<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security specialist &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/security-specialist/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sat, 05 Dec 2020 09:10:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>security specialist &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Do cybersecurity like a boss: 35 experts to follow on Twitter</title>
		<link>https://risk-academy.ru/do-cybersecurity-like-a-boss-35-experts-to-follow-on-twitter/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 05 Dec 2020 09:10:36 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Dmitri Alperovitch]]></category>
		<category><![CDATA[Robert D. Atkinson]]></category>
		<category><![CDATA[Co-Founder]]></category>
		<category><![CDATA[President]]></category>
		<category><![CDATA[security specialist]]></category>
		<category><![CDATA[information technology]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[Washington, DC]]></category>
		<category><![CDATA[executive chairman]]></category>
		<category><![CDATA[Information Technology & Innovation Foundation]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/do-cybersecurity-like-a-boss-35-experts-to-follow-on-twitter/</guid>

					<description><![CDATA[Staying on top of security is a big job, and Twitter can help. Listed here, in alphabetical order, are 35 researchers, hackers, and gurus whose Twitter feeds will keep any [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><span><span><span><span>Staying on top of security is a big job, and Twitter can help. Listed here, in alphabetical order, are 35 researchers, hackers, and gurus whose Twitter feeds will keep any security specialist well informed on the latest developments and thinking in the industry.</span></span></span></span></p>
<p>Follow these folks and you will keep one step ahead.</p>
<h3>Dmitri Alperovitch</h3>
<h4><a href="https://twitter.com/DAlperovitch" target="_blank" rel="nofollow noopener noreferrer">@DAlperovitch</a></h4>
<p>Alperovitch is executive chairman of the Silverado Policy Accelerator and co-founder of CrowdStrike. He&#8217;s also on the boards of more than a half-dozen companies and has patents on more than two dozen of his cybersecurity creations. His most recent tweets are about election security and disinformation campaigns.</p>
<h3>Robert D. Atkinson</h3>
<h4><a href="https://twitter.com/RobAtkinsonITIF" target="_blank" rel="nofollow noopener noreferrer">@RobAtkinsonITIF</a></h4>
<p>Atkinson is president of the Information Technology &amp; Innovation Foundation, a tech policy think tank in Washington, DC. Many of his tweets focus on the international aspects of technology, such as European digital protectionism, as well as automation, industrial policy, and big tech antitrust issues.</p>
<h3>Paul Asadoorian</h3>
<h4><a href="https://twitter.com/securityweekly" target="_blank" rel="nofollow noopener noreferrer">@securityweekly</a></h4>
<p>Asadoorian is founder and CTO of <em>Security Weekly</em> and chief innovation officer at the CyberRisk Alliance&#8230;.</p>
</div>
<p><a href="https://techbeacon.com/security/do-cybersecurity-boss-35-experts-follow-twitter">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Colleges Can Strengthen Security with a Defense-in-Depth Strategy</title>
		<link>https://risk-academy.ru/how-colleges-can-strengthen-security-with-a-defense-in-depth-strategy/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 01 Oct 2020 17:43:07 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[internet use]]></category>
		<category><![CDATA[technology environment]]></category>
		<category><![CDATA[deloitte]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[National security]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[security specialist]]></category>
		<category><![CDATA[distance learning]]></category>
		<category><![CDATA[regulatory compliance solutions]]></category>
		<category><![CDATA[Richard Rudnicki]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/how-colleges-can-strengthen-security-with-a-defense-in-depth-strategy/</guid>

					<description><![CDATA[By necessity, universities have evolved beyond the old castle-and-moat approach to cybersecurity. In today’s highly distributed technology environment, firewalls alone cannot ensure student privacy or secure critical data. With a [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>By necessity, universities have evolved beyond the old castle-and-moat approach to cybersecurity. In today’s highly distributed technology environment, firewalls alone cannot ensure student privacy or secure critical data.</p>
<p>With a proliferation of endpoints, the present push toward remote work and distance learning has heightened existing cyber risks for colleges and universities. “Traditional, ‘monolithic,’ approaches to cybersecurity are becoming less reliable,” says Richard Rudnicki, a Deloitte security specialist with 15 years of experience delivering cyber-risk and regulatory compliance solutions to higher education. “To address evolving risks, institutions should adopt multilayered approaches that involve people, process and technology.”</p>
<p>Known as defense in depth, this multilayered approach centers on redundancy. Having multiple layers of security controls is likely more effective than ensuring one layer is perfectly secure. Above all, the first layer of security starts with user education: Make sure all students and faculty understand the basics of safe internet use. Let’s examine some further solutions that can help enhance your DiD strategy.</p>
<p><strong><em>MORE ON&#8230;</em></strong></p>
</div>
<p><a href="https://edtechmagazine.com/higher/article/2020/10/defense-depth-did-strategies-protect-higher-ed-users-against-cyberthreats-perfcon">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How a new-look BlackBerry Spark is partnering in Asia Pacific</title>
		<link>https://risk-academy.ru/how-a-new-look-blackberry-spark-is-partnering-in-asia-pacific/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 20 May 2020 06:12:12 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[BlackBerry]]></category>
		<category><![CDATA[cylance]]></category>
		<category><![CDATA[Asia]]></category>
		<category><![CDATA[security specialist]]></category>
		<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Joe McPhilips]]></category>
		<category><![CDATA[director of Channel Sales]]></category>
		<category><![CDATA[Operating systems]]></category>
		<category><![CDATA[Computer architecture]]></category>
		<category><![CDATA[Computers]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/how-a-new-look-blackberry-spark-is-partnering-in-asia-pacific/</guid>

					<description><![CDATA[Joe McPhilips (BlackBerry Spark) Credit: BlackBerry Spark BlackBerry Spark is hammering home a message of consolidation at channel, customer and product levels in 2020, as the new-look vendor expands Asia [&#8230;]]]></description>
										<content:encoded><![CDATA[<div itemprop="articleBody">
<div class="story_images">
<figure>
<p>     <img decoding="async" title="cylance" alt="Joe McPhilips (BlackBerry Spark)" src="https://d2bs8hqp6qvsw6.cloudfront.net/article/images/740x500/dimg/joe_mcphillips_cylance_800-500_1.jpg"/><figcaption>
<p>Joe McPhilips (BlackBerry Spark)</p>
</figcaption><span class="image-license"></p>
<p>      <span>Credit: BlackBerry Spark </span></p>
<p>     </span></p>
</figure></div>
<p>BlackBerry Spark is hammering home a message of consolidation at channel, customer and product levels in 2020, as the new-look vendor expands Asia Pacific reach.</p>
<p>In addition to unifying the partner programs of BlackBerry and Cylance &#8211; acquired for $1.4 billion in November 2018 &#8211; the security specialist is also rolling out new cyber and endpoint management options for customers and providers in the form of BlackBerry Spark Suites, advocating an end-to-end approach in the process.</p>
<p>The move is designed to help customers streamline vendor products amid a noisy security landscape, delivered via a focused and combined channel ecosystem across the region.</p>
<p>“Customers more than ever are looking to consolidate vendors, particularly in the security market,” observed Joe McPhilips, director of Channel Sales across Asia&#8230;</p>
</div>
<p><a href="https://sg.channelasia.tech/article/679867/how-a-new-look-blackberry-is-partnering-in-asia-pacific/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
