IT Best Practices: The Security Poverty Line

February 10th, 2014 |
Image for FaceBook
Download Video FileRight click here to download video | Right click here to download HD version | Share Player
For more information on Intel IT Best Practices, please visit www.intel.com/IT
 

IT Best Practices: Imagine a security poverty line… below this line are individuals or organizations who do not have the skills, resources or funding to protect, detect and respond to cybersecurity threats. Many organizations and individuals fall below this line. With today’s sharing of customer, supplier, and personal information the individuals and organizations that fall below the security poverty line can put others at risk. Malcolm Harkins, Intel Chief Security and Privacy Officer, talks about how security professionals are obligated to help bring others above the line with security solutions that are built-in to the compute infrastructure.

Share

Posted in: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast
Tags: , , , , , , , ,


Learn more with Intel IT’s expert on Cyber Risk Management, Tim Casey on:
Intel.com, LinkedIn, or follow him on Twitter.


Learn more about IT Business Value from Paula Tolliver, Intel CIO on:
Intel.com, LinkedIn, or follow her on Twitter.