<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>National Institute of Standards &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/national-institute-of-standards/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sun, 15 Nov 2020 17:19:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>National Institute of Standards &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The clock is ticking for compliance with IMO’s 2021 cyber regulations.</title>
		<link>https://risk-academy.ru/the-clock-is-ticking-for-compliance-with-imos-2021-cyber-regulations/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 15 Nov 2020 17:19:27 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[United Nations]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Safety Management Systems]]></category>
		<category><![CDATA[IMOs Maritime Safety Committee]]></category>
		<category><![CDATA[Ticking]]></category>
		<category><![CDATA[Disaster Accident]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[National Institute of Standards]]></category>
		<category><![CDATA[Maritime Safety Committee]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/the-clock-is-ticking-for-compliance-with-imos-2021-cyber-regulations/</guid>

					<description><![CDATA[&#13; &#13; Maritime organisations have long focused on safety and the management of risks, however, bringing cyber threats into play can often be challenging as these are usually harder to [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="">&#13;<br />
&#13;</p>
<p style="text-align: left;">Maritime organisations have long focused on safety and the management of risks, however, bringing cyber threats into play can often be challenging as these are usually harder to quantify, understand and relate to the physical world. Some lessons can be brought across from other industries and frameworks, including that of the National Institute of Standards and Technology (NIST), which can be very helpful in aligning thinking and practice to cyber risks. But there are unique considerations that need to be factored in when applying a robust risk management process to cyber risks within marine and offshore organisations.</p>
<p style="text-align: left;">In 2017, the IMO issued MSC-FAL.1/Circ.3 ‘Guidelines on maritime cyber risk management’. These guidelines provide high-level recommendations to safeguard shipping from current and emerging cyber threats and vulnerabilities, including functional elements that support effective cyber risk management. The IMO’s Maritime Safety Committee then adopted these guidelines through Resolution MSC.428(98) ‘Maritime Cyber Risk Management in Safety Management Systems’. This resolution encourages administrations to ensure that cyber risks are appropriately&#8230;</p>
</div>
<p><a href="https://www.lr.org/en/insights/articles/imo-cyber-secuity-regulation-compliance/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>US DOE and NIST Partner to Improve Cybersecurity in Energy, Maritime Transportation Industries</title>
		<link>https://risk-academy.ru/us-doe-and-nist-partner-to-improve-cybersecurity-in-energy-maritime-transportation-industries/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 23 Oct 2020 12:02:54 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[CMA CGM]]></category>
		<category><![CDATA[container booking systems]]></category>
		<category><![CDATA[Maritime Transportation Industries]]></category>
		<category><![CDATA[US DOE]]></category>
		<category><![CDATA[energy sectors]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[National Institute of Standards]]></category>
		<category><![CDATA[partner]]></category>
		<category><![CDATA[energy sector]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/us-doe-and-nist-partner-to-improve-cybersecurity-in-energy-maritime-transportation-industries/</guid>

					<description><![CDATA[On October 5, the US Department of Energy’s Office of Cybersecurity, Energy Security and Emergency Response (CESER) reached a $3 million partnership agreement with the National Institute of Standards and [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="lex-article-body" style="display:block" data-integrity-check="B2C78568ADB5012FF6D4BECDD15DE75B" data-content-slug="b39681a2-05d9-4c9b-9b2f-823d0d04b973" data-friendly-name="US DOE and NIST Partner to Improve Cybersecurity in Energy, Maritime Transportation Industries" data-firm-ref="2689" data-content-type="Article" data-workareas="16,21,34" data-jurisdictions="1">
<p>On October 5, the US Department of Energy’s Office of Cybersecurity, Energy Security and Emergency Response (CESER) reached a $3 million partnership agreement with the National Institute of Standards and Technology (NIST) in order to “research and develop tools and practices that will strengthen the cybersecurity of the nation’s energy sector and maritime transportation system.”</p>
<p>According to CESER, 40% of all maritime traffic is comprised of energy products, which highlights the importance of addressing cybersecurity risks at seaports and in maritime transportation to safeguard US energy security. In the past several years, the incidence of cyber-intrusions, malware attacks and other dangerous lapses in cybersecurity impacting the maritime and energy sectors has increased tremendously across the globe.</p>
<p>As of September 2020, APM-Maersk, COSCO Shipping, CMA CGM, and Mediterranean Shipping Company have all fallen victim to multiple cyberattacks. These attacks include but are not limited to company data centers being breached/taken offline, disabling onboard vessel navigation systems and tampering with container booking systems. In 2018, one attack on Maersk’s global IT&#8230;</p>
</div>
<p><a href="https://www.lexology.com/library/detail.aspx?g=b39681a2-05d9-4c9b-9b2f-823d0d04b973">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Want to Improve Bulk Electric System Cybersecurity? Focus on Specific NIST Controls</title>
		<link>https://risk-academy.ru/want-to-improve-bulk-electric-system-cybersecurity-focus-on-specific-nist-controls/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 29 Sep 2020 15:26:44 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Federal Energy Regulatory Commission]]></category>
		<category><![CDATA[potential solution]]></category>
		<category><![CDATA[low-impact systems]]></category>
		<category><![CDATA[North American Reliability Corporation]]></category>
		<category><![CDATA[cyber systems]]></category>
		<category><![CDATA[low-impact cyber systems]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[National Institute of Standards]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/want-to-improve-bulk-electric-system-cybersecurity-focus-on-specific-nist-controls/</guid>

					<description><![CDATA[In late June 2020, the Federal Energy Regulatory Commission (FERC) released a Notice of Inquiry1 (NOI) in which they asked detailed questions about the National Institute of Standards and Technology [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>In late June 2020, the Federal Energy Regulatory Commission (FERC) released a Notice of Inquiry<sup>1</sup> (NOI) in which they asked detailed questions about the National Institute of Standards and Technology <span class="nowrap">(<abbr class="su-tooltip" data-close="no" data-behavior="hover" data-my="bottom center" data-at="top center" data-classes="su-qtip qtip-dark su-qtip-size-default" data-title="NIST" title="National Institute for Standards and Technology">NIST</abbr>)</span> Cybersecurity Framework and the risk and impact of a coordinated cyberattack on the bulk electric system (BES). A recurring question throughout the NOI was whether low-impact cyber systems should be subject to the same North American Reliability Corporation <span class="nowrap">(<abbr class="su-tooltip" data-close="no" data-behavior="hover" data-my="bottom center" data-at="top center" data-classes="su-qtip qtip-dark su-qtip-size-default" data-title="NERC" title="North American Electric Reliability Corporation">NERC</abbr>)</span> Critical Infrastructure Protection (CIP) standards currently required of medium- and high-impact BES cyber systems.</p>
<p>The policy outcome that arises from this attention on the BES will need to balance the government interest in protecting the nation against a coordinated cyberattack and industry concerns about regulatory burden. This is especially important as low-impact systems are usually smaller and often have fewer resources than their larger, medium- and high-impact system counterparts. To balance these interests, one potential solution would be to implement certain <abbr class="su-tooltip" data-close="no" data-behavior="hover" data-my="bottom center" data-at="top center" data-classes="su-qtip qtip-dark su-qtip-size-default" data-title="NERC" title="North American Electric Reliability Corporation">NERC</abbr> CIP controls and <abbr class="su-tooltip" data-close="no" data-behavior="hover" data-my="bottom center" data-at="top center" data-classes="su-qtip qtip-dark su-qtip-size-default" data-title="NIST" title="National Institute for Standards and Technology">NIST</abbr> concepts for low-impact cyber systems that will have the most impact:</p>
<ol>
<li><abbr class="su-tooltip" data-close="no" data-behavior="hover" data-my="bottom center" data-at="top center" data-classes="su-qtip qtip-dark su-qtip-size-default" data-title="NERC" title="North American Electric Reliability Corporation">NERC</abbr>-CIP’s Asset inventory (CIP 002-5.1a)<sup>2</sup>&#8230;</li>
</ol>
</div>
<p><a href="https://securityboulevard.com/2020/09/want-to-improve-bulk-electric-system-cybersecurity-focus-on-specific-nist-controls/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Acquired Data Solutions, KDM Analytics Partner on Cyber Risk Analysis Offering for Federal Sector</title>
		<link>https://risk-academy.ru/acquired-data-solutions-kdm-analytics-partner-on-cyber-risk-analysis-offering-for-federal-sector/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 22 Aug 2020 23:52:04 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[National Institute of Standards]]></category>
		<category><![CDATA[partner]]></category>
		<category><![CDATA[KDM Analytics]]></category>
		<category><![CDATA[Steve Seiden]]></category>
		<category><![CDATA[operational technology devices]]></category>
		<category><![CDATA[ADS]]></category>
		<category><![CDATA[Data Solutions]]></category>
		<category><![CDATA[President]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/acquired-data-solutions-kdm-analytics-partner-on-cyber-risk-analysis-offering-for-federal-sector/</guid>

					<description><![CDATA[cybersecurity Acquired Data Solutions and KDM Analytics have partnered to market an automated cyber risk analysis and measurement platform to federal agencies and equipment providers. The Blade RiskManager product is [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<figure style="width: 200px" class="wp-caption alignleft left"><img decoding="async" style="float: left;padding-right: 20px" src="https://executivebiz-media.s3.amazonaws.com/2020/08/06/da/3a/5b/c2/c1/ab/d8/14/servletFileDownload-50.png" alt="cybersecurity" width="200" title="Acquired Data Solutions, KDM Analytics Partner on Cyber Risk Analysis Offering for Federal Sector" /><figcaption class="wp-caption-text">cybersecurity</figcaption></figure>
<p>Acquired Data Solutions and KDM Analytics have partnered to market an automated cyber risk analysis and measurement platform to federal agencies and equipment providers.</p>
<p>The Blade RiskManager product is designed to help organizations monitor possible system and operational risks through artificial intelligence approaches, ADS said Wednesday.</p>
<p>The partnership aims to help customers reduce the time they will spend when pursuing evaluations with the National Institute of Standards and Technology&#8217;s risk management framework.</p>
<p>Steve Seiden, president of ADS, said online exposure of older operational technology devices has created new risks that could affect critical infrastructure assets.</p>
<p>&#8220;Urgent, proactive strategies are needed to ensure OT cybersecurity develops to the same maturity as IT cybersecurity,&#8221; Seiden added.</p>
</div>
<p>!function(f,b,e,v,n,t,s){if(f.fbq)return;n=f.fbq=function(){n.callMethod?<br />
n.callMethod.apply(n,arguments):n.queue.push(arguments)};<br />
if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version=&#8217;2.0&#8242;;<br />
n.queue=[];t=b.createElement(e);t.async=!0;<br />
t.src=v;s=b.getElementsByTagName(e)[0];<br />
s.parentNode.insertBefore(t,s)}(window,&#8230;</p>
<p><a href="https://blog.executivebiz.com/2020/08/acquired-data-solutions-kdm-analytics-partner-on-cyber-risk-analysis-offering-for-federal-sector/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FERC Considers Enhancements to Cybersecurity in Notice of Inquiry and Staff White Paper &#124; Davis Wright Tremaine LLP</title>
		<link>https://risk-academy.ru/ferc-considers-enhancements-to-cybersecurity-in-notice-of-inquiry-and-staff-white-paper-davis-wright-tremaine-llp/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 08 Jul 2020 04:34:36 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Business Finance]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[National Institute of Standards]]></category>
		<category><![CDATA[Federal Energy Regulatory Commission]]></category>
		<category><![CDATA[DAVIS WRIGHT TREMAINE LLP]]></category>
		<category><![CDATA[Tremaine]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/ferc-considers-enhancements-to-cybersecurity-in-notice-of-inquiry-and-staff-white-paper-davis-wright-tremaine-llp/</guid>

					<description><![CDATA[The Federal Energy Regulatory Commission (FERC) issued a Notice of Inquiry (NOI) on June 18, 2020, requesting comments on potential enhancements to the current U.S. Critical Infrastructure Protection (CIP) Reliability [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="html-view-content">
<p>The Federal Energy Regulatory Commission (FERC) issued a Notice of Inquiry (NOI) on June 18, 2020, requesting comments on potential enhancements to the current U.S. Critical Infrastructure Protection (CIP) Reliability Standards (CIP Standards). In the NOI, FERC also seeks input on the potential risk of a coordinated cyberattack on geographically distributed targets and the need for FERC to address such risk.</p>
<p>In a related development, that same day FERC Staff (Staff) issued a Cybersecurity Incentives Policy White Paper (the White Paper) that discusses a potential new framework for providing transmission incentives to utilities for cybersecurity investments. The Staff presents a framework for providing transmission incentives to utilities &#8220;for cybersecurity investments that produce significant benefits for actions that exceed&#8221; the CIP Standards.</p>
<h3>The NOI</h3>
<p>CIP Standards are mandatory and enforceable following their approval by FERC. They are intended to provide a risk-based, defense-in-depth approach to cybersecurity of the bulk electric system (BES).</p>
<p>An important source for improving the CIP Standards to address evolving cyber threats is the National Institute of Standards&#8230;</p>
</div>
<p><a href="https://www.jdsupra.com/legalnews/ferc-considers-enhancements-to-49205/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Top 25 Cyber Execs to Watch in 2020: Peraton&#8217;s Jim Schifalacqua</title>
		<link>https://risk-academy.ru/top-25-cyber-execs-to-watch-in-2020-peratons-jim-schifalacqua/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 25 May 2020 21:40:06 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[assurance cloud services]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[software-as-a-service security components]]></category>
		<category><![CDATA[response tools]]></category>
		<category><![CDATA[Jim Schifalacqua Jim Schifalacqua]]></category>
		<category><![CDATA[security services provider solution]]></category>
		<category><![CDATA[National Institute of Standards]]></category>
		<category><![CDATA[Peraton]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/top-25-cyber-execs-to-watch-in-2020-peratons-jim-schifalacqua/</guid>

					<description><![CDATA[Jim Schifalacqua, Peraton Joining Peraton in 2018, Jim Schifalacqua has worked to integrate an entirely new infrastructure and cybersecurity architecture using a cloud-first approach. This architecture proved critical during the [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="post-208674">
<p>	<!-- .post-header --></p>
<div class="post-content post-dynamic">
<div id="attachment_208233" style="width: 224px" class="wp-caption alignleft"><img fetchpriority="high" decoding="async" title="Technology Internet" aria-describedby="caption-attachment-208233" class=" wp-image-208233" src="https://washingtonexec.com/wp-content/uploads/2020/05/Jim-Schifalacqua-533x800.jpg" alt="Technology Internet" width="214" height="321" srcset="https://washingtonexec.com/wp-content/uploads/2020/05/Jim-Schifalacqua-533x800.jpg 533w, https://washingtonexec.com/wp-content/uploads/2020/05/Jim-Schifalacqua-800x1200.jpg 800w, https://washingtonexec.com/wp-content/uploads/2020/05/Jim-Schifalacqua-1024x1536.jpg 1024w, https://washingtonexec.com/wp-content/uploads/2020/05/Jim-Schifalacqua-1365x2048.jpg 1365w, https://washingtonexec.com/wp-content/uploads/2020/05/Jim-Schifalacqua-800x1200@2x.jpg 1600w, https://washingtonexec.com/wp-content/uploads/2020/05/Jim-Schifalacqua-533x800@2x.jpg 1066w" sizes="(max-width: 214px) 100vw, 214px"/></p>
<p id="caption-attachment-208233" class="wp-caption-text">Jim Schifalacqua, Peraton</p>
</div>
<p>Joining Peraton in 2018, Jim Schifalacqua has worked to integrate an entirely new infrastructure and cybersecurity architecture using a cloud-first approach. This architecture proved critical during the COVID-19 crisis, when employees were able to quickly pivot to a remote working environment, having the same secure capabilities as they had in their offices.</p>
<p>The Peraton approach uses high-assurance cloud services, multiple software-as-a-service security components and integrated multifactor authentication to achieve a zero-trust architecture with private access, advanced information protection and advanced security threat detection. Peraton was able to rapidly comply with the National Institute of Standards and Technology’s 800-171 cybersecurity requirements.</p>
<p>Schifalacqua’s team of motivated cybersecurity experts transitioned Peraton’s SOC from a bloated proprietary managed security services provider solution with low-visibility into the environment to a high-performance, cost-effective hybrid model where in-house threat hunters easily work across the enterprise with advanced detection and response tools. Schifalacqua&#8230;</p>
</div>
</div>
<p><a href="https://washingtonexec.com/2020/05/top-25-cyber-execs-to-watch-in-2020-peratons-jim-schifalacqua/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
