<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>u.s. department of homeland security &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/u-s-department-of-homeland-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Fri, 30 Oct 2020 08:14:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>u.s. department of homeland security &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What&#8217;s My Priority? The Key Pillars of Threat Intelligence</title>
		<link>https://risk-academy.ru/whats-my-priority-the-key-pillars-of-threat-intelligence/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 29 Oct 2020 18:37:43 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[information technology]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[u.s. department of homeland security]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Why Is Spotting Threats More Complex]]></category>
		<category><![CDATA[certain application delivery systems]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/whats-my-priority-the-key-pillars-of-threat-intelligence/</guid>

					<description><![CDATA[Often, in the world of information security and risk management, the question facing threat intelligence teams is amidst this sea of vulnerability disclosures, which ones matter the most to my [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="single__height-calc">
<p><span class="">Often</span>, in the world of information security and risk management, the question facing threat intelligence teams is amidst this sea of vulnerability disclosures, which ones matter the most to my organization? Which can impact us the most? And, how do I best explain threats to internal stakeholders in a way that helps minimize risk?</p>
<p>Reducing risk through proper patch management is not always simple. Not all common vulnerabilities and exposures (CVEs) are equally important. In July 2020, for example, the U.S. Department of Homeland Security released multiple top-priority advisories. One covered known exploits against certain application delivery systems (CVE-2020-5902) and another covered detected vulnerabilities in a domain name system (DNS) server (CVE-2020-1350). While both are top priorities, how do they apply to the network you use? Which threats are the most likely to impact<em> your</em> core business?</p>
<p>To better answer this, we must be able to identify relevant threats before beginning to address patching or manage risks. Enter threat identification: a necessary process that has become increasingly complicated.</p>
<h2>Why Is Spotting Threats More Complex&#8230;</h2>
</div>
<p><a href="https://securityintelligence.com/posts/whats-my-priority-key-pillars-of-threat-intelligence-program/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Axon Global Presents Executive Insights on Cyber Enterprise Risk Management to DHS CISCP</title>
		<link>https://risk-academy.ru/axon-global-presents-executive-insights-on-cyber-enterprise-risk-management-to-dhs-ciscp/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 23 Oct 2020 02:01:19 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[ceo]]></category>
		<category><![CDATA[Executive]]></category>
		<category><![CDATA[WASHINGTON]]></category>
		<category><![CDATA[u.s. department of homeland security]]></category>
		<category><![CDATA[Vice President]]></category>
		<category><![CDATA[deputy assistant director]]></category>
		<category><![CDATA[President & CEO]]></category>
		<category><![CDATA[U.S. Secret Service]]></category>
		<category><![CDATA[Axon Global]]></category>
		<category><![CDATA[Axon Global Services]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/axon-global-presents-executive-insights-on-cyber-enterprise-risk-management-to-dhs-ciscp/</guid>

					<description><![CDATA[Israel Martinez, Axon Global CEO and Forbes Technology Council member. DHS CISA has been a powerful force positively impacting cybersecurity in the private sector &#13; WASHINGTON (PRWEB)&#13; October 22, 2020&#13; [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<div class="middle-column">
<div class="news-image"><img fetchpriority="high" decoding="async" title="ceo" itemprop="image" class="qa-news-image" src="https://ww1.prweb.com/prfiles/2018/04/27/17492011/gI_67500_synch%20magazine%20bust%20of%20martinez.png" width="250" height="241" alt="Israel Martinez, Axon Global CEO"/></p>
<p class="news-image-caption">Israel Martinez, Axon Global CEO and Forbes Technology Council member.</p>
</p></div>
<blockquote class="blockquote blockquote--lg quote-lines qa-news-quote"><p><span class="quote-start"/><span class="blockquote-text">DHS CISA has been a powerful force positively impacting cybersecurity in the private sector</span><span class="quote-end"/></p></blockquote></div>
<p class="article-date">&#13;<br />
                <span itemprop="contentLocation">WASHINGTON (PRWEB)</span>&#13;<br />
                <span itemprop="datePublished">October 22, 2020</span>&#13;
              </p>
<p class="responsiveNews"> NACD in the News&#13;<br />
<br />Forbes in the News</p>
<p class="responsiveNews">Axon Global Services (Axon), at the request of the Department of Homeland Security Cybersecurity &amp; Infrastructure Agency CISCP, presented its experience on the topic, “How executive leadership teams view cyber security; risk; and how they make decisions regarding people, process, and funding.” Presenting as subject matter experts were Israel Martinez, President &amp; CEO of Axon, and Stuart Tryon Senior Vice President of Axon and formerly the Deputy Assistant Director of the U.S. Secret Service. </p>
<p class="responsiveNews">The U.S. Department of Homeland Security (DHS) Cyber Information Sharing and Collaboration Program (CISCP), who hosted the session, enables actionable, relevant, and timely information exchange through trusted public-private partnerships across all&#8230;</p>
</div>
<p><a href="https://www.prweb.com/releases/axon_global_presents_executive_insights_on_cyber_enterprise_risk_management_to_dhs_ciscp/prweb17492011.htm">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DHS Works to Protect National Critical Infrastructure</title>
		<link>https://risk-academy.ru/dhs-works-to-protect-national-critical-infrastructure/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 04 Oct 2020 15:58:12 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[United States Department of Homeland Security]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[u.s. department of homeland security]]></category>
		<category><![CDATA[Federal government of the United States]]></category>
		<category><![CDATA[Agencies of the United States government]]></category>
		<category><![CDATA[Thad Odderstol]]></category>
		<category><![CDATA[DHS Cyber Security Division]]></category>
		<category><![CDATA[National Cybersecurity and Critical Infrastructure Protection Act]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/dhs-works-to-protect-national-critical-infrastructure/</guid>

					<description><![CDATA[Last month, the Cybersecurity and Infrastructure Security Agency (CISA), which is part of the U.S. Department of Homeland Security (DHS), published two important resources that deserve special attention. While many [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Last month, the Cybersecurity and Infrastructure Security Agency (CISA), which is part of the U.S. Department of Homeland Security (DHS), published two important resources that deserve special attention. While many of these CISA status reports may seem a bit like “alphabet soup” to those not familiar with the process, the importance of this National Critical Function (NCF) topic is paramount to our joint efforts to protect our nation’s critical infrastructure from numerous threats.</p>
<p>The &#8220;NCF: Status Update to the Critical Infrastructure Community&#8221; was released directly to stakeholders in July 2020, and the NCF Fact Sheet is new.</p>
<p>The release of this NCF report on progress in protecting our National Critical Functions is ground-breaking. In order to better understand the importance of this topic and dive deeper into what it means, I interviewed Thad Odderstol,&#8230;</p>
</div>
<p><a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/dhs-works-to-protect-national-critical-infrastructure.html">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ransomware Attacks — Assessing and Mitigating the Exposure of Fund Managers</title>
		<link>https://risk-academy.ru/ransomware-attacks-assessing-and-mitigating-the-exposure-of-fund-managers/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 18 Aug 2020 04:27:44 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[u.s. department of homeland security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[manager]]></category>
		<category><![CDATA[SECs office of Compliance Inspections and Examinations]]></category>
		<category><![CDATA[electronic infrastructure]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Homeland Securitys Cybersecurity and Infrastructure Security Agency]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/ransomware-attacks-assessing-and-mitigating-the-exposure-of-fund-managers/</guid>

					<description><![CDATA[Cybercriminals are targeting businesses of all kinds with ransomware attacks. As these attacks become more sophisticated, carrying the potential to effect a wholesale inability to access a firm’s entire electronic [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="lex-article-body" style="display:block" data-integrity-check="1103744E1628B682773CAA37CB1A0997" data-content-slug="28151f2c-6c81-49f8-9264-271a8f84e243" data-friendly-name="Ransomware Attacks — Assessing and Mitigating the Exposure of Fund Managers" data-firm-ref="17200" data-content-type="Article" data-workareas="5,21" data-jurisdictions="1">
<p>Cybercriminals are targeting businesses of all kinds with ransomware attacks. As these attacks become more sophisticated, carrying the potential to effect a wholesale inability to access a firm’s entire electronic infrastructure, ransom demands have increased — often reaching eight figures. Because these denial of access attacks have been so effective, making ransom payments has become mainstream in corporate America.</p>
<p>Private fund managers may be particularly attractive targets. Firms that are active traders could face potentially large trading losses if locked out of their systems. Firms that buy controlling stakes in companies could face ransomware attacks at both the manager and portfolio company levels.</p>
<p>With the recent surge in ransomware incidents, driven in part by vulnerabilities created due to the COVID-19 pandemic,[1] it is more important than ever for fund managers to take steps to safeguard their systems and data against an attack. Recent alerts from the SEC’s Office of Compliance Inspections and Examinations (“OCIE”) and the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (“CISA”) underscore the importance of&#8230;</p>
</div>
<p><a href="https://www.lexology.com/library/detail.aspx?g=28151f2c-6c81-49f8-9264-271a8f84e243">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 Ways Health Cos. Can Reduce Pandemic Cybersecurity Risk</title>
		<link>https://risk-academy.ru/5-ways-health-cos-can-reduce-pandemic-cybersecurity-risk/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 09 Jun 2020 23:01:43 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[Kristin Bryan Law360]]></category>
		<category><![CDATA[Ways Health Cos.]]></category>
		<category><![CDATA[Elliot Golding]]></category>
		<category><![CDATA[U.S. Department of Health and Human Services office for Civil Rights]]></category>
		<category><![CDATA[u.s. department of homeland security]]></category>
		<category><![CDATA[Elliot Golding Kristin Bryan]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/5-ways-health-cos-can-reduce-pandemic-cybersecurity-risk/</guid>

					<description><![CDATA[By Elliot Golding and Kristin Bryan Law360 is providing free access to its coronavirus coverage to make sure all members of the legal community have accurate information in this time [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="article-body">
				<span><br />
    	By <strong>Elliot Golding and Kristin Bryan</strong><br />
</span></p>
<p>
  Law360 is providing free access to its coronavirus coverage to make sure all members of the legal community have accurate information in this time of uncertainty and change. Use the form below to sign up for any of our daily newsletters. Signing up for any of our section newsletters will opt you in to the daily Coronavirus briefing.
</p>
<p>Law360 (June 9, 2020, 4:18 PM EDT) &#8212;
				</p>
<table width="80" border="0" align="right" cellpadding="5" cellspacing="0">
<tr>
<td><img decoding="async" title="Articles" src="https://assets.law360news.com/1280000/1280599/801c84b53d01ab16553ce2656911467cc2903013-washington_dc_golding_e_master.jpg" align="right" alt="Elliot Golding" style="margin: 5px 8px 0 8px; border: 1px solid #999; width: 120px;"/></td>
</tr>
<tr>
<td style="color:#999; text-align:center;font-size:12px;line-height:14px;padding-top:4px">Elliot Golding</td>
</tr>
<tr>
<td><img decoding="async" src="https://assets.law360news.com/1280000/1280599/a968ba881c0d43a04c0bf82670ecb1482cf5227b-cleveland_bryan_k_master.jpg" align="right" alt="Kristin Bryan" style="margin: 5px 8px 0 8px; border: 1px solid #999; width: 120px;"/></td>
</tr>
<tr>
<td style="color:#999; text-align:center;font-size:12px;line-height:14px;padding-top:4px">Kristin Bryan</td>
</tr>
</table>
<p>Robust cybersecurity continues to be of paramount importance as the COVID-19 outbreak develops and cybercriminals seek to exploit a remote workforce.</p>
<p>The Cybersecurity and Infrastructure Security Agency at the U.S. Department of Homeland Security recently issued an alert identifying the top 10 cybersecurity vulnerabilities routinely exploited by foreign malicious actors.[1]</p>
<p>The U.S. Department of Health and Human Services Office for Civil Rights shared the alert so health care organizations can likewise take appropriate action to reduce the potential risk of exploitation, as entities in this field are increasingly the target of cyberattacks.</p>
<p>This article provides a summary of the most common vulnerabilities and&#8230;</p>
</div>
<p><a href="https://www.law360.com/health/articles/1280599/5-ways-health-cos-can-reduce-pandemic-cybersecurity-risk-">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
