Intel IT Best Practices: Rethinking Information Security with Intel CISO

Image for FaceBook

 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
The video player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, 720p, 1080p, Other


 
This video file can be linked to by copying the following URL:


 
Download the video file. There is also an HD version of this video.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email
 

In this short IT Security vblog, Malcolm Harkins, Intel CISO, talks about why Intel IT has undertaken a radical new five-year redesign of our information security architecture. Malcolm says that compromise is inevitable under almost any compute model, find out why in this video.


For more information on Intel IT Best Practices, please visit intel.com/IT

Tags: , , , , , , ,
 
Posted in: Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security
 


 


Learn more with Intel IT’s expert on Cyber Risk Management, Tim Casey on:
Intel.com, LinkedIn, or follow him on Twitter.


Learn more about IT Business Value from Paula Tolliver, Intel CIO on:
Intel.com, LinkedIn, or follow her on Twitter.