IT Best Practices: The Security Poverty Line

February 10th, 2014 |
Image for FaceBook

 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
The video player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, 720p, 1080p, Other


 
This video file can be linked to by copying the following URL:


 
Right/Ctrl-click to download the video file. There is also an HD version of this video.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email
 

IT Best Practices: Imagine a security poverty line… below this line are individuals or organizations who do not have the skills, resources or funding to protect, detect and respond to cybersecurity threats. Many organizations and individuals fall below this line. With today’s sharing of customer, supplier, and personal information the individuals and organizations that fall below the security poverty line can put others at risk. Malcolm Harkins, Intel Chief Security and Privacy Officer, talks about how security professionals are obligated to help bring others above the line with security solutions that are built-in to the compute infrastructure.


For more information on Intel IT Best Practices, please visit intel.com/IT
 

Tags: , , , , , , , ,
 
Posted in: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast