• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Can Information Security Survive
 

Can Information Security Survive

on

  • 731 views

Gather insights from Malcolm Harkins, Intel Chief information Security Officer, on how to balance business growth with risk mitigation. This presentation links to a webinar on this topic.

Gather insights from Malcolm Harkins, Intel Chief information Security Officer, on how to balance business growth with risk mitigation. This presentation links to a webinar on this topic.

Statistics

Views

Total Views
731
Views on SlideShare
731
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Can Information Security Survive Can Information Security Survive Presentation Transcript

    • Can InformationSecurity Survive? Malcolm Harkins Vice President and Chief Information Security Officer Intel Corporation
    • Given the growth of incidents we haveseen, the evolution of technology, andusage models changes … Can information security survive? 2 Copyright © 2011, Intel Corporation. All rights reserved.
    • HOW ?3 Copyright © 2011. Intel Corporation. All rights reserved.
    • IT Risk and Security A Balancing Act Open AccessControls increased cost and constrains use of How Do We Balance? data and systems • Keeping us legal • Availability of information • Protection of information • Industry influence • Cost effectiveness of controls Locked Down Information assets should be fully protected Our mission is to protect to enable. 4 Copyright © 2011, Intel Corporation. All rights reserved.
    • Don’t misperceive risk … 5 Copyright © 2011, Intel Corporation. All rights reserved.
    • The Misperception of Risk Under-Estimated Risk is . . . Exaggerated 6 Copyright © 2011, Intel Corporation. All rights reserved.
    • Surviving the Risk Data EnclavingPrevent Risk-Based Privileges Data Protection Browser SecurityDetect Endpoint Protection Identity and Asset Management Training and AwarenessRespond Central Logging Service Infrastructure Protection Data Correlation/AlertingPredict Security Business Predictive Analytics Intelligence 7 Copyright © 2011, Intel Corporation. All rights reserved.
    • Do you want to know more?"Can Information Security Survive?" webinarMalcolm Harkins, Vice President and Chief Information SecurityOfficer at Intel, talks about balancing business needs and growthwith risk mitigation. 8 Copyright © 2011, Intel Corporation. All rights reserved.
    • Intel IT is passionate about driving businessvalue through innovation and sharing IT best practices with our industry peers. Learn more about Intel IT’s information security initiatives at: Intel.com/IT 9 Copyright © 2011, Intel Corporation. All rights reserved.
    • Legal NoticesThis presentation is for informational purposes only. INTEL MAKES NO WARRANTIES,EXPRESS OR IMPLIED, IN THIS SUMMARY.Intel, Intel logo, are trademarks of Intel Corporation in the U.S. and other countries.* Other names and brands may be claimed as the property of othersCopyright © 2012 Intel Corporation. All rights reserved. 10 Copyright © 2011, Intel Corporation. All rights reserved.