<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Operational Technology &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/operational-technology/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Mon, 07 Dec 2020 11:22:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Operational Technology &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Key OT Cybersecurity Challenges: Availability, Integrity and Confidentiality</title>
		<link>https://risk-academy.ru/key-ot-cybersecurity-challenges-availability-integrity-and-confidentiality/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 07 Dec 2020 11:22:06 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Operational Technology]]></category>
		<category><![CDATA[Berliner Wasserbetriebe]]></category>
		<category><![CDATA[Berlin]]></category>
		<category><![CDATA[waste water management]]></category>
		<category><![CDATA[Computer security]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/key-ot-cybersecurity-challenges-availability-integrity-and-confidentiality/</guid>

					<description><![CDATA[Organisations are still underestimating the risks created by insufficiently secured operational technology (OT). One current example comes from Germany. According to a report by heise.de, external security testers consider it [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="">
<p>Organisations are still underestimating the risks created by insufficiently secured operational technology (OT).</p>
<p>One current example comes from Germany. According to a report by heise.de, external security testers consider it “likely” that a successful serious cyberattack against the publicly owned water company Berliner Wasserbetriebe could lead to a complete failure of the German capital’s waste water management.</p>
<p>The good news, at least for Germany, is that a combination of engineering standards and legal requirements often prevents many worst-case scenarios from happening. One such regulation requires that utility companies must be able to control their grids manually, if necessary. This is not the case in all European countries. If the legally required basic IT protections are in place, and two-factor authentication and other best practices are used, many potentially damaging incidents can be prevented or at least contained. Germany has a number of guidelines and standards that aim to minimise cybersecurity risks, including a law on basic IT security, ISO 27001, IEC62443 standards and a compendium published by the BSI, Germany’s equivalent to the UK’s National&#8230;</p>
</div>
<p><a href="https://www.tripwire.com/state-of-security/security-data-protection/key-ot-cybersecurity-challenges-availability-integrity-confidentiality/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Claroty Adds Fully Integrated Remote Incident &#8230;</title>
		<link>https://risk-academy.ru/claroty-adds-fully-integrated-remote-incident/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 31 Oct 2020 05:47:48 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[NEW YORK]]></category>
		<category><![CDATA[security solution]]></category>
		<category><![CDATA[Operational Technology]]></category>
		<category><![CDATA[remote incident management]]></category>
		<category><![CDATA[Claroty Adds Fully]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/claroty-adds-fully-integrated-remote-incident/</guid>

					<description><![CDATA[Enhanced Secure Remote Access and Continuous Threat Detection enable seamless detection, investigation, and response to OT security incidents across the broadest attack surface area from any location NEW YORK – [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="article-main">
<header/><span class="strong black" style="font-size: 1.083333em;">Enhanced Secure Remote Access and Continuous Threat Detection enable seamless detection, investigation, and response to OT security incidents across the broadest attack surface area from any location</span></p>
<p class="" style="margin-top: 0;">NEW YORK – October 28, 2020 – Claroty, the global leader in operational technology (OT) security, today announced new enhancements to The Claroty Platform, making it the industry’s first OT security solution to offer remote incident management as a fully integrated capability that spans the entire incident lifecycle. The platform now enables cybersecurity teams to detect, investigate, and respond to security incidents on OT networks across the broadest attack surface area securely and seamlessly from any location.</p>
<p>IT and OT networks were already becoming more interconnected due to digital transformation, and the COVID-19-induced shift to remote work has accelerated their convergence even more. These combined forces have created an acutely expanded attack surface and volume of alerts for cybersecurity teams to manage. According to Gartner, “For those organizations whose cybersecurity operations capabilities are tuned to monitor events from their standard operating&#8230;</p>
</div>
<p><a href="https://www.darkreading.com/attacks-breaches/claroty-adds-fully-integrated-remote-incident-management-to-industry-leading-ot-security-platform/d/d-id/1339344">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Industrial cyber</title>
		<link>https://risk-academy.ru/industrial-cyber/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 21 Aug 2020 12:43:59 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[IoT technology]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Actuarial science]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[VP]]></category>
		<category><![CDATA[Tenable]]></category>
		<category><![CDATA[Marty Edwards]]></category>
		<category><![CDATA[infrastructure services]]></category>
		<category><![CDATA[Operational Technology]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/industrial-cyber/</guid>

					<description><![CDATA[By nature, organisations are risk averse. Investors and stakeholders like to see regular business cycles, cash flow and monthly recurring revenue. An organisation taking on risk usually leads to scrutiny [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<span class="feature-image"><img fetchpriority="high" decoding="async" title="risk management" data-lazyloaded="1" data-placeholder-resp="343x189" width="343" height="189" src="https://www.professionalsecurity.co.uk/wp-content/uploads/2020/08/Network18comp2.jpg" class="attachment-full size-full wp-post-image" alt="risk management" srcset="https://www.professionalsecurity.co.uk/wp-content/uploads/2020/08/Network18comp2.jpg 343w, https://www.professionalsecurity.co.uk/wp-content/uploads/2020/08/Network18comp2-300x165.jpg 300w" data-sizes="(max-width: 343px) 100vw, 343px"/><noscript><img decoding="async" title="Actuarial science" width="343" height="189" src="https://www.professionalsecurity.co.uk/wp-content/uploads/2020/08/Network18comp2.jpg" class="attachment-full size-full wp-post-image" alt="Actuarial science" srcset="https://www.professionalsecurity.co.uk/wp-content/uploads/2020/08/Network18comp2.jpg 343w, https://www.professionalsecurity.co.uk/wp-content/uploads/2020/08/Network18comp2-300x165.jpg 300w" sizes="(max-width: 343px) 100vw, 343px"/></noscript></span></p>
<p>By nature, organisations are risk averse. Investors and stakeholders like to see regular business cycles, cash flow and monthly recurring revenue. An organisation taking on risk usually leads to scrutiny with a cost-benefit analysis for the business as, although some forms of risk may be manageable, others are not. It is down to organisational leaders to determine what is deemed an acceptable level of risk and eliminate and manage it as necessary, writes Marty Edwards, VP of Operational Technology, at the cyber firm Tenable.</p>
<p>For those organisations that provide critical infrastructure services, efficient risk management is vital in ensuring the company’s operational technology (OT) and the fabric of our national security is always thoroughly protected. Some countries have broken down which vertical industries they consider to be critical within their regions. For example, the CPNI in the UK identifies 13 distinct national infrastructure sectors that are of strategic importance.</p>
<p>In recent years, as critical infrastructure organisations have modernised their operations with a sharp rise in automation and IoT technology, the threat landscape has also heightened. In a world where&#8230;</p>
</div>
<p><a href="https://www.professionalsecurity.co.uk/news/interviews/critical-infrastructure-and-cyber-risk/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
