Inside IT: Sharing Cyber-Threat Information

July 9th, 2013 |
Image for FaceBook

 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
The audio player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, Other


 
The audio player code can be used without the image as follows:


 
This audio file can be linked to by copying the following URL:


 
Right/Ctrl-click to download the audio file.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Inside IT - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email
 

IT Best Practices: Episode 53 – Information technology is no longer simply an isolated set of machines and tools used on a narrow set of tasks. The Global Digital Infrastructure, or GDI, is a worldwide network of devices and services that facilitate a wide range of transactions and interactions for individuals and organizations. As this infrastructure grows, we depend on it more and more. And that means no single organization, no single government, no single entity has a broad view of the “attack surface” of this infrastructure. In this podcast we examine what organizations are doing to minimize risk across the GDI with our guest Brian Willis, Senior Cyber Threat Analyst with Intel Corporation.


For more information on Intel IT Best Practices, please visit intel.com/IT
 

Tags: , , , , , , , , , , , , , ,
 
Posted in: Inside IT, Intel, Intel IT, IT@Intel
 


 


Learn more about IT Business Value from Paula Tolliver, Intel CIO on:
Intel.com, LinkedIn, or follow her on Twitter.