Malcolm Harkins

Sacramento, California, United States Contact Info
17K followers 500+ connections

Join to view profile

Articles by Malcolm

See all articles

Contributions

Activity

Join now to see all activity

Experience & Education

  • University of California, Davis - Graduate School of Management

View Malcolm’s full experience

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Publications

  • Managing Risk and Information Security: Protect to Enable 2nd edition

    Apress

    This updated version describes, at a high level, the evolving enterprise security landscape and provides guidance for a management-level audience about how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies.

    Managing Risk and Information Security provides thought leadership in the increasingly important area of enterprise…

    This updated version describes, at a high level, the evolving enterprise security landscape and provides guidance for a management-level audience about how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies.

    Managing Risk and Information Security provides thought leadership in the increasingly important area of enterprise information risk and security. It describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology not only for internal operations but increasing as a part of product or service creation, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk.

    This edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities and offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk.

    See publication
  • Introduction to IT Privacy - a Handbook for Technologists

    International Association of Privacy Professionals

    As a technological innovation creates new opportunities to collect, process and transfer personal information, the privacy risks associated with it grow exponentially. In today's information economy, successful IT Professionals must understand these risks and have the appropriate skills to safeguard data and support the privacy goals of their organization.

    Introduction to IT Privacy: A Handbook for Technologists is the essential resource for all IT stakeholders. Whether you're involved…

    As a technological innovation creates new opportunities to collect, process and transfer personal information, the privacy risks associated with it grow exponentially. In today's information economy, successful IT Professionals must understand these risks and have the appropriate skills to safeguard data and support the privacy goals of their organization.

    Introduction to IT Privacy: A Handbook for Technologists is the essential resource for all IT stakeholders. Whether you're involved in IT development, acquisition or administration, this book will give you the know-how you need to integrate privacy best practices.

    Other authors
    • Chris Clifton
    • Lorrie Faith Cranor
    • Simson Garfinkel
    • David Gordon
    • David Hoffman,
    • Aaron Massey
    • Stuart Shapiro
    • Manya Sleeper
    • Blase Ur
    See publication
  • Managing Risk and Information Security: Protect to Enable

    Apress

    This book describes the changing risk environment and why a fresh approach to information security is needed.The book discusses business risk from a broad perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions.

    See publication
  • CIO Leadership for State Governments

    Public Technology Institute

    With all the responsibility and challenges, little has been written about the state CIO Leader, until now. This book is with 37 contributors among 26 chapters, is designed to serve as a thought leadership guide aimed at the practitioner as well as those who seek to better understand the roles and responsibilities of today’s evolving State CIO. It is estimated that states will spend $157.5 billion on technology through 2015. The average tenure of a state CIO is approximately 2.5 years, and…

    With all the responsibility and challenges, little has been written about the state CIO Leader, until now. This book is with 37 contributors among 26 chapters, is designed to serve as a thought leadership guide aimed at the practitioner as well as those who seek to better understand the roles and responsibilities of today’s evolving State CIO. It is estimated that states will spend $157.5 billion on technology through 2015. The average tenure of a state CIO is approximately 2.5 years, and increasingly both the demands and expectations have risen dramatically. Today’s state CIO plays a greater strategic role than ever before when it comes to technology infrastructure, as well as providing key statewide citizen services and communications systems. This book is the ultimate thought-leaders guide

    Other authors
    • Alan R Shark
    • Carolyn Purcell
    • Rick Webb
    • Bethan Pepoli
    • Daniel Lohrmann
    See publication
  • Can Information Security Survive?

    The Freeman Spogli Institute for International Studies - Stanford University

    Almost every company is asking the question of survivability – how to balance business needs and growth, while meeting regulatory compliance and mitigating security risks? This question is facing organizations of all sizes, and for some the answer is changing the mission and scope of their IT security initiatives. In this session, Malcolm will discuss Intel’s approach to managing risk with its new “Protect to Enable” information security strategy

    See publication
  • Transforming Information Security, Realizing the Mobile Enterprise, Getting Ahead of Advanced Threats, and other papers

    -

    RSA convened a group of security executives from Global 1000 enterprises called the "Security for Business Innovation Council." They have been conducting interviews with Council members and publishing their ideas in a series of reports. Our hope is that these documents will provide your organization with valuable techniques for improving information security.

    Other authors
    • other members of the SBIC
    See publication

Honors & Awards

  • Excellence in Innovation

    Security Advisor Alliance

    The Excellence in Innovation Award honors a security leader that displays creativity, innovation and outside-the-box thinking in addressing today's cybersecurity challenges. This individual also donates time and energy to consulting startups in cybersecurity, and helps identify and articulate the complex problems the industry must…

    The Excellence in Innovation Award honors a security leader that displays creativity, innovation and outside-the-box thinking in addressing today's cybersecurity challenges. This individual also donates time and energy to consulting startups in cybersecurity, and helps identify and articulate the complex problems the industry must solve.

    http://www.itbusinessnet.com/article/Cylance-Global-CISO-Malcolm-Harkins-Receives-2015-Security-Advisor-Alliance-Excellence-in-Innovation-Award--4197049

  • 2013 Evanta Top 10 Breakaway Leader

    Evanta

    The prestigious Evanta Top 10 Breakaway Leader Awards celebrates world-class information security leaders and honors CISOs and senior IS executives whose leadership elevates their people, partners and business. The 2013 theme was Empowering Leadership Through Collective Insight.

  • (ISC)2® 2012 Americas Information Security Leadership Award (ISLA) - Senior Information Security Professional Category

    (ISC)2®

    The Americas ISLA program honors those information security professionals or managers in Central, North, and South America who have demonstrated outstanding leadership and initiative by creating and implementing projects and policies that are effecting significant improvements to the information security workforce and bringing new and positive visibility to the profession.

    Mr. Harkin´s implementation of an enterprise security strategy for Intel´s Bring Your Own Device (BYOD) program…

    The Americas ISLA program honors those information security professionals or managers in Central, North, and South America who have demonstrated outstanding leadership and initiative by creating and implementing projects and policies that are effecting significant improvements to the information security workforce and bringing new and positive visibility to the profession.

    Mr. Harkin´s implementation of an enterprise security strategy for Intel´s Bring Your Own Device (BYOD) program enabled the program to meet its 2011 goals for decreased security risk, increased cost savings, and improved employee satisfaction and productivity.

  • 2012 Computerworld Premier 100 IT Leader Award

    Computerworld

    Computerworld's Premier 100 IT Leaders Awards honor individuals who have had a positive impact on their organization through technology. Honored individuals manage internal IT organizations, mentor and motivate their IT teams with interesting challenges, envision innovative solutions to business problems and effectively manage and execute IT strategies.

    Computerworld's Premier 100 IT Leaders issue, published each year, highlights the accomplishments of the honorees, focusing on how they…

    Computerworld's Premier 100 IT Leaders Awards honor individuals who have had a positive impact on their organization through technology. Honored individuals manage internal IT organizations, mentor and motivate their IT teams with interesting challenges, envision innovative solutions to business problems and effectively manage and execute IT strategies.

    Computerworld's Premier 100 IT Leaders issue, published each year, highlights the accomplishments of the honorees, focusing on how they have used technology to have a positive impact on their organization.

  • 2010 RSA Conference Award - Excellence in the field of Security Practices

    RSA Conference

    Malcolm Harkins is among the first of Chief Information Security Officers to embrace social media while mitigating its risk. Harkins investigated social media threats and determined the impact to Intel. He then educated employees of potential threats, ensuring they were equipped to deal with the risks associated with social media, and architected an environment that used tools and processes to provide additional layers of protection.

    Harkins also developed a global marketing and…

    Malcolm Harkins is among the first of Chief Information Security Officers to embrace social media while mitigating its risk. Harkins investigated social media threats and determined the impact to Intel. He then educated employees of potential threats, ensuring they were equipped to deal with the risks associated with social media, and architected an environment that used tools and processes to provide additional layers of protection.

    Harkins also developed a global marketing and communications plan – making security relevant, engaging and effective for all users at Intel. He has made information security a “way of life” for Intel employees by creating a security portal and providing anti-virus software for both personal and professional use.

Organizations

  • Institute for Critical Infrastructure Technology

    Fellow

    - Present

    The Institute for Critical Infrastructure Technology is a non-partisan think-tank providing objective advisement on cybersecurity and technology issues to the House and Senate, federal agencies and critical infrastructure sector stakeholders. ICIT Fellows contribute their expertise and cutting edge research to legislative briefs and other publications as well as participate in legislative briefings and speaking engagements to help educate our Nation's technology leaders. www.ICITech.org.

  • Professional Development Academy

    Executive Vice Chair - Enterprise Security

    - Present

    https://www.evantaacademy.com/

  • CISO Institute - UC Berkley Center for Executive Education - Haas School of Business

    Faculty Member

    - Present

    http://executive.haas.berkeley.edu/programs/ciso-institute

  • CISO Coalition

    National Advisory Board

    - Present

    The CISO Coalition connects you to your most powerful resource, your peers. For real-time collaboration on information security, risk management, intelligence, board readiness and other relevant topics.

  • UC Davis Graduate School of Management

    Dean's Advisory Council

    - Present

    http://gsm.ucdavis.edu/deans-advisory-council

  • Defense of International Markets and Exchanges Symposium

    Program Committee

    - Present

    DIMES is an exclusive forum for the international market and exchange community to gather and discuss the latest cyber security developments and threats within the industry http://www.nasdaqomx.com/dimes/committee

  • LifeJourney

    CISO Mentor

    - Present

    https://www.lifejourney.us/

  • Arizona Cyber Threat Response Alliance

    Board of Advisors

    - Present

    http://azinfragard.org/?page_id=8

  • Infraguard

    Sacramento Region - Executive Board

    - Present

    https://www.infragard.org/

  • Security Business Innovation Council

    -

    - Present

    http://www.emc.com/emc-plus/rsa-thought-leadership/sbic/index.htm

  • National Security Business Alliance Council

    -

    - Present

    http://www.fbi.gov/about-us/investigate/counterintelligence/us-business-1

  • CISO Executive Summit

    Governing Body Chair Member

    - Present

    http://www.evanta.com/ciso

  • Bay Area CSO Council

    -

    - Present
  • Executive Security Action Forum

    Program Committee

    - Present

    https://www.rsaconference.com/ESAF

  • Industry Consortium for Advancement of Security on the Internet

    Founding Board Member - Treasurer

    -

    http://www.icasi.org/

  • Susquehanna University

    Adjunct Professor

    -

    Undergraduate class covering a broad set of topics across information risk and security including risk analysis, threat analysis, privacy, SOX, privacy, business continuity, war gaming, and incident response

  • Center for the Protection of National Infrastructure

    -

    http://www.cpni.gov.uk/

  • International Association of Privacy Professionals

    Member

Recommendations received

7 people have recommended Malcolm

Join now to view

More activity by Malcolm

View Malcolm’s full profile

  • See who you know in common
  • Get introduced
  • Contact Malcolm directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Malcolm Harkins

Add new skills with these courses