Malcolm Harkins


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • So I mentioned transformation and disruption – let me try and clarify that and put the change that is occurring in perspective What we’re going through right now is akin to the 3rd industrial revolution …….. 1752 – Ben Franklin proved that static electricity and lightning were the same – this paved the way for the future1800 - first electric battery introduced 1821 – Faraday invented the first electric motor1835 – First electric relay invented 1844 – Morse invented the telegraph 1879 – first light bulb – Thomas Eddison1903 – First power stationNoyce and Kilby invented the integrated circuit in the 1950s but it wasn’t until the 2000’s where we crossed the threshold where compute and communications based on this technology passed a level of affordability that meant it was not longer a luxury item but became pervasive and a necessity – and we surpass not only technological boundaries but economic ones – making the impossible, possible (and affordable and almost required to remain competitive …) A new economic narrativeAlters the spatial and temporal dynamic of society RifkinJeremy Rifkin is president of the Foundation on Economic Trends and the bestselling author of nineteen books on the impact of scientific and technological changes on the economy, the workforce, society, and the environment.
  • 1910’s – The architectural battle is decided and build of electrical generation and distribution systems takes off1920 – less than 10% of British households were wired/connected However, this is when something “miraculous” happened. A tipping point was hit where electricity was no longer the preserve of the rich and of business. By the end of the 1920’s / early 30’s (ie. between the 1st and 2nd WW’s) every single new house built was built for power. Suddenly, electricity was affordable and becoming pervasive. Transforming industry and the we live forever. This is where the hockey stick hits the near linear ramp. Further, we believe this is analogous to what we’re seeing with regards to compute/communications adoption. We’ve hit the tipping point but there’s still a huge way to go. Half the world is not connected. And the scope in developed economies for “connected everything” from farmers’ fields, to signs, transport systems… etc is just huge. 
  • We’ve hit the tipping point but there’s still a huge way to go. Half the world is not connected. And the scope in developed economies for “connected everything” from farmers’ fields, to signs, transport systems… etc is enormous.2011- 11% retail sales done on-line; 8% in 2008.2012 – WTC. 
  • Our preferences and bias affect how we assess risks and various trade offs and dilemmasSometimes we don’t fully consider the impact on others (end users, the business, our products/services, our customers, the world)Some times we see the world as business control vs. velocity – drag coefficient against creativity and speed – opposing forces
  • Information risk and security has always been to some extent a balancing act. On the one hand, you can view the risk and control functions that we’re trying to manage as increasing cost, and constraining the use of data and systems. And so therefore, you might have some view within the company or some users that this should just be completely opened. Why do I need to have these things—why do I need to have access control? Why do I need to have encryption? Why do I need to do these things, because all you’re doing is adding cost into the IT organization, and you’re constraining the user, and you’re constraining the business function.And then you can go the other end and you go and lock the information down. And then you get fully protective.But in reality, we’re in a world today where I think in most organizations, whether it be public, private, large companies, small companies, the information systems and information assets are essentially the central nervous system of how an organization operates. I can tell you, Intel wouldn’t operate without our information flowing.And so if you take an approach of locking it down, you’re preventing the flow of information, which means the company might not be able to operate. So you really do have that balancing act.
  • so how do race car drivers stay safe doing something so risk ?
  • When controls create a drag coefficient that slow things down...rules can work against us, and they can work for us. Need to figure out how to utilize the rules / leverage the rules to improve the velocity.Where rules don't exist and the risks are dynamic, it comes back to trust. IT collaborating together for mutual benefit.
  • Smart = Tech Innovation - Better ways to reduce risks and intersect new threatsTrusted = Backed by Intel’s commitment and experience. - Intel & McAfee’s resources, reputation, ops/production/solution-provider expertiseStrong = Embedded security - Hardened to resist compromise, faster/efficient performance of securityUbiquitous = All devices and usages - Security where and how computing is done. From user to cloud.
  • Malcolm Harkins

    1. 1. Intel & McAfee Confidential Business Control Vs. Business Velocity Practical Considerations for Business Survivability in the Information Age Malcolm Harkins Vice President, Chief Security and Privacy Officer
    2. 2. Intel & McAfee Confidential Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. BunnyPeople, Celeron, Celeron Inside, Centrino, Centrino Inside, Core Inside, i960, Intel, the Intel logo, Intel AppUp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, the Intel Inside logo, Intel NetBurst, Intel NetMerge, Intel NetStructure, Intel SingleDriver, Intel SpeedStep, Intel Sponsors of Tomorrow., the Intel Sponsors of Tomorrow. logo, Intel StrataFlash, Intel Viiv, Intel vPro, Intel XScale, InTru, the InTru logo, InTru soundmark, Itanium, Itanium Inside, MCS, MMX, Moblin, Pentium, Pentium Inside, skoool, the skoool logo, Sound Mark, The Journey Inside, vPro Inside, VTune, Xeon, and Xeon Inside are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others. Copyright © 2011, Intel Corporation. All rights reserved. 2
    3. 3. Intel & McAfee Confidential Late 1990’s……. What’s Going On? Steam and coal Railways Factories Printing press – mass education 1.0 Electrification, comm s, oil, combustion engine New materials Highways, automobil es Mass production Internet, molecular biology, renewable energy sources Super information highways Smart “everything” 2.0 3.0 1860’s……. * The Third Industrial Revolution: How Lateral Power is Transforming Energy, the Economy, and the World by Jeremy Rifkin, president of the Foundation on Economic Trends * We are still at the dawning of the third era… ...A new economic narrative is being written. 3 1760’s…….
    4. 4. Intel & McAfee Confidential 1752 Ben Franklin proved that static electricity and lightning were the same – this paved the way for the future 1800 first electric battery introduced 1821 Faraday invented the first electric motor 1835 First electric relay invented 1844 Morse invented the telegraph 1879 first light bulb – Thomas Edison 1882 First DC power station 1891 First AC power station 1920 <10% of British households wired connected 1750 1760 1770 1780 1790 1800 1810 1820 1830 1840 1850 1860 1870 1880 1890 1900 1910 1920 1930 1940 Rate of Change Will Approach Light Speed 1910 Generation and distribution systems build out Late 1920’s Electricity becoming pervasive 4
    5. 5. Intel & McAfee Confidential 1951 First Commercial Computer (Ferranti Mark 1) 1959 Integrated Circuit is patented (Noyce/Kilby) 1969 ARPANET (internet forerunner) 1971 First microprocessor (Intel 4004) 1997 registered 1983 First IBM PC compatible laptops 2003 Intel Centrino. WiFi Hot spots. Broadband 2004 Facebook launched 1991 Tim Berners Lee publishes World Wide Web 2007 iPhone launched 2010 iPad launched, other Android tablets follow 1950 1955 1960 1965 1970 1975 1980 1985 1990 1995 2000 2005 2010 2015 “if the Internet were a movie we’d still be in the opening credits” Rate of Change Will Approach Light Speed 2012 Embedded Intelligence in WTC 5
    6. 6. Intel & McAfee Confidential Unprecedented Change … Increased Opportunities & Risk  In this dynamic & complex environment, how do we:  Reinforce & protect a culture of integrity  Continuously create the culture to accelerate  Lead through our words & actions Culture of Integrity Lead Protect Create 6
    7. 7. New World of Digital Footprints and Attack Surfaces The Internet of things Copyright © Beecham Research 2011 Intel & McAfee Confidential 7
    8. 8. Intel & McAfee Confidential Catastrophic Landscape Framework 8 Why? What? How? Motivation Attack Target Impact Consequence
    9. 9. Intel & McAfee Confidential Catastrophic Landscape 9 Motivation Attack Target Impact Consequence Numerous Possibilities Which are Most Likely…
    10. 10. Intel & McAfee Confidential Security Privacy Compliance Velocity Cost Protect - - - - - - - - - - Don’t Impede - - - - - - - - Enable The Challenge and The Opportunity 10
    11. 11. Intel & McAfee Confidential Tuned to Target Market Objectives Customer Needs Enterprises Cost and Maintenance Productivity and User Experience Risk and Compliance 11
    12. 12. What about a Formula One race car? 12
    13. 13. Designed for speed and safety 13
    14. 14. And discipline, control, communication, collaboration between the driver and the pit crew 14
    15. 15. Intel & McAfee Confidential End users are not like professional drivers… 15
    16. 16. Intel & McAfee Confidential 16 That’s a lot of unnecessary risk Silicon Valley CEO confesses that she doesn't use a passcode to protect her smartphone Intel & McAfee Confidential
    17. 17. INTEL CONFIDENTIAL When it comes to End users… We’re in the Behavior Modification Business… 17
    18. 18. INTEL CONFIDENTIAL When it comes to their driving… …we need to shape the path 18
    19. 19. Intel & McAfee Confidential How Do You Manage the Risk and Adapt? 19 Predict Prevent Detect Respond •Proactive Threat Investigations •Risk Based Privileges •Data Enclaves •Endpoint Protection •Central Logging Service •Browser Security •Data Correlation / Alerting •Training and Awareness Security Business Intelligence Data Protection Identity & Access Mgmt. Infrastructure Protection
    20. 20. Intel & McAfee Confidential Intel Security and Privacy Governance Internal Audit Corp Ethics Committee BC/DR program Self Audits Threat Landscape Briefs Financial Plans Drills & Table Top Exercises Threat Management Legal Peer Information Sharing Emerging Threat Analysis Emergency Management Security & Privacy Office Global Tax & Trade Industry workgroups Biz Unit MRC’s •Annual Risk assessments •Compliance Effectiveness Reviews •Risk Governance through management committee’s •Decentralized risk management processes & systems •Operational with function level accountability Sense Interpret Act Formal Benchmarking Strategic Planning & discussions 20
    21. 21. INTEL CONFIDENTIAL * Glynis Breakwell – The Psychology of Risk Risk surrounds and envelops us. Without understanding it, we risk everything, without capitalizing on it, we gain nothing.* 21
    22. 22. Intel & McAfee Confidential Call to Action…Insuring Trust Security Built-In Privacy by Design Connected Security Consequence and Impact  To the Users and Society Evaluate and demand trustworthiness of the products and services you purchase/use 22
    23. 23. Intel & McAfee Confidential Smart Trusted Strong Ubiquitous Innovation to deliver more capable solutions to keep pace with threats Solutions backed by Intel’s commitment, reputation, and expertise Hardened, embedded, and faster technology, resistant to compromise Security benefitting all users and devices across the compute landscape Intel to Deliver the Next Generations of Security 23
    24. 24. Intel & McAfee Confidential
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.