<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>manufacturing &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/manufacturing/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Mon, 23 Nov 2020 01:05:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>manufacturing &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cybersecurity threats to Industry 4.0</title>
		<link>https://risk-academy.ru/cybersecurity-threats-to-industry-4-0/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 23 Nov 2020 01:05:38 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[ONA Group]]></category>
		<category><![CDATA[Socit Nationale d'Investissement]]></category>
		<category><![CDATA[manufacturing]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Analyst]]></category>
		<category><![CDATA[senior vice president]]></category>
		<category><![CDATA[Andrew Bryson]]></category>
		<category><![CDATA[FM Global]]></category>
		<category><![CDATA[Managem]]></category>
		<category><![CDATA[Mining in Morocco]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cybersecurity-threats-to-industry-4-0/</guid>

					<description><![CDATA[Strong risk management is critical in the Industry 4.0 fight against cybercrime.   The ability to automate traditional manufacturing and industrial processes, supported by data sensors and powerful analytics, has [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="">
<h3><em><span class="TextRun SCXW229454984 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW229454984 BCX0">Strong risk management is critical in the Industry 4.0 fight against cybercrime. </span></span><span class="EOP SCXW229454984 BCX0" data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></em></h3>
<p><span data-contrast="auto">T</span><span data-contrast="auto">he ability to automate traditional manufacturing and industrial processes, sup</span><span data-contrast="auto">ported by data sensors and powerful analytics, has seen the Industry 4.0 trend turbocharge the growth of many companies. By allowing for greater connectivity between machines and facilities, it has accelerated supply chains, driven significant efficiencies, improved the flexibility and agility of businesses, and facilitated a much better customer experience. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">All of this has contributed to the explosion of the internet of things (IoT). Analyst firm Gartner predicts there are now approximately 30 billion devices in the world and, according to research by </span><span data-contrast="auto">IndustryARC</span><span data-contrast="auto">, the global Industry 4.0 market specifically is expected to reach $156.6 billion by 2024. This pace of change will continue to advance as companies seek to stay competitive and maximise the quality of their products and services. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">“Industry 4.0 has transformed the way many businesses operate,” says Andrew Bryson, operations senior vice president at FM Global, one of the world’s largest commercial and industrial property insurers. “An&#8230;</span></p>
</div>
<p><a href="https://www.worldfirst.com/uk/blog/economic-updates/industry-4-0-cyber-security-threats/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mercenaries for cyberespionage. ICS threats. IoT botnet in the cloud. Return of DNS cache poisoning? PLATYPUS, a new side-channel bug.</title>
		<link>https://risk-academy.ru/mercenaries-for-cyberespionage-ics-threats-iot-botnet-in-the-cloud-return-of-dns-cache-poisoning-platypus-a-new-side-channel-bug/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 13 Nov 2020 05:05:18 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Persian Gulf]]></category>
		<category><![CDATA[oil and gas entities]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[manufacturing]]></category>
		<category><![CDATA[oil and gas]]></category>
		<category><![CDATA[aerospace]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[industrial control systems]]></category>
		<category><![CDATA[electric utilities]]></category>
		<category><![CDATA[aerospace sectors]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/mercenaries-for-cyberespionage-ics-threats-iot-botnet-in-the-cloud-return-of-dns-cache-poisoning-platypus-a-new-side-channel-bug/</guid>

					<description><![CDATA[BlackBerry researchers are tracking what they believe to be a mercenary cyberespionage group whose campaign they’re calling “CostaRicto.” BlackBerry doesn’t speculate about who CostaRicto&#8217;s paymasters might be, but they offer [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="summary-text1">
<p>BlackBerry researchers are tracking what they believe to be a mercenary cyberespionage group whose campaign they’re calling “CostaRicto.” BlackBerry doesn’t speculate about who CostaRicto&#8217;s paymasters might be, but they offer four reasons for thinking it a mercenary operation. It uses bespoke malware; it shows systematic, continual development; it may share some network infrastructure with APT28 (Fancy Bear, Russia’s GRU), and its highly diversified target list suggests more than one customer.</p>
<p>Dragos finds that industrial control systems (ICS) are increasingly being subjected to the attentions of cyber threat actors. The researchers are following five distinct threat groups:</p>
<ul>
<li>CHRYSENE (APT34 or Helix Kitten) targets the petrochemical, oil and gas, manufacturing, and electric generation sectors. It’s expanded its interests beyond the Persian Gulf.</li>
<li>MAGNALLIUM (APT33 or Elfin) is active against the energy and aerospace sectors, including their supporting sectors.</li>
<li>PARISITE (Fox Kitten or Pioneer Kitten) works against electric utilities, aerospace, manufacturing, oil and gas entities, and governmental and non-governmental organizations.</li>
<li>WASSONITE, associated with the Lazarus&#8230;</li>
</ul>
</div>
<p><a href="https://thecyberwire.com/newsletters/daily-briefing/9/219">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Large vendor ecosystems and low visibility increase third-party cyber risk</title>
		<link>https://risk-academy.ru/large-vendor-ecosystems-and-low-visibility-increase-third-party-cyber-risk/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 11:01:26 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Switzerland]]></category>
		<category><![CDATA[Mexico]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[manufacturing]]></category>
		<category><![CDATA[Singapore]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[energy]]></category>
		<category><![CDATA[financial services]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/large-vendor-ecosystems-and-low-visibility-increase-third-party-cyber-risk/</guid>

					<description><![CDATA[80% of organizations experienced a cybersecurity breach that originated from vulnerabilities in their vendor ecosystem in the past 12 months, and the average organization had been breached in this way [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="entryContent">
<p>80% of organizations experienced a cybersecurity breach that originated from vulnerabilities in their vendor ecosystem in the past 12 months, and the average organization had been breached in this way 2.7 times, according to a BlueVoyant survey.</p>
<p><img decoding="async" src="https://img2.helpnetsecurity.com/posts2020/opinionmatters-092020.jpg" class="aligncenter" alt="budgets third-party cyber risk" title="Survey stats"/></p>
<p>The research also found organizations are experiencing multiple pain points across their cyber risk management program as they aim to mitigate risk across a network that typically encompasses 1409 vendors.</p>
<p>The study was conducted by Opinion Matters and recorded the views and experiences of 1505 CIOs, CISOs and Chief Procurement Officers in organizations with more than 1000 employees across a range of vertical sectors including business and professional services, financial services, healthcare and pharmaceutical, manufacturing, utilities and energy. It covered five countries: USA, UK, Mexico, Switzerland and Singapore. </p>
<h3>Third-party cyber risk budgets and other key findings</h3>
<ul>
<li>29% say they have no way of knowing if cyber risk emerges in a third-party vendor</li>
<li>22.5% monitor their entire supply chain</li>
<li>32% only re-assess and report their vendor’s cyber risk position either six-monthly or less frequently</li>
<li>The average headcount in&#8230;</li>
</ul>
</div>
<p><a href="https://www.helpnetsecurity.com/2020/09/25/budgets-third-party-cyber-risk/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How VR Can Ease the Pressure of High-Risk Training </title>
		<link>https://risk-academy.ru/how-vr-can-ease-the-pressure-of-high-risk-training%e2%80%af/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 16 Sep 2020 16:10:41 +0000</pubDate>
				<category><![CDATA[HBR]]></category>
		<category><![CDATA[Virtual reality applications]]></category>
		<category><![CDATA[PwC]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[manufacturing]]></category>
		<category><![CDATA[Science and technology]]></category>
		<category><![CDATA[virtual reality]]></category>
		<category><![CDATA[VR Group]]></category>
		<category><![CDATA[Computer peripherals]]></category>
		<category><![CDATA[Components]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/how-vr-can-ease-the-pressure-of-high-risk-training%e2%80%af/</guid>

					<description><![CDATA[Employees who specialize in demanding and dangerous lines of work—manufacturing, construction, handling cargo, and other hazardous environments—face the constant threat of physical risk.   In these roles, on-the-job “hard skills” training can be costly [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><img fetchpriority="high" decoding="async" title="PwC" class="alignnone size-full wp-image-270428" src="http://feeds.hbr.org/resources/images/article_assets/2020/08/Oculus_For_Business_1200x675_v2.jpg" srcset="http://feeds.hbr.org/resources/images/article_assets/2020/08/Oculus_For_Business_1200x675_v2.jpg 1200w, http://feeds.hbr.org/resources/images/article_assets/2020/08/Oculus_For_Business_1200x675_v2-300x169.jpg 300w, http://feeds.hbr.org/resources/images/article_assets/2020/08/Oculus_For_Business_1200x675_v2-768x432.jpg 768w, http://feeds.hbr.org/resources/images/article_assets/2020/08/Oculus_For_Business_1200x675_v2-1024x576.jpg 1024w, http://feeds.hbr.org/resources/images/article_assets/2020/08/Oculus_For_Business_1200x675_v2-500x281.jpg 500w, http://feeds.hbr.org/resources/images/article_assets/2020/08/Oculus_For_Business_1200x675_v2-383x215.jpg 383w, http://feeds.hbr.org/resources/images/article_assets/2020/08/Oculus_For_Business_1200x675_v2-700x394.jpg 700w, http://feeds.hbr.org/resources/images/article_assets/2020/08/Oculus_For_Business_1200x675_v2-850x478.jpg 850w" alt="PwC" width="1200" height="675" sizes="(min-width: 48em) 55.7291667vw, 97.3924381vw"/></p>
<p><span data-contrast="none">Employees who specialize in demanding and dangerous lines of work—manufacturing, construction, handling cargo, and other hazardous environments—face the constant threat of physical risk.</span><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">In these roles, on-the-job “hard skills” training can be costly and dangerous. But organizations increasingly see how virtual</span><span data-contrast="none"> </span><span data-contrast="none">reality solutions can help them provide invaluable hands-on training safely, efficiently, and economically.</span><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">Far from being used primarily for gaming and entertainment, VR is growing rapidly as an enterprise tool. By </span><span data-contrast="none">PwC</span><span data-contrast="none">’s estimate,&#8230;</span></p>
</div>
<p><a href="http://feeds.hbr.org/~r/harvardbusiness/~3/ioM-roiInXw/how-vr-can-ease-the-pressure-of-high-risk-training">Read More&#8230;</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Securing Cyber-Physical Systems: Overcoming 3 Hurdles to a Holistic Approach</title>
		<link>https://risk-academy.ru/securing-cyber-physical-systems-overcoming-3-hurdles-to-a-holistic-approach/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 19:04:54 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[safety systems]]></category>
		<category><![CDATA[Cyber-physical system]]></category>
		<category><![CDATA[Disaster Accident]]></category>
		<category><![CDATA[manufacturing]]></category>
		<category><![CDATA[cyber-physical systems]]></category>
		<category><![CDATA[computer systems]]></category>
		<category><![CDATA[transportation]]></category>
		<category><![CDATA[NEWSWEEK]]></category>
		<category><![CDATA[Nozomi Networks]]></category>
		<category><![CDATA[electric utilities]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/securing-cyber-physical-systems-overcoming-3-hurdles-to-a-holistic-approach/</guid>

					<description><![CDATA[For critical infrastructure organizations and operators to prevent a catastrophic event, they must first understand the risks facing cyber-physical systems Photo courtesy of Nozomi Networks Cybersecurity has never been more [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<div class="page-image__wrapper"><img decoding="async" title="Disaster Accident" data-image-id="5ed06761fb81d12b008b45f4" src="https://img.utilityproducts.com/files/base/ebm/up/image/2020/05/2005UPpf6_p01.5ed0675f5a296.png?auto=format&amp;w=720" srcset="https://img.utilityproducts.com/files/base/ebm/up/image/2020/05/2005UPpf6_p01.5ed0675f5a296.png?auto=format&amp;dpr=2&amp;w=720 2x" class="page-image__image lazyload" alt="For critical infrastructure organizations and operators to prevent a catastrophic event, they must first understand the risks facing cyber-physical systems"/></div>
<p>For critical infrastructure organizations and operators to prevent a catastrophic event, they must first understand the risks facing cyber-physical systems</p>
<p>Photo courtesy of Nozomi Networks</p>
</div>
<div>
<p>Cybersecurity has never been more challenging for industrial organizations. Recent attacks on critical safety systems have shown conventional defenses may not stop sophisticated attackers. Growing political unrest is increasing the likelihood of more sophisticated nation-state breaches against industries that support everyday life, like electric utilities, transportation and manufacturing. The potential risks to safety, operational performance and information confidentiality requires constant vigilance.   </p>
<p>For critical infrastructure organizations and operators to prevent a catastrophic event, they must first understand the risks facing cyber-physical systems. A recent survey from Nozomi Networks and Newsweek Vantage of 400 C-level executives from critical infrastructure organizations shows that when it comes to security, these companies have not focused enough on taking a holistic approach to the digital and physical realms. Nearly half of respondents struggle with differences&#8230;</p>
</div>
<p><a href="https://www.utilityproducts.com/home/article/14176864/securing-cyberphysical-systems-overcoming-3-hurdles-to-a-holistic-approach">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Macquarie Capital and Nasdaq Ventures join $17 million Series B in XM Cyber</title>
		<link>https://risk-academy.ru/macquarie-capital-and-nasdaq-ventures-join-17-million-series-b-in-xm-cyber/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 09 Jul 2020 10:42:42 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Nasdaq Ventures]]></category>
		<category><![CDATA[cloud security posture management]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[leader]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[manufacturing]]></category>
		<category><![CDATA[Latin America]]></category>
		<category><![CDATA[Telecommunications]]></category>
		<category><![CDATA[Asia]]></category>
		<category><![CDATA[MACQUARIE CAPITAL]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/macquarie-capital-and-nasdaq-ventures-join-17-million-series-b-in-xm-cyber/</guid>

					<description><![CDATA[&#13; XM Cyber, the multi-award-winning leader in breach and attack simulation (BAS) advanced cyber risk analytics and cloud security posture management, today announced that it has closed a $17 million [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>&#13;<br />
      XM Cyber, the multi-award-winning leader in breach and attack simulation (BAS) advanced cyber risk analytics and cloud security posture management, today announced that it has closed a $17 million Series B funding round with Macquarie Capital, Nasdaq Ventures, Our Innovation Fund, and Swarth Group. &#13;
    </p>
<div id="ctl00_ctl00_body_mainContent_Article_pnlBody">
	The company has now raised a total of $49 million, from this current round as well as the previous Series A round, and a seed investment from Swarth Group.</p>
<p>XM Cyber will use the funding to grow its research and development department while expanding its sales and marketing presence worldwide. The company is also expanding its capabilities as a result of the recent growth in demand for its ability to simulate attacks against cloud-based resources. The company currently has customers across the US, Europe and Asia with a growing presence in Latin America. Customers include major financial institutions, government, manufacturing, telecommunications, and critical infrastructure. </p>
<p>“XM Cyber’s evolution as a company has impressed us, and we believe that its solutions have become an increasing necessity for enterprises looking to improve their security&#8230;</p>
</div>
<p><a href="https://www.finextra.com/pressarticle/83248/macquarie-capital-and-nasdaq-ventures-join-17-million-series-b-in-xm-cyber">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Need to secure industrial IoT more acute than ever</title>
		<link>https://risk-academy.ru/need-to-secure-industrial-iot-more-acute-than-ever/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 07 Jul 2020 03:28:42 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[the Foresight review]]></category>
		<category><![CDATA[manufacturing]]></category>
		<category><![CDATA[energy]]></category>
		<category><![CDATA[NEW YORK]]></category>
		<category><![CDATA[Robert Hannigan]]></category>
		<category><![CDATA[BlueVoyant]]></category>
		<category><![CDATA[report co-author and international executive chairman]]></category>
		<category><![CDATA[Lloyds Register Foundation]]></category>
		<category><![CDATA[industrial infrastructure]]></category>
		<category><![CDATA[physical infrastructure]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/need-to-secure-industrial-iot-more-acute-than-ever/</guid>

					<description><![CDATA[&#13; The need to address the threat posed by malicious actors exploiting the internet of things (IoT) to attack critical industrial infrastructure is becoming an increasingly urgent one, according to [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="content-body">&#13;</p>
<p>The need to address the threat posed by malicious actors exploiting the internet of things (IoT) to attack critical industrial infrastructure is becoming an increasingly urgent one, according to the <em>Foresight review of cyber security for the Industrial IoT</em> report published by charitable organisation the Lloyd’s Register Foundation.</p>
<p>The report dives into the inherent risks surrounding the industrial IoT as it becomes a core part of network infrastructures across multiple critical sectors, such as energy, transport, the built environment, physical infrastructure and manufacturing, noting that the IoT exacerbates many of the security challenges that have existed for a long time.</p>
<p>“Over the past few years, we have seen a rise in deliberate attacks aimed at critical infrastructures across the globe. As adoption of IoT in the industrial sector continues to grow, clear action and guidance is needed,” said Robert Hannigan, report co-author and international executive chairman at BlueVoyant, a New York-based managed security services provider (MSSP).</p>
<p>“Our report frames the context of [the] industrial IoT, the imminent problems facing key infrastructure as they&#8230;</p>
</div>
<p><a href="https://www.computerweekly.com/news/252485716/Need-to-secure-industrial-IoT-more-acute-than-ever">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Are Companies Ready for the Risks of IoT?</title>
		<link>https://risk-academy.ru/are-companies-ready-for-the-risks-of-iot/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 04 Jul 2020 20:17:30 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Shared Assessments Program]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[manufacturing]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[Information and communications technology]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[retail]]></category>
		<category><![CDATA[Things Risk Management]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/are-companies-ready-for-the-risks-of-iot/</guid>

					<description><![CDATA[The Internet of Things (IoT) and Industrial IoT (IIoT) are beginning to see some real momentum, particularly in industries such as manufacturing, healthcare, and retail. More and more devices, equipment, [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="hs_cos_wrapper_post_body">
<p>The Internet of Things (IoT) and Industrial IoT (IIoT) are beginning to see some real momentum, particularly in industries such as manufacturing, healthcare, and retail. More and more devices, equipment, vehicles, buildings, and other objects are being equipped with sensors and connected, enabling the sharing of data that provides useful insights for businesses.</p>
<p>Security has always been a concern with IoT, and that has not gone away as more organizations launch projects. In fact, security issues are likely to become even more complex as businesses work with partners throughout their supply chains in efforts to create “smarter” environments and more efficient processes.</p>
<p>A new report from research firm Ponemon Institute and the Shared Assessments Program, a group of risk management authorities, emphasizes the “acute need for IoT risk management improvement, as most organizations do not know what tracking and safeguards their third parties have in place.”</p>
<p>The study, “Third Party Internet of Things Risk Management,” said current IoT risk management programs are not keeping pace with the dramatic increase in IoT-related risks. This is a shortcoming that represents a clear&#8230;</p>
</div>
<p><a href="https://securityboulevard.com/2020/07/are-companies-ready-for-the-risks-of-iot/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Maritime Industry Sees Increase in Cyber Attacks</title>
		<link>https://risk-academy.ru/maritime-industry-sees-increase-in-cyber-attacks/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 25 Jun 2020 20:28:42 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Financial Services Cyber-Compliance Team]]></category>
		<category><![CDATA[FRE]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Cyberattack]]></category>
		<category><![CDATA[Contents]]></category>
		<category><![CDATA[manufacturing]]></category>
		<category><![CDATA[Security engineering]]></category>
		<category><![CDATA[real estate]]></category>
		<category><![CDATA[security law]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/maritime-industry-sees-increase-in-cyber-attacks/</guid>

					<description><![CDATA[Linn Freedman practices in data privacy and security law, cybersecurity, and complex litigation. She provides guidance on data privacy and cybersecurity compliance to a full range of public and private clients [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p class="rtejustify">Linn Freedman practices in data privacy and security law, cybersecurity, and complex litigation. She provides guidance on data privacy and cybersecurity compliance to a full range of public and private clients across all industries, such as construction, education, health care, insurance, manufacturing, real estate, utilities and critical infrastructure, marine, and charitable organizations. Linn is a member of the firm&#8217;s Business Litigation Group and chairs its Data Privacy + Cybersecurity Team. She is also a member of the Financial Services Cyber-Compliance Team (CyFi &#8230;</p>
</div>
<p><a href="https://www.natlawreview.com/article/cyber-attacks-against-maritime-industry-quadrupled-last-few-months">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>30 best decision science speakers, now available online RISK-ACADEMY Blog</title>
		<link>https://risk-academy.ru/30-best-decision-science-speakers-now-available-online-risk-academy-blog/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 21 May 2020 12:55:02 +0000</pubDate>
				<category><![CDATA[Блог Алексея Сидоренко]]></category>
		<category><![CDATA[Journalism]]></category>
		<category><![CDATA[alex sidorenko]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Actuarial science]]></category>
		<category><![CDATA[http://www.riskacademy.blog]]></category>
		<category><![CDATA[manufacturing]]></category>
		<category><![CDATA[offers online courses]]></category>
		<category><![CDATA[energy]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Diaries]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/30-best-decision-science-speakers-now-available-online-risk-academy-blog/</guid>

					<description><![CDATA[With over 30 Speakers, this virtual conference presents the wide variety of arenas in which Decision Science is increasingly being adopted, including energy, sustainability, education, government, manufacturing, and health care. Through a [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>With over 30 Speakers, this virtual conference presents the wide variety of arenas in which <strong><em>Decision Science</em></strong> is increasingly being adopted, including energy, sustainability, education, government, manufacturing, and health care.</p>
<p>Through a combination of presentations, panel discussions, and interactive sessions, attendees will gain a rich understanding of how to achieve better outcomes from both personal and professional decisions. https://cvent.me/WL7ABZ?RefId=RISKACADEMY_DAAGCONFERENCE</p>
<div style=";margin: 12px!important">
<h3>Check out other decision making books</h3>
</div>
<div style=";margin: 12px!important">
<h3>RISK-ACADEMY offers online courses</h3>
<div class="wpac_am_ads productcards per_row_3">
<figure class="snip1418 wpac_am2">
<div class="wpac_am2_inner"><img decoding="async" title="alex sidorenko" src="https://i0.wp.com/riskacademy.blog/wp-content/uploads/2020/05/1687492_9225_3.jpg?w=730&amp;ssl=1" alt="sample85" data-recalc-dims="1" data-lazy-src="https://i0.wp.com/riskacademy.blog/wp-content/uploads/2020/05/1687492_9225_3.jpg?w=730&amp;is-pending-load=1#038;ssl=1" srcset="https://riskacademy.blog/data:image/gif;base64,https://riskacademy.blog/R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class=" jetpack-lazy-image"/><noscript><img decoding="async" src="https://i0.wp.com/riskacademy.blog/wp-content/uploads/2020/05/1687492_9225_3.jpg?w=730&amp;ssl=1" alt="sample85" data-recalc-dims="1"/></noscript></p>
<p> <span class="faplus">+</span> <span>Buy now</span></p><figcaption>&#13;</p>
<h3>Informed Risk Taking</h3>
<p>&#13;</p>
<p>Learn 15 practical steps on integrating risk management into decision making, business processes, organizational culture and other activities!</p>
<p>&#13;</p>
<p>&#13;<br />
   <!--<s>$24.00</s>$19.00--><s>19,99</s>9,99&#13;
  </p>
<p>&#13;<br />
 </figcaption></div>
<p>&#13;<br />
</figure>
<figure class="snip1418 wpac_am2">
<div class="wpac_am2_inner"><img decoding="async" src="https://i1.wp.com/riskacademy.blog/wp-content/uploads/2020/05/2197558_383b_3.jpg?w=730&amp;ssl=1" alt="sample85" data-recalc-dims="1" data-lazy-src="https://i1.wp.com/riskacademy.blog/wp-content/uploads/2020/05/2197558_383b_3.jpg?w=730&amp;is-pending-load=1#038;ssl=1" srcset="https://riskacademy.blog/data:image/gif;base64,https://riskacademy.blog/R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class=" jetpack-lazy-image"/><noscript><img decoding="async" src="https://i1.wp.com/riskacademy.blog/wp-content/uploads/2020/05/2197558_383b_3.jpg?w=730&amp;ssl=1" alt="sample85" data-recalc-dims="1"/></noscript></p>
<p> <span class="faplus">+</span> <span>Buy now</span></p><figcaption>&#13;</p>
<h3>ISO31000 Integrating Risk Management</h3>
<p>&#13;</p>
<p>Alex Sidorenko, known for his risk management blog http://www.riskacademy.blog, has created a 25-step program to integrate risk management into decision making, core business processes and the overall culture of the organization.</p>
<p>&#13;</p>
<p>&#13;<br />
   <!--<s>$24.00</s>$19.00--><s>199,99</s>9,99&#13;
  </p>
<p>&#13;<br />
 </figcaption></div>
<p>&#13;<br />
</figure>
<figure class="snip1418 wpac_am2">
<div class="wpac_am2_inner"><img decoding="async" src="https://i0.wp.com/riskacademy.blog/wp-content/uploads/2020/05/1738168_17a1_2.jpg?w=730&amp;ssl=1" alt="sample85" data-recalc-dims="1" data-lazy-src="https://i0.wp.com/riskacademy.blog/wp-content/uploads/2020/05/1738168_17a1_2.jpg?w=730&amp;is-pending-load=1#038;ssl=1" srcset="https://riskacademy.blog/data:image/gif;base64,https://riskacademy.blog/R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class=" jetpack-lazy-image"/><noscript><img decoding="async" src="https://i0.wp.com/riskacademy.blog/wp-content/uploads/2020/05/1738168_17a1_2.jpg?w=730&amp;ssl=1" alt="sample85" data-recalc-dims="1"/></noscript></p>
<p> <span class="faplus">+</span> <span>Buy now</span></p><figcaption>&#13;</p>
<h3>Управление рисками </h3>
<p>&#13;</p>
<p>В этом коротком и очень увлекательном курсе, Алексей Сидоренко расскажет о причинах внедрения риск менеджмента, об особенностях принятия управленческих решений в ситуации неопределенности и изменениях в новом стандарте ИСО 31000:2018.</p>
<p>&#13;</p>
<p>&#13;<br />
   <!--<s>$24.00</s>$19.00--><s>19,99</s>9,99&#13;
  </p>
<p>&#13;<br />
 </figcaption></div>
<p>&#13;<br />
</figure>
</div>
</div>
<div class="sharedaddy sd-sharing-enabled">
<div class="robots-nocontent sd-block sd-social sd-social-icon sd-sharing">
<h3 class="sd-title">Please share to improve risk literacy</h3>
</div>
</div>
<div class="sharedaddy sd-block sd-like jetpack-likes-widget-wrapper jetpack-likes-widget-unloaded" id="like-post-wrapper-122574029-22377-5ec67a2635c93" data-src="https://widgets.wp.com/likes/#blog_id=122574029&amp;post_id=22377&amp;origin=riskacademy.blog&amp;obj_id=122574029-22377-5ec67a2635c93" data-name="like-post-frame-122574029-22377-5ec67a2635c93">
<h3 class="sd-title">Like this:</h3>
<p><span class="button"><span>Like</span></span> <span class="loading">Loading&#8230;</span></p>
<p><span class="sd-text-color"/></div>
<p><h3 class="jp-relatedposts-headline"><em>Related</em></h3>
</p></div>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
