<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Technology assessment &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/technology-assessment/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Wed, 02 Dec 2020 00:55:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Technology assessment &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>OMB should lead category management efforts to improve contract data, GAO says</title>
		<link>https://risk-academy.ru/omb-should-lead-category-management-efforts-to-improve-contract-data-gao-says/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 02 Dec 2020 00:54:59 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Technology assessment]]></category>
		<category><![CDATA[Government Accountability Office]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[office of Management and Budget]]></category>
		<category><![CDATA[Federal government of the United States]]></category>
		<category><![CDATA[Dave Nyczepir]]></category>
		<category><![CDATA[governmentwide solutions]]></category>
		<category><![CDATA[similar products]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/omb-should-lead-category-management-efforts-to-improve-contract-data-gao-says/</guid>

					<description><![CDATA[Written by Dave Nyczepir Dec 1, 2020 &#124; FEDSCOOP Efforts to improve contract data must be led by the Office of Management and Budget, if its category management initiative is to improve, [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
				      Written by</p>
<p>                Dave Nyczepir							<br /><span class="article__meta" style="border-top: 0px; border-bottom: 1px solid rgba(0,0,0,0.2);"> Dec 1, 2020 | FEDSCOOP</span></p>
<p>Efforts to improve contract data must be led by the Office of Management and Budget, if its category management initiative is to improve, according to the Government Accountability Office.</p>
<p>GAO found OMB‘s category management initiative focused too much on how to buy things<span style="font-weight: 400;"> — </span>at the expense of helping agencies determine what goods and services they actually need<span style="font-weight: 400;"> — </span>when it assessed data for 28 agencies, reviewed guidance for four and interviewed officials.</p>
<p>The category management initiative saved $27.3 billion in three years by having agencies use existing contracts to buy similar products and services like those in the IT Category, but billions more could be saved if OMB pursues governmentwide solutions to data challenges.</p>
<p>“Agency officials told GAO that data challenges—particularly challenges in collecting, analyzing, and sharing data on their spending and the prices they pay—have hindered implementation of the category management initiative,” reads GAO’s congressional report released Monday. “OMB is aware of these&#8230;</p>
</div>
<p><a href="https://www.fedscoop.com/omb-category-management-data/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Enterprise Internet of Things (IoT) cybersecurity &#124; 2020-10-29</title>
		<link>https://risk-academy.ru/enterprise-internet-of-things-iot-cybersecurity-2020-10-29/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 29 Oct 2020 08:36:08 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Windows IoT]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Technology assessment]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Digital technology]]></category>
		<category><![CDATA[Ambient intelligence]]></category>
		<category><![CDATA[Internet of things]]></category>
		<category><![CDATA[Science and technology]]></category>
		<category><![CDATA[IOT]]></category>
		<category><![CDATA[Unified-Inbox]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/enterprise-internet-of-things-iot-cybersecurity-2020-10-29/</guid>

					<description><![CDATA[Enterprise Internet of Things (IoT) cybersecurity &#124; 2020-10-29 &#124; Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By [&#8230;]]]></description>
										<content:encoded><![CDATA[<div> <!--<![endif]--><br />
 <head></p>
<link href="https://www.securitymagazine.com/articles/93771-enterprise-internet-of-things-iot-cybersecurity" rel="canonical"/>
<p>  <meta name="csrf-param" content="authenticity_token"/><br />
<meta name="csrf-token" content="Ylm0Enq4oHuCfoc5QK7we9e6xjkBoQA8RUx6uADhnHacwcXOL/V9qEz1K8R4db3RMIGuRxZPNw1wKdYzkWP4XA=="/><br />
  <meta name="viewport" content="width=device-width, initial-scale=1.0"/><br />
  <meta name="description" content="The Internet of Things (IoT) refers to a large number of interconnected devices that can interact with the physical world. There are amazing benefits to having IoT devices for individuals and enterprises as they provide a new level of features and an ability to gather data that was not possible before. IoT devices are the foundation on which to build smart cities and smart homes. An example of this is smart doorbells which provides new features such as alerting whenever someone is at the door, . . ."/><br />
  <meta name="keywords" content="Internet of Things (IoT),cyber security,risk management"/></p>
<link rel="alternate" type="application/xml" title="Security Magazine RSS Feed" href="https://www.securitymagazine.com/rss/articles"/>
<p>  <meta property="og:title" content="Enterprise Internet of Things (IoT) cybersecurity"/><br />
<meta property="og:description" content="IoT plays an important role that allows enterprises to go through digital transformation. However, in many cases organizations start to become aware that they do already have a large number of IoT devices which were introduced gradually over the years. One of the main concerns that an organizations face when dealing with IoT is managing risks involved in increasing number of IoT devices. Because of their ability to interact with the physical world, there are safety and privacy concerns when it comes to the security of IoT devices.&#10;&#10;This paper provides an overview of IoT components, followed by risks and sample attacks. Finally, a list of current and prospective future security solutions is discussed."/><br />
<meta property="og:author" content="Ali A. Al Khater"/><br />
<meta property="og:url" content="https://www.securitymagazine.com/articles/93771-enterprise-internet-of-things-iot-cybersecurity?v=preview"/><br />
<meta property="og:image" content="https://www.securitymagazine.com/ext/resources/images/cyber-security1.jpg?height=635&amp;t=1603920397&amp;width=1200"/><br />
<meta property="og:image:width" content="900"/><br />
<meta property="og:image:height" content="550"/><br />
<meta property="og:type" content="Article"/><br />
<meta name="twitter:title" content="Enterprise Internet of Things (IoT) cybersecurity"/><br />
<meta name="twitter:description" content="IoT plays an important role that allows enterprises to go through digital transformation. However, in many cases organizations start to become aware that they do already have a large number of IoT devices which were introduced gradually over the years. One of the main concerns that an organizations face when dealing with IoT is managing risks involved in increasing number of IoT devices. Because of their ability to interact with the physical world, there are safety and privacy concerns when it comes to the security of IoT devices.&#10;&#10;This paper provides an overview of IoT components, followed by risks and sample attacks. Finally, a list of current and prospective future security solutions is discussed."/><br />
<meta name="twitter:card" content="summary"/><br />
<meta name="twitter:image" content="https://www.securitymagazine.com/ext/resources/images/cyber-security1.jpg?1603920397"/></p>
<p> <meta name="msapplication-TileColor" content="#FFFFFF"/><br />
<meta name="msapplication-TileImage" content="/images/favicon/mstile-144.png"/>
<link rel="icon" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/favicons.ico" sizes="16x16 32x32 48x48 64x64"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-152.png" sizes="152x152"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-144.png" sizes="144x144"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-120.png" sizes="120x120"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-72.png" sizes="72x72"/>
<p><meta content="true" name="has-log-view"/><br />
  <title>Enterprise Internet of Things (IoT) cybersecurity | 2020-10-29 | Security Magazine</title>
  <link rel="stylesheet" media="screen" href="https://www.securitymagazine.com/stylesheets/application.css"/>
   <link rel="stylesheet" media="print" href="https://www.securitymagazine.com/stylesheets/print.css"/>
 <link rel="dns-prefetch" href="https://fonts.googleapis.com"/>
 <link rel="preconnect" href="https://fonts.gstatic.com/" crossorigin=""/>
  <link href="https://fonts.googleapis.com/css?family=PT+Serif|Open+Sans:400,700|Open+Sans+Condensed:300" rel="stylesheet"/>
<link rel="stylesheet" media="screen" href="https://www.securitymagazine.com/ext/resources/securitymagazine.css"/>
<p><!-- dataLayer scripts, place in head before GTM snippet --></p>
<p><!-- End dataLayer --></p>
<p><!-- Google Tag Manager --></p>
<p><!-- End Google Tag Manager --></p>
<p> <!--[if lt IE 9]><![endif]--></p>
<p> </head><br />
 <body data-controller="articles" data-action="show" data-article-requires-registration="true" data-article-requires-subscription="false" data-prestitial-ad="false" data-poststitial-ad="false" data-dfp-prefix="/52040140/sec" data-ad-unit-prefix="null" data-is-microsite="0" id="wp_automatic_ReadabilityBody"></p>
<p><!-- Google Tag Manager (noscript) --><br />
<noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-KNK327G" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript><br />
<!-- End Google Tag Manager (noscript) --></p>
<section class="cookie-policy" id="cookie-policy">
<div class="cookie-policy__body">
<div class="mobileHide">
<span style="font-family:verdana,geneva,sans-serif;"><span style="font-size:12px;"><strong><span style="color:#696969;">This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated <span style="color:#696969;">privacy and cookie policy to learn more. </span></span></strong></span></span></div>
<div class="mobileShow">
<details>&#13;</p>
<summary>This Website Uses Cookies<br />By closing this message or continuing to use our site, you agree to our cookie policy. <u>Learn More</u></summary>
<p>&#13;<br />
<span style="font-family:verdana,geneva,sans-serif;"><span style="font-size:12px;"><strong><span style="color:#696969;">This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated <span style="color:#696969;">privacy and cookie policy to learn more. </span></span></strong></span></span></details>
</div>
</div>
<p><span class="cookie-policy__close" id="cookie-policy-close"/></section>
<p>   <!-- google structured data --></p>
<p> <iframe width="0" height="0" name="Trade Desk Tracking - IP1713744_Security Magazine RT_Core" frameborder="0" scrolling="no" src="https://insight.adsrvr.org/tags/h83y0ff/j7ic26x/iframe"></iframe>&#13;<br />
&#13;</p>
<p> &#8230;</body></div>
<p><a href="https://www.securitymagazine.com/articles/93771-enterprise-internet-of-things-iot-cybersecurity">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Risk Assessment Software Market Report 2020 (COVID-19 Impact Analysis) By Segmentations, Key Company Profiles &#038; Demand Forecasts to 2020 – 2026</title>
		<link>https://risk-academy.ru/risk-assessment-software-market-report-2020-covid-19-impact-analysis-by-segmentations-key-company-profiles-demand-forecasts-to-2020-2026/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 27 Sep 2020 18:15:50 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Occupational safety and health]]></category>
		<category><![CDATA[Evaluation]]></category>
		<category><![CDATA[Impact assessment]]></category>
		<category><![CDATA[Reliability engineering]]></category>
		<category><![CDATA[Safety engineering]]></category>
		<category><![CDATA[Technology assessment]]></category>
		<category><![CDATA[Risk Assessment Software]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/risk-assessment-software-market-report-2020-covid-19-impact-analysis-by-segmentations-key-company-profiles-demand-forecasts-to-2020-2026/</guid>

					<description><![CDATA[The recent report on Global Risk Assessment Software Market is a compilation of factual market data and insightful data points drawn from it to better understand the prospects of Risk [&#8230;]]]></description>
										<content:encoded><![CDATA[<div style="color: #000000;width: 90%;height: 100%;border: 3px solid;border-color: #DEB887;background: #F5F5DC;padding: 2%;font-family: Calibri, serif;font-size: 14pt;font-style: normal;margin-left: auto;margin-right: auto">
<p><img decoding="async" title="risk assessment" loading="lazy" class="size-medium wp-image-1960877 aligncenter" src="https://thedailychronicle.in/wp-content/uploads/2020/09/Research-Report-300x208.gif" alt="risk assessment" width="300" height="208"/></p>
<p>The recent report on <strong>Global Risk Assessment Software Market</strong> is a compilation of factual market data and insightful data points drawn from it to better understand the prospects of Risk Assessment Software in global market scenario. A host of factors that are directly, indirectly, positively, or negatively influencing the performance of market have been subject to critical assessment to evaluate their extent of impact on market growth. This section not only helps readers to learn about the top growth supporting factors but also notifies them about the equally important challenges facing them in market place.</p>
<p>The report also sheds light on competition structure analysis of the global Risk Assessment Software market that provides valuable information about the prominent companies operating in industry, along with their financial status, revenue share contribution, key developmental strategies, growth milestones, key offerings and market positioning, adoption of technological advancements, and global and regional client base. The analysis offered in report is extensive and allows for deep-dive understanding of market scenario, which further facilitates strategy planning and&#8230;</p>
</div>
<p><a href="http://crypto-daily.news/news/263297/risk-assessment-software-market-report-2020-covid-19-impact-analysis-by-segmentations-key-company-profiles-demand-forecasts-to-2020-2026/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Managing Cyber Risk with NIS Compliance &#124; Cyber Security &#038; Rail</title>
		<link>https://risk-academy.ru/managing-cyber-risk-with-nis-compliance-cyber-security-rail/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 23 Sep 2020 18:49:59 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[Actuarial science]]></category>
		<category><![CDATA[Academic disciplines]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Impact assessment]]></category>
		<category><![CDATA[Reliability engineering]]></category>
		<category><![CDATA[Safety engineering]]></category>
		<category><![CDATA[Technology assessment]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/managing-cyber-risk-with-nis-compliance-cyber-security-rail/</guid>

					<description><![CDATA[Risk Workshops and Governance But how does this help with the CAF? Firstly, any good risk assessment sets up the context, involving the stakeholders and those who need to be [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<h3>Risk Workshops and Governance</h3>
<p>But how does this help with the CAF? Firstly, any good risk assessment sets up the context, involving the stakeholders and those who need to be informed of the outcome. This allows one to identify the governance (CAF A1) structure required and name responsible individuals and risk owners. To help with the context it is always best to include some user input. With the stakeholders, users and risk owners attending an on-site or virtual workshop, lessons learnt, incidents from the past, real fears and worries can be put in the melting-pot and risks can be prioritised. This covers the last part of the CAF, D2. The outcomes between A2 and D2 involve controls. Choosing, selecting and investing in controls will follow analysis of lessons learnt in the risk assessment. The risk workshop can give a sense of priority, which are the real concerns can be targeted and equally one can identify the ‘low hanging fruit’, those quick wins, low cost achievements that will show progress and drive momentum. It also provides a view of the opportunity risk – the business opportunities to be exploited, why some actions are followed and some are not, which risks can&#8230;</p>
</div>
<p><a href="https://railway-news.com/managing-cyber-risk-with-nis-compliance-il7/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Possibly the best risk assessment template #riskawarenessweek2019</title>
		<link>https://risk-academy.ru/possibly-the-best-risk-assessment-template-riskawarenessweek2019-5/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 03 Sep 2020 06:30:17 +0000</pubDate>
				<category><![CDATA[Официальная группа ИСАР]]></category>
		<category><![CDATA[riskawarenessweek2019]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Occupational safety and health]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[Evaluation]]></category>
		<category><![CDATA[Impact assessment]]></category>
		<category><![CDATA[riskacademy]]></category>
		<category><![CDATA[Reliability engineering]]></category>
		<category><![CDATA[riskmanagement]]></category>
		<category><![CDATA[Safety engineering]]></category>
		<category><![CDATA[decisionmaking]]></category>
		<category><![CDATA[Technology assessment]]></category>
		<category><![CDATA[riskarticles]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[iso310000]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/possibly-the-best-risk-assessment-template-riskawarenessweek2019-5/</guid>

					<description><![CDATA[Possibly the best risk assessment template #riskawarenessweek2019 #riskacademy, #riskarticles, #riskmanagement, #decisionmaking, #iso310000 Possibly the best risk assessment template #riskawarenessweek2019 While working on the project in the Middle East recently the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span></p>
<p>Possibly the best risk assessment template <a class="by bz" href="https://facebook.com/hashtag/riskawarenessweek2019?refid=18&amp;_ft_=qid.6868145606106755366%3Amf_story_key.1183557802019152%3Agroup_id.412510262457247%3Atop_level_post_id.1183557802019152%3Atl_objid.1183557802019152%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1599114617%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1183557802019152%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="ca cb">#<span>riskawarenesswe</span><wbr></wbr><span class="word_break"></span>ek2019</span></a> <a class="by bz" href="https://facebook.com/hashtag/riskacademy?refid=18&amp;_ft_=qid.6868145606106755366%3Amf_story_key.1183557802019152%3Agroup_id.412510262457247%3Atop_level_post_id.1183557802019152%3Atl_objid.1183557802019152%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1599114617%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1183557802019152%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="ca cb">#riskacademy</span></a>, <a class="by bz" href="https://facebook.com/hashtag/riskarticles?refid=18&amp;_ft_=qid.6868145606106755366%3Amf_story_key.1183557802019152%3Agroup_id.412510262457247%3Atop_level_post_id.1183557802019152%3Atl_objid.1183557802019152%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1599114617%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1183557802019152%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="ca cb">#riskarticles</span></a>, <a class="by bz" href="https://facebook.com/hashtag/riskmanagement?refid=18&amp;_ft_=qid.6868145606106755366%3Amf_story_key.1183557802019152%3Agroup_id.412510262457247%3Atop_level_post_id.1183557802019152%3Atl_objid.1183557802019152%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1599114617%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1183557802019152%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="ca cb">#riskmanagement</span></a>, <a class="by bz" href="https://facebook.com/hashtag/decisionmaking?refid=18&amp;_ft_=qid.6868145606106755366%3Amf_story_key.1183557802019152%3Agroup_id.412510262457247%3Atop_level_post_id.1183557802019152%3Atl_objid.1183557802019152%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1599114617%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1183557802019152%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="ca cb">#decisionmaking</span></a>, <a class="by bz" href="https://facebook.com/hashtag/iso310000?refid=18&amp;_ft_=qid.6868145606106755366%3Amf_story_key.1183557802019152%3Agroup_id.412510262457247%3Atop_level_post_id.1183557802019152%3Atl_objid.1183557802019152%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1599114617%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1183557802019152%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="ca cb">#iso310000</span></a></p>
<p></span>
</p>
<p><a href="https://buff.ly/31DWnao"><img decoding="async" alt="risk assessment" title="Possibly the best risk assessment template #riskawarenessweek2019" src="https://scontent-dfw5-1.xx.fbcdn.net/v/t1.0-0/c52.0.540.540a/p180x540/118488382_10157027944912142_8291398145905994633_n.jpg?_nc_cat=100&#038;_nc_sid=ca434c&#038;_nc_ohc=R6H98S5zAp0AX_7Nsnz&#038;_nc_ht=scontent-dfw5-1.xx&#038;oh=ce6cd429424fd642a1bb68f6d1722133&#038;oe=5F755732" /></a> </p>
<p><a href="https://buff.ly/31DWnao">Possibly the best risk assessment template #riskawarenessweek2019</a></p>
<p>While working on the project in the Middle East recently the RISK-ACADEMY team came up with what looks like the best risk identification template I&#039;ve seen in a long time. This is what a good risk reg</p>
<p><a href="https://www.facebook.com/groups/412510262457247/permalink/1183557802019152">Присоеденяйтесь к официальной группе ИСАР в Facebook</a> </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Addressing Security Issues Posed by IoT Devices in Connected Buildings</title>
		<link>https://risk-academy.ru/addressing-security-issues-posed-by-iot-devices-in-connected-buildings/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 02 Sep 2020 00:54:47 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Internet of things]]></category>
		<category><![CDATA[Science and technology]]></category>
		<category><![CDATA[Pod Group]]></category>
		<category><![CDATA[OneM2M]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[Technology assessment]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Digital technology]]></category>
		<category><![CDATA[Ambient intelligence]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/addressing-security-issues-posed-by-iot-devices-in-connected-buildings/</guid>

					<description><![CDATA[As buildings begin to reopen and building projects resume, there is an increased emphasis on creating healthier and more productive working environments. In many instances, new technologies coupled with various [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="dnn_ctr625_BBArticleDetail_ctl02_ctrlArticleDetails_PM1">
<p>As buildings begin to reopen and building projects resume, there is an increased emphasis on creating healthier and more productive working environments.</p>
<p>In many instances, new technologies coupled with various IoT devices will be used to implement new protocols, enhance on-premise safety and hygiene, and offer more connectivity options to remote and on-site workers. That puts an additional premium on managing the security of these connected devices and systems.</p>
<p><img decoding="async" alt="Security IoT Framework" src="https://www.buildings.com/Portals/0/Images/00_August_2020/Acuity/BLD-0920-acuity-graphic2.jpg" title="Security IoT Framework"/></p>
<p>If there is a weakness or vulnerability into these devices, for example, it may breakdown communication in systems designed to make buildings safer and more efficient.</p>
<p>The cybersecurity threat landscape continues to evolve and requires the use of innovative security models and sophisticated prevention techniques to protect the devices in facilities and commercial office buildings. In the Internet of Things (IoT) industry alone, attacks against devices increased more than 200% in 2018<sup>1</sup>.</p>
<p>To adapt, all entities, stakeholders, suppliers and vendors need to redefine their cyber strategy, bringing security into the center of any project and ensuring that any products used in facilities include the highest possible&#8230;</p>
</div>
<p><a href="https://www.buildings.com/article-details/articleid/22287/title/security-iot-devices-connected-buildings">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>IoT Devices in Different Industries and How to Secure Them</title>
		<link>https://risk-academy.ru/iot-devices-in-different-industries-and-how-to-secure-them/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 26 Aug 2020 03:14:41 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Internet of things]]></category>
		<category><![CDATA[industrial machinery]]></category>
		<category><![CDATA[IEEE P1931.1]]></category>
		<category><![CDATA[Telecom North America]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Technology assessment]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Digital technology]]></category>
		<category><![CDATA[Ambient intelligence]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/iot-devices-in-different-industries-and-how-to-secure-them/</guid>

					<description><![CDATA[Today, data analytics, automation, connectivity, and remote monitoring have made great progress and have brought innovations in every sphere of modern civilization. The digitization in day-to-day human activities has been [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="">
<p>Today, data analytics, automation, connectivity, and remote monitoring have made great progress and have brought innovations in every sphere of modern civilization.</p>
<p>The digitization in day-to-day human activities has been revolutionized by the Internet of Things (IoT). Based on Gartner’s Forecast database, we can expect that there will be approximately 14 billion devices connected to the internet by 2022. With more devices connected, it will change the way we do business and use resources.</p>
<p>For example, monitoring the cows on a farm can help farmers obtain health reports and plan more efficient feeding strategies. Also, being able to track the behavior of complex industrial machinery enables organizations to prevent accidents and shorten the downtime for maintenance.</p>
<p>There are many examples of how IoT is facilitating human activities. All kinds of devices can gather and share information from their environment. A world where all things are connected will potentially bring endless opportunities for most human activities.</p>
<p>In this blog, we are going to walk through the impact of IoT on some of these different industries.</p>
<h3>Manufacturing</h3>
<p>IoT has enabled smart manufacturing that&#8230;</p>
</div>
<p><a href="https://www.tripwire.com/state-of-security/featured/iot-devices-industry-secure/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Possibly the best risk assessment template #riskawarenessweek2019</title>
		<link>https://risk-academy.ru/possibly-the-best-risk-assessment-template-riskawarenessweek2019-4/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 25 Jul 2020 09:00:12 +0000</pubDate>
				<category><![CDATA[Официальная группа ИСАР]]></category>
		<category><![CDATA[riskacademy]]></category>
		<category><![CDATA[Safety engineering]]></category>
		<category><![CDATA[riskmanagement]]></category>
		<category><![CDATA[Technology assessment]]></category>
		<category><![CDATA[decisionmaking]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[riskarticles]]></category>
		<category><![CDATA[iso310000]]></category>
		<category><![CDATA[riskawarenessweek2019]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Hazard analysis]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[Impact assessment]]></category>
		<category><![CDATA[Reliability engineering]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/possibly-the-best-risk-assessment-template-riskawarenessweek2019-4/</guid>

					<description><![CDATA[Possibly the best risk identification template #riskawarenessweek2019 #riskacademy, #riskarticles, #riskmanagement, #decisionmaking, #iso310000 Possibly the best risk assessment template #riskawarenessweek2019 While working on the project in the Middle East recently the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span></p>
<p>Possibly the best risk identification template <a class="bz ca" href="https://facebook.com/hashtag/riskawarenessweek2019?refid=18&amp;_ft_=qid.6853351127176418284%3Amf_story_key.1151759218532344%3Agroup_id.412510262457247%3Atop_level_post_id.1151759218532344%3Atl_objid.1151759218532344%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1595667612%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1151759218532344%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="cb cc">#<span>riskawarenesswe</span><wbr></wbr><span class="word_break"></span>ek2019</span></a> <a class="bz ca" href="https://facebook.com/hashtag/riskacademy?refid=18&amp;_ft_=qid.6853351127176418284%3Amf_story_key.1151759218532344%3Agroup_id.412510262457247%3Atop_level_post_id.1151759218532344%3Atl_objid.1151759218532344%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1595667612%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1151759218532344%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="cb cc">#riskacademy</span></a>, <a class="bz ca" href="https://facebook.com/hashtag/riskarticles?refid=18&amp;_ft_=qid.6853351127176418284%3Amf_story_key.1151759218532344%3Agroup_id.412510262457247%3Atop_level_post_id.1151759218532344%3Atl_objid.1151759218532344%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1595667612%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1151759218532344%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="cb cc">#riskarticles</span></a>, <a class="bz ca" href="https://facebook.com/hashtag/riskmanagement?refid=18&amp;_ft_=qid.6853351127176418284%3Amf_story_key.1151759218532344%3Agroup_id.412510262457247%3Atop_level_post_id.1151759218532344%3Atl_objid.1151759218532344%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1595667612%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1151759218532344%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="cb cc">#riskmanagement</span></a>, <a class="bz ca" href="https://facebook.com/hashtag/decisionmaking?refid=18&amp;_ft_=qid.6853351127176418284%3Amf_story_key.1151759218532344%3Agroup_id.412510262457247%3Atop_level_post_id.1151759218532344%3Atl_objid.1151759218532344%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1595667612%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1151759218532344%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="cb cc">#decisionmaking</span></a>, <a class="bz ca" href="https://facebook.com/hashtag/iso310000?refid=18&amp;_ft_=qid.6853351127176418284%3Amf_story_key.1151759218532344%3Agroup_id.412510262457247%3Atop_level_post_id.1151759218532344%3Atl_objid.1151759218532344%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1595667612%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1151759218532344%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="cb cc">#iso310000</span></a></p>
<p></span>
</p>
<p><a href="https://buff.ly/2UdiFM8"><img decoding="async" alt="risk" title="Possibly the best risk assessment template #riskawarenessweek2019" src="https://scontent-dfw5-1.xx.fbcdn.net/v/t1.0-0/c247.0.540.540a/p180x540/109532157_10156931134822142_3633562883141960407_o.jpg?_nc_cat=101&#038;_nc_sid=ca434c&#038;_nc_ohc=XewShVhhaxQAX9NO1KI&#038;_nc_ht=scontent-dfw5-1.xx&#038;oh=1ada331957f6cdf1510a9db48b98ed42&#038;oe=5F433B04" /></a> </p>
<p><a href="https://buff.ly/2UdiFM8">Possibly the best risk assessment template #riskawarenessweek2019</a></p>
<p>While working on the project in the Middle East recently the RISK-ACADEMY team came up with what looks like the best risk identification template I&#039;ve seen in a long time. This is what a good risk reg</p>
<p><a href="https://www.facebook.com/groups/412510262457247/permalink/1151759218532344">Присоеденяйтесь к официальной группе ИСАР в Facebook</a> </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Possibly the best risk assessment template #riskawarenessweek2019</title>
		<link>https://risk-academy.ru/possibly-the-best-risk-assessment-template-riskawarenessweek2019-3/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 17 Jul 2020 17:30:45 +0000</pubDate>
				<category><![CDATA[Официальная группа ИСАР]]></category>
		<category><![CDATA[Evaluation]]></category>
		<category><![CDATA[Hazard analysis]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[Impact assessment]]></category>
		<category><![CDATA[Reliability engineering]]></category>
		<category><![CDATA[riskacademy]]></category>
		<category><![CDATA[Safety engineering]]></category>
		<category><![CDATA[riskmanagement]]></category>
		<category><![CDATA[Technology assessment]]></category>
		<category><![CDATA[decisionmaking]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[riskarticles]]></category>
		<category><![CDATA[Assessment]]></category>
		<category><![CDATA[iso310000]]></category>
		<category><![CDATA[riskawarenessweek2019]]></category>
		<category><![CDATA[Articles]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/possibly-the-best-risk-assessment-template-riskawarenessweek2019-3/</guid>

					<description><![CDATA[Possibly the best risk assessment template #riskawarenessweek2019 #riskacademy, #riskarticles, #riskmanagement, #decisionmaking, #iso310000 Possibly the best risk assessment template #riskawarenessweek2019 While working on the project in the Middle East recently the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span></p>
<p>Possibly the best risk assessment template <a class="cm cn" href="https://facebook.com/hashtag/riskawarenessweek2019?refid=18&amp;_ft_=qid.6850513377901859968%3Amf_story_key.1146091545765778%3Agroup_id.412510262457247%3Atop_level_post_id.1146091545765778%3Atl_objid.1146091545765778%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1595007045%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1146091545765778%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="co cp">#<span>riskawarenesswe</span><wbr></wbr><span class="word_break"></span>ek2019</span></a> <a class="cm cn" href="https://facebook.com/hashtag/riskacademy?refid=18&amp;_ft_=qid.6850513377901859968%3Amf_story_key.1146091545765778%3Agroup_id.412510262457247%3Atop_level_post_id.1146091545765778%3Atl_objid.1146091545765778%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1595007045%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1146091545765778%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="co cp">#riskacademy</span></a>, <a class="cm cn" href="https://facebook.com/hashtag/riskarticles?refid=18&amp;_ft_=qid.6850513377901859968%3Amf_story_key.1146091545765778%3Agroup_id.412510262457247%3Atop_level_post_id.1146091545765778%3Atl_objid.1146091545765778%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1595007045%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1146091545765778%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="co cp">#riskarticles</span></a>, <a class="cm cn" href="https://facebook.com/hashtag/riskmanagement?refid=18&amp;_ft_=qid.6850513377901859968%3Amf_story_key.1146091545765778%3Agroup_id.412510262457247%3Atop_level_post_id.1146091545765778%3Atl_objid.1146091545765778%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1595007045%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1146091545765778%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="co cp">#riskmanagement</span></a>, <a class="cm cn" href="https://facebook.com/hashtag/decisionmaking?refid=18&amp;_ft_=qid.6850513377901859968%3Amf_story_key.1146091545765778%3Agroup_id.412510262457247%3Atop_level_post_id.1146091545765778%3Atl_objid.1146091545765778%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1595007045%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1146091545765778%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="co cp">#decisionmaking</span></a>, <a class="cm cn" href="https://facebook.com/hashtag/iso310000?refid=18&amp;_ft_=qid.6850513377901859968%3Amf_story_key.1146091545765778%3Agroup_id.412510262457247%3Atop_level_post_id.1146091545765778%3Atl_objid.1146091545765778%3Acontent_owner_id_new.608777141%3Apage_id.412510262457247%3Asrc.22%3Astory_location.6%3Astory_attachment_style.share%3Afilter.GroupStoriesByActivityEntQuery%3Atds_flgs.3%3Apage_insights.%7B%22412510262457247%22%3A%7B%22page_id%22%3A412510262457247%2C%22page_id_type%22%3A%22group%22%2C%22actor_id%22%3A608777141%2C%22dm%22%3A%7B%22isShare%22%3A1%2C%22originalPostOwnerID%22%3A0%7D%2C%22psn%22%3A%22EntGroupMallPostCreationStory%22%2C%22post_context%22%3A%7B%22object_fbtype%22%3A657%2C%22publish_time%22%3A1595007045%2C%22story_name%22%3A%22EntGroupMallPostCreationStory%22%2C%22story_fbid%22%3A%5B1146091545765778%5D%7D%2C%22role%22%3A1%2C%22sl%22%3A6%7D%7D&amp;__tn__=%2As-R"><span class="co cp">#iso310000</span></a></p>
<p></span>
</p>
<p><a href="https://buff.ly/31DWnao"><img decoding="async" alt="risk assessment" title="Possibly the best risk assessment template #riskawarenessweek2019" src="https://scontent-dfw5-1.xx.fbcdn.net/v/t1.0-0/c247.0.540.540a/p180x540/109532157_10156931134822142_3633562883141960407_o.jpg?_nc_cat=101&#038;_nc_sid=ca434c&#038;_nc_ohc=dwGbepaZXQ0AX_FoX_J&#038;_nc_ht=scontent-dfw5-1.xx&#038;oh=52e80f49d5a4492ec2a83f3a615d23dc&#038;oe=5F375D84" /></a> </p>
<p><a href="https://buff.ly/31DWnao">Possibly the best risk assessment template #riskawarenessweek2019</a></p>
<p>While working on the project in the Middle East recently the RISK-ACADEMY team came up with what looks like the best risk identification template I&#039;ve seen in a long time. This is what a good risk reg</p>
<p><a href="https://www.facebook.com/groups/412510262457247/permalink/1146091545765778">Присоеденяйтесь к официальной группе ИСАР в Facebook</a> </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protecting Industrial IoT Devices &#124; 2020-07-02</title>
		<link>https://risk-academy.ru/protecting-industrial-iot-devices-2020-07-02/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 05 Jul 2020 06:20:42 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[M2Mi Corporation]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[Technology assessment]]></category>
		<category><![CDATA[Digital technology]]></category>
		<category><![CDATA[Information and communications technology]]></category>
		<category><![CDATA[Ambient intelligence]]></category>
		<category><![CDATA[Internet of things]]></category>
		<category><![CDATA[List of IoT cloud services]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/protecting-industrial-iot-devices-2020-07-02/</guid>

					<description><![CDATA[Protecting Industrial IoT Devices &#124; 2020-07-02 &#124; Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this [&#8230;]]]></description>
										<content:encoded><![CDATA[<div> <!--<![endif]--><br />
 <head></p>
<link href="https://www.securitymagazine.com/articles/92738-protecting-industrial-iot-devices" rel="canonical"/>
<p>  <meta name="csrf-param" content="authenticity_token"/><br />
<meta name="csrf-token" content="N5TNsH0TJisvFLiDxkvD9rSe3mVojJH5jYIbkerRV3iF1VYRCuhjpSChAOmlmW705bxlBdw6uC7vFGCZRugCGQ=="/><br />
  <meta name="viewport" content="width=device-width, initial-scale=1.0"/><br />
  <meta name="description" content="The truth is that every versatile new tool also has a downside risk &#x2013; such as the new wire cutters that make installing security fences faster and easier can also be used to compromise that same fence. The Internet and networked connected devices are no exception. Networking sensors, controls&#xA0;and other electronic devices that now comprise the Industrial Internet of Things (IIoT) are&#xA0;opening amazing new capabilities for purposes of data exchange, remote monitoring or control, while also creating new business and societal risks. Security cameras are . . ."/><br />
  <meta name="keywords" content="Industrial Control Systems,Internet of Things (IoT),cyber security,information security,risk management"/></p>
<link rel="alternate" type="application/rss+xml" title="Security Magazine RSS Feed" href="https://www.securitymagazine.com/rss/articles"/>
<p>  <meta property="og:title" content="Protecting Industrial IoT Devices"/><br />
<meta property="og:description" content="The nature of IIoT devices and infrastructure makes them high-value cyber targets. This is because they are relatively easy to compromise and are often connected to internal networks with high-value content with links to other networks. Moreover, IIoT devices rarely have direct user interaction, and this unattended nature means that many types of device compromise are likely to go unnoticed and undetected &#x2013; particularly when the malware does not disrupt the device&#x2019;s primary functionality. Here are a dozen reasons why intelligent IIoT devices are attractive targets for hackers."/><br />
<meta property="og:author" content="Bud Broomhead"/><br />
<meta property="og:url" content="https://www.securitymagazine.com/articles/92738-protecting-industrial-iot-devices"/><br />
<meta property="og:image" content="https://www.securitymagazine.com/ext/resources/images/Manu_9001.jpg?height=635&amp;t=1593635963&amp;width=1200"/><br />
<meta property="og:image:width" content="900"/><br />
<meta property="og:image:height" content="550"/><br />
<meta property="og:type" content="Article"/><br />
<meta name="twitter:title" content="Protecting Industrial IoT Devices"/><br />
<meta name="twitter:description" content="The nature of IIoT devices and infrastructure makes them high-value cyber targets. This is because they are relatively easy to compromise and are often connected to internal networks with high-value content with links to other networks. Moreover, IIoT devices rarely have direct user interaction, and this unattended nature means that many types of device compromise are likely to go unnoticed and undetected &#x2013; particularly when the malware does not disrupt the device&#x2019;s primary functionality. Here are a dozen reasons why intelligent IIoT devices are attractive targets for hackers."/><br />
<meta name="twitter:card" content="summary"/><br />
<meta name="twitter:image" content="https://www.securitymagazine.com/ext/resources/images/Manu_9001.jpg?1593635963"/></p>
<p> <meta name="msapplication-TileColor" content="#FFFFFF"/><br />
<meta name="msapplication-TileImage" content="/images/favicon/mstile-144.png"/>
<link rel="icon" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/favicons.ico" sizes="16x16 32x32 48x48 64x64"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-152.png" sizes="152x152"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-144.png" sizes="144x144"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-120.png" sizes="120x120"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-72.png" sizes="72x72"/>
<p><meta content="true" name="has-log-view"/><br />
  <title>Protecting Industrial IoT Devices | 2020-07-02 | Security Magazine</title>
  <link rel="stylesheet" media="screen" href="https://www.securitymagazine.com/stylesheets/application.css"/>
   <link rel="stylesheet" media="print" href="https://www.securitymagazine.com/stylesheets/print.css"/>
 <link rel="dns-prefetch" href="https://fonts.googleapis.com"/>
 <link rel="preconnect" href="https://fonts.gstatic.com/" crossorigin=""/>
  <link href="https://fonts.googleapis.com/css?family=PT+Serif|Open+Sans:400,700|Open+Sans+Condensed:300" rel="stylesheet"/>
<link rel="stylesheet" media="screen" href="https://www.securitymagazine.com/ext/resources/securitymagazine.css"/>
<p><!-- dataLayer scripts, place in head before GTM snippet --></p>
<p><!-- End dataLayer --></p>
<p><!-- Google Tag Manager --></p>
<p><!-- End Google Tag Manager --></p>
<p>   <!--[if lt IE 9]><![endif]--></p>
<p> </head><br />
 <body data-controller="articles" data-action="show" data-article-requires-registration="true" data-article-requires-subscription="false" data-prestitial-ad="false" data-poststitial-ad="false" data-dfp-prefix="/52040140/sec" data-ad-unit-prefix="null" data-is-microsite="0" id="wp_automatic_ReadabilityBody"></p>
<p><!-- Google Tag Manager (noscript) --><br />
<noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-KNK327G" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript><br />
<!-- End Google Tag Manager (noscript) --></p>
<section class="cookie-policy" id="cookie-policy">
<div class="cookie-policy__body">
<div class="mobileHide">
<span style="font-family:verdana,geneva,sans-serif;"><span style="font-size:12px;"><strong><span style="color:#696969;">This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated <span style="color:#696969;">privacy and cookie policy to learn more. </span></span></strong></span></span></div>
<div class="mobileShow">
<details>&#13;</p>
<summary>This Website Uses Cookies<br />By closing this message or continuing to use our site, you agree to our cookie policy. <u>Learn More</u></summary>
<p>&#13;<br />
<span style="font-family:verdana,geneva,sans-serif;"><span style="font-size:12px;"><strong><span style="color:#696969;">This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated <span style="color:#696969;">privacy and cookie policy to learn more. </span></span></strong></span></span></details>
</div>
</div>
<p><span class="cookie-policy__close" id="cookie-policy-close"/></section>
<p>   <!-- google structured data --></p>
<p> <iframe loading="lazy" width="0" height="0" name="Trade Desk Tracking - IP1713744_Security Magazine RT_Core" frameborder="0" scrolling="no" src="https://insight.adsrvr.org/tags/h83y0ff/j7ic26x/iframe"></iframe>&#13;<br />
&#13;</p>
<p></body></div>
<p><a href="https://www.securitymagazine.com/articles/92738-protecting-industrial-iot-devices">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
