<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>NIST Cybersecurity Framework &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/nist-cybersecurity-framework/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sat, 21 Nov 2020 20:14:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>NIST Cybersecurity Framework &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to get an A+ in cybersecurity now that schools are back in session</title>
		<link>https://risk-academy.ru/how-to-get-an-a-in-cybersecurity-now-that-schools-are-back-in-session/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 19 Nov 2020 21:46:25 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Education]]></category>
		<category><![CDATA[NIST Cybersecurity Framework]]></category>
		<category><![CDATA[National Initiative for Cybersecurity Education]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[Workforce]]></category>
		<category><![CDATA[online students]]></category>
		<category><![CDATA[Articles]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/how-to-get-an-a-in-cybersecurity-now-that-schools-are-back-in-session/</guid>

					<description><![CDATA[Students will be spending significantly more time on their computers throughout the fall, increasing the risk of cyber threats such as phishing and Zoom bombing. Courtesy of BigStock.com &#8212; Copyright: [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<div class="page-image__wrapper"><img decoding="async" title="Articles" src="https://img.securityinfowatch.com/files/base/cygnus/siw/image/2020/11/bigstock_Asian_Girl_Student_Video_Confe_370798933.5fb6e10c47f79.png?auto=format&amp;w=720" class="page-image__image lazyload" alt="Students will be spending significantly more time on their computers throughout the fall, increasing the risk of cyber threats such as phishing and Zoom bombing." data-image-id="5fb6e10d56afb9442d8b461f" /></div>
<p>Students will be spending significantly more time on their computers throughout the fall, increasing the risk of cyber threats such as phishing and Zoom bombing.</p>
<p>Courtesy of BigStock.com &#8212; Copyright: Prasit Rodphan</p>
</div>
<div>
<p>The world has changed dramatically since the advent of COVID-19. This change is visible when we see people wearing masks and abiding by the six-foot distancing rule, restaurant signs advertising takeout service, and plexiglass shields at checkout counters. Because fewer folks are out and about and we’re staying further apart, life may seem sleepier than it was in the “before” time. However, what happens behind closed doors these days is often much more chaotic. </p>
<p>Many of us are now working from home. As if that is not difficult enough, a fair share of the new remote workforce is trying to get the job done with their children in the house. The back-to-school season has recently brought an added twist to this dynamic. Now home office work and virtual learning are all taking place under one roof. Of course, the challenges this creates are not solely within the four walls of our homes – online students also make us more vulnerable to hackers.</p>
<p>Months ago, when the&#8230;</p>
</div>
<p><a href="https://www.securityinfowatch.com/cybersecurity/article/21163528/how-to-get-an-a-in-cybersecurity-now-that-schools-are-back-in-session">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Supply Chain Cybersecurity: What You Need to Consider</title>
		<link>https://risk-academy.ru/supply-chain-cybersecurity-what-you-need-to-consider/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 24 Oct 2020 18:08:23 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[NIST Cybersecurity Framework]]></category>
		<category><![CDATA[National Initiative for Cybersecurity Education]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[Workforce]]></category>
		<category><![CDATA[United States Department of Defense]]></category>
		<category><![CDATA[Articles]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/supply-chain-cybersecurity-what-you-need-to-consider/</guid>

					<description><![CDATA[As companies and organizations evaluate their attack surface, they know to look at their own systems and infrastructure to defend against threats and manage vulnerabilities. However, what about their critical [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="layout-" data-layout-id="2" data-edit-folder-name="text" data-index="0">
<p>As companies and organizations evaluate their attack surface, they know to look at their own systems and infrastructure to defend against threats and manage vulnerabilities. However, what about their critical partners and the supply chain? With up to 80% of cyber-attacks now beginning in the supply chain, breaches at even the smallest vendors can have big consequences for enterprise level operations. The problem of supply chain cybersecurity has become so pressing that the United States Department of Defense is rolling out the Cybersecurity Maturity Model Certification (CMMC) as a means to help secure the defense industry. Prime contractors and subcontractors will have to achieve CMMC compliance to do business as part of a DoD contract. The Primes are also expected to take a greater responsibility to ensure that subcontractors are implementing the appropriate security practices and compliance with the DoD standard.</p>
<p>One problem in securing the supply chain is where the organizational responsibility lies. Many different departments of an enterprise work with the supply chain and other critical partners, but there’s no one person or team held accountable.</p>
<p>Corporate legal may&#8230;</p>
</div>
<p><a href="https://www.infosecurity-magazine.com/blogs/supply-chain-cybersecurity/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The importance of a cybersecurity framework &#124; 2020-10-01</title>
		<link>https://risk-academy.ru/the-importance-of-a-cybersecurity-framework-2020-10-01/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 05 Oct 2020 17:21:23 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Human Interest]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[NIST Cybersecurity Framework]]></category>
		<category><![CDATA[Uptane]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/the-importance-of-a-cybersecurity-framework-2020-10-01/</guid>

					<description><![CDATA[The importance of a cybersecurity framework &#124; 2020-10-01 &#124; Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By [&#8230;]]]></description>
										<content:encoded><![CDATA[<div> <!--<![endif]--><br />
 <head></p>
<link href="https://www.securitymagazine.com/articles/93509-the-importance-of-a-cybersecurity-framework" rel="canonical"/>
<p>  <meta name="csrf-param" content="authenticity_token"/><br />
<meta name="csrf-token" content="1Ll6LZCm+fW1OLk+5UdRcBoZDdfYqpKRRFVu+7jtBT7+hw/d2bZFENIJ1u2/YX+obeqYddIhE+8Zj94r1cprvw=="/><br />
  <meta name="viewport" content="width=device-width, initial-scale=1.0"/><br />
  <meta name="description" content="A framework allows for standardization of service delivery that improves efficiency and margin. Many organizations implement frameworks to establish a common language among themselves and clients. For example, frameworks allow you to align conversations with customers on what they want &#x201C;good&#x201D; to look like.&#xA0;Why is having a cybersecurity framework so important?&#xA0; When it comes to cybersecurity, a framework serves as a system of standards, guidelines, and best practices to manage risks that arise in a digital world. A cybersecurity framework prioritizes a flexible, repeatable and cost-effective approach to promote the protection and resilience of your business.&#xA0;It&#x2019;s important to realize that cybersecurity helps with the growth of your business. Using a framework to align controls like local, offline, and cloud backups will improve resilience from any attack or reliance on hardware. As an MSP, the extra work of building out a process will fall onto you, but will allow you to hold your clients accountable and vice versa.&#xA0;&#xA0;"/><br />
  <meta name="keywords" content="cyber security,NIST cyber security framework,risk management,framework"/></p>
<link rel="alternate" type="application/xml" title="Security Magazine RSS Feed" href="https://www.securitymagazine.com/rss/articles"/>
<p>  <meta property="og:title" content="The importance of a cybersecurity framework"/><br />
<meta property="og:description" content="A framework allows for standardization of service delivery that improves efficiency and margin. Many organizations implement frameworks to establish a common language among themselves and clients. For example, frameworks allow you to align conversations with customers on what they want &#x201C;good&#x201D; to look like.&#xA0;Why is having a cybersecurity framework so important?&#xA0; When it comes to cybersecurity, a framework serves as a system of standards, guidelines, and best practices to manage risks that arise in a digital world. A cybersecurity framework prioritizes a flexible, repeatable and cost-effective approach to promote the protection and resilience of your business.&#xA0;It&#x2019;s important to realize that cybersecurity helps with the growth of your business. Using a framework to align controls like local, offline, and cloud backups will improve resilience from any attack or reliance on hardware. As an MSP, the extra work of building out a process will fall onto you, but will allow you to hold your clients accountable and vice versa.&#xA0;&#xA0;"/><br />
<meta property="og:author" content="Jay Ryerse"/><br />
<meta property="og:url" content="https://www.securitymagazine.com/articles/93509-the-importance-of-a-cybersecurity-framework?v=preview"/><br />
<meta property="og:image" content="https://www.securitymagazine.com/ext/resources/SEC/2017/July/SEC0717-cyber-feat-slide1_900px.jpg?height=635&amp;t=1498492841&amp;width=1200"/><br />
<meta property="og:image:width" content="900"/><br />
<meta property="og:image:height" content="550"/><br />
<meta property="og:type" content="Article"/><br />
<meta name="twitter:title" content="The importance of a cybersecurity framework"/><br />
<meta name="twitter:description" content="A framework allows for standardization of service delivery that improves efficiency and margin. Many organizations implement frameworks to establish a common language among themselves and clients. For example, frameworks allow you to align conversations with customers on what they want &#x201C;good&#x201D; to look like.&#xA0;Why is having a cybersecurity framework so important?&#xA0; When it comes to cybersecurity, a framework serves as a system of standards, guidelines, and best practices to manage risks that arise in a digital world. A cybersecurity framework prioritizes a flexible, repeatable and cost-effective approach to promote the protection and resilience of your business.&#xA0;It&#x2019;s important to realize that cybersecurity helps with the growth of your business. Using a framework to align controls like local, offline, and cloud backups will improve resilience from any attack or reliance on hardware. As an MSP, the extra work of building out a process will fall onto you, but will allow you to hold your clients accountable and vice versa.&#xA0;&#xA0;"/><br />
<meta name="twitter:card" content="summary"/><br />
<meta name="twitter:image" content="https://www.securitymagazine.com/ext/resources/SEC/2017/July/SEC0717-cyber-feat-slide1_900px.jpg?1498492841"/></p>
<p> <meta name="msapplication-TileColor" content="#FFFFFF"/><br />
<meta name="msapplication-TileImage" content="/images/favicon/mstile-144.png"/>
<link rel="icon" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/favicons.ico" sizes="16x16 32x32 48x48 64x64"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-152.png" sizes="152x152"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-144.png" sizes="144x144"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-120.png" sizes="120x120"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-72.png" sizes="72x72"/>
<p><meta content="true" name="has-log-view"/><br />
  <title>The importance of a cybersecurity framework | 2020-10-01 | Security Magazine</title>
  <link rel="stylesheet" media="screen" href="https://www.securitymagazine.com/stylesheets/application.css"/>
   <link rel="stylesheet" media="print" href="https://www.securitymagazine.com/stylesheets/print.css"/>
 <link rel="dns-prefetch" href="https://fonts.googleapis.com"/>
 <link rel="preconnect" href="https://fonts.gstatic.com/" crossorigin=""/>
  <link href="https://fonts.googleapis.com/css?family=PT+Serif|Open+Sans:400,700|Open+Sans+Condensed:300" rel="stylesheet"/>
<link rel="stylesheet" media="screen" href="https://www.securitymagazine.com/ext/resources/securitymagazine.css"/>
<p><!-- dataLayer scripts, place in head before GTM snippet --></p>
<p><!-- End dataLayer --></p>
<p><!-- Google Tag Manager --></p>
<p><!-- End Google Tag Manager --></p>
<p> <!--[if lt IE 9]><![endif]--></p>
<p> </head><br />
 <body data-controller="articles" data-action="show" data-article-requires-registration="true" data-article-requires-subscription="false" data-prestitial-ad="false" data-poststitial-ad="false" data-dfp-prefix="/52040140/sec" data-ad-unit-prefix="null" data-is-microsite="0" id="wp_automatic_ReadabilityBody"></p>
<p><!-- Google Tag Manager (noscript) --><br />
<noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-KNK327G" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript><br />
<!-- End Google Tag Manager (noscript) --></p>
<section class="cookie-policy" id="cookie-policy">
<div class="cookie-policy__body">
<div class="mobileHide">
<span style="font-family:verdana,geneva,sans-serif;"><span style="font-size:12px;"><strong><span style="color:#696969;">This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated <span style="color:#696969;">privacy and cookie policy to learn more. </span></span></strong></span></span></div>
<div class="mobileShow">
<details>&#13;</p>
<summary>This Website Uses Cookies<br />By closing this message or continuing to use our site, you agree to our cookie policy. <u>Learn More</u></summary>
<p>&#13;<br />
<span style="font-family:verdana,geneva,sans-serif;"><span style="font-size:12px;"><strong><span style="color:#696969;">This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated <span style="color:#696969;">privacy and cookie policy to learn more. </span></span></strong></span></span></details>
</div>
</div>
<p><span class="cookie-policy__close" id="cookie-policy-close"/></section>
<p>   <!-- google structured data --></p>
<p> <iframe width="0" height="0" name="Trade Desk Tracking - IP1713744_Security Magazine RT_Core" frameborder="0" scrolling="no" src="https://insight.adsrvr.org/tags/h83y0ff/j7ic26x/iframe"></iframe>&#13;<br />
&#13;</p>
<p>  &#8230;</p>
<p><a href="https://www.securitymagazine.com/articles/93509-the-importance-of-a-cybersecurity-framework">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Get to Know the Standards Advancing Cybersecurity &#124; 2020-09-11</title>
		<link>https://risk-academy.ru/get-to-know-the-standards-advancing-cybersecurity-2020-09-11/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 11 Sep 2020 05:39:39 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Human Interest]]></category>
		<category><![CDATA[NIST Cybersecurity Framework]]></category>
		<category><![CDATA[Electric power]]></category>
		<category><![CDATA[Electric grid security]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/get-to-know-the-standards-advancing-cybersecurity-2020-09-11/</guid>

					<description><![CDATA[Get to Know the Standards Advancing Cybersecurity &#124; 2020-09-11 &#124; Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. [&#8230;]]]></description>
										<content:encoded><![CDATA[<div> <!--<![endif]--><br />
 <head></p>
<link href="https://www.securitymagazine.com/articles/93287-get-to-know-the-standards-advancing-cybersecurity" rel="canonical"/>
<p>  <meta name="csrf-param" content="authenticity_token"/><br />
<meta name="csrf-token" content="KJPY4ptLFGkVbwfKxmBCu+V6qxTiqlQJIVzPFKG6/nyl/OsdujdsUMWosRB4Q8NdfFuEBjFW0dR/1PYRY0L91g=="/><br />
  <meta name="viewport" content="width=device-width, initial-scale=1.0"/><br />
  <meta name="description" content="There are currently a multitude of different standards and regulations to address the urgent need to secure our connected world, yet it&#x2019;s time to create a unified global conformance assessment. A world with amped up connectivity and electrical demand needs confidence that connected systems are constructed with trusted products. The exponential growth of the Industrial Internet of Things (IIoT) is creating a crucial need for robust cybersecurity practices and well-defined standards that provide customers with confidence that their connected devices will operate securely throughout their . . ."/><br />
  <meta name="keywords" content="security"/></p>
<link rel="alternate" type="application/rss+xml" title="Security Magazine RSS Feed" href="https://www.securitymagazine.com/rss/articles"/>
<p>  <meta property="og:title" content="Get to Know the Standards Advancing Cybersecurity"/><br />
<meta property="og:description" content="There are currently a multitude of different standards and regulations to address the urgent need to secure our connected world, yet it's time to create a unified global conformance assessment."/><br />
<meta property="og:author" content="Max Wandera"/><br />
<meta property="og:url" content="https://www.securitymagazine.com/articles/93287-get-to-know-the-standards-advancing-cybersecurity?v=preview"/><br />
<meta property="og:image" content="https://www.securitymagazine.com/ext/resources/Issues/2020/September/Advancing-Cybersecurity/SEC0920-Standards-Feat-slide1_900px.jpg?height=635&amp;t=1599579866&amp;width=1200"/><br />
<meta property="og:image:width" content="900"/><br />
<meta property="og:image:height" content="550"/><br />
<meta property="og:type" content="Article"/><br />
<meta name="twitter:title" content="Get to Know the Standards Advancing Cybersecurity"/><br />
<meta name="twitter:description" content="There are currently a multitude of different standards and regulations to address the urgent need to secure our connected world, yet it's time to create a unified global conformance assessment."/><br />
<meta name="twitter:card" content="summary"/><br />
<meta name="twitter:image" content="https://www.securitymagazine.com/ext/resources/Issues/2020/September/Advancing-Cybersecurity/SEC0920-Standards-Feat-slide1_900px.jpg?1599579866"/></p>
<p> <meta name="msapplication-TileColor" content="#FFFFFF"/><br />
<meta name="msapplication-TileImage" content="/images/favicon/mstile-144.png"/>
<link rel="icon" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/favicons.ico" sizes="16x16 32x32 48x48 64x64"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-152.png" sizes="152x152"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-144.png" sizes="144x144"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-120.png" sizes="120x120"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-72.png" sizes="72x72"/>
<p><meta content="true" name="has-log-view"/><br />
  <title>Get to Know the Standards Advancing Cybersecurity | 2020-09-11 | Security Magazine</title>
  <link rel="stylesheet" media="screen" href="https://www.securitymagazine.com/stylesheets/application.css"/>
   <link rel="stylesheet" media="print" href="https://www.securitymagazine.com/stylesheets/print.css"/>
 <link rel="dns-prefetch" href="https://fonts.googleapis.com"/>
 <link rel="preconnect" href="https://fonts.gstatic.com/" crossorigin=""/>
  <link href="https://fonts.googleapis.com/css?family=PT+Serif|Open+Sans:400,700|Open+Sans+Condensed:300" rel="stylesheet"/>
<link rel="stylesheet" media="screen" href="https://www.securitymagazine.com/ext/resources/securitymagazine.css"/>
<p><!-- dataLayer scripts, place in head before GTM snippet --></p>
<p><!-- End dataLayer --></p>
<p><!-- Google Tag Manager --></p>
<p><!-- End Google Tag Manager --></p>
<p> <!--[if lt IE 9]><![endif]--></p>
<p> </head><br />
 <body data-controller="articles" data-action="show" data-article-requires-registration="true" data-article-requires-subscription="false" data-prestitial-ad="false" data-poststitial-ad="false" data-dfp-prefix="/52040140/sec" data-ad-unit-prefix="null" data-is-microsite="0" id="wp_automatic_ReadabilityBody"></p>
<p><!-- Google Tag Manager (noscript) --><br />
<noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-KNK327G" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript><br />
<!-- End Google Tag Manager (noscript) --></p>
<section class="cookie-policy" id="cookie-policy">
<div class="cookie-policy__body">
<div class="mobileHide">
<span style="font-family:verdana,geneva,sans-serif;"><span style="font-size:12px;"><strong><span style="color:#696969;">This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated <span style="color:#696969;">privacy and cookie policy to learn more. </span></span></strong></span></span></div>
<div class="mobileShow">
<details>&#13;</p>
<summary>This Website Uses Cookies<br />By closing this message or continuing to use our site, you agree to our cookie policy. <u>Learn More</u></summary>
<p>&#13;<br />
<span style="font-family:verdana,geneva,sans-serif;"><span style="font-size:12px;"><strong><span style="color:#696969;">This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated <span style="color:#696969;">privacy and cookie policy to learn more. </span></span></strong></span></span></details>
</div>
</div>
<p><span class="cookie-policy__close" id="cookie-policy-close"/></section>
<p>   <!-- google structured data --></p>
<p> <iframe loading="lazy" width="0" height="0" name="Trade Desk Tracking - IP1713744_Security Magazine RT_Core" frameborder="0" scrolling="no" src="https://insight.adsrvr.org/tags/h83y0ff/j7ic26x/iframe"></iframe>&#13;<br />
&#13;</p>
<p> &#8230;</body></div>
<p><a href="https://www.securitymagazine.com/articles/93287-get-to-know-the-standards-advancing-cybersecurity">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Harmonize FinServ Cybersecurity Standards with the Financial Sector Cybersecurity Profile</title>
		<link>https://risk-academy.ru/harmonize-finserv-cybersecurity-standards-with-the-financial-sector-cybersecurity-profile/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 23 Aug 2020 14:57:42 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Business Finance]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[National Cybersecurity Center of Excellence]]></category>
		<category><![CDATA[NIST Cybersecurity Framework]]></category>
		<category><![CDATA[Financial Services Sector Coordinating Council]]></category>
		<category><![CDATA[Cybersecurity standards]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/harmonize-finserv-cybersecurity-standards-with-the-financial-sector-cybersecurity-profile/</guid>

					<description><![CDATA[The Financial Services Sector (FSSCC) Cyber Security Profile is one of the critical pieces of information used for proving compliance across a host of standards necessary of financial institutions of [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="hs_cos_wrapper_post_body">
<p>The Financial Services Sector (FSSCC) Cyber Security Profile is one of the critical pieces of information used for proving compliance across a host of standards necessary of financial institutions of all types, financial services companies, financial firms, and their third-party providers. In 2018, a survey showed that CISOs in the financial services sector spent 40% of their time, and their teams’ time reconciling various cybersecurity and regulatory frameworks instead of focusing on cybersecurity needs. This time spent was because each regulation has its own standards for institutions to follow for their cybersecurity initiatives resulting in a segmented approach to compliance with various regulatory standards. As such, the Financial Services Sector Coordinating Council developed the Financial Services Sector Cybersecurity Profile to unify CISOs and practitioners’ efforts to maintain and improve their compliance activity.</p>
<p>The FSSCC Cybersecurity Profile uses a cybersecurity risk management-based approach, very similar to the NIST Cybersecurity Framework, from which it draws inspiration. One thing that separates the FSSCC from the NIST CSF is that the FSSCC is broken up&#8230;</p>
</div>
<p><a href="https://securityboulevard.com/2020/08/harmonize-finserv-cybersecurity-standards-with-the-financial-sector-cybersecurity-profile/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>4 Evolving Technology Areas Of Smart Cybersecurity</title>
		<link>https://risk-academy.ru/4-evolving-technology-areas-of-smart-cybersecurity/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 06 Jul 2020 02:23:56 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Abstract technology]]></category>
		<category><![CDATA[Bill Conner]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[NIST Cybersecurity Framework]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[4 Evolving Technology]]></category>
		<category><![CDATA[Adaptive Networks]]></category>
		<category><![CDATA[Getty]]></category>
		<category><![CDATA[cognitive technologies]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/4-evolving-technology-areas-of-smart-cybersecurity/</guid>

					<description><![CDATA[Motion blur. Abstract technology and cyber space environment 3D render Getty The surge in digital connectivity and more sophisticated cyber-threats has promulgated the need for smart cybersecurity.  Smart Cybersecurity is [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<figure class="embed-base image-embed embed-4" role="presentation">
<div>
 <img decoding="async" title="Technology Internet" src="https://specials-images.forbesimg.com/imageserve/944784934/960x0.jpg?fit=scale" alt="Data transfer and future technology, cyber security concept background, abstract hi speed digital internet." data-height="2160" data-width="3840"/>
 </div><figcaption>
 <fbs-accordion> </p>
<p class="color-body light-text">Motion blur. Abstract technology and cyber space environment 3D render</p>
<p> </fbs-accordion><br />
 <small>Getty</small><br />
 </figcaption></figure>
<p>The surge in digital connectivity and more sophisticated cyber-threats has promulgated the need for smart cybersecurity.  Smart Cybersecurity is a logical reaction to try to manage risk by lessening security gaps often posed by reliance on manual processes that are impacted by a continual cybersecurity skills shortage and the administrative burdens of data security management.</p>
<p>Despite the challenges, there is promise for reducing dependence on humans and bolstering cybersecurity capabilities. A myriad of evolving cognitive technologies can help us enhance cybersecurity and navigate the increasingly malicious and disruptive cyber threat landscape. They include:</p>
<p>•     <strong>Artificial Intelligence </strong></p>
<p>•     <strong>Machine Learning</strong></p>
<p><fbs-ad position="inread" progressive="" ad-id="article-0-inread" aria-hidden="true" role="presentation"/> </p>
<p>•     <strong>Automated and Adaptive Networks:</strong></p>
<p>•     <strong>Super-Computing </strong></p>
<p><strong>Artificial intelligence (AI): </strong>  Gartner describes AI as a &#8220;technology that appears to emulate human performance typically by learning, coming to its own conclusions, appearing to understand complex content, engaging in natural dialogs with people, enhancing&#8230;</p>
</div>
<p><a href="https://www.forbes.com/sites/chuckbrooks/2020/07/05/4-evolving-technology-areas-of-smart-cybersecurity/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity risk abounds. HDR introduces how to fix mission critical problems &#8230;</title>
		<link>https://risk-academy.ru/cybersecurity-risk-abounds-hdr-introduces-how-to-fix-mission-critical-problems/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 19 May 2020 15:13:11 +0000</pubDate>
				<category><![CDATA[Официальная группа ИСАР]]></category>
		<category><![CDATA[NIST Cybersecurity Framework]]></category>
		<category><![CDATA[Health Medical Pharma]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Information governance]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Information Age]]></category>
		<category><![CDATA[Douglas W. Hubbard]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cybersecurity-risk-abounds-hdr-introduces-how-to-fix-mission-critical-problems/</guid>

					<description><![CDATA[Cybersecurity risk abounds. HDR introduces how to fix mission critical problems of traditional cybersecurity methods with 21st century quantitative techniques and produce measurably improved outcomes. https://hubbardresearch.com/shop/webinar-measure-anything-cybersecurity-risk/ Присоеденяйтесь к официальной группе [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><p>Cybersecurity risk abounds. HDR introduces how to fix mission critical problems of traditional cybersecurity methods with 21st century quantitative techniques and produce measurably improved outcomes. <a href="https://lm.facebook.com/l.php?u=https%3A%2F%2Fhubbardresearch.com%2Fshop%2Fwebinar-measure-anything-cybersecurity-risk%2F&amp;h=AT1p84v117l7yzHYFuxeRMR_nsBEwl_TILB8yUF012zbd2GDFBCoBf8w8daRWL_LyyEfDyW7iO_Fi4Ql3BeuhUpdJaNa9mK86qcWxj85s3w3Bkt7REhErSjnIZGsowVHeKFcZ3KUYqDkghIy9HuDVG71UrANUWvtQfSjX5ZcWcidkE_m1KklTLv3kJBVeSQhhBk7L5YFeQ7IMHRQt1dwo7wfrOueubLZt9FHfcj9sI4PNHfNRwEFFKWD37gTNiPrJP1fEK1q7tAk2WEF9Pj7D0qhvZuQbXy6koRXe3hvT5VVLbpvxI2kH8fFBAfRvcX1ZjKr59Od9sOlMYgFSZHnykChp8Y_2jp7viQTpE-8K0SvUYUP49J8P7V_rqaGTc6gUGwTC3ik83IqG0uAadSU2cYlNqP8at-9yyi6c9BkPVC1fHYBiY47sI3RIo40nj_Vmx5cSXMizmXc31UNnWO9U1gD35UX0xIxnpSmetcgsgXHgnbJt56d1KZYECciyot-C6aye94Y0pQF9UVL_u4fpCzaeGiwMyoR4HBYzgVeqFzCmwOjyfCEkv0H5B3cPzh7Cb7NSJk4BN4bvWkkg0k7RR9F_NbFMfuS9Mx-mDC9Ft1lMkxp9_rQWyVqxanDP23a2Xd4kLLAFq4Zky3d_IPESb1epWI2GP-GHNqFOcpCHpqlOUsQkFjJ1oZJf4IsQkSH1gCmmp9v4VJs6YHBky2lSt0pKRXvyxgz7nZ8tYYeTw8DRAJZ9I8GkKDGMZqah8tCaCLI-UbHvpwsJk8bTtEkK9FLkTfculBec0tON0KdWeOBzF6QNc4zmSnr3EtmG9z9-fRUiUkmxwNkQe-UB6B1mjQJ-xV_a3B-yJubZc4wzixdn8iPV7t84ESm9gpukazk5ct8zEKrFIh4WSXaIECu9pGnTKvPe2P0gen2itXbfyUDy6eBVyv9zfcrsme8PpVySkJBRcLf5nVeT0o4y4lvPmL91RLLP-18zGNKDZ-de_axyu_VD2cgOAsjrkZtKlbVC_ESWaGAYUuJZHDN1tQ_7z4UgoVE-Q0IhxcWjogq5Mz-fwZzGDWtJ7IU-PTLuP1iEZ0_V-k286El0a4EgUg1jb4NMfwVvf3WZS26cXiMYQxTnN4TEPBFXI7E1V9X1TQMXZ8D6zO5st8g3E2gBp4CzXEHw9rdCi8w-6qUGbi4_v1H56ZwQxr9w3xfoARREdEV1tCLg4Rx_h-T6ss8fSUFGtmlqvXW14og769pRw5hHlpnUjh1l7WawA2EKJGnJ5zKp1YMDAAIdWACnr4ZzZzKJh4PgiBKHXF6ixl5jOsb1ituevXKq0KIrvfL0r3fMzVoRbObdyLJrhqzmfJtuukEeRIkyxK45lPPFFKiUwevCBDadSNvxM8dDhTFlK_EWUHkJeZmujndoFgfaD55LP_9j8xthkZ69iktwYOHnohviD2LsHmUb8PaVt_QDVLmRaYIoGO7BtI59b36DIu2jjWpCVGrd_iBWmn0EiyWiAs9Byhum9DVuFTBGI0hd1SC-YDG5E1KEHmYnEGiAs4YhPkH3Z6ZlF88IcMlxvWRfcgy" target="_blank" rel="noopener noreferrer"><span>https://</span><wbr></wbr><span class="word_break"></span><span>hubbardresearch.</span><wbr></wbr><span class="word_break"></span><span>com/shop/</span><wbr></wbr><span class="word_break"></span><span>webinar-measure-</span><wbr></wbr><span class="word_break"></span><span>anything-cybers</span><wbr></wbr><span class="word_break"></span>ecurity-risk/</a></p>
</p>
<p><a href="https://scontent-lga3-1.xx.fbcdn.net/v/t1.0-9/98344662_2873050622730239_4982961038946205696_o.jpg?_nc_cat=101&#038;_nc_sid=8024bb&#038;_nc_ohc=iMG4xAlT3ikAX8OfySQ&#038;_nc_ht=scontent-lga3-1.xx&#038;oh=b8e7d71b1a4b207fec592c48a843b590&#038;oe=5EE8821F"><img decoding="async" alt="Health Medical Pharma" class="wp_automatic_fb_img" title="Health Medical Pharma" src="https://scontent-lga3-1.xx.fbcdn.net/v/t1.0-9/98344662_2873050622730239_4982961038946205696_o.jpg?_nc_cat=101&#038;_nc_sid=8024bb&#038;_nc_ohc=iMG4xAlT3ikAX8OfySQ&#038;_nc_ht=scontent-lga3-1.xx&#038;oh=b8e7d71b1a4b207fec592c48a843b590&#038;oe=5EE8821F" /></a></p>
<p><a href="https://www.facebook.com/groups/412510262457247/permalink/1102126176828982">Присоеденяйтесь к официальной группе ИСАР в Facebook</a> </p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
