IT Best Practices: The Polarity of Security and Privacy | Connected Social Media


IT Best Practices: The Polarity of Security and Privacy

| Right click here to download HD version | Share Player

For more information on Intel IT best practices , please visit www.intel.com/IT

IT Best Practices : Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other. Listen to Malcolm Harkins, Intel Chief Security and Privacy Officer, discuss how organizations can manage the polarity of security and privacy with collaboration and a balanced approach.

Related posts:

  1. IT Best Practices: The 21st Century CISO (Chief Information Security Officer) IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable" by Malcolm Harkins As the technology environment continues to evolve, many people believe we’re moving toward a future in which organizations outsource much of the delivery...
  2. Inside IT: Malcolm Harkins – Business Velocity in the Changing Security Landscape IT Best Practices: Episode 61 – In this podcast we engage in a wide-ranging discussion on business velocity, security, and privacy with Intel’s Malcolm Harkins. Harkins has a unique view from his position as the Chief Security and Privacy Officer...
  3. Inside IT: Security and Business Intelligence IT Best Practices: Episode 45 – Intel’s approach to security has evolved. The current strategy looks to apply reasonable protections that allow information to flow through the organization. This reduces risk, but maintains a quality user experience. A big component...
  4. Intel IT Best Practices: Rethinking Information Security with Intel CISO In this short IT Security vblog, Malcolm Harkins, Intel CISO, talks about why Intel IT has undertaken a radical new five-year redesign of our information security architecture. Malcolm says that compromise is inevitable under almost any compute model, find out...
  5. IT Best Practices: Rethink Privacy IT Best Practices: Consumers care about privacy, is your company or organization paying attention? This video shows why companies and organizations should incorporate privacy early in their design, development, and deployment process – whether they’re working on products, programs or...
  6. IT Best Practices: Information Security and Cloud Computing Intel CISO, Malcolm Harkins shares his perspective on security and the cloud. ...
  7. Inside IT: Stopping Viruses and Threats IT Best Practices: Episode 15 – Information Technology has changed dramatically in just a few years, and the security threat has changed along with it. The opportunities for bad actors to infiltrate an organization have grown, and the nature of...
  8. Intel IT Best Practices: Intel CISO Discusses Misperception of Risk Intel CISO, Malcolm Harkins believes that underestimating or over exaggerating risk is one of the biggest vulnerabilities we face. Watch this short vblog to hear Malcolm’s explanation. ...
  9. IT Best Practices: Intel IT Embraces Social Computing Intel CISO, Malcolm Harkins suggests we embrace social media and social computing to reduce risk. ...
  10. IT Best Practices: Protecting the Perimeter IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable" by Malcolm Harkins At Intel, we are well aware of the risks associated with social media, but attempting to stop the use of external social media...

Posted in: Corporate , Featured , HD Video , Information Technology , Intel , Intel IT , IT@Intel , Security , Video Podcast

Tags: data security , governance , information security , information technology , Intel , Intel IT , IT Best Practices , IT Business Value , IT Whitepaper , IT@Intel , Malcolm Harkins , privacy , privacy principles , protect to enable