IT Best Practices: The Polarity of Security and Privacy

October 25th, 2013 |
Image for FaceBook

 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
The video player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, 720p, 1080p, Other


 
This video file can be linked to by copying the following URL:


 
Right/Ctrl-click to download the video file. There is also an HD version of this video.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email
 

IT Best Practices: Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other. Listen to Malcolm Harkins, Intel Chief Security and Privacy Officer, discuss how organizations can manage the polarity of security and privacy with collaboration and a balanced approach.


For more information on Intel IT Best Practices, please visit intel.com/IT
 

Tags: , , , , , , , , , , , , ,
 
Posted in: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast