Cyber Risk Management tagged posts:

Measuring the Value of Information Security Investments

January 30th, 2012 |
Measuring the Value of Information Security Investments

IT Best Practices: Intel IT finance created a new information security investment model which allows IT management, financial experts and security professionals to analyze and prioritize investments, based on risk mitigation against a variety of security threats. A key [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , ,

Inside IT: Stopping Viruses and Threats

January 3rd, 2012 |
Inside IT: Stopping Viruses and Threats

IT Best Practices: Episode 15 – Information Technology has changed dramatically in just a few years, and the security threat has changed along with it. The opportunities for bad actors to infiltrate an organization have grown, and the nature [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , ,

IT Best Practices: Rethinking Information Security to Improve Business Agility

December 7th, 2011 |
IT Best Practices: Rethinking Information Security to Improve Business Agility

IT Best Practices: To enable rapid adoption of new technologies and usage models—and provide protection in an evolving threat landscape—Intel IT has embarked on a radical five-year redesign of Intel’s information security architecture. [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , ,

IT@Intel Technology Tip: The 12 Scams of Christmas

November 18th, 2011 |
IT@Intel Technology Tip: The 12 Scams of Christmas

IT Best Practices: As the holiday season approaches, we all turn to our computers to help get things done. But be aware that criminals are also looking for ways to get things done, and that may include scamming you. [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , ,

The Cloud Today and in the Future – A Chat with Wikibon: Intel Conversations in the Cloud – Episode 25

September 26th, 2011 |
The Cloud Today and in the Future – A Chat with Wikibon: Intel Conversations in the Cloud – Episode 25

In this VMworld podcast, Stu Miniman from Wikibon drops by to talk about his organization and cloud computing adoption today and in the future. Topics include simplifying the cloud, manageability, regulation, and security.

See also:
Intel Conversations in the Cloud [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel Conversations in the Cloud, Security, VMware Tags: , , , , , , , , , , , , ,

Inside IT: Disaster Preparedness for the Data Center

September 20th, 2011 |

Inside IT: Cloud Computing & Security

August 9th, 2011 |
Inside IT: Cloud Computing & Security

IT Best Practices: Episode 5 – The IT organization is undergoing rapid change. Changes like virtualization and consumerization present new opportunities for business, and new challenges for IT. Cloud computing shifts IT to more of a creator and distributor [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , ,

IT Best Practices: Strengthening Enterprise Security through Notebook Encryption

IT Best Practices: Strengthening Enterprise Security through Notebook Encryption

IT Best Practices: Intel chose to encrypt all corporate notebooks to keep data from being accessed if lost or stolen. Including a detailed plan for secure and cost-effective implementation, Intel IT combined a software and hardware based solution to [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system health. Testing and validating these capabilities, Intel was able to deliver reduced manual [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

Get Direct Insight into Intel IT’s Best Practices

Get Direct Insight into Intel IT’s Best Practices

IT Best Practices: The IT@Intel program connects IT professionals around the world with their IT peers inside our organization – sharing lessons learned, methods and strategies. Our goal is simple: Share the Intel IT best practices that create business [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , , , , , , ,

The Tomorrow Project: Computer Security

The Tomorrow Project: Computer Security

In this episode of The Tomorrow Project: Brian David Johnson, Futurist at Intel Corporation, interviews Tadayoshi Kohno about embedded computational devices and security.

Kohno, a scientist and researcher at the University of Washington, studies how everyday devices around us [See the full post…]

Download Video FileWatch/download video  

Categories: HD Video, Intel, Security, The Tomorrow Project, Video Podcast Tags: , , , , , , , , , , ,

IT Best Practices: Information Security and Cloud Computing

IT Best Practices: Intel IT Embraces Social Computing

Intel IT Best Practices: Information Security should Protect and Enable

Intel IT Best Practices: Information Security should Protect and Enable

Intel IT Best Practices: At Intel IT we realized we needed to rethink how we approach enterprise security. We cannot continue to spend all our resources trying to block every threat. Our new approach takes into consideration that the [See the full post…]

Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , ,

Intel IT Best Practices: Rethinking Information Security with Intel CISO

Intel IT Best Practices: Rethinking Information Security with Intel CISO

In this short IT Security vblog, Malcolm Harkins, Intel CISO, talks about why Intel IT has undertaken a radical new five-year redesign of our information security architecture. Malcolm says that compromise is inevitable under almost any compute model, find [See the full post…]

Download Video FileWatch/download video  

Categories: Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , ,

Intel IT Best Practices: Intel CISO Discusses Misperception of Risk

Intel IT Best Practices: Intel CISO Discusses Misperception of Risk

Intel CISO, Malcolm Harkins believes that underestimating or over exaggerating risk is one of the biggest vulnerabilities we face. Watch this short vblog to hear Malcolm’s explanation. [See the full post…]

Download Video FileWatch/download video  

Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , ,

Intel IT Best Practices: PC Fleet Management

Intel IT Best Practices: PC Fleet Management

Intel IT Best Practices: In this IT@Intel Executive Insights, we explain how Intel IT uses regular refresh, smart technology, the benefits of consumerization and proactive support to help us maintain our PC fleet and empower our 80,000 users across [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , ,

Securing Intel’s External Online Presence

Securing Intel’s External Online Presence

To protect Intel and its customers, Intel IT established a program that assesses, monitors, and enforces the security, privacy, and regulatory compliance of externally facing Intel-branded Web sites and online marketing programs. [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , ,

Security in the Data Center & Cloud – Intel Chip Chat – Episode 133

Security in the Data Center & Cloud – Intel Chip Chat – Episode 133

In this Intel Chip Chat audio podcast with Allyson Klein: Dylan Larson Intel Director of Xeon Platform Marketing, Intel Rock Star, and frequent Intel Chip Chat guest discusses security, embedded encryption, trust and cloud computing trends.

See also:
The [See the full post…]

Download Audio FileListen/download audio  

Categories: Cloud Computing, Intel, Intel Chip Chat, Security Tags: , , , , , , , ,

Inside IT: Security

April 21st, 2011 |
Inside IT: Security

IT Best Practices: Episode 3 – Inside IT is the latest on information technology straight from the people of Intel’s IT organization. In this episode of the podcast, we take a look at the state of IT security with [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , ,

Enterprise IT Security Benefits of Microsoft Windows 7

December 17th, 2010 |
Enterprise IT Security Benefits of Microsoft Windows 7

IT Best Practices: Information security is a critical concern for Intel IT. New threats are continually evolving, and over time, this has forced us to invest in various security controls and mitigation strategies. As part of a three-month [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Microsoft Tags: , , , , , , , , , , , , , , , ,

Intel IT Performance Report – Creating Business Value

December 10th, 2010 |

IT Best Practices: Maintaining IT Security while Allowing Personal Hand-Held Devices in the Enterprise

November 26th, 2010 |
IT Best Practices: Maintaining IT Security while Allowing Personal Hand-Held Devices in the Enterprise

IT Best Practices: Intel IT is actively integrating employee-owned hand-held devices into our enterprise environment. With safeguards in place to protect data and intellectual property, we are allowing employees to select the tools that suit their personal work styles [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , ,

Resetting Passwords on Encrypted Hard Drives Using Intel Active Management Technology

November 9th, 2010 |
Resetting Passwords on Encrypted Hard Drives Using Intel Active Management Technology

IT Best Practices: Matt Bodin of Intel IT demonstrates in a proof-of-concept how Intel Active Management Technology can be used to reset passwords on encrypted hard drives, saving service deck technicians significant time.

See also:
IT Center
Open Port [See the full post…]

Download Video FileWatch/download video  

Categories: Information Technology, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , ,

Enabling Device-Independent Mobility with Dynamic Virtual Clients

October 19th, 2010 |
Enabling Device-Independent Mobility with Dynamic Virtual Clients

IT Best Practices: To enable device-independent mobility (DIM) at Intel, Intel IT is considering implementing dynamic virtual client (DVC) technology, which uses containerized software appliances to abstract the OS; applications; corporate and personal data and workspaces; and user-specific settings. [See the full post…]

Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , ,