SlideShare a Scribd company logo
Can Information
Security Survive?
                  Malcolm Harkins
                  Vice President and
   Chief Information Security Officer
                   Intel Corporation
Given the growth of incidents we have
seen, the evolution of technology, and
usage models changes …


      Can information
      security survive?


                                       2

            Copyright © 2011, Intel Corporation. All rights reserved.
HOW ?


3   Copyright © 2011. Intel Corporation. All rights reserved.
IT Risk and Security
                     A Balancing Act

  Open Access
Controls increased cost
 and constrains use of
                          How Do We Balance?
   data and systems
                          •   Keeping us legal
                          •   Availability of information
                          •   Protection of information
                          •   Industry influence
                          •   Cost effectiveness of controls
                                                                                             Locked Down
                                                                                              Information assets
                                                                                           should be fully protected



                   Our mission is to protect to enable.

                                                          4

                               Copyright © 2011, Intel Corporation. All rights reserved.
Don’t misperceive risk …




                                  5

       Copyright © 2011, Intel Corporation. All rights reserved.
The Misperception of Risk




 Under-
Estimated
              Risk is . . .                                                Exaggerated




                                          6

               Copyright © 2011, Intel Corporation. All rights reserved.
Surviving the Risk
              Data Enclaving
Prevent
                Risk-Based
                 Privileges                                                  Data Protection


             Browser Security

Detect
            Endpoint Protection
                                                                                               Identity and Asset
                                                                                                 Management
               Training and
                Awareness
Respond
              Central Logging
                 Service
                                                                             Infrastructure
                                                                               Protection
                   Data
            Correlation/Alerting

Predict                                                                                        Security Business
            Predictive Analytics                                                                 Intelligence



                                            7

                 Copyright © 2011, Intel Corporation. All rights reserved.
Do you want to know more?




"Can Information Security Survive?" webinar
Malcolm Harkins, Vice President and Chief Information Security
Officer at Intel, talks about balancing business needs and growth
with risk mitigation.


                                                 8

                      Copyright © 2011, Intel Corporation. All rights reserved.
Intel IT is passionate about driving business
value through innovation and sharing IT best
              practices with our industry peers.


     Learn more about Intel IT’s information
          security initiatives at: Intel.com/IT




                                    9

         Copyright © 2011, Intel Corporation. All rights reserved.
Legal Notices




This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES,
EXPRESS OR IMPLIED, IN THIS SUMMARY.

Intel, Intel logo, are trademarks of Intel Corporation in the U.S. and other countries.

* Other names and brands may be claimed as the property of others

Copyright © 2012 Intel Corporation. All rights reserved.




                                                             10

                                   Copyright © 2011, Intel Corporation. All rights reserved.

More Related Content

What's hot

eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
eircom
 
Information Security Governance: Government Considerations for the Cloud Comp...
Information Security Governance: Government Considerations for the Cloud Comp...Information Security Governance: Government Considerations for the Cloud Comp...
Information Security Governance: Government Considerations for the Cloud Comp...
Booz Allen Hamilton
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS UK
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
Vincent Kwon
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2olambel
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
Network Intelligence India
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trends
wardell henley
 
What is IRM? bright talk
What is IRM?  bright talkWhat is IRM?  bright talk
What is IRM? bright talk
ritupande
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.netethnos
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
IBM Sverige
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
Nalneesh Gaur
 
Complex Discovery Ethics Efficiency And Economics (Overview) 1108
Complex Discovery Ethics Efficiency And Economics (Overview) 1108Complex Discovery Ethics Efficiency And Economics (Overview) 1108
Complex Discovery Ethics Efficiency And Economics (Overview) 1108
Rob Robinson
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceAndris Soroka
 
Regulatory Compliance Financial Institution
Regulatory Compliance Financial InstitutionRegulatory Compliance Financial Institution
Regulatory Compliance Financial Institution
Apani Enterprise Security Software
 
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)Intel - Copaco Cloud Event 2015 (break-out 3 en 4)
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)
Copaco Nederland
 

What's hot (20)

eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
 
Information Security Governance: Government Considerations for the Cloud Comp...
Information Security Governance: Government Considerations for the Cloud Comp...Information Security Governance: Government Considerations for the Cloud Comp...
Information Security Governance: Government Considerations for the Cloud Comp...
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
IT compliance
IT complianceIT compliance
IT compliance
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trends
 
What is IRM? bright talk
What is IRM?  bright talkWhat is IRM?  bright talk
What is IRM? bright talk
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
 
On Demand Cloud Services Coury
On Demand Cloud Services   CouryOn Demand Cloud Services   Coury
On Demand Cloud Services Coury
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
Complex Discovery Ethics Efficiency And Economics (Overview) 1108
Complex Discovery Ethics Efficiency And Economics (Overview) 1108Complex Discovery Ethics Efficiency And Economics (Overview) 1108
Complex Discovery Ethics Efficiency And Economics (Overview) 1108
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
Regulatory Compliance Financial Institution
Regulatory Compliance Financial InstitutionRegulatory Compliance Financial Institution
Regulatory Compliance Financial Institution
 
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)Intel - Copaco Cloud Event 2015 (break-out 3 en 4)
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)
 

Viewers also liked

AbsolutelyFantasticSlideshow
AbsolutelyFantasticSlideshowAbsolutelyFantasticSlideshow
AbsolutelyFantasticSlideshowJasteen Marceline
 
HNW_1
HNW_1HNW_1
Mentor networks and career success lessons for turbulent times
Mentor networks and career success   lessons for turbulent timesMentor networks and career success   lessons for turbulent times
Mentor networks and career success lessons for turbulent timesVicki Whiting
 
Monthly Top 15 Games in the media - 2015 edition
Monthly Top 15 Games in the media - 2015 editionMonthly Top 15 Games in the media - 2015 edition
Monthly Top 15 Games in the media - 2015 edition
ICO Partners
 
Kickstarter and Games - June 2012
Kickstarter and Games - June 2012Kickstarter and Games - June 2012
Kickstarter and Games - June 2012
ICO Partners
 
GDC12 Keys to the European Market
GDC12 Keys to the European MarketGDC12 Keys to the European Market
GDC12 Keys to the European MarketICO Partners
 
Oracle's Listagg Function - Uses and Duplicate Removal
Oracle's Listagg Function - Uses and Duplicate RemovalOracle's Listagg Function - Uses and Duplicate Removal
Oracle's Listagg Function - Uses and Duplicate Removal
Bryan L. Mack
 
Profil kesehatan Kabupaten mamuju tengah
Profil  kesehatan Kabupaten mamuju tengahProfil  kesehatan Kabupaten mamuju tengah
Profil kesehatan Kabupaten mamuju tengah
Muh Saleh
 
Sistem Informasi Pelayanan Publik Milik Pemerintah dan BUMN/Swasta
Sistem Informasi Pelayanan Publik Milik Pemerintah dan BUMN/SwastaSistem Informasi Pelayanan Publik Milik Pemerintah dan BUMN/Swasta
Sistem Informasi Pelayanan Publik Milik Pemerintah dan BUMN/Swasta
National Cheng Kung University
 
The psychology of visual perception. Notes on a match-3 fields by Playrix
The psychology of visual perception. Notes on a match-3 fields by PlayrixThe psychology of visual perception. Notes on a match-3 fields by Playrix
The psychology of visual perception. Notes on a match-3 fields by Playrix
DevGAMM Conference
 
ИБ АСУ ТП NON-STOP. Серия 6. Управление информационной безопасностью АСУ ТП и...
ИБ АСУ ТП NON-STOP. Серия 6. Управление информационной безопасностью АСУ ТП и...ИБ АСУ ТП NON-STOP. Серия 6. Управление информационной безопасностью АСУ ТП и...
ИБ АСУ ТП NON-STOP. Серия 6. Управление информационной безопасностью АСУ ТП и...
Компания УЦСБ
 
Jaringan tumbuhan
Jaringan tumbuhanJaringan tumbuhan
Jaringan tumbuhan
TiaraMay01
 
Twists and turns of developing music applications for iOS
Twists and turns of developing music applications for iOSTwists and turns of developing music applications for iOS
Twists and turns of developing music applications for iOS
DevGAMM Conference
 
Com escrivim una carta?
Com escrivim una carta?Com escrivim una carta?
Com escrivim una carta?
lurdessaavedra
 
INDIKATOR KINERJA SURVEILANS DI PUSKESMAS I BATURRADEN
INDIKATOR KINERJA SURVEILANS DI PUSKESMAS I BATURRADEN INDIKATOR KINERJA SURVEILANS DI PUSKESMAS I BATURRADEN
INDIKATOR KINERJA SURVEILANS DI PUSKESMAS I BATURRADEN
yesintabella
 
Контент-менеджмент: руководство к действию.
Контент-менеджмент: руководство к действию.Контент-менеджмент: руководство к действию.
Контент-менеджмент: руководство к действию.
Soloten
 

Viewers also liked (19)

AbsolutelyFantasticSlideshow
AbsolutelyFantasticSlideshowAbsolutelyFantasticSlideshow
AbsolutelyFantasticSlideshow
 
Jeanx
JeanxJeanx
Jeanx
 
Glee transmedia
Glee transmediaGlee transmedia
Glee transmedia
 
HNW_1
HNW_1HNW_1
HNW_1
 
Halloween
HalloweenHalloween
Halloween
 
Mentor networks and career success lessons for turbulent times
Mentor networks and career success   lessons for turbulent timesMentor networks and career success   lessons for turbulent times
Mentor networks and career success lessons for turbulent times
 
Monthly Top 15 Games in the media - 2015 edition
Monthly Top 15 Games in the media - 2015 editionMonthly Top 15 Games in the media - 2015 edition
Monthly Top 15 Games in the media - 2015 edition
 
Kickstarter and Games - June 2012
Kickstarter and Games - June 2012Kickstarter and Games - June 2012
Kickstarter and Games - June 2012
 
GDC12 Keys to the European Market
GDC12 Keys to the European MarketGDC12 Keys to the European Market
GDC12 Keys to the European Market
 
Oracle's Listagg Function - Uses and Duplicate Removal
Oracle's Listagg Function - Uses and Duplicate RemovalOracle's Listagg Function - Uses and Duplicate Removal
Oracle's Listagg Function - Uses and Duplicate Removal
 
Profil kesehatan Kabupaten mamuju tengah
Profil  kesehatan Kabupaten mamuju tengahProfil  kesehatan Kabupaten mamuju tengah
Profil kesehatan Kabupaten mamuju tengah
 
Sistem Informasi Pelayanan Publik Milik Pemerintah dan BUMN/Swasta
Sistem Informasi Pelayanan Publik Milik Pemerintah dan BUMN/SwastaSistem Informasi Pelayanan Publik Milik Pemerintah dan BUMN/Swasta
Sistem Informasi Pelayanan Publik Milik Pemerintah dan BUMN/Swasta
 
The psychology of visual perception. Notes on a match-3 fields by Playrix
The psychology of visual perception. Notes on a match-3 fields by PlayrixThe psychology of visual perception. Notes on a match-3 fields by Playrix
The psychology of visual perception. Notes on a match-3 fields by Playrix
 
ИБ АСУ ТП NON-STOP. Серия 6. Управление информационной безопасностью АСУ ТП и...
ИБ АСУ ТП NON-STOP. Серия 6. Управление информационной безопасностью АСУ ТП и...ИБ АСУ ТП NON-STOP. Серия 6. Управление информационной безопасностью АСУ ТП и...
ИБ АСУ ТП NON-STOP. Серия 6. Управление информационной безопасностью АСУ ТП и...
 
Jaringan tumbuhan
Jaringan tumbuhanJaringan tumbuhan
Jaringan tumbuhan
 
Twists and turns of developing music applications for iOS
Twists and turns of developing music applications for iOSTwists and turns of developing music applications for iOS
Twists and turns of developing music applications for iOS
 
Com escrivim una carta?
Com escrivim una carta?Com escrivim una carta?
Com escrivim una carta?
 
INDIKATOR KINERJA SURVEILANS DI PUSKESMAS I BATURRADEN
INDIKATOR KINERJA SURVEILANS DI PUSKESMAS I BATURRADEN INDIKATOR KINERJA SURVEILANS DI PUSKESMAS I BATURRADEN
INDIKATOR KINERJA SURVEILANS DI PUSKESMAS I BATURRADEN
 
Контент-менеджмент: руководство к действию.
Контент-менеджмент: руководство к действию.Контент-менеджмент: руководство к действию.
Контент-менеджмент: руководство к действию.
 

Similar to Can Information Security Survive

Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Matthew Rosenquist
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
IT@Intel
 
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingCloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingOpSource
 
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared CarstensenCyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
jaredcarst
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
Jason Clark
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
IBM Danmark
 
Technology Asset Intelligence
Technology Asset IntelligenceTechnology Asset Intelligence
Technology Asset IntelligenceLuis Lobo e Silva
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYODstefriche0199
 
Why Have A Digital Investigative Infrastructure
Why Have A Digital Investigative InfrastructureWhy Have A Digital Investigative Infrastructure
Why Have A Digital Investigative InfrastructureKevin Wharram
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary
Intel IT Center
 
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013Matthew Rosenquist
 
Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."
Rafal Los
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
Marlabs
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligence
guest08b1e6
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
gueste69f645
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
Ulf Mattsson
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
BIOVIA
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
Rogers Communications
 

Similar to Can Information Security Survive (20)

Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingCloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
 
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared CarstensenCyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Technology Asset Intelligence
Technology Asset IntelligenceTechnology Asset Intelligence
Technology Asset Intelligence
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
 
Why Have A Digital Investigative Infrastructure
Why Have A Digital Investigative InfrastructureWhy Have A Digital Investigative Infrastructure
Why Have A Digital Investigative Infrastructure
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary
 
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
 
Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligence
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 

More from IT@Intel

IT@Intel: Creating Smart Spaces with All-in-Ones
IT@Intel:  Creating Smart Spaces with All-in-OnesIT@Intel:  Creating Smart Spaces with All-in-Ones
IT@Intel: Creating Smart Spaces with All-in-Ones
IT@Intel
 
Unlock Hidden Potential through Big Data and Analytics
Unlock Hidden Potential through Big Data and AnalyticsUnlock Hidden Potential through Big Data and Analytics
Unlock Hidden Potential through Big Data and Analytics
IT@Intel
 
Intel and IT- key industry trends driving business transformation
Intel and IT- key industry trends driving business transformationIntel and IT- key industry trends driving business transformation
Intel and IT- key industry trends driving business transformation
IT@Intel
 
IT@Intel: Introducing IT on the Go
IT@Intel:   Introducing IT on the GoIT@Intel:   Introducing IT on the Go
IT@Intel: Introducing IT on the Go
IT@Intel
 
Enterprise Video Hosting: Introducing the Intel Video Portal
Enterprise Video Hosting:  Introducing the Intel Video PortalEnterprise Video Hosting:  Introducing the Intel Video Portal
Enterprise Video Hosting: Introducing the Intel Video Portal
IT@Intel
 
How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology
How to Self-Provision over WLAN with Intel(R) vPro(TM) TechnologyHow to Self-Provision over WLAN with Intel(R) vPro(TM) Technology
How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology
IT@Intel
 
Jamming on Collaboration
Jamming on CollaborationJamming on Collaboration
Jamming on Collaboration
IT@Intel
 
Accelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsAccelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform Benefits
IT@Intel
 
Deploying Intel Architecture-based Tablets with Windows* 8 at Intel
Deploying Intel Architecture-based Tablets with Windows* 8 at IntelDeploying Intel Architecture-based Tablets with Windows* 8 at Intel
Deploying Intel Architecture-based Tablets with Windows* 8 at Intel
IT@Intel
 
Nurturing Innovation at Intel through Mindfulness
Nurturing Innovation at Intel through MindfulnessNurturing Innovation at Intel through Mindfulness
Nurturing Innovation at Intel through Mindfulness
IT@Intel
 
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets
Evaluating Microsoft Windows 8 Security on Intel Architecture TabletsEvaluating Microsoft Windows 8 Security on Intel Architecture Tablets
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets
IT@Intel
 
It tools slideshare
It tools slideshareIt tools slideshare
It tools slideshareIT@Intel
 

More from IT@Intel (12)

IT@Intel: Creating Smart Spaces with All-in-Ones
IT@Intel:  Creating Smart Spaces with All-in-OnesIT@Intel:  Creating Smart Spaces with All-in-Ones
IT@Intel: Creating Smart Spaces with All-in-Ones
 
Unlock Hidden Potential through Big Data and Analytics
Unlock Hidden Potential through Big Data and AnalyticsUnlock Hidden Potential through Big Data and Analytics
Unlock Hidden Potential through Big Data and Analytics
 
Intel and IT- key industry trends driving business transformation
Intel and IT- key industry trends driving business transformationIntel and IT- key industry trends driving business transformation
Intel and IT- key industry trends driving business transformation
 
IT@Intel: Introducing IT on the Go
IT@Intel:   Introducing IT on the GoIT@Intel:   Introducing IT on the Go
IT@Intel: Introducing IT on the Go
 
Enterprise Video Hosting: Introducing the Intel Video Portal
Enterprise Video Hosting:  Introducing the Intel Video PortalEnterprise Video Hosting:  Introducing the Intel Video Portal
Enterprise Video Hosting: Introducing the Intel Video Portal
 
How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology
How to Self-Provision over WLAN with Intel(R) vPro(TM) TechnologyHow to Self-Provision over WLAN with Intel(R) vPro(TM) Technology
How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology
 
Jamming on Collaboration
Jamming on CollaborationJamming on Collaboration
Jamming on Collaboration
 
Accelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsAccelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform Benefits
 
Deploying Intel Architecture-based Tablets with Windows* 8 at Intel
Deploying Intel Architecture-based Tablets with Windows* 8 at IntelDeploying Intel Architecture-based Tablets with Windows* 8 at Intel
Deploying Intel Architecture-based Tablets with Windows* 8 at Intel
 
Nurturing Innovation at Intel through Mindfulness
Nurturing Innovation at Intel through MindfulnessNurturing Innovation at Intel through Mindfulness
Nurturing Innovation at Intel through Mindfulness
 
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets
Evaluating Microsoft Windows 8 Security on Intel Architecture TabletsEvaluating Microsoft Windows 8 Security on Intel Architecture Tablets
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets
 
It tools slideshare
It tools slideshareIt tools slideshare
It tools slideshare
 

Recently uploaded

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Can Information Security Survive

  • 1. Can Information Security Survive? Malcolm Harkins Vice President and Chief Information Security Officer Intel Corporation
  • 2. Given the growth of incidents we have seen, the evolution of technology, and usage models changes … Can information security survive? 2 Copyright © 2011, Intel Corporation. All rights reserved.
  • 3. HOW ? 3 Copyright © 2011. Intel Corporation. All rights reserved.
  • 4. IT Risk and Security A Balancing Act Open Access Controls increased cost and constrains use of How Do We Balance? data and systems • Keeping us legal • Availability of information • Protection of information • Industry influence • Cost effectiveness of controls Locked Down Information assets should be fully protected Our mission is to protect to enable. 4 Copyright © 2011, Intel Corporation. All rights reserved.
  • 5. Don’t misperceive risk … 5 Copyright © 2011, Intel Corporation. All rights reserved.
  • 6. The Misperception of Risk Under- Estimated Risk is . . . Exaggerated 6 Copyright © 2011, Intel Corporation. All rights reserved.
  • 7. Surviving the Risk Data Enclaving Prevent Risk-Based Privileges Data Protection Browser Security Detect Endpoint Protection Identity and Asset Management Training and Awareness Respond Central Logging Service Infrastructure Protection Data Correlation/Alerting Predict Security Business Predictive Analytics Intelligence 7 Copyright © 2011, Intel Corporation. All rights reserved.
  • 8. Do you want to know more? "Can Information Security Survive?" webinar Malcolm Harkins, Vice President and Chief Information Security Officer at Intel, talks about balancing business needs and growth with risk mitigation. 8 Copyright © 2011, Intel Corporation. All rights reserved.
  • 9. Intel IT is passionate about driving business value through innovation and sharing IT best practices with our industry peers. Learn more about Intel IT’s information security initiatives at: Intel.com/IT 9 Copyright © 2011, Intel Corporation. All rights reserved.
  • 10. Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel, Intel logo, are trademarks of Intel Corporation in the U.S. and other countries. * Other names and brands may be claimed as the property of others Copyright © 2012 Intel Corporation. All rights reserved. 10 Copyright © 2011, Intel Corporation. All rights reserved.