<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>United States &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/united-states/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Fri, 18 Dec 2020 04:32:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>United States &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>ClassNK Consulting Service launches ISM compliance support for cyber security</title>
		<link>https://risk-academy.ru/classnk-consulting-service-launches-ism-compliance-support-for-cyber-security/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 18 Dec 2020 04:32:56 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Business Finance]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[cyber risk management]]></category>
		<category><![CDATA[SMS]]></category>
		<category><![CDATA[United Nations]]></category>
		<category><![CDATA[U.S. Coast Guard]]></category>
		<category><![CDATA[nippon kaiji kyokai]]></category>
		<category><![CDATA[ISM Code]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/classnk-consulting-service-launches-ism-compliance-support-for-cyber-security/</guid>

					<description><![CDATA[(Image Courtesy: ClassNK) ClassNK Consulting Service Co., Ltd. (NKCS) has launched the service to support ship management companies in complying with ISM requirements for cyber security. Regarding IMO Resolution MSC.428(98), [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
      <!-- image --></p>
<div class="td-post-featured-image">
<figure><img fetchpriority="high" decoding="async" width="696" height="374" class="entry-thumb td-modal-image" src="https://i2.wp.com/seanews.co.uk/wp-content/uploads/2020/04/SN.jpg?resize=500%2C269&amp;ssl=1" srcset="https://i2.wp.com/seanews.co.uk/wp-content/uploads/2020/04/SN.jpg?w=500&amp;ssl=1 500w, https://i2.wp.com/seanews.co.uk/wp-content/uploads/2020/04/SN.jpg?resize=300%2C161&amp;ssl=1 300w, https://i2.wp.com/seanews.co.uk/wp-content/uploads/2020/04/SN.jpg?resize=768%2C413&amp;ssl=1 768w, https://i2.wp.com/seanews.co.uk/wp-content/uploads/2020/04/SN.jpg?resize=696%2C374&amp;ssl=1 696w, https://i2.wp.com/seanews.co.uk/wp-content/uploads/2020/04/SN.jpg?resize=781%2C420&amp;ssl=1 781w, https://i2.wp.com/seanews.co.uk/wp-content/uploads/2020/04/SN.jpg?resize=150%2C81&amp;ssl=1 150w" sizes="(max-width: 696px) 100vw, 696px" alt="United States" title="SN"/><figcaption class="wp-caption-text">(Image Courtesy: ClassNK)</figcaption></figure>
</div>
<p>      <!-- content --></p>
<p>ClassNK Consulting Service Co., Ltd. (NKCS) has launched the service to support ship management companies in complying with ISM requirements for cyber security.</p>
<p>Regarding IMO Resolution MSC.428(98), which recommends that a safety management system should take into account cyber risk management in accordance with the ISM Code requirements, the number of flag states making it compulsory from 2021 is increasing.</p>
<p>In particular, the U.S. Coast Guard (USCG) has announced that it will make this recommendation mandatory for U.S. flagged vessels and foreign flagged vessels that call on ports in the U.S. However, detailed information is not always enough at present, and NKCS is aware that many shipping companies are struggling with the specifics of how to handle this issue.</p>
<p>In response to this situation, NKCS has launched the service to incorporate cyber risk management into an existing SMS manual as its support for ship management companies in complying with ISM requirements for cyber security.</p>
<p>Based on a systematic and comprehensive approach to the cyber risks that may occur onboard and the recommended elements (Identify,&#8230;</p>
</div>
<p><a href="https://seanews.co.uk/news/classnk-consulting-service-launches-ism-compliance-support-for-cyber-security/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mimecast : U.S. Government and Industry Aim to Secure 5G Networks</title>
		<link>https://risk-academy.ru/mimecast-u-s-government-and-industry-aim-to-secure-5g-networks/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 13:23:50 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Secure 5G Networks]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[WASHINGTON]]></category>
		<category><![CDATA[Congress]]></category>
		<category><![CDATA[U.S. government]]></category>
		<category><![CDATA[5G network]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[5G networks]]></category>
		<category><![CDATA[AT&T]]></category>
		<category><![CDATA[5G technology]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/mimecast-u-s-government-and-industry-aim-to-secure-5g-networks/</guid>

					<description><![CDATA[Leadership changes in Washington coincide with the early-phase launch of 5G networks, which could accelerate policy on 5G cyber and network security in 2021. Key Points: The business promise of [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="grantexto">
<b><br />
   Leadership changes in Washington coincide with the early-phase launch of 5G networks, which could accelerate policy on 5G cyber and network security in 2021.<br />
  </b></p>
<p>
   <strong>Key Points:</strong>
  </p>
<ul>
<li>
    The business promise of 5G networks can only be realized if they are secure, despite new cyber risks on a vastly expanded attack surface.
   </li>
<li>
    Congress recently passed an Internet of Things security bill, showing bipartisan support for 5G security policy.
   </li>
<li>
    The incoming administration and Congress could accelerate a 5G national security strategy in 2021.
   </li>
</ul>
<p>
   U.S. government and industry have been setting the stage for 5G technology to achieve its full potential in America and launch the next wave of digital business transformation. But only if the 5G network is secure will it deliver on its business promise of quantum leaps in productivity, innovation and cost reduction.
  </p>
<p>
   A new 5G security report from AT&amp;T addressed this challenge directly: &#8216;Many scenarios will broaden connections among humans and machines more quickly and efficiently but also bring advanced attacks that can take down businesses,&#8230;</p>
</div>
<p><a href="https://www.marketscreener.com/quote/stock/MIMECAST-LIMITED-24949015/news/Mimecast-U-S-Government-and-Industry-Aim-to-Secure-5G-Networks-31996474/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Top 9 Cybersecurity Certifications (2020)</title>
		<link>https://risk-academy.ru/top-9-cybersecurity-certifications-2020/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 10 Dec 2020 19:38:27 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[important tool]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Operating systems]]></category>
		<category><![CDATA[Illinois Institute of Technology]]></category>
		<category><![CDATA[real-time scenarios]]></category>
		<category><![CDATA[hacking technologies]]></category>
		<category><![CDATA[cloud computing technology]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/top-9-cybersecurity-certifications-2020/</guid>

					<description><![CDATA[Cybersecurity is becoming increasingly crucial for businesses in every sector, and it is especially vital for small- to medium-sized organizations. Cyberattacks continue to become a major problem in the United [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="mvp-content-main">
<p>Cybersecurity is becoming increasingly crucial for businesses in every sector, and it is especially vital for small- to medium-sized organizations. Cyberattacks continue to become a major problem in the United States and the rest of the globe, often times resulting in customer information being stolen.</p>
<p>Because of this increased risk, cybersecurity certifications are an important tool to prepare against the attacks. The high demand for cybersecurity skills means a top cybersecurity certification will boost one’s resumé.</p>
<p>With so many cybersecurity certifications to choose from, let’s take a look at the top ones on the market:</p>
<p>The Certified Ethical Hacker (CEH) course was developed in order to get you thinking like a hacker, which is crucial to stop one.</p>
<p>The class covers various topics and tools such as hacking technologies that are used against cloud computing technology, mobile platforms and operating systems. It also covers the latest malware and viruses, as well as information security laws and standards.</p>
<p>One of the fundamental aspects of the course is real-time scenarios, where you are exposed to various ways in which hackers breach networks and steal information. You will&#8230;</p>
</div>
<p><a href="https://www.unite.ai/top-cybersecurity-certifications/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What do cyber insurance, Fintech services, and cloud data warehouses have in common?</title>
		<link>https://risk-academy.ru/what-do-cyber-insurance-fintech-services-and-cloud-data-warehouses-have-in-common/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 09 Dec 2020 23:34:05 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Itai Damti]]></category>
		<category><![CDATA[ceo]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[CTO]]></category>
		<category><![CDATA[bank accounts]]></category>
		<category><![CDATA[Doron Somech]]></category>
		<category><![CDATA[Screenshot Unit]]></category>
		<category><![CDATA[organizational infrastructure]]></category>
		<category><![CDATA[Flourish Ventures]]></category>
		<category><![CDATA[users custom financial services]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/what-do-cyber-insurance-fintech-services-and-cloud-data-warehouses-have-in-common/</guid>

					<description><![CDATA[Unit exits stealth mode Israeli Fintech startup Unit emerges from stealth mode announcing both Seed and Series A funding rounds, totaling $18.6 million. The startup, which develops a financial services [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<h2 id="unit-exits-stealth-mode">Unit exits stealth mode </h2>
<p>Israeli Fintech startup <em>Unit </em>emerges from stealth mode announcing both Seed and Series A funding rounds, totaling $18.6 million. The startup, which develops a financial services platform for enterprises, had both investments led by <em>TLV Partners </em>($3.6 million Seed round) and <em>Aleph </em>($15 million Series A). The rounds also saw participation from <em>Better Tomorrow Ventures, Flourish Ventures, OperatorVC, </em>and 30 Angels from the Fintech sphere.</p>
<h3 id="implement-financial-tools-at-core">Implement financial tools at core</h3>
<figure class="kg-card kg-image-card kg-card-hascaption"><img decoding="async" title="ceo" src="https://www.geektime.com/content/images/2020/12/UNIT-1607430934-1024x598.png" class="kg-image" alt="ceo" /><figcaption>Screenshot</figcaption></figure>
<p><em>Unit </em>develops a platform that helps organizations create financial features in their existing products. For example linking bank accounts, payments, loans, and more. <em>Unit </em>claims that by utilizing its service, clients can provide their users custom financial services integrated into their core technologies.</p>
<p>The system is implemented into the organizational infrastructure, and it takes care of the tedious and complicated negotiation process with banks, as well as helping meet bureaucratic regulations. The company was founded by CEO Itai Damti and CTO Doron Somech, who previously founded <em>Leverate </em>in 2008. <em>Unit</em>’s system is currently available in the U.S., with the new&#8230;</p>
</div>
<p><a href="https://www.geektime.com/what-do-cyber-insurance-fintech-services-and-cloud-data-warehouses-have-in-common/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CSBS Proposes Prudential Standards for Servicers &#124; Alston &#038; Bird</title>
		<link>https://risk-academy.ru/csbs-proposes-prudential-standards-for-servicers-alston-bird/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 03 Dec 2020 22:05:02 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[mortgage bank mortgage servicers]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Financial Stability Oversight Council]]></category>
		<category><![CDATA[STATE BANK]]></category>
		<category><![CDATA[Fannie Mae]]></category>
		<category><![CDATA[the federal housing finance agency]]></category>
		<category><![CDATA[Mortgage Servicing Rights Task Force]]></category>
		<category><![CDATA[alston & bird]]></category>
		<category><![CDATA[Freddie Mac]]></category>
		<category><![CDATA[Federal Housing Finance Agency]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/csbs-proposes-prudential-standards-for-servicers-alston-bird/</guid>

					<description><![CDATA[A&#38;B Abstract: The Conference of State Bank Supervisors (“CSBS”) proposed regulatory prudential standards (the “Standards”) to develop a consistent regulatory structure of nonbank mortgage servicers.  Comments on all aspects of [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="html-view-content">
<p><strong><em>A&amp;B Abstract:</em></strong> The Conference of State Bank Supervisors (“CSBS”) proposed regulatory prudential standards (the “Standards”) to develop a consistent regulatory structure of nonbank mortgage servicers.  Comments on all aspects of the Standards are encouraged by December 31, 2020.</p>
<h4><strong><em>Background:</em></strong></h4>
<p>Since the financial crisis, the rapid growth of mortgage bank mortgage servicers has led regulators to call for the enhanced oversight of such entities.  The Financial Stability Oversight Council (charged under the Dodd-Frank Act with identifying risk to the stability of the U.S. markets) recommended in its 2014 and 2019 annual reports that state regulators work collaboratively to develop prudential and corporate governance standards. Earlier this year, the Federal Housing Finance Agency (FHFA) proposed new financial eligibility requirement for nonbank servicers doing business with Fannie Mae and Freddie Mac.</p>
<p>In 2015, state regulators working through the Mortgage Servicing Rights Task Force proposed baseline and enhanced prudential regulatory standards (including capital and net worth requirements) for nonbank mortgage servicers.  Although those standards were not finalized,&#8230;</p>
</div>
<p><a href="https://www.jdsupra.com/legalnews/csbs-proposes-prudential-standards-for-22192/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>US Coast Guard could detain ships not complying with IMO guidelines</title>
		<link>https://risk-academy.ru/us-coast-guard-could-detain-ships-not-complying-with-imo-guidelines/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 02 Dec 2020 05:55:35 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Foreign relations]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[cyber risk management]]></category>
		<category><![CDATA[Countries]]></category>
		<category><![CDATA[United Nations]]></category>
		<category><![CDATA[Insurance]]></category>
		<category><![CDATA[Robert Dorey]]></category>
		<category><![CDATA[CEO of cyber risk management]]></category>
		<category><![CDATA[US Coast Guard]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/us-coast-guard-could-detain-ships-not-complying-with-imo-guidelines/</guid>

					<description><![CDATA[Ships sailing in US waters could be detained if they are found not to be complying with the IMO’s cyber risk management guidelines. The guidance to inspectors on how to [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>            <img decoding="async" title="United States" width="120" height="100" src="https://www.hellenicshippingnews.com/wp-content/uploads/2020/06/astaara.jpg" class="alignleft wp-post-image" alt="United States" loading="lazy"/>                      </p>
<p>Ships sailing in US waters could be detained if they are found not to be complying with the IMO’s cyber risk management guidelines.</p>
<p>The guidance to inspectors on how to enforce the guidelines, which come into effect in January, states that serious deficiencies will require fixing and an external audit carried out within 90 days, or risk detention. Minor deficiencies will need an internal audit within 90 days and the deficiencies to be fixed prior to departure.</p>
<p>Robert Dorey, CEO of cyber risk management and insurance company, Astaara, said the USCG’s position is a stark warning to shipowners that non-compliance is not an option.</p>
<p>‘The US Coast Guard have fired the first salvo and have put operators of foreign flagged vessels on clear notice that if they arrive in a US port without the required cyber security/hygiene, they risk being impounded, or at the very least being required to undertake rapid remediation,’ he said.</p>
<p>‘There are indications in the document that cyber security will start to be regarded as a fundamental enabler for seaworthiness. It is also clear&#8230;</p>
</div>
<p><a href="https://www.hellenicshippingnews.com/us-coast-guard-could-detain-ships-not-complying-with-imo-guidelines/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Conversation with Former CISA Director Christopher Krebs</title>
		<link>https://risk-academy.ru/a-conversation-with-former-cisa-director-christopher-krebs/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 30 Nov 2020 18:47:53 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[George Mason University]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Virginia]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[Director]]></category>
		<category><![CDATA[Christopher Krebs]]></category>
		<category><![CDATA[Homeland Securitys Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[University of Virginia]]></category>
		<category><![CDATA[first director of the Department]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/a-conversation-with-former-cisa-director-christopher-krebs/</guid>

					<description><![CDATA[Guests Christopher Krebs, Former CISA Director Christopher Krebs served as the first director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). As Director, Mr. Krebs oversaw [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<section>
<p><h3 class="font--subhead gray-darkest ma-0 pb-sm pt-lgmod">Guests</h3>
</p>
<p><h3 class="font--subhead gray-darkest ma-0 pb-sm pt-lgmod">Christopher Krebs, Former CISA Director</h3>
</p>
<div>
<p class="font--body font-copy gray-darkest ma-0 pb-md ">Christopher Krebs served as the first director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). As Director, Mr. Krebs oversaw CISA’s efforts to manage risk to the nation&#8217;s businesses and government agencies, bringing together partners to collectively defend against cyber and physical threats.</p>
</div>
<div>
<p class="font--body font-copy gray-darkest ma-0 pb-md ">Before serving as CISA Director, Mr. Krebs served in various roles at the Department, responsible for a range of cybersecurity, critical infrastructure, and national resilience issues.</p>
</div>
<div>
<p class="font--body font-copy gray-darkest ma-0 pb-md ">Prior to coming to DHS, he directed U.S. cybersecurity policy for Microsoft. Before Microsoft, Mr. Krebs consulted industry and government clients on complex cybersecurity and business risk matters.</p>
</div>
<div>
<p class="font--body font-copy gray-darkest ma-0 pb-md ">He previously served in the Bush Administration, advising DHS leadership on domestic and international risk management and public private partnership initiatives.</p>
</div>
<div>
<p class="font--body font-copy gray-darkest ma-0 pb-md ">Mr. Krebs holds a bachelor’s degree in environmental sciences from the University of Virginia and a J.D. from the Antonin Scalia Law School at George Mason University.</p>
</div>
</section>
</div>
<p><a href="https://www.washingtonpost.com/washington-post-live/2020/12/02/conversation-with-christopher-krebs/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity In A Digital Age – &#8220;The Only Truly Secure System Is One That Is Powered Off&#8221; &#8211; Technology</title>
		<link>https://risk-academy.ru/cybersecurity-in-a-digital-age-the-only-truly-secure-system-is-one-that-is-powered-off-technology/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 28 Nov 2020 16:36:57 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Dara Panahy]]></category>
		<category><![CDATA[Glenn]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[General Counsel]]></category>
		<category><![CDATA[Allan Marks]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cybersecurity-in-a-digital-age-the-only-truly-secure-system-is-one-that-is-powered-off-technology/</guid>

					<description><![CDATA[&#13; &#13; United States: &#13; &#13; Cybersecurity In A Digital Age – &#8220;The Only Truly Secure System Is One That Is Powered Off&#8221;&#13; &#13; 27 November 2020 &#13; Milbank LLP&#13; [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>&#13;</p>
<h2>&#13;<br />
              <span class="region-heading">United States: </span>&#13;<br />
&#13;<br />
              Cybersecurity In A Digital Age – &#8220;The Only Truly Secure System Is One That Is Powered Off&#8221;&#13;<br />
            </h2>
<p>&#13;
          </p>
<div class="article-author-info">
<div class="article-author-info-left">
<div class="smalltext">
<p>27 November 2020 </p>
<p>&#13;<br />
                  Milbank LLP&#13;
                </p>
</p></div>
</p></div>
<div class="authorphoto">
                      <img decoding="async" title="United States" alt="United States" class="author-logo" src="https://www.mondaq.com/images/profile/individual/473568.jpg"/>
            </div>
</p></div>
</p></div>
<p>&#13;<br />
            To print this article, all you need is to be registered or login on Mondaq.com.&#13;
          </p>
<div id="articlebody">
<p><strong>&#8220;The Only Truly Secure System Is One That Is&#13;<br />
Powered Off&#8221; – Cybersecurity In A Digital Age</strong>&#13;<br />
&#8211; Podcast episode with Milbank partners Allan Marks and Dara&#13;<br />
Panahy with former NSA General Counsel Glenn S. Gerstell</p>
<p><img decoding="async" src="https://www.mondaq.com/images/article_images/1010520a.jpg" width="534" height="174" alt="1010520a.jpg"/></p>
<p>There are two perspectives from which to examine cybersecurity.&#13;<br />
Big&#8230;</p>
</div>
<p><a href="https://www.mondaq.com/unitedstates/security/1010520/cybersecurity-in-a-digital-age-the-only-truly-secure-system-is-one-that-is-powered-off">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What&#8217;s New in NIST SP 800 53 Rev 5</title>
		<link>https://risk-academy.ru/whats-new-in-nist-sp-800-53-rev-5/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 28 Nov 2020 01:31:10 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[NIST Special Publication 800-53]]></category>
		<category><![CDATA[NIST SP 800-90B]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[federal government]]></category>
		<category><![CDATA[federal information systems]]></category>
		<category><![CDATA[Regulation]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/whats-new-in-nist-sp-800-53-rev-5/</guid>

					<description><![CDATA[NIST Special Publication (SP) 800-53 offers regulatory guidelines and controls for federal information systems except those relating to national security. This catalog of security and privacy controls has been used [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="hs_cos_wrapper_post_body">
<p>NIST Special Publication (SP) 800-53 offers regulatory guidelines and controls for federal information systems except those relating to national security. This catalog of security and privacy controls has been used and adopted by a range of organizations both apart of the federal government and beyond due to the comprehensive nature of the control set. </p>
<p>Back in 2017, NIST released the first public draft of SP 800-53 Revision 5. In September of 2020, NIST released the official version of Rev 5, following what NIST describes as “a multi-year effort to develop the next generation of security and privacy controls needed to strengthen and support the Federal Government and every sector of critical infrastructure,” and with it has come a monumental sweep of changes for federal agencies and non-governmental organizations alike to use in an effort to protect the critical systems, components, and services that defend the United States.</p>
<h2>Many of the major changes in NIST Special Publication 800-53 include, but are not limited to…</h2>
<p>Controls for information systems and security controls are integrated into a seamless catalog for information systems and organizations. Privacy elements are&#8230;</p>
</div>
<p><a href="https://securityboulevard.com/2020/11/whats-new-in-nist-sp-800-53-rev-5/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Comparing top 11 cyber protection solutions for businesses</title>
		<link>https://risk-academy.ru/comparing-top-11-cyber-protection-solutions-for-businesses/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 23 Nov 2020 11:05:45 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Richard A. Clarke]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[National security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[advisor]]></category>
		<category><![CDATA[Information]]></category>
		<category><![CDATA[cyber protection solutions]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/comparing-top-11-cyber-protection-solutions-for-businesses/</guid>

					<description><![CDATA[“If you spend more on coffee than on IT security, you’ll be hacked. What’s more, you deserve to be hacked.” – Richard A. Clarke, American Advisor. Cybersecurity is a key [&#8230;]]]></description>
										<content:encoded><![CDATA[<div itemprop="text">
<p style="text-align: justify;">“<em>If you spend more on coffee than on IT security, you’ll be hacked. What’s more, you deserve to be hacked</em>.” – <strong>Richard A. Clarke, American Advisor.</strong></p>
<p style="text-align: justify;">Cybersecurity is a key enterprise-wide concern for organizations. Whether you’re a small organization with 2-100 employees or a corporate giant with more than 10,000 employees, if you’re dealing with data, you’re always at the risk of a cyber-attack.</p>
<p style="text-align: justify;">Look at some of the astounding cyber-security statistics<sup>1</sup>:</p>
<ul style="text-align: justify;">
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li>Data breaches exposed 4.1 billion records in the first half of the year 2019.</li>
<li>Security breaches have increased by 11% since 2018.</li>
<li>The average time to identify a breach was 206 days in 2019.</li>
<li>The average cost of a data breach is $3.92 million as of 2019.</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
</ul>
<p style="text-align: justify;">Coupled with digital transformation and increasing cloud migration, the cyber-risk of companies has increased. As businesses and individuals expose themselves to digital ecosystems, they need to equally pay attention to control their risk of falling prey to a cyber-attack.</p>
<p style="text-align: justify;">And, amidst the coronavirus pandemic, these cyber crimes have increased by 600%. There has also been an increase in phishing emails and coronavirus scams.</p>
<p style="text-align: justify;">As cyber-criminals become&#8230;</p>
</div>
<p><a href="https://www.dailyhostnews.com/top-11-cyber-protection-solutions-for-businesses-a-comparison">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
