IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

February 6th, 2013 |
Image for FaceBook
Download PDFRead/Download White Paper (PDF)
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
This post can be linked to directly with the following short URL:

This pdf file can be linked to by copying the following URL:

Right/Ctrl-click to download the pdf file.
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email

IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins

As the technology environment continues to evolve, many people believe we’re moving toward a future in which organizations outsource much of the delivery of IT services, which will shift the organization away from IT implementation to procurement and management of suppliers and services, nonetheless requiring a CISO – Chief Information Security Officer – to set direction and establishing an overall IT architecture. To communicate this shift, the CISO must have the ability to address these subjects at different levels so that all members of the organization have a clear understanding of the group’s direction.

Malcolm Harkins is vice president of the Information Technology Group, and Chief Information Security Officer (CISO) and general manager of Information Risk and Security. The group is responsible for managing the risk, controls, privacy, security, and other related compliance activities for all of Intel’s information assets.

For more information on Intel IT Best Practices, please visit

Tags: , , , , , , , , , ,
Posted in: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security