IT Best Practices: People are the Perimeter

December 9th, 2013 |
Image for FaceBook

Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
This post can be linked to directly with the following short URL:

The video player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, 720p, 1080p, Other

This video file can be linked to by copying the following URL:

Right/Ctrl-click to download the video file. There is also an HD version of this video.
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email

IT Best Practices: The enterprise walls and network are no longer the only pieces of the security perimeter. People are the new perimeter. People are increasing the perimeter via a myriad of mobile devices and new channels, such as social media. Malcolm Harkins, Intel Chief Security and Privacy Officer, describes how technologists and IT professionals must think differently when designing for security and privacy, to protect information and minimize risk, in this new era of computing.

For more information on Intel IT Best Practices, please visit

Tags: , , , , , , , , , , , ,
Posted in: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast