<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Resources</title>
    <link>https://277648.hs-sites.com/resources</link>
    <description>Access cybersecurity &amp; third-party risk management resources including ebooks, data sheets, white papers, videos, webinars, case studies, reports &amp; more.</description>
    <language>en</language>
    <pubDate>Fri, 29 Oct 2021 14:48:56 GMT</pubDate>
    <dc:date>2021-10-29T14:48:56Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>On-Demand: 5 Things You May Not Have Known About Cyber Risk Quantification</title>
      <link>https://277648.hs-sites.com/resources/5-things-you-may-not-have-known-about-cyber-risk-quantification</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/5-things-you-may-not-have-known-about-cyber-risk-quantification" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/5%20things%20you%20may%20not%20have%20known%20about%20cyber%20risk%20quantification_cover.png" alt="On-Demand: 5 Things You May Not Have Known About Cyber Risk Quantification" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/5-things-you-may-not-have-known-about-cyber-risk-quantification" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/5%20things%20you%20may%20not%20have%20known%20about%20cyber%20risk%20quantification_cover.png" alt="On-Demand: 5 Things You May Not Have Known About Cyber Risk Quantification" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=277648&amp;amp;k=14&amp;amp;r=https%3A%2F%2F277648.hs-sites.com%2Fresources%2F5-things-you-may-not-have-known-about-cyber-risk-quantification&amp;amp;bu=https%253A%252F%252F277648.hs-sites.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity</category>
      <pubDate>Fri, 29 Oct 2021 14:48:56 GMT</pubDate>
      <author>bryana.dacri@bitsighttech.com (Bryana Dacri)</author>
      <guid>https://277648.hs-sites.com/resources/5-things-you-may-not-have-known-about-cyber-risk-quantification</guid>
      <dc:date>2021-10-29T14:48:56Z</dc:date>
    </item>
    <item>
      <title>Fireside Chat: Hot Topics in Cybersecurity with Former White House CIO Theresa Payton</title>
      <link>https://277648.hs-sites.com/resources/fireside-chat-hot-topics-in-cybersecurity-with-former-white-house-cio-theresa-payton</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/fireside-chat-hot-topics-in-cybersecurity-with-former-white-house-cio-theresa-payton" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/Webinar_Slides/Cybersecurity%20with%20Theresa%20Payton_Cover.png" alt="Fireside Chat: Hot Topics in Cybersecurity with Former White House CIO Theresa Payton" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/fireside-chat-hot-topics-in-cybersecurity-with-former-white-house-cio-theresa-payton" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/Webinar_Slides/Cybersecurity%20with%20Theresa%20Payton_Cover.png" alt="Fireside Chat: Hot Topics in Cybersecurity with Former White House CIO Theresa Payton" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=277648&amp;amp;k=14&amp;amp;r=https%3A%2F%2F277648.hs-sites.com%2Fresources%2Ffireside-chat-hot-topics-in-cybersecurity-with-former-white-house-cio-theresa-payton&amp;amp;bu=https%253A%252F%252F277648.hs-sites.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity</category>
      <category>Executive Reporting</category>
      <pubDate>Fri, 29 Oct 2021 14:09:33 GMT</pubDate>
      <author>bryana.dacri@bitsighttech.com (Bryana Dacri)</author>
      <guid>https://277648.hs-sites.com/resources/fireside-chat-hot-topics-in-cybersecurity-with-former-white-house-cio-theresa-payton</guid>
      <dc:date>2021-10-29T14:09:33Z</dc:date>
    </item>
    <item>
      <title>On-Demand: The Future of Cybersecurity: A Fireside Chat with Derek Vadala, VisibleRisk</title>
      <link>https://277648.hs-sites.com/resources/the-future-of-cybersecurity-a-fireside-chat-with-derek-vadala-visiblerisk</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/the-future-of-cybersecurity-a-fireside-chat-with-derek-vadala-visiblerisk" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/Webinar_Slides/The%20Future%20of%20Cybersecurity%20A%20Fireside%20Chat%20with%20Derek%20Vadala%20VisibleRisk_thumb.png" alt="On-Demand: The Future of Cybersecurity: A Fireside Chat with Derek Vadala, VisibleRisk" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/the-future-of-cybersecurity-a-fireside-chat-with-derek-vadala-visiblerisk" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/Webinar_Slides/The%20Future%20of%20Cybersecurity%20A%20Fireside%20Chat%20with%20Derek%20Vadala%20VisibleRisk_thumb.png" alt="On-Demand: The Future of Cybersecurity: A Fireside Chat with Derek Vadala, VisibleRisk" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=277648&amp;amp;k=14&amp;amp;r=https%3A%2F%2F277648.hs-sites.com%2Fresources%2Fthe-future-of-cybersecurity-a-fireside-chat-with-derek-vadala-visiblerisk&amp;amp;bu=https%253A%252F%252F277648.hs-sites.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity</category>
      <category>Executive Reporting</category>
      <pubDate>Thu, 21 Oct 2021 15:55:50 GMT</pubDate>
      <author>bryana.dacri@bitsighttech.com (Bryana Dacri)</author>
      <guid>https://277648.hs-sites.com/resources/the-future-of-cybersecurity-a-fireside-chat-with-derek-vadala-visiblerisk</guid>
      <dc:date>2021-10-21T15:55:50Z</dc:date>
    </item>
    <item>
      <title>On-Demand: 5 Quick Ways To Mature Your Third Party Risk Management Program</title>
      <link>https://277648.hs-sites.com/resources/on-demand-5-quick-ways-to-mature-your-third-party-risk-management-program</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/on-demand-5-quick-ways-to-mature-your-third-party-risk-management-program" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/Webinar_Slides/5%20Quick%20Ways%20to%20Mature%20Your%20TPRM%20Program.png" alt="On-Demand: 5 Quick Ways To Mature Your Third Party Risk Management Program" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/on-demand-5-quick-ways-to-mature-your-third-party-risk-management-program" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/Webinar_Slides/5%20Quick%20Ways%20to%20Mature%20Your%20TPRM%20Program.png" alt="On-Demand: 5 Quick Ways To Mature Your Third Party Risk Management Program" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=277648&amp;amp;k=14&amp;amp;r=https%3A%2F%2F277648.hs-sites.com%2Fresources%2Fon-demand-5-quick-ways-to-mature-your-third-party-risk-management-program&amp;amp;bu=https%253A%252F%252F277648.hs-sites.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity</category>
      <category>Third Party Risk Management</category>
      <pubDate>Thu, 16 Sep 2021 13:17:21 GMT</pubDate>
      <author>bryana.dacri@bitsighttech.com (Bryana Dacri)</author>
      <guid>https://277648.hs-sites.com/resources/on-demand-5-quick-ways-to-mature-your-third-party-risk-management-program</guid>
      <dc:date>2021-09-16T13:17:21Z</dc:date>
    </item>
    <item>
      <title>On-Demand: Reinventing Cyber Risk Quantification</title>
      <link>https://277648.hs-sites.com/resources/reinventing-cyber-risk-quantification</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/reinventing-cyber-risk-quantification" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/Webinar_Slides/BitSight%20IDC%20Webinar%20-%20Reinventing%20Cyber%20Risk%20Quantification.png" alt="Reinventing Cyber Risk Quantification" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/reinventing-cyber-risk-quantification" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/Webinar_Slides/BitSight%20IDC%20Webinar%20-%20Reinventing%20Cyber%20Risk%20Quantification.png" alt="Reinventing Cyber Risk Quantification" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=277648&amp;amp;k=14&amp;amp;r=https%3A%2F%2F277648.hs-sites.com%2Fresources%2Freinventing-cyber-risk-quantification&amp;amp;bu=https%253A%252F%252F277648.hs-sites.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security Risk Management</category>
      <category>Cybersecurity</category>
      <category>Executive Reporting</category>
      <pubDate>Wed, 25 Aug 2021 14:46:31 GMT</pubDate>
      <author>bryana.dacri@bitsighttech.com (Bryana Dacri)</author>
      <guid>https://277648.hs-sites.com/resources/reinventing-cyber-risk-quantification</guid>
      <dc:date>2021-08-25T14:46:31Z</dc:date>
    </item>
    <item>
      <title>Video: BitSight customer Epiq uses security ratings to confidently remediate cybersecurity risks</title>
      <link>https://277648.hs-sites.com/resources/case-study-epiq</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/case-study-epiq" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/case_studies/Epiq%20Case%20Study%20Video%20Thumb.png" alt="BitSight customer Epiq uses security ratings to confidently remediate cybersecurity risks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/case-study-epiq" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/case_studies/Epiq%20Case%20Study%20Video%20Thumb.png" alt="BitSight customer Epiq uses security ratings to confidently remediate cybersecurity risks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=277648&amp;amp;k=14&amp;amp;r=https%3A%2F%2F277648.hs-sites.com%2Fresources%2Fcase-study-epiq&amp;amp;bu=https%253A%252F%252F277648.hs-sites.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Business Services</category>
      <category>Security Performance Management</category>
      <pubDate>Thu, 12 Aug 2021 13:54:04 GMT</pubDate>
      <author>bryana.dacri@bitsighttech.com (Bryana Dacri)</author>
      <guid>https://277648.hs-sites.com/resources/case-study-epiq</guid>
      <dc:date>2021-08-12T13:54:04Z</dc:date>
    </item>
    <item>
      <title>Epiq relies on BitSight to identify and remediate cybersecurity risks, hitting at the root cause of their vulnerabilities</title>
      <link>https://277648.hs-sites.com/resources/epiq</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/epiq" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/case_studies/epiq_logo_thumb.png" alt="Epiq relies on BitSight to identify and remediate cybersecurity risks, hitting at the root cause of their vulnerabilities" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/epiq" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/case_studies/epiq_logo_thumb.png" alt="Epiq relies on BitSight to identify and remediate cybersecurity risks, hitting at the root cause of their vulnerabilities" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=277648&amp;amp;k=14&amp;amp;r=https%3A%2F%2F277648.hs-sites.com%2Fresources%2Fepiq&amp;amp;bu=https%253A%252F%252F277648.hs-sites.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Business Services</category>
      <category>Security Performance Management</category>
      <pubDate>Thu, 12 Aug 2021 13:51:15 GMT</pubDate>
      <author>bryana.dacri@bitsighttech.com (Bryana Dacri)</author>
      <guid>https://277648.hs-sites.com/resources/epiq</guid>
      <dc:date>2021-08-12T13:51:15Z</dc:date>
    </item>
    <item>
      <title>Video: Understanding the Digital Operational Resilience Act (DORA) and What it Means for Your Organization</title>
      <link>https://277648.hs-sites.com/resources/understanding-the-digital-operational-resilience-act-dora-and-what-it-means-for-your-organization</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/understanding-the-digital-operational-resilience-act-dora-and-what-it-means-for-your-organization" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/Videos/Understanding%20the%20Digital%20Operational%20Resilience%20Act%20and%20What%20it%20Means%20for%20Your%20Organization%20DORA%20video%20thumb.png" alt="Video: Understanding the Digital Operational Resilience Act (DORA) and What it Means for Your Organization" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/understanding-the-digital-operational-resilience-act-dora-and-what-it-means-for-your-organization" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/Videos/Understanding%20the%20Digital%20Operational%20Resilience%20Act%20and%20What%20it%20Means%20for%20Your%20Organization%20DORA%20video%20thumb.png" alt="Video: Understanding the Digital Operational Resilience Act (DORA) and What it Means for Your Organization" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=277648&amp;amp;k=14&amp;amp;r=https%3A%2F%2F277648.hs-sites.com%2Fresources%2Funderstanding-the-digital-operational-resilience-act-dora-and-what-it-means-for-your-organization&amp;amp;bu=https%253A%252F%252F277648.hs-sites.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Regulation &amp; Compliance</category>
      <category>Vendor Risk Management</category>
      <pubDate>Tue, 22 Jun 2021 14:52:59 GMT</pubDate>
      <author>nsimon@bitsighttech.com (Noah Simon)</author>
      <guid>https://277648.hs-sites.com/resources/understanding-the-digital-operational-resilience-act-dora-and-what-it-means-for-your-organization</guid>
      <dc:date>2021-06-22T14:52:59Z</dc:date>
    </item>
    <item>
      <title>Harmonizing ICT Risk in the EU Financial Sector: The Digital Operational Resilience Act (DORA)</title>
      <link>https://277648.hs-sites.com/resources/harmonizing-ict-risk-in-the-eu-financial-sector-the-digital-operational-resilience-act</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/harmonizing-ict-risk-in-the-eu-financial-sector-the-digital-operational-resilience-act" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/eBooks/DORA_ebook_Cover_Image.png" alt="Harmonizing ICT Risk in the EU Financial Sector: The Digital Operational Resilience Act (DORA)" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/harmonizing-ict-risk-in-the-eu-financial-sector-the-digital-operational-resilience-act" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/eBooks/DORA_ebook_Cover_Image.png" alt="Harmonizing ICT Risk in the EU Financial Sector: The Digital Operational Resilience Act (DORA)" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=277648&amp;amp;k=14&amp;amp;r=https%3A%2F%2F277648.hs-sites.com%2Fresources%2Fharmonizing-ict-risk-in-the-eu-financial-sector-the-digital-operational-resilience-act&amp;amp;bu=https%253A%252F%252F277648.hs-sites.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Regulation &amp; Compliance</category>
      <category>Cybersecurity</category>
      <category>Financial Services</category>
      <category>Supply Chain Cybersecurity</category>
      <pubDate>Mon, 21 Jun 2021 17:20:36 GMT</pubDate>
      <author>bryana.dacri@bitsighttech.com (Bryana Dacri)</author>
      <guid>https://277648.hs-sites.com/resources/harmonizing-ict-risk-in-the-eu-financial-sector-the-digital-operational-resilience-act</guid>
      <dc:date>2021-06-21T17:20:36Z</dc:date>
    </item>
    <item>
      <title>Ransomware: Leveraging Data Insights to Avoid Becoming A Victim</title>
      <link>https://277648.hs-sites.com/resources/ransomware-leveraging-data-insights-to-avoid-becoming-a-victim</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/ransomware-leveraging-data-insights-to-avoid-becoming-a-victim" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/Webinar_Slides/Ransomware%20Webinar%20Video_CTA.png" alt="Ransomware: Leveraging Data Insights to Avoid Becoming A Victim" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://277648.hs-sites.com/resources/ransomware-leveraging-data-insights-to-avoid-becoming-a-victim" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.bitsight.com/hubfs/Webinar_Slides/Ransomware%20Webinar%20Video_CTA.png" alt="Ransomware: Leveraging Data Insights to Avoid Becoming A Victim" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=277648&amp;amp;k=14&amp;amp;r=https%3A%2F%2F277648.hs-sites.com%2Fresources%2Fransomware-leveraging-data-insights-to-avoid-becoming-a-victim&amp;amp;bu=https%253A%252F%252F277648.hs-sites.com%252Fresources&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Data Science</category>
      <category>Cybersecurity</category>
      <category>Supply Chain Cybersecurity</category>
      <category>Data Breaches</category>
      <pubDate>Fri, 11 Jun 2021 15:22:32 GMT</pubDate>
      <author>bryana.dacri@bitsighttech.com (Bryana Dacri)</author>
      <guid>https://277648.hs-sites.com/resources/ransomware-leveraging-data-insights-to-avoid-becoming-a-victim</guid>
      <dc:date>2021-06-11T15:22:32Z</dc:date>
    </item>
  </channel>
</rss>
