<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>U.S. government &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/u-s-government/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sat, 12 Dec 2020 13:23:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>U.S. government &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Mimecast : U.S. Government and Industry Aim to Secure 5G Networks</title>
		<link>https://risk-academy.ru/mimecast-u-s-government-and-industry-aim-to-secure-5g-networks/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 13:23:50 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[5G networks]]></category>
		<category><![CDATA[AT&T]]></category>
		<category><![CDATA[5G technology]]></category>
		<category><![CDATA[Secure 5G Networks]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[WASHINGTON]]></category>
		<category><![CDATA[Congress]]></category>
		<category><![CDATA[U.S. government]]></category>
		<category><![CDATA[5G network]]></category>
		<category><![CDATA[America]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/mimecast-u-s-government-and-industry-aim-to-secure-5g-networks/</guid>

					<description><![CDATA[Leadership changes in Washington coincide with the early-phase launch of 5G networks, which could accelerate policy on 5G cyber and network security in 2021. Key Points: The business promise of [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="grantexto">
<b><br />
   Leadership changes in Washington coincide with the early-phase launch of 5G networks, which could accelerate policy on 5G cyber and network security in 2021.<br />
  </b></p>
<p>
   <strong>Key Points:</strong>
  </p>
<ul>
<li>
    The business promise of 5G networks can only be realized if they are secure, despite new cyber risks on a vastly expanded attack surface.
   </li>
<li>
    Congress recently passed an Internet of Things security bill, showing bipartisan support for 5G security policy.
   </li>
<li>
    The incoming administration and Congress could accelerate a 5G national security strategy in 2021.
   </li>
</ul>
<p>
   U.S. government and industry have been setting the stage for 5G technology to achieve its full potential in America and launch the next wave of digital business transformation. But only if the 5G network is secure will it deliver on its business promise of quantum leaps in productivity, innovation and cost reduction.
  </p>
<p>
   A new 5G security report from AT&amp;T addressed this challenge directly: &#8216;Many scenarios will broaden connections among humans and machines more quickly and efficiently but also bring advanced attacks that can take down businesses,&#8230;</p>
</div>
<p><a href="https://www.marketscreener.com/quote/stock/MIMECAST-LIMITED-24949015/news/Mimecast-U-S-Government-and-Industry-Aim-to-Secure-5G-Networks-31996474/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Financial Crime During COVID-19: AML Fines on the Rise</title>
		<link>https://risk-academy.ru/financial-crime-during-covid-19-aml-fines-on-the-rise/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 10 Nov 2020 12:00:03 +0000</pubDate>
				<category><![CDATA[Блоги на английском]]></category>
		<category><![CDATA[Иностранные блоги]]></category>
		<category><![CDATA[anti-money laundering law]]></category>
		<category><![CDATA[Rise Gumundur Kristjnsson]]></category>
		<category><![CDATA[7+3]]></category>
		<category><![CDATA[Tax evasion]]></category>
		<category><![CDATA[ceo]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Financial regulation]]></category>
		<category><![CDATA[U.S. government]]></category>
		<category><![CDATA[New York City]]></category>
		<category><![CDATA[Lucinity]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/financial-crime-during-covid-19-aml-fines-on-the-rise/</guid>

					<description><![CDATA[Guðmundur Kristjánsson, CEO of Lucinity, discusses the recent uptick in AML fines and what this may portend for banks and other financial institutions in the fight against financial crime. The number [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
</p>
<div class="intro-text">
<p><em>Guðmundur Kristjánsson</em><em>, CEO of Lucinity, discusses the recent uptick in AML fines and what this may portend for banks and other financial institutions in the fight against financial crime.</em></p>
</div>
<p>The number of fines for anti-money laundering (AML) failures during the first half of 2020 has already outstripped those for the entirety of 2019. It’s evident, then, that we’re sitting on the cusp of another potential surge in financial crime, as the COVID-19 pandemic increases pressure on people, processes and systems across the world.</p>
<p>How then, can banks and major financial institutions mitigate the risk of financial crime and the increasing sophistication of money launderers, especially when criminals thrive in such chaotic and uncertain times?</p>
<h2>History Predicts the Future</h2>
<p>When we look back, the common denominator tying together the 21<sup>st</sup> century financial crime timeline is exploitation of a crisis. Possibly one of the most significant occurrences this side of the millennium took place on September 11, 2001 in New York City. The 9/11 tragedy prompted some of the biggest overhauls in anti-money laundering law and financial crime legislation in history, as the U.S. government sought to cut off terrorism funding at the source in the war against terror.[1]</p>
<p>The 2008 financial crisis provided another catalyst for&#8230;</p>
</div>
<p><a href="http://feedproxy.google.com/~r/CorporateComplianceInsights/~3/eR-ZcdqBW0s/">Подробнее&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>GovCons Weigh in on ODNI Supply Chain Warnings</title>
		<link>https://risk-academy.ru/govcons-weigh-in-on-odni-supply-chain-warnings/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 14 Oct 2020 17:10:24 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Justin Shirk]]></category>
		<category><![CDATA[BLA]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Business Finance]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[Director]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[U.S. government]]></category>
		<category><![CDATA[vice president of asymmetric analytics at Novetta]]></category>
		<category><![CDATA[National Intelligence]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/govcons-weigh-in-on-odni-supply-chain-warnings/</guid>

					<description><![CDATA[Image: blackred/iStock In a recently published document addressing supply chain risk, the Office of the Director of National Intelligence warns against “foreign attempts to compromise the integrity, trustworthiness, and authenticity [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<div id="attachment_213554" style="width: 904px" class="wp-caption alignnone"><img fetchpriority="high" decoding="async" title="United States" aria-describedby="caption-attachment-213554" alt="Network Connections World Map Polygon Graphic Background with Connected Lines. Image: blackred/iStock" width="894" height="497" srcset="https://washingtonexec.com/wp-content/uploads/2020/10/supply-chain-blackred--800x445.jpg 800w, https://washingtonexec.com/wp-content/uploads/2020/10/supply-chain-blackred-.jpg 1000w" src="https://washingtonexec.com/wp-content/uploads/2020/10/supply-chain-blackred--800x445.jpg" data-sizes="(max-width: 894px) 100vw, 894px" class=" wp-image-213554 lazyload"/><noscript><img decoding="async" aria-describedby="caption-attachment-213554" class=" wp-image-213554" src="https://washingtonexec.com/wp-content/uploads/2020/10/supply-chain-blackred--800x445.jpg" alt="Network Connections World Map Polygon Graphic Background with Connected Lines. Image: blackred/iStock" width="894" height="497" srcset="https://washingtonexec.com/wp-content/uploads/2020/10/supply-chain-blackred--800x445.jpg 800w, https://washingtonexec.com/wp-content/uploads/2020/10/supply-chain-blackred-.jpg 1000w" sizes="(max-width: 894px) 100vw, 894px"/></noscript></p>
<p id="caption-attachment-213554" class="wp-caption-text">Image: blackred/iStock</p>
</div>
<p><span style="font-weight: 400;">In a recently published </span><span style="font-weight: 400;">document</span><span style="font-weight: 400;"> addressing supply chain risk, the Office of the Director of National Intelligence warns against “foreign attempts to compromise the integrity, trustworthiness, and authenticity of products and services purchased and integrated into the operations of the U.S. Government, the Defense Industrial Base, and the private sector.”</span></p>
<p><span style="font-weight: 400;">Attacks on the supply chain represent “a complex and growing threat to strategically important U.S. economic sectors and critical infrastructure,” the agency notes. Foreign adversaries are attacking key supply chains at multiple points: From concept to design, manufacture, integration, deployment and maintenance.</span></p>
<p><span style="font-weight: 400;">GovCon leaders say the government does well to take the risks seriously, and they point to ways in which the contracting community can work hand-in-glove with federal officials to mitigate the threat.</span></p>
<p><span style="font-weight: 400;">“ODNI is definitely right to be concerned,” said Justin Shirk, vice president of asymmetric analytics at Novetta. “An area of real emerging risk on which we focus is in the provenance of software, both open-source or commercial. This is unfortunately inherently&#8230;</span></p>
</div>
<p><a href="https://washingtonexec.com/2020/10/govcons-weigh-in-on-odni-supply-chain-warnings/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5G Mobile Network Security: U.S. Government&#8217;s Strategy</title>
		<link>https://risk-academy.ru/5g-mobile-network-security-u-s-governments-strategy-2/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 20:34:18 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Wireless]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[Telecommunications]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Internet of things]]></category>
		<category><![CDATA[U.S. government]]></category>
		<category><![CDATA[5G supply chain]]></category>
		<category><![CDATA[5G mobile network infrastructure]]></category>
		<category><![CDATA[Mobile telecommunications]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/5g-mobile-network-security-u-s-governments-strategy-2/</guid>

					<description><![CDATA[by DH Kass • Aug 28, 2020 The Department of Homeland Security’s cyber wing has released a five point plan to safeguard the nation’s budding 5G mobile network infrastructure against [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p class="byline">by DH Kass • Aug 28, 2020</p>
<p>The Department of Homeland Security’s cyber wing has released a five point plan to safeguard the nation’s budding 5G mobile network infrastructure against cyber threats.</p>
<p>The document, entitled <em>CISA 5G Strategy: Ensuring the Security and Resilience of 5G Infrastructure in Our Nation</em>, details five “strategic initiatives” the Cybersecurity and Infrastructure Security Agency (CISA) is focused on:</p>
<ul>
<li>Support 5G policy and standards development by emphasizing security and resilience.</li>
<li>Expand situational awareness of 5G supply chain risks and promote security measures.</li>
<li>Partner with stakeholders to strengthen and secure existing infrastructure to support future 5G deployments.</li>
<li>Encourage innovation in the 5G marketplace to foster trusted 5G vendors.</li>
<li>Analyze potential 5G use cases and share information on risk management strategies.</li>
</ul>
<p>Of the strategic initiatives, each addresses “critical risks to secure 5G deployment, such as physical security concerns, attempts by threat actors to influence the design and architecture of the network, vulnerabilities within the 5G supply chain, and an increased attack surface for malicious actors to exploit&#8230;</p>
</div>
<p><a href="https://www.msspalert.com/cybersecurity-news/5g-doh-strategy/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5G Mobile Network Security: U.S. Government&#8217;s Strategy</title>
		<link>https://risk-academy.ru/5g-mobile-network-security-u-s-governments-strategy/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 20:34:18 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Wireless]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[Telecommunications]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Internet of things]]></category>
		<category><![CDATA[U.S. government]]></category>
		<category><![CDATA[5G supply chain]]></category>
		<category><![CDATA[5G mobile network infrastructure]]></category>
		<category><![CDATA[Mobile telecommunications]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/5g-mobile-network-security-u-s-governments-strategy/</guid>

					<description><![CDATA[by DH Kass • Aug 28, 2020 The Department of Homeland Security’s cyber wing has released a five point plan to safeguard the nation’s budding 5G mobile network infrastructure against [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p class="byline">by DH Kass • Aug 28, 2020</p>
<p>The Department of Homeland Security’s cyber wing has released a five point plan to safeguard the nation’s budding 5G mobile network infrastructure against cyber threats.</p>
<p>The document, entitled <em>CISA 5G Strategy: Ensuring the Security and Resilience of 5G Infrastructure in Our Nation</em>, details five “strategic initiatives” the Cybersecurity and Infrastructure Security Agency (CISA) is focused on:</p>
<ul>
<li>Support 5G policy and standards development by emphasizing security and resilience.</li>
<li>Expand situational awareness of 5G supply chain risks and promote security measures.</li>
<li>Partner with stakeholders to strengthen and secure existing infrastructure to support future 5G deployments.</li>
<li>Encourage innovation in the 5G marketplace to foster trusted 5G vendors.</li>
<li>Analyze potential 5G use cases and share information on risk management strategies.</li>
</ul>
<p>Of the strategic initiatives, each addresses “critical risks to secure 5G deployment, such as physical security concerns, attempts by threat actors to influence the design and architecture of the network, vulnerabilities within the 5G supply chain, and an increased attack surface for malicious actors to exploit&#8230;</p>
</div>
<p><a href="https://www.msspalert.com/cybersecurity-news/5g-doh-strategy/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Interconnected critical infrastructure increases cybersecurity risk</title>
		<link>https://risk-academy.ru/interconnected-critical-infrastructure-increases-cybersecurity-risk/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 05 Jul 2020 11:21:19 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Tennessee Valley Authority]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[energy]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Indianapolis]]></category>
		<category><![CDATA[senior program manager]]></category>
		<category><![CDATA[Steven Briggs]]></category>
		<category><![CDATA[U.S. government]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/interconnected-critical-infrastructure-increases-cybersecurity-risk/</guid>

					<description><![CDATA[&#13; The U.S. government identifies 16 sectors as critical infrastructure, but inconsistent regulations and management leave many sectors lacking security. The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="content-body">&#13;</p>
<p>The U.S. government identifies 16 sectors as critical infrastructure, but inconsistent regulations and management leave many sectors lacking security.</p>
<p>The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) lists the 16 critical infrastructure sectors on its website, and of those, only three &#8212; energy, government and nuclear &#8212; are under regulations mandating that security requirements be mapped to all five sections of the NIST Cybersecurity Framework (CSF). The health sector has HIPAA requirements, which map to the Protect section of the CSF, and the water sector has requirements that map how to Identify and Respond to cybersecurity incidents based on CSF guidelines.</p>
<p>At least one expert believes the risks could be exacerbated because of the interconnected nature of the sectors. Steven Briggs, senior program manager at Tennessee Valley Authority, spoke on the state of critical infrastructure cybersecurity at the virtual CircleCityCon, a security conference normally held in Indianapolis, and discussed his research with SearchSecurity. Briggs said one problem is cybersecurity rules have historically been reactionary: Of those&#8230;</p>
</div>
<p><a href="https://searchsecurity.techtarget.com/feature/Interconnected-critical-infrastructure-increases-cybersecurity-risk">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
