaries.&#8221;</p>
<p>Krebs said the shifting threats require an&#8230;</p>
</div>
<p><a href="https://fcw.com/articles/2020/07/22/rockwell-cisa-pandemic-hires.aspx">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CISA gives agencies a day to remedy Windows DNS server vulnerability</title>
		<link>https://risk-academy.ru/cisa-gives-agencies-a-day-to-remedy-windows-dns-server-vulnerability/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 17 Jul 2020 14:30:04 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Chris Krebs]]></category>
		<category><![CDATA[Windows Servers]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Director]]></category>
		<category><![CDATA[Infrastructure Security Agency]]></category>
		<category><![CDATA[Microsoft Windows]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[operating system]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cisa-gives-agencies-a-day-to-remedy-windows-dns-server-vulnerability/</guid>

					<description><![CDATA[Agencies face a quick turnaround to address a known vulnerability in Windows Domain Name System servers. The Cybersecurity and Infrastructure Security Agency, under an emergency directive, is giving agencies until [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Agencies face a quick turnaround to address a known vulnerability in Windows Domain Name System servers.</p>
<p>The Cybersecurity and Infrastructure Security Agency, under an emergency directive, is giving agencies until 2 p.m. Friday, July 17, to apply a patch released Tuesday — or a “temporary registry-based workaround” — for Windows Servers running DNS.</p>
<p>“CISA has determined that this vulnerability poses unacceptable significant risk to the federal civilian executive branch and requires an immediate and emergency action,” the agency wrote in its emergency directive.</p>
<p>CISA issued the emergency directive “based on the likelihood of the vulnerability being exploited, the widespread use of the affected software across the federal enterprise, the high potential for a compromise of agency information systems, and the grave impact of a successful compromise.”</p>
<figure id="attachment_2229743" style="width: 464px" class="wp-caption alignright"><img decoding="async" title="Cybersecurity and Infrastructure Security Agency" src="https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs.png" class=" wp-image-2229743" alt="CISA" width="464" height="306" srcset="https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs.png 902w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-300x198.png 300w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-768x507.png 768w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-180x120.png 180w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-90x60.png 90w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-727x480.png 727w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-130x87.png 130w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-182x120.png 182w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-303x200.png 303w" sizes="(max-width: 464px) 100vw, 464px"/><noscript><img decoding="async" class=" wp-image-2229743" src="https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs.png" alt="CISA" width="464" height="306" srcset="https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs.png 902w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-300x198.png 300w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-768x507.png 768w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-180x120.png 180w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-90x60.png 90w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-727x480.png 727w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-130x87.png 130w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-182x120.png 182w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-303x200.png 303w" sizes="(max-width: 464px) 100vw, 464px"/></noscript><figcaption class="wp-caption-text">Chris Krebs is the director of CISA at DHS.</figcaption></figure>
<p>CISA Director Chris Krebs wrote in a separate blog post that this marks the third emergency directive he’s approved during his tenure.</p>
<p>In January, CISA required “emergency action” from agencies on Microsoft’s Windows operating system vulnerability, giving&#8230;</p>
</div>
<p><a href="https://federalnewsnetwork.com/cybersecurity/2020/07/cisa-gives-agencies-a-day-to-remedy-windows-dns-server-vulnerability/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CISA focuses on building agency trust in data as part of upcoming CDM dashboard</title>
		<link>https://risk-academy.ru/cisa-focuses-on-building-agency-trust-in-data-as-part-of-upcoming-cdm-dashboard/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 10 Jun 2020 04:02:35 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[minimal viable product]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Digital technology]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[Infrastructure Security Agency]]></category>
		<category><![CDATA[CDM program manager]]></category>
		<category><![CDATA[Kevin Cox]]></category>
		<category><![CDATA[agency systems integrators]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cisa-focuses-on-building-agency-trust-in-data-as-part-of-upcoming-cdm-dashboard/</guid>

					<description><![CDATA[Many agencies have seen their IT and cybersecurity workloads balloon during the coronavirus pandemic and with more federal employees seeking remote access to networks while teleworking. But aside from a [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Many agencies have seen their IT and cybersecurity workloads balloon during the coronavirus pandemic and with more federal employees seeking remote access to networks while teleworking.</p>
<p>But aside from a few agencies focused on the brunt of pandemic response, the Cybersecurity and Infrastructure Security Agency has most agencies remaining on-target with keeping inventory of where their data is stored and how it’s protected under the Continuous Diagnostics and Mitigation program.</p>
<p>Kevin Cox, CISA’s CDM program manager, said the agency will establish the information exchange between agency dashboards and the new federal  CDM dashboard in the second quarter of fiscal 2021, and will complete the migration by the end of the fourth quarter.</p>
<p>The new dashboard puts a focus on building agency trust in the underlying reporting data behind the dashboard and related algorithms. CISA released a minimal viable product for the federal CDM dashboard in April, and agency systems integrators are currently reviewing and deploying it.</p>
<p><!-- AMP AdSlot 1 for Ad Unit 'fnr_mobile_right' ### Size: 300x250 --><br />
          <amp-ad layout="responsive" type="doubleclick" id="amp-aslot-1" data-slot="/6585/fnr_mobile_right" width="300" height="250" json="{&quot;targeting&quot;: {&quot;slug&quot;: [&quot;cisa-focuses-on-building-agency-trust-in-data-as-part-of-upcoming-federal-cdm-dashboard;&quot;]}}"><br />
          </amp-ad><br />
          <!-- End --></p>
<p>“We have the overall process finalized, [we’re] working with agencies now to go through&#8230;</p>
</div>
<p><a href="https://federalnewsnetwork.com/all-news/2020/06/cisa-focuses-on-building-agency-trust-in-data-as-part-of-upcoming-federal-cdm-dashboard/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Nuisance-level hacktivism during US protests. USBs against air gaps. Hardening EU attitudes toward GRU hacking? COVID-19 notes.</title>
		<link>https://risk-academy.ru/nuisance-level-hacktivism-during-us-protests-usbs-against-air-gaps-hardening-eu-attitudes-toward-gru-hacking-covid-19-notes/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 05 Jun 2020 18:40:56 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[politico]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[Texas]]></category>
		<category><![CDATA[Austin]]></category>
		<category><![CDATA[Infrastructure Security Agency]]></category>
		<category><![CDATA[Krebs]]></category>
		<category><![CDATA[Director Krebs yesterday]]></category>
		<category><![CDATA[GRU officer]]></category>
		<category><![CDATA[Cycldek]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/nuisance-level-hacktivism-during-us-protests-usbs-against-air-gaps-hardening-eu-attitudes-toward-gru-hacking-covid-19-notes/</guid>

					<description><![CDATA[Episodic, nuisance-level hacktivism continues to accompany protests in the US. According to KXAN, Anonymous has claimed responsibility for taking down an Austin, Texas, public website in an anti-police gesture, and [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="summary-text1">
<p>Episodic, nuisance-level hacktivism continues to accompany protests in the US. According to KXAN, Anonymous has claimed responsibility for taking down an Austin, Texas, public website in an anti-police gesture, and Variety reports that K-Pop fans remain an odd force in social media hashtag-jamming.</p>
<p>Kaspersky reports finding a new strain of USB-based malware, USBCulprit, that&#8217;s being run by Chinese-speaking threat actors, &#8220;Cycldek&#8221; or &#8220;Goblin Panda&#8221; (&#8220;two operational entities that are active under a mutual quartermaster&#8221;). USBCulprit is intended for use against air-gapped systems; its targets have been in Southeast Asia.</p>
<p>POLITICO sees the German intention to prosecute a Russian GRU officer for hacking the Bundestag as indicating hardening European attitudes toward Russian cyber operations. (Even TASS is authorized to take notice of the indictment.)</p>
<p>The US Department of Homeland Security&#8217;s Cybersecurity and Infrastructure Security Agency (CISA) yesterday announced the launch of a new public resource for information about cybersecurity and the other areas in the agency&#8217;s portfolio.</p>
<p>CISA Director Krebs yesterday said in an interview on Intelligence Matters that as a matter of course&#8230;</p>
</div>
<p><a href="https://thecyberwire.com/newsletters/daily-briefing/9/108">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
