<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Zoom Airlines &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/zoom-airlines/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Mon, 26 Oct 2020 00:18:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Zoom Airlines &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>End that Zoom call and take a step back…</title>
		<link>https://risk-academy.ru/end-that-zoom-call-and-take-a-step-back/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 26 Oct 2020 00:18:10 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Zoom Airlines]]></category>
		<category><![CDATA[Web conferencing]]></category>
		<category><![CDATA[Fictional characters]]></category>
		<category><![CDATA[DC Comics characters]]></category>
		<category><![CDATA[Vulnerability Management]]></category>
		<category><![CDATA[chief data officer]]></category>
		<category><![CDATA[protective tools]]></category>
		<category><![CDATA[Fictional serial killers]]></category>
		<category><![CDATA[Videotelephony]]></category>
		<category><![CDATA[Airlines]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/end-that-zoom-call-and-take-a-step-back/</guid>

					<description><![CDATA[If you are the CISO of a mid-sized enterprise, end that zoom call and take a step back. You probably spent 60+ hrs in Zoom meetings this week. Your team [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="">
<p>If you are the CISO of a mid-sized enterprise, end that zoom call and take a step back.</p>
<p>You probably spent 60+ hrs in Zoom meetings this week.</p>
<p>Your team has been working really hard over the last few months dealing with the change to a work-from-home workforce. Lots of sweat (and hopefully no blood). But, you are still 1 click away from a major breach, and your company’s attack surface continues to grow.</p>
<p>If reading this makes you uncomfortable, perhaps it is time to reserve some team cycles to “changing the business” as opposed to “running the business.” This is the only way you will make progress on that strategic infosec roadmap you promised your board and senior management earlier this year.</p>
<p> </p>
<h3><img decoding="async" title="Web conferencing" loading="lazy" class="wp-image-5075 size-full aligncenter" src="https://www.balbix.com/app/uploads/Roadmap-to-change-e1603495201953.png" alt="Roadmap to change" width="890" height="208" srcset="https://securityboulevard.com/app/uploads/Roadmap-to-change-e1603495201953.png 890w, https://securityboulevard.com/app/uploads/Roadmap-to-change-e1603495201953-300x70.png 300w, https://securityboulevard.com/app/uploads/Roadmap-to-change-e1603495201953-768x179.png 768w" sizes="auto, (max-width: 890px) 100vw, 890px"/></h3>
<h3>Getting Started</h3>
<p>Getting started is pretty straightforward: you need to invest in <strong>continuous cybersecurity visibility</strong> and <strong>risk-based analytics</strong>:</p>
<ol>
<li>Hire (or re-purpose) one person on your team to become your “chief data officer”</li>
<li>Deploy a tool like Balbix</li>
<li>Create a map between network/endpoint vulnerabilities and risk owners</li>
<li>Use the data-driven risk-based prioritization across all aspects of your security program: vulnerability management, protective tools, incidence response, and your&#8230;</li>
</ol>
</div>
<p><a href="https://securityboulevard.com/2020/10/end-that-zoom-call-and-take-a-step-back/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
