<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>machine learning &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/machine-learning/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sun, 06 Dec 2020 14:41:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>machine learning &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Wrong digital transformation strategy creates cyber-risks (Includes interview)</title>
		<link>https://risk-academy.ru/wrong-digital-transformation-strategy-creates-cyber-risks-includes-interview/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 04 Dec 2020 23:09:31 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[DHS Cyber Security Division]]></category>
		<category><![CDATA[Chief Product Officer at Pulse Secure]]></category>
		<category><![CDATA[Rohini Kasturi]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[National security]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/wrong-digital-transformation-strategy-creates-cyber-risks-includes-interview/</guid>

					<description><![CDATA[To gain an insight into the way that businesses need develop further in 2021 to face the issues of data security, Digital Journal caught up with Rohini Kasturi, Chief Product [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>To gain an insight into the way that businesses need develop further in 2021 to face the issues of data security, Digital Journal caught up with Rohini Kasturi, Chief Product Officer at Pulse Secure. The points raised are central to business digital transformation strategies. </p>
<p><strong>Digital Journal: Will automation be the key to a successful cybersecurity program?</strong></p>
<p><strong>Rohini Kasturi:</strong>Amid the growing cybersecurity skills gap, the broader theme in 2021 will be the increased adoption of technology that capitalizes on artificial intelligence and machine learning to automate key security functions. </p>
<p>COVID-19 resulted in a massive, global shift to a remote workforce. However, next year we will enter a completely new normal when we start to see more workers return to the office while others, who are not yet able or willing to make the transition, remain home. This will result in a split that forces IT departments to handle the demands of both full-scale on-premise and full-scale remote access. The only way to be efficient in the new world of work will be to utilize solutions with automation capabilities instead of relying solely on in-house security teams. Companies will turn to newer&#8230;</p></div>
<p><a href="http://www.digitaljournal.com/business/q-a-wrong-digital-transformation-strategy-creates-cyber-risks/article/581691">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Role of Smart Technologies in Data-Driven Compliance Programs</title>
		<link>https://risk-academy.ru/the-role-of-smart-technologies-in-data-driven-compliance-programs/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 04 Dec 2020 12:00:38 +0000</pubDate>
				<category><![CDATA[Блоги на английском]]></category>
		<category><![CDATA[Иностранные блоги]]></category>
		<category><![CDATA[smart technologies]]></category>
		<category><![CDATA[compliance technology]]></category>
		<category><![CDATA[bad workman]]></category>
		<category><![CDATA[Naveen Bhardwaj]]></category>
		<category><![CDATA[Data-Driven Compliance Programs Compliance technology]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Google]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/the-role-of-smart-technologies-in-data-driven-compliance-programs/</guid>

					<description><![CDATA[Compliance technology can simplify complex compliance processes and help make smart decisions. As Naveen Bhardwaj explains, by strategically integrating compliance technology and tools, organizations can achieve data-driven, smart and effective [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
                </p>
<div class="intro-text">
<p><em>Compliance technology can simplify complex compliance processes and help make smart decisions. As Naveen Bhardwaj explains, by strategically integrating compliance technology and tools, organizations can achieve data-driven, smart and effective compliance programs.</em></p>
</div>
<p>There is an English proverb that says, “a bad workman always blames his tools.” A constructive version of the proverb in Dutch goes like, “goed gereedschap is het halve werk,” which means “good tools are half the work.” This can be interpreted to mean that half of the work is done by humans and the remaining half is completed by tools.</p>
<p>Can one imagine opening a tight bolt without a spanner? No one can, right? Tools simplify our task at hand. In present times, this phenomenon has reached the next level: Tools with embedded technologies such as artificial intelligence, machine learning and deep learning (collectively referred to as “smart technologies”) can mimic human intelligence and in many cases can replace human intervention.</p>
<p>A contemporary example of this would be Google’s driverless cars, which can drive a person around autonomously without human intervention. Now imagine a scenario in which compliance and ethics professionals can sit back and monitor several compliance processes at the click of&#8230;</p>
</div>
<p><a href="http://feedproxy.google.com/~r/CorporateComplianceInsights/~3/g5DPAPYA42E/">Подробнее&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Swift Community Update: Combatting the cyber threat</title>
		<link>https://risk-academy.ru/swift-community-update-combatting-the-cyber-threat/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 22 Nov 2020 04:58:28 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[bank]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[financial services]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Social engineering]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[machine learning]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/swift-community-update-combatting-the-cyber-threat/</guid>

					<description><![CDATA[&#13; Whether you work at a bank or at the treasury desk of a large corporate, most of us are working remotely and becoming increasingly dependent on digital processes. This [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>&#13;<br />
        Whether you work at a bank or at the treasury desk of a large corporate, most of us are working remotely and becoming increasingly dependent on digital processes. This dependence can increase vulnerabilities to cyber attacks. &#13;
      </p>
<div id="ctl00_ctl00_body_mainContent_NewsActicle_pnlBody">
<p>A session all about the cyber threats the sector faces was a highlight on day 2 of Swift&#8217;s Community Update &#8211; Focus on Europe virtual event, which explored how fraudsters perpetrate an attack and attempt to legitimise their ill-gotten gains, as well as how the industry is working together to fight back.</p>
<p><strong>Hacking the system</strong></p>
<p>Fraudsters targeting financial services are not going away. Despite the technological advancements in security in recent years, it is still the human factor &#8211; usually through an email compromise &#8211; that is the easiest way into a bank&#8217;s network. </p>
<p>Attackers are well-resourced, constantly evolving their modus operandi and racing to make use of new technologies such as artificial intelligence and machine learning.</p>
<p>Some of the payment fraud trends Swift has observed include:</p>
<ul>&#13;</p>
<li>Attackers targeting banks which process a low amount of cross-border payments and are based in countries with a high or very high risk&#8230;</li>
</ul>
</div>
<p><a href="https://www.finextra.com/newsarticle/36991/swift-community-update-combatting-the-cyber-threat">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Envelop Risk Brings Advanced Machine Learning to Cyber Risk With Dataiku</title>
		<link>https://risk-academy.ru/envelop-risk-brings-advanced-machine-learning-to-cyber-risk-with-dataiku/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 28 Oct 2020 12:31:38 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[MS Amlin]]></category>
		<category><![CDATA[cyber underwriting specialist]]></category>
		<category><![CDATA[Alpha Intelligence Capital]]></category>
		<category><![CDATA[Dataiku]]></category>
		<category><![CDATA[Proprietary software]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[London]]></category>
		<category><![CDATA[aerospace]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/envelop-risk-brings-advanced-machine-learning-to-cyber-risk-with-dataiku/</guid>

					<description><![CDATA[Following on from its $6 million Q2 Series A investment, top global insurtech firm delivers AI-driven quantification to cyber risk London, UK – 28th October 2020 – Today, Dataiku, one [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id=""><!-- Article Start --></p>
<p><em>Following on from its $6 million Q2 Series A investment, top global insurtech firm delivers AI-driven quantification to cyber risk </em></p>
<p><strong>London, UK – 28th October 2020</strong> – Today, Dataiku, one of the world’s leading Enterprise AI and machine learning platforms, has announced its partnership with global specialty cyber underwriting specialist Envelop Risk. Envelop Risk is working with Dataiku to model and mitigate cyber and other forms of complex, unprotected risk for insurers. </p>
<p>Envelop Risk specialises in applying machine learning to complex corporate risks. In May, the firm announced a Series A investment of $6 million, led by AI-specialist investor Alpha Intelligence Capital. Since launch, Envelop Risk has underwritten well over $100 million in premium, placing it among the top insurtech firms globally by this metric. The firm operates as a lead market in cyber reinsurance, in partnership with MS Amlin. </p>
<p>Envelop Risk’s founding team and directors combine decades of leadership experience in both insurance and deep tech enterprises such as aerospace and defense. The firm reconceived how machine learning, human expertise, and underwriting can be integrated, using Dataiku’s&#8230;</p>
</div>
<p><a href="https://www.realwire.com/releases/Envelop-Risk-Brings-Advanced-Machine-Learning-to-Cyber-Risk-With-Dataiku">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>LinkShadow Named &#8216;User Behavior Analytics Security Solution of the Year&#8217; in 2020 CyberSecurity Breakthrough Awards Program</title>
		<link>https://risk-academy.ru/linkshadow-named-user-behavior-analytics-security-solution-of-the-year-in-2020-cybersecurity-breakthrough-awards-program/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 15 Oct 2020 23:19:43 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[ATHENS]]></category>
		<category><![CDATA[CyberSecurity Breakthrough]]></category>
		<category><![CDATA[Machine Learning Algorithms]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[machine learning]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/linkshadow-named-user-behavior-analytics-security-solution-of-the-year-in-2020-cybersecurity-breakthrough-awards-program/</guid>

					<description><![CDATA[ATHENS, Ga., Oct. 15, 2020 /PRNewswire/ &#8212; LinkShadow, the Next-Generation Cybersecurity Analytics platform, today announced that it has been named the winner of the &#8220;User Behavior Analytics Security Solution of the [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><span class="xn-location">ATHENS, Ga.</span>, <span class="xn-chron">Oct. 15, 2020</span> /PRNewswire/ &#8212; LinkShadow, the Next-Generation Cybersecurity Analytics platform, today announced that it has been named the winner of the &#8220;User Behavior Analytics Security Solution of the Year&#8221;<b> </b>award for the second year in a row in the fourth annual CyberSecurity Breakthrough Awards program, conducted by CyberSecurity Breakthrough, a leading independent market intelligence organization that recognizes the top companies, technologies, and products in the global information security market today.</p>
<div class="pull-right inline-gallery-container col-md-8 col-sm-7 col-xs-12">
<div class="gallery inline-gallery">
<div class="row">
<div class="col-sm-12 clearfix">
<figure>
<div class="image lightbox-item " data-src="https://mma.prnewswire.com/media/1313583/0144484d8f632765effe4b5450c8.jpg?p=publish" data-asset-type="photo" data-asset-id="Life_After_Debt_Aug_17_Event.jpg" data-asset-label="General" data-sub-html="LinkShadow" data-tweet-text="LinkShadow" data-facebook-share-text="LinkShadow" data-linkedin-text="LinkShadow" data-download-url="https://mma.prnewswire.com/media/1313583/0144484d8f632765effe4b5450c8.jpg?p=publish" data-pinterest-text="LinkShadow" data-twitter-share-url="https://mma.prnewswire.com/media/1313583/0144484d8f632765effe4b5450c8.jpg?p=twitter" data-linkedin-share-url="https://mma.prnewswire.com/media/1313583/0144484d8f632765effe4b5450c8.jpg?p=linkedin" data-facebook-share-url="https://mma.prnewswire.com/media/1313583/0144484d8f632765effe4b5450c8.jpg?p=facebook" data-pinterest-share-url="https://mma.prnewswire.com/media/1313583/0144484d8f632765effe4b5450c8.jpg?p=facebook">
<img decoding="async" title="LinkShadow" src="https://mma.prnewswire.com/media/1313583/0144484d8f632765effe4b5450c8.jpg?p=publish&amp;w=650" id="imageid_2" alt="LinkShadow" class="gallery-thumb img-responsive" /><br />
<span class="fa fa-arrows-alt arrow_styles" aria-hidden="true" />
</div><figcaption>
LinkShadow<br />
</figcaption></figure>
</div>
</div>
</div>
</div>
<p>LinkShadow enhances an organization&#8217;s defenses against advanced cyberattacks, zero-day malware, and ransomware, while simultaneously providing rapid insight into the effectiveness of a company&#8217;s existing security investments and risk posture.</p>
<p>The LinkShadow platform is designed to manage threats in real-time with attacker behavior analytics and extensive machine learning capabilities to detect both internal &amp; external threats. Powered by Machine Learning Algorithms, LinkShadow monitors the behavior of users and entities on the environment and pinpoints anomalies. It also empowers security teams with best-in-class threat&#8230;</p>
</div>
<p><a href="https://www.prnewswire.com/news-releases/linkshadow-named-user-behavior-analytics-security-solution-of-the-year-in-2020-cybersecurity-breakthrough-awards-program-301153602.html">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>OSFI launches consultation on technology risks in the financial sector</title>
		<link>https://risk-academy.ru/osfi-launches-consultation-on-technology-risks-in-the-financial-sector/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 15 Sep 2020 15:03:48 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Ontario]]></category>
		<category><![CDATA[Superintendent of Financial Institutions]]></category>
		<category><![CDATA[OTTAWA]]></category>
		<category><![CDATA[Banking in Canada]]></category>
		<category><![CDATA[Office of the Superintendent of Financial Institutions]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Financial regulation]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[technology risks]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/osfi-launches-consultation-on-technology-risks-in-the-financial-sector/</guid>

					<description><![CDATA[OTTAWA, ON, Sept. 15, 2020 /CNW/ &#8211; Today the Office of the Superintendent of Financial Institutions (OSFI) launched a three-month consultation with the publication of a discussion paper, Developing financial sector [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><span class="xn-location">OTTAWA, ON</span>, <span class="xn-chron">Sept. 15, 2020</span> /CNW/ &#8211; Today the Office of the Superintendent of Financial Institutions (OSFI) launched a three-month consultation with the publication of a discussion paper, <i>Developing financial sector resilience in a digital world.  </i>The paper focuses on risks arising from rapid technological advancement and digitalization, as these trends impact the stability of the Canadian financial sector.   </p>
<p>This consultation supports OSFI&#8217;s strategic objective to ensure that federally-regulated financial institutions and pension plans are better prepared to identify and develop resilience to non-financial risks before they negatively affect their financial condition. While technology is a key enabler for financial institutions and financial consumers, its widespread use and rapid adoption can pose risks in many different areas of the business if not properly understood and managed. </p>
<p>Understanding the financial sector&#8217;s use of technology and how technology risks are managed is central to this consultation. OSFI&#8217;s discussion paper focuses on the risk areas of cyber security, advanced analytics (artificial intelligence and machine learning), and the use of third party&#8230;</p>
</div>
<p><a href="https://www.newswire.ca/news-releases/osfi-launches-consultation-on-technology-risks-in-the-financial-sector-842064141.html">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CyberCore Discusses WindRose Supply Chain Threat Assessment Center; Neal Frick Quoted – Executive Gov</title>
		<link>https://risk-academy.ru/cybercore-discusses-windrose-supply-chain-threat-assessment-center-neal-frick-quoted-executive-gov/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 06 Sep 2020 05:16:40 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[PKI]]></category>
		<category><![CDATA[WindRose Supply Chain Threat Assessment Center]]></category>
		<category><![CDATA[VP CyberCore]]></category>
		<category><![CDATA[Neal Frick]]></category>
		<category><![CDATA[Executive]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[information technology]]></category>
		<category><![CDATA[federal government]]></category>
		<category><![CDATA[cryptographic applications]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cybercore-discusses-windrose-supply-chain-threat-assessment-center-neal-frick-quoted-executive-gov/</guid>

					<description><![CDATA[Neal Frick VP CyberCore launched the WindRose Supply Chain Threat Assessment Center to provide the federal and commercial sectors insight into customers and contractors in 2019. As security threats increase, [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<div class="entry-thumb" style="float: left; padding: 0 15px 15px 0;">
<img decoding="async" title="Executive" width="150" height="150" src="https://executivegov-media.s3.amazonaws.com/2020/09/04/ee/75/ad/f5/9b/95/54/f4/neal-frick.png" class="img-responsive wp-post-image" alt="CyberCore Discusses WindRose Supply Chain Threat Assessment Center; Neal Frick Quoted" loading="lazy"/>	</p>
<p>Neal Frick VP</p>
</div>
<p><u>CyberCore</u> launched the <u>WindRose Supply Chain Threat Assessment Center</u> to provide the federal and commercial sectors insight into customers and contractors in 2019. As security threats increase, federal government contractors’ accountability for security breaches continues to grow. </p>
<p>WindRose has leveraged <u>artificial intelligence</u> (AI) and <u>machine learning</u> (ML) to assess business and product risk of the <u>Supply Chain Network</u>. WindRose has scaled global <u>Information Technology</u> (IT) supply chain threats and vulnerabilities by providing a comprehensive analysis, covering all threat vectors. </p>
<p>CyberCore’s WindRose follows a cyber and supply chain focused analysis framework, consisting of over 50,000 Non-Cooperative Data Sources, where 150 Threat Factors are assessed across 15 Key Supply Chain Elements which are analyzed within 5 Critical Threat Vectors.</p>
<p>With the center’s capabilities, WindRose recently investigated a corporation that provided <u>PKI consulting</u> as well as user interface design for cryptographic applications. The organization did not do business with the federal government directly; however, their partners had a history of supporting the&#8230;</p>
</div>
<p><a href="https://www.executivegov.com/2020/09/cybercore-discusses-windrose-supply-chain-threat-assessment-center-neal-frick-quoted/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why do we need machine learning to effectively approach regulatory requirements?</title>
		<link>https://risk-academy.ru/why-do-we-need-machine-learning-to-effectively-approach-regulatory-requirements-2/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 24 Jun 2020 00:07:03 +0000</pubDate>
				<category><![CDATA[Официальная группа ИСАР]]></category>
		<category><![CDATA[Software requirements]]></category>
		<category><![CDATA[Psychological theories]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Deep learning]]></category>
		<category><![CDATA[MLOps]]></category>
		<category><![CDATA[riskmanagement]]></category>
		<category><![CDATA[riskminds]]></category>
		<category><![CDATA[Psychology]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Cognition]]></category>
		<category><![CDATA[Learning]]></category>
		<category><![CDATA[Educational psychology]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/why-do-we-need-machine-learning-to-effectively-approach-regulatory-requirements-2/</guid>

					<description><![CDATA[Why do we need machine learning to effectively approach regulatory requirements? #risk, #riskmanagement, #riskminds Why do we need machine learning to effectively approach regulatory requirements? Davide Boselli, Senior Regulatory Analytics [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span></p>
<p>Why do we need machine learning to effectively approach regulatory requirements? <a class="cq cr" href="https://facebook.com/hashtag/risk?refid=18&amp;_ft_=qid.6841808446587985599%3Amf_story_key.1128252680882998%3Agroup_id.412510262457247%3Atop_level_post_id.1128252680882998%3Atl_objid.1128252680882998%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1592957223%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1128252680882998%5D%7D%2C%22role%22%3A0%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="cs ct">#risk</span></a>, <a class="cq cr" href="https://facebook.com/hashtag/riskmanagement?refid=18&amp;_ft_=qid.6841808446587985599%3Amf_story_key.1128252680882998%3Agroup_id.412510262457247%3Atop_level_post_id.1128252680882998%3Atl_objid.1128252680882998%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1592957223%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1128252680882998%5D%7D%2C%22role%22%3A0%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="cs ct">#riskmanagement</span></a>, <a class="cq cr" href="https://facebook.com/hashtag/riskminds?refid=18&amp;_ft_=qid.6841808446587985599%3Amf_story_key.1128252680882998%3Agroup_id.412510262457247%3Atop_level_post_id.1128252680882998%3Atl_objid.1128252680882998%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1592957223%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1128252680882998%5D%7D%2C%22role%22%3A0%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="cs ct">#riskminds</span></a></p>
<p></span>
</p>
<p><a href="https://buff.ly/30MOkpr"><img decoding="async" alt="Psychology" title="Why do we need machine learning to effectively approach regulatory requirements?" src="https://scontent-dfw5-1.xx.fbcdn.net/v/t1.0-0/c247.0.540.540a/p180x540/98204845_10156777022912142_5980139770905362432_o.jpg?_nc_cat=107&#038;_nc_sid=ca434c&#038;_nc_ohc=4X8l6aNGSkcAX-IOIvS&#038;_nc_ht=scontent-dfw5-1.xx&#038;oh=c2d5d33fbfd97a9aa0dc3268b85c6d60&#038;oe=5F16AEFC" /></a> </p>
<p><a href="https://buff.ly/30MOkpr">Why do we need machine learning to effectively approach regulatory requirements?</a></p>
<p>Davide Boselli, Senior Regulatory Analytics Consultant EMEA, Experian, picks apart the problems of using machine learning to meet regulatory needs. Visit Ris&#8230;</p>
<p><a href="https://www.facebook.com/groups/412510262457247/permalink/1128252680882998">Присоеденяйтесь к официальной группе ИСАР в Facebook</a> </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NopSec Drives the Vulnerability Management Standards with Latest Release of Program Intelligence Module</title>
		<link>https://risk-academy.ru/nopsec-drives-the-vulnerability-management-standards-with-latest-release-of-program-intelligence-module/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 15 Jun 2020 04:27:58 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Vulnerability Management]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[leader]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[NEW YORK]]></category>
		<category><![CDATA[simulation]]></category>
		<category><![CDATA[NopSecInc.]]></category>
		<category><![CDATA[cyber threat management]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/nopsec-drives-the-vulnerability-management-standards-with-latest-release-of-program-intelligence-module/</guid>

					<description><![CDATA[NopSec&#8217;s Vulnerability Risk Management Platform Enables Organizations to Better Manage Business Risk NEW YORK, June 15, 2020 /PRNewswire-PRWeb/ &#8212; NopSec,Inc., a leader in vulnerability and cyber threat management, today announced [&#8230;]]]></description>
										<content:encoded><![CDATA[<div data-reactid="11">
<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" type="text" content="&lt;b&gt;NopSec's Vulnerability Risk Management Platform Enables Organizations to Better Manage Business Risk&lt;/b&gt;" data-reactid="12"><b>NopSec&#8217;s Vulnerability Risk Management Platform Enables Organizations to Better Manage Business Risk</b></p>
<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" type="text" content="&lt;span class=&quot;xn-location&quot;&gt;NEW YORK&lt;/span&gt;, &lt;span class=&quot;xn-chron&quot;&gt;June 15, 2020&lt;/span&gt; /PRNewswire-PRWeb/ -- &lt;a target=&quot;_blank&quot; href=&quot;https://c212.net/c/link/?t=0&amp;amp;l=en&amp;amp;o=2829296-1&amp;amp;h=2279319903&amp;amp;u=https%3A%2F%2Fwww.nopsec.com%2F&amp;amp;a=NopSec%2CInc.&quot; rel=&quot;nofollow noopener&quot;&gt;NopSec,Inc.&lt;/a&gt;, a leader in vulnerability and cyber threat management, today announced that the Program Intelligence Module will extend the power of the &lt;a target=&quot;_blank&quot; href=&quot;https://c212.net/c/link/?t=0&amp;amp;l=en&amp;amp;o=2829296-1&amp;amp;h=2011586194&amp;amp;u=https%3A%2F%2Fwww.nopsec.com%2Funified-vrm%2F&amp;amp;a=Unified+VRM&quot; rel=&quot;nofollow noopener&quot;&gt;Unified VRM&lt;/a&gt;, addressing additional use cases to strengthen the security posture of customers." data-reactid="13"><span class="xn-location">NEW YORK</span>, <span class="xn-chron">June 15, 2020</span> /PRNewswire-PRWeb/ &#8212; NopSec,Inc., a leader in vulnerability and cyber threat management, today announced that the Program Intelligence Module will extend the power of the Unified VRM, addressing additional use cases to strengthen the security posture of customers.</p>
<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" type="text" content="NopSec's flagship product, Unified VRM, is used by government entities and private organizations to prioritize and remediate vulnerabilities, reduce risks, and validate cyber security controls. Unified VRM is a cloud-based SaaS platform powered by the world's most advanced attack simulation capabilities and machine learning analytics. The platform provides IT Security and Risk teams with global visibility of their infrastructure risk levels, enabling them to prioritize and remediate their most imminent cyber threats." data-reactid="14">NopSec&#8217;s flagship product, Unified VRM, is used by government entities and private organizations to prioritize and remediate vulnerabilities, reduce risks, and validate cyber security controls. Unified VRM is a cloud-based SaaS platform powered by the world&#8217;s most advanced attack simulation capabilities and machine learning analytics. The platform provides IT Security and Risk teams with global visibility of their infrastructure risk levels, enabling them to prioritize and remediate their most imminent cyber threats.</p>
<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" type="text" content="Unified VRM Program Intelligence Module allows customers to strategically align their vulnerability management program with their business goals — i.e. digital transformation, cost reduction, operational excellence, and growth. Unified VRM Program Intelligence Module provides holistic visibility into the real risks posed to organizations and measures the efficiency of their technology, people, and processes. The Program Intelligence Module simplifies communicating the overall vulnerability risk management program's health to executives, board members, and other non-technical audiences. This module makes it possible to instantly answer executives' ad hoc emergency vulnerability management questions and to provide them with customized metrics and benchmarking." data-reactid="15">Unified VRM Program Intelligence Module allows customers to strategically align their vulnerability management program with their business goals — i.e. digital transformation, cost reduction, operational excellence, and growth. Unified VRM Program Intelligence Module provides&#8230;</p>
</div>
<p><a href="https://finance.yahoo.com/news/nopsec-drives-vulnerability-management-standards-040000280.html">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Booz Allen Hamilton Holding Cor</title>
		<link>https://risk-academy.ru/booz-allen-hamilton-holding-cor/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 16 May 2020 16:54:15 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Service companies]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[transformational solutions]]></category>
		<category><![CDATA[analytics services]]></category>
		<category><![CDATA[cyber solutions]]></category>
		<category><![CDATA[Booz Allen Hamilton]]></category>
		<category><![CDATA[http://www.boozallen.com]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[technology consulting]]></category>
		<category><![CDATA[Booz Allen Hamilton Holding Corporation]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/booz-allen-hamilton-holding-cor/</guid>

					<description><![CDATA[Booz Allen Hamilton Holding Cor found using ticker (BAH) now have 12 analysts covering the stock with the consensus suggesting a rating of ‘Buy’. The range between the high target [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<div>
<p><b>Booz Allen Hamilton Holding Cor</b> found using ticker (BAH) now have 12 analysts covering the stock with the consensus suggesting a rating of ‘Buy’. The range between the high target price and low target price is between 95 and 77 calculating the mean target price we have 84.33. Now with the previous closing price of 69.92 this would indicate that there is a potential upside of 20.6%. The 50 day MA is 72.99 and the 200 day MA is 73.01. The market capitalisation for the company is $9,820m. Company Website: http://www.boozallen.com</p>
<p>Booz Allen Hamilton Holding Corporation provides management and technology consulting, engineering, analytics, digital, mission operations, and cyber solutions to governments, corporations, and not-for-profit organizations in the United States and internationally. The company offers consulting solutions for various domains, business strategies, human capital, and operations. It also provides analytics services, which focuses on delivering transformational solutions in the areas of decision analytics, including operations research and cost estimation; automation; and data science, which include predictive modeling and machine learning, as well as&#8230;</p>
</div>
</div>
<p><a href="https://www.directorstalkinterviews.com/booz-allen-hamilton-holding-cor-consensus-indicates-potential-20-6-upside/412821443">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
