<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Infrastructure &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/infrastructure/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Tue, 03 Nov 2020 14:16:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Infrastructure &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Why 360-degree visibility is vital to protect critical infrastructure</title>
		<link>https://risk-academy.ru/why-360-degree-visibility-is-vital-to-protect-critical-infrastructure/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 03 Nov 2020 14:16:00 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[deloitte]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[Security engineering]]></category>
		<category><![CDATA[Apac]]></category>
		<category><![CDATA[Manager of Technical Services]]></category>
		<category><![CDATA[Aaron Ross]]></category>
		<category><![CDATA[reactive solutions]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/why-360-degree-visibility-is-vital-to-protect-critical-infrastructure/</guid>

					<description><![CDATA[Aaron Ross, APAC Manager of Technical Services at Paessler, tells us without 360-degree visibility those responsible for safeguarding the sanctity of an organization’s data are flying blind. He says: “CIOs [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><strong><em>Aaron Ross, APAC Manager of Technical Services at Paessler, tells us without 360-degree visibility those responsible for safeguarding the sanctity of an organization’s data are flying blind. He says: “CIOs trying to solve the visibility issue are frustrated with too many complex, reactive solutions, which makes them vulnerable to sophisticated threats and attacks, as well as network downtime.”</em></strong></p>
<p>360-degree visibility is a fundamental cybersecurity and IT risk management strategy that will help to protect critical infrastructure assets and sensitive information. But the increasing complexity of distributed enterprise networks makes this extremely challenging. Digital Transformation is increasing the complexity due to IT infrastructures becoming borderless. The key issue here is that you cannot protect critical infrastructure assets you cannot see.</p>
<p>According to a report by Deloitte – The Value Of Visibility – Cybersecurity Risk Management Examination, implementing a sound cybersecurity and IT risk management program is essential to protecting brands and can give organizations a jump in addressing mounting regulatory requirements.</p>
<p>This includes the Australian&#8230;</p>
</div>
<p><a href="https://www.intelligentcio.com/apac/2020/11/03/why-360-degree-visibility-is-vital-to-protect-critical-infrastructure/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Framework Version 1.1 Manufacturing Profile: NISTIR 8183 Revision 1</title>
		<link>https://risk-academy.ru/cybersecurity-framework-version-1-1-manufacturing-profile-nistir-8183-revision-1/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 08 Oct 2020 10:35:48 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[Identity management]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[supply chain]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cybersecurity-framework-version-1-1-manufacturing-profile-nistir-8183-revision-1/</guid>

					<description><![CDATA[NIST announces the publication of NISTIR 8183 Revision 1, Cybersecurity Framework Version 1.1 Manufacturing Profile. This revision of the CSF Manufacturing Profile includes the sub-category enhancements established in NIST’s Framework [&#8230;]]]></description>
										<content:encoded><![CDATA[<div itemprop="articleBody">
<p>NIST announces the publication of NISTIR 8183 Revision 1, Cybersecurity Framework Version 1.1 Manufacturing Profile. This revision of the CSF Manufacturing Profile includes the sub-category enhancements established in NIST’s Framework for Improving Critical Infrastructure Cybersecurity Version 1.1; these updates include managing cybersecurity within the supply chain, self-assessing cybersecurity risk, vulnerability disclosure, system integrity, and more comprehensive controls for identity management. Additional changes include updating language to change references from “security levels” to “impact levels.”</p>
<p>The Manufacturing Profile was developed for manufacturers managing cybersecurity risk and is aligned with manufacturing sector goals and industry best practices. The Manufacturing Profile provides a voluntary, risk-based approach for managing cybersecurity activities and reducing cyber risk to manufacturing systems. The Manufacturing Profile is meant to enhance but not replace current cybersecurity standards and industry guidelines that the manufacturer is embracing.</p>
<p> <!-- include link at the top --> </p>
<div class="clear" style="">/Public Release. The material in this public release comes from the originating organization and&#8230;</div>
</div>
<p><a href="https://www.miragenews.com/cybersecurity-framework-version-11-manufacturing-profile-nistir-8183-revision-1/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 supply chain cybersecurity risks and best practices</title>
		<link>https://risk-academy.ru/5-supply-chain-cybersecurity-risks-and-best-practices/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 18 Sep 2020 23:24:41 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Gartner Inc.]]></category>
		<category><![CDATA[Supply chain management]]></category>
		<category><![CDATA[software providers]]></category>
		<category><![CDATA[Mark Atwood]]></category>
		<category><![CDATA[vice president of supply chain research]]></category>
		<category><![CDATA[deloitte]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Computer security]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/5-supply-chain-cybersecurity-risks-and-best-practices/</guid>

					<description><![CDATA[&#13; The rise of supply chain cyberthreats in the wake of COVID-19 have made a solid risk management plan even more essential than it always has been. Supply chain cyberattacks [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="content-body">&#13;</p>
<p>The rise of supply chain cyberthreats in the wake of COVID-19 have made a solid risk management plan even more essential than it always has been.</p>
<p>Supply chain cyberattacks put organizations at significant risk &#8212; risk that can disrupt their operations and damage their reputations.</p>
<p>Supply chain cyberattacks are on the rise and hackers are targeting every company in the supply chain ecosystem from the end-user organization to the software providers to the suppliers, said Mark Atwood, managing vice president of supply chain research at Gartner Inc.</p>
<p>COVID-19 has just ratcheted up a trend that was already happening.</p>
<p>In 2019, 40% of manufacturers had operations that were affected by a cyber incident, according to a report from Deloitte released on May 6. And from March to May of this year, there was an increase in supply chain attacks related to COVID-19, the report&#8217;s authors noted.</p>
<p>While definitive numbers may be hard to pinpoint, the trend is clear.</p>
<p>&#8220;Bad actors will act wherever they see an opportunity,&#8221; according to the Gartner supply chain cybersecurity report, co-written by Atwood. &#8220;Supply chains, which extend the envelope of enterprise risks to all business ecosystem&#8230;</p>
</div>
<p><a href="https://searcherp.techtarget.com/feature/5-supply-chain-cybersecurity-risks-and-best-practices">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CISA’s new plan to protect critical infrastructure</title>
		<link>https://risk-academy.ru/cisas-new-plan-to-protect-critical-infrastructure/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 08 Aug 2020 23:35:18 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[control systems]]></category>
		<category><![CDATA[Richard Driggers]]></category>
		<category><![CDATA[deputy assistant director]]></category>
		<category><![CDATA[industrial control systems]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Tom Temin]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cisas-new-plan-to-protect-critical-infrastructure/</guid>

					<description><![CDATA[Best listening experience is on Chrome, Firefox or Safari. Subscribe to Federal Drive’s daily audio interviews on Apple Podcasts or PodcastOne. It might be critical, but infrastructure in the United States has remained [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>Best listening experience is on Chrome, Firefox or Safari. Subscribe to Federal Drive’s daily audio interviews on Apple Podcasts or PodcastOne.</em></p>
<p>It might be critical, but infrastructure in the United States has remained stubbornly difficult to protect from cyber and physical attacks. Now the Cybersecurity and Infrastructure Security Agency has a new five-year plan for an important subset of critical infrastructure, namely industrial control systems. With details of the plan, <em><strong>Federal Drive with Tom Temin </strong></em>turned to the deputy assistant director of cybersecurity at CISA, Richard Driggers.</p>
<div id="">
<p><strong>Tom Temin:</strong> Mr Driggers, good to have you on</p>
<p><strong>Richard Driggers:</strong> Good morning. Thank you for having me.</p>
<p><strong>Tom Temin:</strong> What is the fundamental challenge in protecting control systems? Earlier, 20 years ago, none of them were connected generally to the internet, and now they all are,. Is that the basic problem here?</p>
<p><strong>Richard Driggers:</strong> I mean, I think that that’s the crux of it. I mean, the biggest challenge is a lot of these ICS devices that we find in our critical infrastructure, they were installed a long time ago and really used to create efficiencies internal into the facility. And so&#8230;</p>
</div>
<p><a href="https://federalnewsnetwork.com/cybersecurity/2020/08/cisas-new-plan-to-protect-critical-infrastructure/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>State-Sponsored Cyber Attacks Threaten Australian Critical Infrastructure</title>
		<link>https://risk-academy.ru/state-sponsored-cyber-attacks-threaten-australian-critical-infrastructure/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 02 Jul 2020 08:04:39 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[Prime Minister]]></category>
		<category><![CDATA[Scott Morrison]]></category>
		<category><![CDATA[state-based cyber actor]]></category>
		<category><![CDATA[cyber-actor]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/state-sponsored-cyber-attacks-threaten-australian-critical-infrastructure/</guid>

					<description><![CDATA[The discussion around state-sponsored cyber attacks on Australia has once again launched to the fore in the country following comments by the Prime Minister Scott Morrison on June 19. According [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>The discussion around state-sponsored cyber attacks on Australia has once again launched to the fore in the country following comments by the Prime Minister Scott Morrison on June 19. According to the new remarks, Australian institutions of all kinds have fallen victim to cyber attacks from a sophisticated state based cyber-actor over at least the course of the last several months, raising alarm about the vulnerability of the country’s critical infrastructure.</p>
<p>The attacks are taking place against all levels of governments as well as services and businesses in Australia, according to Morrison, with their frequency having increased “over many months”.</p>
<p>“I’m here today to advise you that, based on advice provided to me by our cyber-experts, Australian organisations are currently being targeted by a sophisticated state-based cyber-actor,” Morrison said at a press conference. He added that such attacks have been targeting organizations “across a range of sectors, including all levels of government, industry, political organisations, education, health, essential service providers and operators of other critical infrastructure”.</p>
<p>Although identified as being&#8230;</p>
</div>
<p><a href="https://www.cpomagazine.com/cyber-security/state-sponsored-cyber-attacks-threaten-australian-critical-infrastructure/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Building a Framework for Critical Infrastructure Cybersecurity</title>
		<link>https://risk-academy.ru/building-a-framework-for-critical-infrastructure-cybersecurity/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 13 Jun 2020 12:18:52 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Information Age]]></category>
		<category><![CDATA[energy]]></category>
		<category><![CDATA[National Initiative for Cybersecurity Education]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[Critical infrastructure]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/building-a-framework-for-critical-infrastructure-cybersecurity/</guid>

					<description><![CDATA[Given the blossoming of attacks on organizations — from energy to health care firms — the need for robust critical infrastructure cybersecurity has expanded.  Takeaways include the following: Critical infrastructure [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>
					<span class="entry-subtitle">Given the blossoming of attacks on organizations — from energy to health care firms — the need for robust critical infrastructure cybersecurity has expanded. </span></p>
<div>
<p class="first_paragraph"><span style="font-weight: 400">Takeaways include the following:</span></p>
<ul>
<li style="font-weight: 400"><span style="font-weight: 400">Critical infrastructure protection is a long-standing priority, but many organizations lag in their response to cyberthreats. </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">COVID-19 has broadened the definition of critical infrastructure while also providing a reminder for enterprise companies to question which systems are essential to operations. This article builds on the advice in chapter one of this series in “</span><span style="font-weight: 400">Addressing IoT Security Challenges From the Cloud to the Edge</span><span style="font-weight: 400">.” </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">Organizations managing critical infrastructure should develop a proactive cybersecurity posture, but coronavirus-led disruptions heighten the challenge. </span></li>
</ul>
<p><span style="font-weight: 400">By now, the need for comprehensive cybersecurity for critical infrastructure is clear. Public accounts are widespread concerning the risk of malicious actors targeting the electrical grid, dams, </span><span style="font-weight: 400">voting systems</span><span style="font-weight: 400"> and other federally designated critical infrastructure. But the majority of organizations that provide essential services have taken only incremental steps in addressing cyber&#8230;</span></p>
</div>
<p><a href="https://www.iotworldtoday.com/2020/06/12/developing-a-critical-infrastructure-cybersecurity-strategy/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Gareth Byatt has interviewed former #Infrastructure SiG Chair Darren Mullan abou&#8230;</title>
		<link>https://risk-academy.ru/gareth-byatt-has-interviewed-former-infrastructure-sig-chair-darren-mullan-abou/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 19 Feb 2019 13:05:12 +0000</pubDate>
				<category><![CDATA[Официальная группа ИСАР]]></category>
		<category><![CDATA[riskmanagement]]></category>
		<category><![CDATA[Interview]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/gareth-byatt-has-interviewed-former-infrastructure-sig-chair-darren-mullan-abou/</guid>

					<description><![CDATA[Gareth Byatt has interviewed former #Infrastructure SiG Chair Darren Mullan about #riskmanagement within the infrastructure industry. Their Q&#38;A session covers the various issues faced by infrastructure projects carried out in [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Gareth Byatt has interviewed former <a class="el em" href="https://facebook.com/hashtag/infrastructure?refid=18&amp;_ft_=qid.6659758066283035922%3Amf_story_key.775713236136946%3Atop_level_post_id.775713236136946%3Atl_objid.775713236136946%3Acontent_owner_id_new.608777141%3Aoriginal_content_id.2709163475791293%3Aoriginal_content_owner_id.398087983565532%3Apage_id.398087983565532%3Asrc.22%3Aphoto_id.2709163475791293%3Astory_location.6%3Aattached_story_attachment_style.photo%3Apage_insights.%7B%22398087983565532%22%3A%7B%22page_id%22%3A398087983565532%2C%22role%22%3A1%2C%22actor_id%22%3A608777141%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22attached_story%22%3A%7B%22role%22%3A1%2C%22page_id%22%3A398087983565532%2C%22post_context%22%3A%7B%22story_fbid%22%3A2709163475791293%2C%22publish_time%22%3A1550581512%2C%22story_name%22%3A%22EntComposerPhotoCreationStory%22%2C%22object_fbtype%22%3A22%7D%2C%22actor_id%22%3A398087983565532%2C%22psn%22%3A%22EntComposerPhotoCreationStory%22%2C%22sl%22%3A6%2C%22dm%22%3A%7B%22isShare%22%3A0%2C%22originalPostOwnerID%22%3A0%7D%7D%2C%22sl%22%3A6%2C%22dm%22%3A%7B%22isShare%22%3A0%2C%22originalPostOwnerID%22%3A0%7D%2C%22targets%22%3A%5B%7B%22page_id%22%3A398087983565532%2C%22actor_id%22%3A608777141%2C%22role%22%3A1%2C%22post_id%22%3A2709163475791293%2C%22share_id%22%3A0%7D%5D%7D%7D&amp;__tn__=%2AsH-R"><span class="en eo">#Infrastructure</span></a> SiG Chair Darren Mullan about <a class="el em" href="https://facebook.com/hashtag/riskmanagement?refid=18&amp;_ft_=qid.6659758066283035922%3Amf_story_key.775713236136946%3Atop_level_post_id.775713236136946%3Atl_objid.775713236136946%3Acontent_owner_id_new.608777141%3Aoriginal_content_id.2709163475791293%3Aoriginal_content_owner_id.398087983565532%3Apage_id.398087983565532%3Asrc.22%3Aphoto_id.2709163475791293%3Astory_location.6%3Aattached_story_attachment_style.photo%3Apage_insights.%7B%22398087983565532%22%3A%7B%22page_id%22%3A398087983565532%2C%22role%22%3A1%2C%22actor_id%22%3A608777141%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22attached_story%22%3A%7B%22role%22%3A1%2C%22page_id%22%3A398087983565532%2C%22post_context%22%3A%7B%22story_fbid%22%3A2709163475791293%2C%22publish_time%22%3A1550581512%2C%22story_name%22%3A%22EntComposerPhotoCreationStory%22%2C%22object_fbtype%22%3A22%7D%2C%22actor_id%22%3A398087983565532%2C%22psn%22%3A%22EntComposerPhotoCreationStory%22%2C%22sl%22%3A6%2C%22dm%22%3A%7B%22isShare%22%3A0%2C%22originalPostOwnerID%22%3A0%7D%7D%2C%22sl%22%3A6%2C%22dm%22%3A%7B%22isShare%22%3A0%2C%22originalPostOwnerID%22%3A0%7D%2C%22targets%22%3A%5B%7B%22page_id%22%3A398087983565532%2C%22actor_id%22%3A608777141%2C%22role%22%3A1%2C%22post_id%22%3A2709163475791293%2C%22share_id%22%3A0%7D%5D%7D%7D&amp;__tn__=%2AsH-R"><span class="en eo">#riskmanagement</span></a> within the infrastructure industry. </p>
<p></p>
<p> Their Q&amp;A session covers the various issues faced by infrastructure projects carried out in different parts of the world.</p>
<p></p>
<p> Read the <a class="el em" href="https://facebook.com/hashtag/interview?refid=18&amp;_ft_=qid.6659758066283035922%3Amf_story_key.775713236136946%3Atop_level_post_id.775713236136946%3Atl_objid.775713236136946%3Acontent_owner_id_new.608777141%3Aoriginal_content_id.2709163475791293%3Aoriginal_content_owner_id.398087983565532%3Apage_id.398087983565532%3Asrc.22%3Aphoto_id.2709163475791293%3Astory_location.6%3Aattached_story_attachment_style.photo%3Apage_insights.%7B%22398087983565532%22%3A%7B%22page_id%22%3A398087983565532%2C%22role%22%3A1%2C%22actor_id%22%3A608777141%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22attached_story%22%3A%7B%22role%22%3A1%2C%22page_id%22%3A398087983565532%2C%22post_context%22%3A%7B%22story_fbid%22%3A2709163475791293%2C%22publish_time%22%3A1550581512%2C%22story_name%22%3A%22EntComposerPhotoCreationStory%22%2C%22object_fbtype%22%3A22%7D%2C%22actor_id%22%3A398087983565532%2C%22psn%22%3A%22EntComposerPhotoCreationStory%22%2C%22sl%22%3A6%2C%22dm%22%3A%7B%22isShare%22%3A0%2C%22originalPostOwnerID%22%3A0%7D%7D%2C%22sl%22%3A6%2C%22dm%22%3A%7B%22isShare%22%3A0%2C%22originalPostOwnerID%22%3A0%7D%2C%22targets%22%3A%5B%7B%22page_id%22%3A398087983565532%2C%22actor_id%22%3A608777141%2C%22role%22%3A1%2C%22post_id%22%3A2709163475791293%2C%22share_id%22%3A0%7D%5D%7D%7D&amp;__tn__=%2AsH-R"><span class="en eo">#interview</span></a>: <a href="https://lm.facebook.com/l.php?u=http%3A%2F%2Fow.ly%2FHDi030nJHzc%3Ffbclid%3DIwAR1IXRHXL546EBOtY93NEby9fP09R-b2wHdKCCaA4eHGMHrozMvQyfvcim0&amp;h=AT21VCQn1cvI16qjupQg-E1U1XC3biEO5W2GPTu8BQyijGyuflf7LabLa_95gSoHcYYFBo2wCZKRvSn6G80mmz28KstI-yMHFNeUwokKPh7m8KaxErC1nW2Nkzf5cEYo9kjtGsPe2CVguQctz1yLBg82Zr9ruLdGSo3x5OoheaH8l1CqbxwbUvAz3U64_I_jT-8m9vnKpUNfnTPJO6JL86AbUbDfCsvHV6y6MtTytsTXBI7XxtU6O4-e-RcuiJI6uhMvY4__MZfp4ddf971Ejrj3V44WmA4uzcrl4CmfNEsVRe3s6xQJ_5PrK_njhrRwFdPoFHDYh5nC25Z0_yF2emDQBqBBMebF798BVJ5NFUf2RzxyFJIoShh2yvfGw5KMggheinuZCJhz5srClxQG1DL_YrZOT9PX4Be9YWHpGOFwNQ6hjMdbwu-VDZ4KAxznOxl4LTVToyeTqySxgXMftDxtI8N0ms8_KORDq1xzcufYArn-f5jc_HW8f_KYu9Yc-R1jkO-507Z5yjanWFNcWgggwLHo-0ZtsDKRPAz6BOaeOWjk1c1yyXi7i9LxoibhmD1XfoGtOh_w8ksy_tCeMvrScmaJFxP-Jo7UH-YXGxZfAWwBDlq0hJBkfTSaZAgHQ4a33Hrl32vQZ0u2U-J2qKFe4hBWC5zKssBLJ6rUp7sjxeZw_OBZfuzg_uV4J8dh35yFwNpEt8gXph8I6cIfw_Hb820UjG3BWcb54wbEOjrVdHER7O5Qsip2gmnnLggJny2-bwqCSSyiieNTATgetgqlRyeuLJMBpWwpp20Qh7ymSK_JTeRMQRATpTAeG-MngQC0oTFAu4yMQFLSL25XOW-80snhvjNXq0xvt4vPy_sYdTfkvxhY27d6ZPJt_UwVIkiT-fdUkq95TyqXZ8E5dviOYtSlz_G4zTFQ-mMWTPRXumybZprZCKRxKpbk8_xNmNKdbQStodRVDvG3c7_XFLiDQZAWA_ppfqmYW4OQQDgtqYddU7OPr8gkwp0YrbZx3N5_casg0kVIzZ2bw1XMhOqfdGC6tPiHOlIAH7mhOvVGMkSaggfJtwP2qmqEWvVLojdCdAACn0sIy_BgCvt-6W_uEDbNPoONtsgCw6R6DiQs_tBvUDYK7of72PD1LJan_M0Y2nXCkPLhRPSXSIZQLgXyC6n_xJXZ5P3uB8WKpi9cTbkl9sLHFhLvKedUg6rVpsDt3r2YQ-bOPvNgT715T80vHmsOiJMzOfDfwY_0gnkSGV0ozwZOghWUPgQYiXLhEJyCbM9vV1t291xDINE4ME6hf6IKDnkHtsOzKiZlp7vr9-5egilqbgLUS8OOgesAEqfO2a_Bu6pVoSLDhb9dT5IAt3JRGOF-1IvBoLTWiSehCTvWVKpmWow" target="_blank" rel="noopener"><span>http://ow.ly/</span><wbr></wbr><span class="word_break"></span>HDi030nJHzc</a></p>
<p><a href="http://ow.ly/HDi030nJHzc?fbclid=IwAR1IXRHXL546EBOtY93NEby9fP09R-b2wHdKCCaA4eHGMHrozMvQyfvcim0"><img decoding="async" title="" src="https://scontent-atl3-1.xx.fbcdn.net/v/t1.0-0/p526x296/52608971_2709163482457959_6998640404149043200_n.jpg?_nc_cat=109&#038;_nc_ht=scontent-atl3-1.xx&#038;oh=bc61762568511f9b96d0af1129b853cd&#038;oe=5CF2B4D1" /></a> </p>
<p><a href="http://ow.ly/HDi030nJHzc?fbclid=IwAR1IXRHXL546EBOtY93NEby9fP09R-b2wHdKCCaA4eHGMHrozMvQyfvcim0"></a></p>
<p><a href="https://www.facebook.com/412510262457247/posts/775713236136946">Присоеденяйтесь к официальной группе ИСАР в Facebook</a>  </p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
