CISO tagged posts:

Inside IT: Security and Business Intelligence

March 5th, 2013 |
Inside IT: Security and Business Intelligence

IT Best Practices: Episode 45 – Intel’s approach to security has evolved. The current strategy looks to apply reasonable protections that allow information to flow through the organization. This reduces risk, but maintains a quality user experience. A big component ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Corporate, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , , , ,

IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

February 6th, 2013 |
IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins

As the technology environment continues to evolve, many people believe we’re moving toward a future in which organizations outsource much of the delivery of ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , ,

Intel IT Best Practices: Rethinking Information Security with Intel CISO

Intel IT Best Practices: Rethinking Information Security with Intel CISO

In this short IT Security vblog, Malcolm Harkins, Intel CISO, talks about why Intel IT has undertaken a radical new five-year redesign of our information security architecture. Malcolm says that compromise is inevitable under almost any compute model, find out ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , ,

Intel IT Best Practices: Intel CISO Discusses Misperception of Risk

Intel IT Best Practices: Intel CISO Discusses Misperception of Risk

Intel CISO, Malcolm Harkins believes that underestimating or over exaggerating risk is one of the biggest vulnerabilities we face. Watch this short vblog to hear Malcolm’s explanation.

Share
Download Video FileWatch/download video  

Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , ,