<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security convergence &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/security-convergence/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Tue, 20 Oct 2020 18:45:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Security convergence &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Risk-Based Security for Your Organization</title>
		<link>https://risk-academy.ru/risk-based-security-for-your-organization/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 20 Oct 2020 18:45:39 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Society for Risk Analysis]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[risk analysis]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Financial risk]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[Security convergence]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/risk-based-security-for-your-organization/</guid>

					<description><![CDATA[&#13; To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below. &#13; Sign Up Get up-to-the-minute news and opinions, plus access to a wide [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>&#13;</p>
<h4>To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.</h4>
<p>&#13;
          </p>
<div id="cphContent_ctl00_pnlSignUpForm" onkeypress="javascript:return WebForm_FireDefaultButton(event, 'cphContent_ctl00_btnSignUp')">
<div class="form-intro">
<h3>Sign Up</h3>
<p>Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.</p>
</p></div>
<div class="control-group">
<p>&#13;<br />
      <label for="cphContent_ctl00_txtCompanyName" id="cphContent_ctl00_lblCompanyName" class="control-label">Company Name</label>&#13;<br />
      <input name="ctl00$cphContent$ctl00$txtCompanyName" type="text" id="cphContent_ctl00_txtCompanyName" class="textbox" placeholder="Your company or institution"/>&#13;
    </p>
<p>&#13;<br />
      <label for="cphContent_ctl00_ddlCountry" id="cphContent_ctl00_lblCountry" class="control-label">Country</label>&#13;<br />
      <select name="ctl00$cphContent$ctl00$ddlCountry" id="cphContent_ctl00_ddlCountry">&#13;<option value="">Select country</option>&#13;<option value="AFG">Afghanistan </option>&#13;<option value="ALA">Aland Islands </option>&#13;<option value="ALB">Albania </option>&#13;<option value="DZA">Algeria </option>&#13;<option value="ASM">American Samoa </option>&#13;<option value="AND">Andorra </option>&#13;<option value="AGO">Angola </option>&#13;<option value="AIA">Anguilla </option>&#13;<option value="ATA">Antarctica </option>&#13;<option value="ATG">Antigua and Barbuda </option>&#13;<option value="ARG">Argentina </option>&#13;<option value="ARM">Armenia </option>&#13;<option value="ABW">Aruba </option>&#13;<option value="AUS">Australia </option>&#13;<option value="AUT">Austria </option>&#13;<option value="AZE">Azerbaijan </option>&#13;<option value="BHS">Bahamas </option>&#13;<option value="BHR">Bahrain </option>&#13;<option value="BGD">Bangladesh </option>&#13;<option value="BRB">Barbados </option>&#13;<option value="BLR">Belarus </option>&#13;<option value="BEL">Belgium </option>&#13;<option value="BLZ">Belize </option>&#13;<option value="BEN">Benin </option>&#13;<option value="BMU">Bermuda </option>&#13;<option value="BTN">Bhutan </option>&#13;<option value="BOL">Bolivia </option>&#13;<option value="BIH">Bosnia and Herzegovina </option>&#13;<option value="BWA">Botswana </option>&#13;<option value="BVT">Bouvet Island </option>&#13;<option value="BRA">Brazil </option>&#13;<option value="IOT">British Indian Ocean Territory </option>&#13;<option value="BRN">Brunei Darussalam </option>&#13;<option value="BGR">Bulgaria </option>&#13;<option value="BFA">Burkina Faso </option>&#13;<option value="BDI">Burundi </option>&#13;<option value="CIV">C`ote d&#8217;Ivoire </option>&#13;<option value="KHM">Cambodia </option>&#13;<option value="CMR">Cameroon </option>&#13;<option value="CAN">Canada&#8230;</select></p>
</div>
</div>
<p><a href="https://www.infosecurity-magazine.com/webinars/riskbased-security/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Deloitte recommends 5 step security approach to protect the Indian enterprise</title>
		<link>https://risk-academy.ru/deloitte-recommends-5-step-security-approach-to-protect-the-indian-enterprise/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 04 Jul 2020 05:14:41 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[internet-accessible remote access services]]></category>
		<category><![CDATA[deloitte]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Service companies]]></category>
		<category><![CDATA[Companies]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[Security convergence]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/deloitte-recommends-5-step-security-approach-to-protect-the-indian-enterprise/</guid>

					<description><![CDATA[Read Article The unprecedented times of COVID-19 have brought the need to ‘Go Digital’ in all aspects of life including business continuity through virtualized infrastructure at one end and work [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<div class="responsivevoice-button" id="listenButton1" style="width:100%; border-bottom-style: groove; overflow: auto; margin-top: -10px; margin-bottom: 20px; -moz-user-select: none; -webkit-user-select: none; -ms-user-select: none; -o-user-select: none; user-select: none; "> <span id="PlayPause" style="float: left; width: 20%; vertical-align: middle; font-weight: 600;"> <i class="fa fa-play-circle-o fa-lg" aria-hidden="true"> </i> Read Article </span> <span id="soundTrackImg" style="float: left; width: 80%;"> <img decoding="async" title="deloitte" alt="deloitte" class="sound-track" style="margin: unset;" src="https://www.expresscomputer.in/wp-content/plugins/text-to-speech/includes/images/soundtrack-crn.png"/> </span></div>
<p>The unprecedented times of COVID-19 have brought the need to ‘Go Digital’ in all aspects of life including business continuity through virtualized infrastructure at one end and work from home being the new way of operations for India Inc..</p>
<p>Last week, Deloitte’s 9th Global Millennial Survey 2020 stated Cybersecurity to be a top concern amongst Indian millennials, which is a clear reflection of a number of Cyber-attacks that have been witnessed on MNCs operating in India in the past week alone.</p>
<p>The survey further states 86% of millennials and 83% of Gen Zs agreed prefer the option to work from home in the future as a way to relieve stress.</p>
<p>With Work from Home (WFH) becoming the ‘new normal’ amidst COVID-19 crisis and cyber attackers and virus lurking in the shadows, enterprises can adopt a five-step approach to reassess their exposure to Cyber challenges and secure their enterprises, as per a Deloitte perspective.</p>
<p><strong>#1 Implement multi-factor authentication:</strong> Organizations should enable multi-factor authentication (MFA) across all internet-accessible remote access services including: Web and cloud-based email, Collaboration platforms, Virtual private&#8230;</p>
</div>
<p><a href="https://www.expresscomputer.in/news/deloitte-recommends-5-step-security-approach-to-protect-the-indian-enterprise/59724/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Need for Cybersecurity and Physical Security Convergence &#124; 2017-06-03</title>
		<link>https://risk-academy.ru/the-need-for-cybersecurity-and-physical-security-convergence-2017-06-03/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 04 Jun 2020 02:31:56 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Cyber-Governance]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Prevention]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[National Initiative for Cybersecurity Education]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[Security convergence]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/the-need-for-cybersecurity-and-physical-security-convergence-2017-06-03/</guid>

					<description><![CDATA[The Need for Cybersecurity and Physical Security Convergence &#124; 2017-06-03 &#124; Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best [&#8230;]]]></description>
										<content:encoded><![CDATA[<div> <!--<![endif]--><br />
 <head></p>
<link href="https://www.securitymagazine.com/articles/92518-the-need-for-cybersecurity-and-physical-security-convergence" rel="canonical"/>
<p>  <meta name="csrf-param" content="authenticity_token"/><br />
<meta name="csrf-token" content="xZdA4jn9JFFLhx/KO4xkcL1xKqju2BZnDYDmyPBcWkIXNzkA78Q6sF1OYUEFpwbHXx/lqPTUiI9YT55ycNePLA=="/><br />
  <meta name="viewport" content="width=device-width, initial-scale=1.0"/><br />
  <meta name="description" content="Security leaders have been discussing the convergence of cybersecurity and physical security for years. But what does it mean? According to &#x201C;Physical and IT Security Convergence: The Basics,&#x201D; convergence is a formal cooperation between previously disjointed security functions &#x2013; cooperation is a concerted and results-oriented effort to work together. Despite the fact that physical and cybersecurity are intrinsically connected, many organizations still treat these security functions as separate systems. Until recently this was justified because the technology to integrate physical and cybersecurity was not yet . . ."/><br />
  <meta name="keywords" content="convergence,cyber security,data center,physical security,risk management"/></p>
<link rel="alternate" type="application/rss+xml" title="Security Magazine RSS Feed" href="https://www.securitymagazine.com/rss/articles"/>
<p>  <meta property="og:title" content="The Need for Cybersecurity and Physical Security Convergence"/><br />
<meta property="og:description" content="Security leaders have been discussing the convergence of cybersecurity and physical security for years. But what does it mean?"/><br />
<meta property="og:author" content="Maria Henriquez"/><br />
<meta property="og:url" content="https://www.securitymagazine.com/articles/92518-the-need-for-cybersecurity-and-physical-security-convergence"/><br />
<meta property="og:image" content="https://www.securitymagazine.com/ext/resources/images/Infocenters/Brivo/2020/skyline.jpeg?height=635&amp;t=1591228882&amp;width=1200"/><br />
<meta property="og:image:width" content="900"/><br />
<meta property="og:image:height" content="550"/><br />
<meta property="og:type" content="Article"/><br />
<meta name="twitter:title" content="The Need for Cybersecurity and Physical Security Convergence"/><br />
<meta name="twitter:description" content="Security leaders have been discussing the convergence of cybersecurity and physical security for years. But what does it mean?"/><br />
<meta name="twitter:card" content="summary"/><br />
<meta name="twitter:image" content="https://www.securitymagazine.com/ext/resources/images/Infocenters/Brivo/2020/skyline.jpeg?1591228882"/></p>
<p> <meta name="msapplication-TileColor" content="#FFFFFF"/><br />
<meta name="msapplication-TileImage" content="/images/favicon/mstile-144.png"/>
<link rel="icon" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/favicons.ico" sizes="16x16 32x32 48x48 64x64"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-152.png" sizes="152x152"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-144.png" sizes="144x144"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-120.png" sizes="120x120"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-72.png" sizes="72x72"/>
<p><meta content="true" name="has-log-view"/><br />
  <title>The Need for Cybersecurity and Physical Security Convergence | 2017-06-03 | Security Magazine</title>
  <link rel="stylesheet" media="screen" href="https://www.securitymagazine.com/stylesheets/application.css"/>
   <link rel="stylesheet" media="print" href="https://www.securitymagazine.com/stylesheets/print.css"/>
 <link rel="dns-prefetch" href="https://fonts.googleapis.com"/>
 <link rel="preconnect" href="https://fonts.gstatic.com/" crossorigin=""/>
  <link href="https://fonts.googleapis.com/css?family=PT+Serif|Open+Sans:400,700|Open+Sans+Condensed:300" rel="stylesheet"/>
<link rel="stylesheet" media="screen" href="https://www.securitymagazine.com/ext/resources/securitymagazine.css"/>
<p><!-- dataLayer scripts, place in head before GTM snippet --></p>
<p><!-- End dataLayer --></p>
<p><!-- Google Tag Manager --></p>
<p><!-- End Google Tag Manager --></p>
<p>   <!--[if lt IE 9]><![endif]--></p>
<p> </head><br />
 <body data-controller="articles" data-action="show" data-article-requires-registration="true" data-article-requires-subscription="false" data-prestitial-ad="false" data-poststitial-ad="false" data-dfp-prefix="/52040140/sec" data-ad-unit-prefix="SPS" data-is-microsite="1" id="wp_automatic_ReadabilityBody"></p>
<p><!-- Google Tag Manager (noscript) --><br />
<noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-KNK327G" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript><br />
<!-- End Google Tag Manager (noscript) --></p>
<section class="cookie-policy" id="cookie-policy" role="alert">
<div class="cookie-policy__body">
<div class="mobileHide">
<span style="font-family:verdana,geneva,sans-serif;"><span style="font-size:12px;"><strong><span style="color:#696969;">This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated <span style="color:#696969;">privacy and cookie policy to learn more. </span></span></strong></span></span></div>
<div class="mobileShow">
<details>&#13;</p>
<summary>This Website Uses Cookies<br />By closing this message or continuing to use our site, you agree to our cookie policy. <u>Learn More</u></summary>
<p>&#13;<br />
<span style="font-family:verdana,geneva,sans-serif;"><span style="font-size:12px;"><strong><span style="color:#696969;">This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated <span style="color:#696969;">privacy and cookie policy to learn more. </span></span></strong></span></span></details>
</div>
</div>
<p><span class="cookie-policy__close" id="cookie-policy-close" role="button" tabindex="0"/></section>
<p>   <!-- google structured data --></p>
<p> <iframe width="0" height="0" name="Trade Desk Tracking - IP1713744_Security Magazine RT_Core" frameborder="0" scrolling="no"...</body></div>
<p><a href="https://www.securitymagazine.com/articles/92518-the-need-for-cybersecurity-and-physical-security-convergence">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
