<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Intelligence agencies &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/intelligence-agencies/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sun, 26 Jul 2020 20:15:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Intelligence agencies &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Long-Awaited DFS Cyber Enforcement Action Sees Charges Filed Against Title Insurer For Exposing Millions of Documents Containing Consumer Personal Information &#124; Hinshaw &#038; Culbertson &#8211; Consumer Crossroads</title>
		<link>https://risk-academy.ru/long-awaited-dfs-cyber-enforcement-action-sees-charges-filed-against-title-insurer-for-exposing-millions-of-documents-containing-consumer-personal-information-hinshaw-culbertson-consumer-crossro/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 25 Jul 2020 23:15:51 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Intelligence agencies]]></category>
		<category><![CDATA[National security]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[NEW YORK]]></category>
		<category><![CDATA[Insurance]]></category>
		<category><![CDATA[National Security Agency]]></category>
		<category><![CDATA[bank account information]]></category>
		<category><![CDATA[New York State Department]]></category>
		<category><![CDATA[large real estate title insurer]]></category>
		<category><![CDATA[DFS Group]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/long-awaited-dfs-cyber-enforcement-action-sees-charges-filed-against-title-insurer-for-exposing-millions-of-documents-containing-consumer-personal-information-hinshaw-culbertson-consumer-crossro/</guid>

					<description><![CDATA[After several years of anticipation, the New York State Department of Financial Services (DFS) has filed its first enforcement action under the agency&#8217;s groundbreaking and first-in-the-nation 2017 cybersecurity regulation (Part [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="html-view-content">
<p>After several years of anticipation, the New York State Department of Financial Services (DFS) has filed its first enforcement action under the agency&#8217;s groundbreaking and first-in-the-nation 2017 cybersecurity regulation (Part 500 of Title 23 of the New York Codes, Rules, and Regulations), which prescribes how financial services companies licensed to operate in New York should construct their cybersecurity programs. This action is a wakeup call to covered entities to fully implement the directives of Part 500.</p>
<p>A statement of charges was announced on July 21, 2020 against a large real estate title insurer alleging that a design defect in a data management computer program resulted in the exposure over the course of several years of hundreds of millions of documents—millions of which contained sensitive personal information of consumers, including bank account information, mortgage and tax records, Social Security Numbers, wire transaction receipts, and drivers&#8217; license images.</p>
<p>According to the charges, the company discovered the vulnerability and exposure as a result of penetration testing it conducted in 2018, but then failed on multiple levels to remedy the exposure&#8230;</p>
</div>
<p><a href="https://www.jdsupra.com/legalnews/long-awaited-dfs-cyber-enforcement-38324/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The value of the why and the who.</title>
		<link>https://risk-academy.ru/the-value-of-the-why-and-the-who/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 14 Jun 2020 03:22:40 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[Intelligence agencies]]></category>
		<category><![CDATA[Booz Allen Hamilton]]></category>
		<category><![CDATA[prolific threat actor]]></category>
		<category><![CDATA[GRU]]></category>
		<category><![CDATA[Brad Stone]]></category>
		<category><![CDATA[Intelligence gathering disciplines]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/the-value-of-the-why-and-the-who/</guid>

					<description><![CDATA[The value of the why and the who. Proactive, efficient threat mitigation and risk management require understanding adversaries’ fundamental thought processes, not just their tools and methods. Cyber threat intelligence [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The value of the why and the who.</p>
<div>
<div class="jsx-1391874211 description">
<p>Proactive, efficient threat mitigation and risk management require understanding adversaries’ fundamental thought processes, not just their tools and methods. Cyber threat intelligence analysts combed through 15 years (2004 to 2019) of public sources that have documented the activities of one prolific threat actor, Russia’s military intelligence agency, the GRU. Analysis shows that the timing, targets, and impacts of this activity mirrored Russian strategic concerns about specific events and developments. </p>
<p>Joining us in this week&#8217;s Research Saturday are Brad Stone &amp; Nate Beach-Westmoreland from Booz Allen Hamilton to discuss their report and some of the 33 case studies presented in it.</p>
<p>The research can be found here: </p>
</div>
</div>
<p><a href="https://thecyberwire.com/podcasts/research-saturday/139/notes">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Foreign signals intelligence: How does The Australian Signals Directorate defend Australia from global threats?</title>
		<link>https://risk-academy.ru/foreign-signals-intelligence-how-does-the-australian-signals-directorate-defend-australia-from-global-threats/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 05 Jun 2020 13:39:41 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Intelligence agencies]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[Australian Signals Directorate]]></category>
		<category><![CDATA[law enforcement]]></category>
		<category><![CDATA[Australian Government]]></category>
		<category><![CDATA[Government of Australia]]></category>
		<category><![CDATA[Australian intelligence agencies]]></category>
		<category><![CDATA[Signals intelligence]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/foreign-signals-intelligence-how-does-the-australian-signals-directorate-defend-australia-from-global-threats/</guid>

					<description><![CDATA[The Australian Signals Directorate (ASD) aims to defend Australia from global threats through the provision of foreign signals intelligence, cyber security and offensive cyber operations, as directed by Government. ASD [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="lex-article-body" style="display:block" data-integrity-check="0AB5A037FF0AA62CA75CC6BEF4282D92" data-content-slug="9dae7e54-8ebf-4c01-ada2-f35d21a330a8" data-friendly-name="Foreign signals intelligence: How does The Australian Signals Directorate defend Australia from global threats?" data-firm-ref="1182280" data-content-type="Article">
<p>The Australian Signals Directorate (ASD) aims to defend Australia from global threats through the provision of foreign signals intelligence, cyber security and offensive cyber operations, as directed by Government.</p>
<p>ASD provides the Australian Government with intelligence and cyber security expertise, policy and advice that protects our national security and sovereignty, and practical support that informs law enforcement and military operations.</p>
<p>In its 2019-2020 Corporate Plan, ASD provides insight into its functions, strategic plans, operating context and oversight framework.</p>
<p><strong>Functions</strong></p>
<p>ASD operates under the <em>Intelligence Services Act 2001</em>, which specifies that its functions are to:</p>
<ul>
<li>collect and communicate foreign signals intelligence;</li>
<li>prevent and disrupt offshore cyber enabled crime;</li>
<li>provide cyber security advice and assistance to Australian governments, businesses and individuals;</li>
<li>support military operations;</li>
<li>assist the national security community in the performance of its functions</li>
</ul>
<p><strong>Strategic Plan and Objectives</strong></p>
<p>ASD has set 5 key strategic objectives for the duration of its corporate plan, which will help it to fulfil its purpose and achieve its vision of being a&#8230;</p>
</div>
<p><a href="https://www.lexology.com/library/detail.aspx?g=9dae7e54-8ebf-4c01-ada2-f35d21a330a8">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ThreatQuotient extends professional services for security intelligence</title>
		<link>https://risk-academy.ru/threatquotient-extends-professional-services-for-security-intelligence/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 13 May 2020 23:40:18 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Business Finance]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[Intelligence agencies]]></category>
		<category><![CDATA[National security]]></category>
		<category><![CDATA[Military intelligence]]></category>
		<category><![CDATA[GSIS]]></category>
		<category><![CDATA[Security Service]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/threatquotient-extends-professional-services-for-security-intelligence/</guid>

					<description><![CDATA[ThreatQuotient has extended its professional services offering in a bid to enable enterprises to advance their security operations and take advantage of end to end services. Notably, the enhancements include [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>ThreatQuotient has extended its professional services offering in a bid to enable enterprises to advance their security operations and take advantage of end to end services. Notably, the enhancements include new Assessment and Consulting Services.</p>
<p>ThreatQuotient’s global Professional Services team was first launched in 2017 and provides core capabilities to assess, design and build a threat-centric security operations function.</p>
<p>On the whole, the company is focused on helping organisations to transition from traditional signature-based monitoring, detection and response to an external, threat-focused program.</p>
<p>In addition to the current services of implementation, training and development, ThreatQuotient now offers consulting services that range from an initial assessment of current threat intelligence capabilities, to more in-depth and long-term process development.</p>
<p>According to ThreatQuotient, the ultimate goal is to mature a program to the point that a team can confidently address specific use cases like spearphishing, threat hunting and vulnerability management.</p>
<p>The company states its services can educate new cyber intelligence teams, refocus teams onto specific&#8230;</p>
</div>
<p><a href="https://securitybrief.com.au/story/threatquotient-extends-professional-services-for-security-intelligence">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
