IT Best Practices: Protecting the Perimeter

January 14th, 2013 |
Image for FaceBook
IT Best Practices: Protecting the Perimeter
Download PDFRead/Download White Paper (PDF)
For more information on Intel IT Best Practices, please visit www.intel.com/IT
 

IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins

At Intel, we are well aware of the risks associated with social media, but attempting to stop the use of external social media web sites would have been counterproductive and, in any case, impossible. We realized that if we did not embrace social media and define ways to use it, we would lose the opportunity to shape employee behavior. In general, people are likely to take better care of their own possessions than someone else’s. They feel a stronger connection to their own car than to one provided by their employer. We found social media does not create new risks, but can increase existing ones. Recognizing this, we created policies and training tools, then deployed internal social media capabilities, such as wikis, forums, and blogs. This article examines the effort to find the balance between protecting through restrictions and through cultivating a sense of personal commitment and security ownership among our employees.

Malcolm Harkins is vice president of the Information Technology Group, and Chief Information Security Officer (CISO) and general manager of Information Risk and Security. The group is responsible for managing the risk, controls, privacy, security, and other related compliance activities for all of Intel’s information assets.

Share

Posted in: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security
Tags: , , , , , , , ,


Learn more with Intel IT’s expert on Cyber Risk Management, Tim Casey on:
Intel.com, LinkedIn, or follow him on Twitter.


Learn more about IT Business Value from Paula Tolliver, Intel CIO on:
Intel.com, LinkedIn, or follow her on Twitter.