Sacramento, California, United States
Contact Info
17K followers
500+ connections
Articles by Malcolm
-
Controls That Count & Metrics That Matter
Controls That Count & Metrics That Matter
By Malcolm Harkins
-
Do What You Believe, Do It Where you Belong, Do It Because it Matters
Do What You Believe, Do It Where you Belong, Do It Because it Matters
By Malcolm Harkins
Contributions
Activity
-
🚨 Join us for an exciting webinar tomorrow on AI Red Teaming! 🚨 Are you ready to dive deep into the world of AI security and learn the latest…
🚨 Join us for an exciting webinar tomorrow on AI Red Teaming! 🚨 Are you ready to dive deep into the world of AI security and learn the latest…
Liked by Malcolm Harkins
-
I am so looking forward to speaking at next week's CLASS-LLC Cyber Strategy Retreat: Governance of AI and Cybersecurity Risk event in Atlanta…
I am so looking forward to speaking at next week's CLASS-LLC Cyber Strategy Retreat: Governance of AI and Cybersecurity Risk event in Atlanta…
Liked by Malcolm Harkins
-
Governing Your AI Systems Part 2 of our series "Securing Your AI: A Step-by-Step Guide for CISOs" is live. This installment dives into the critical…
Governing Your AI Systems Part 2 of our series "Securing Your AI: A Step-by-Step Guide for CISOs" is live. This installment dives into the critical…
Liked by Malcolm Harkins
Experience & Education
Publications
-
Managing Risk and Information Security: Protect to Enable 2nd edition
Apress
This updated version describes, at a high level, the evolving enterprise security landscape and provides guidance for a management-level audience about how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies.
Managing Risk and Information Security provides thought leadership in the increasingly important area of enterprise…This updated version describes, at a high level, the evolving enterprise security landscape and provides guidance for a management-level audience about how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies.
Managing Risk and Information Security provides thought leadership in the increasingly important area of enterprise information risk and security. It describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology not only for internal operations but increasing as a part of product or service creation, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk.
This edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities and offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk.
-
Introduction to IT Privacy - a Handbook for Technologists
International Association of Privacy Professionals
As a technological innovation creates new opportunities to collect, process and transfer personal information, the privacy risks associated with it grow exponentially. In today's information economy, successful IT Professionals must understand these risks and have the appropriate skills to safeguard data and support the privacy goals of their organization.
Introduction to IT Privacy: A Handbook for Technologists is the essential resource for all IT stakeholders. Whether you're involved…As a technological innovation creates new opportunities to collect, process and transfer personal information, the privacy risks associated with it grow exponentially. In today's information economy, successful IT Professionals must understand these risks and have the appropriate skills to safeguard data and support the privacy goals of their organization.
Introduction to IT Privacy: A Handbook for Technologists is the essential resource for all IT stakeholders. Whether you're involved in IT development, acquisition or administration, this book will give you the know-how you need to integrate privacy best practices.Other authors -
-
Managing Risk and Information Security: Protect to Enable
Apress
This book describes the changing risk environment and why a fresh approach to information security is needed.The book discusses business risk from a broad perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions.
-
CIO Leadership for State Governments
Public Technology Institute
With all the responsibility and challenges, little has been written about the state CIO Leader, until now. This book is with 37 contributors among 26 chapters, is designed to serve as a thought leadership guide aimed at the practitioner as well as those who seek to better understand the roles and responsibilities of today’s evolving State CIO. It is estimated that states will spend $157.5 billion on technology through 2015. The average tenure of a state CIO is approximately 2.5 years, and…
With all the responsibility and challenges, little has been written about the state CIO Leader, until now. This book is with 37 contributors among 26 chapters, is designed to serve as a thought leadership guide aimed at the practitioner as well as those who seek to better understand the roles and responsibilities of today’s evolving State CIO. It is estimated that states will spend $157.5 billion on technology through 2015. The average tenure of a state CIO is approximately 2.5 years, and increasingly both the demands and expectations have risen dramatically. Today’s state CIO plays a greater strategic role than ever before when it comes to technology infrastructure, as well as providing key statewide citizen services and communications systems. This book is the ultimate thought-leaders guide
Other authors -
-
Can Information Security Survive?
The Freeman Spogli Institute for International Studies - Stanford University
Almost every company is asking the question of survivability – how to balance business needs and growth, while meeting regulatory compliance and mitigating security risks? This question is facing organizations of all sizes, and for some the answer is changing the mission and scope of their IT security initiatives. In this session, Malcolm will discuss Intel’s approach to managing risk with its new “Protect to Enable” information security strategy
-
Transforming Information Security, Realizing the Mobile Enterprise, Getting Ahead of Advanced Threats, and other papers
-
RSA convened a group of security executives from Global 1000 enterprises called the "Security for Business Innovation Council." They have been conducting interviews with Council members and publishing their ideas in a series of reports. Our hope is that these documents will provide your organization with valuable techniques for improving information security.
Other authors -
Honors & Awards
-
Excellence in Innovation
Security Advisor Alliance
The Excellence in Innovation Award honors a security leader that displays creativity, innovation and outside-the-box thinking in addressing today's cybersecurity challenges. This individual also donates time and energy to consulting startups in cybersecurity, and helps identify and articulate the complex problems the industry must…
The Excellence in Innovation Award honors a security leader that displays creativity, innovation and outside-the-box thinking in addressing today's cybersecurity challenges. This individual also donates time and energy to consulting startups in cybersecurity, and helps identify and articulate the complex problems the industry must solve.
http://www.itbusinessnet.com/article/Cylance-Global-CISO-Malcolm-Harkins-Receives-2015-Security-Advisor-Alliance-Excellence-in-Innovation-Award--4197049
-
2013 Evanta Top 10 Breakaway Leader
Evanta
The prestigious Evanta Top 10 Breakaway Leader Awards celebrates world-class information security leaders and honors CISOs and senior IS executives whose leadership elevates their people, partners and business. The 2013 theme was Empowering Leadership Through Collective Insight.
-
(ISC)2® 2012 Americas Information Security Leadership Award (ISLA) - Senior Information Security Professional Category
(ISC)2®
The Americas ISLA program honors those information security professionals or managers in Central, North, and South America who have demonstrated outstanding leadership and initiative by creating and implementing projects and policies that are effecting significant improvements to the information security workforce and bringing new and positive visibility to the profession.
Mr. Harkin´s implementation of an enterprise security strategy for Intel´s Bring Your Own Device (BYOD) program…The Americas ISLA program honors those information security professionals or managers in Central, North, and South America who have demonstrated outstanding leadership and initiative by creating and implementing projects and policies that are effecting significant improvements to the information security workforce and bringing new and positive visibility to the profession.
Mr. Harkin´s implementation of an enterprise security strategy for Intel´s Bring Your Own Device (BYOD) program enabled the program to meet its 2011 goals for decreased security risk, increased cost savings, and improved employee satisfaction and productivity. -
2012 Computerworld Premier 100 IT Leader Award
Computerworld
Computerworld's Premier 100 IT Leaders Awards honor individuals who have had a positive impact on their organization through technology. Honored individuals manage internal IT organizations, mentor and motivate their IT teams with interesting challenges, envision innovative solutions to business problems and effectively manage and execute IT strategies.
Computerworld's Premier 100 IT Leaders issue, published each year, highlights the accomplishments of the honorees, focusing on how they…Computerworld's Premier 100 IT Leaders Awards honor individuals who have had a positive impact on their organization through technology. Honored individuals manage internal IT organizations, mentor and motivate their IT teams with interesting challenges, envision innovative solutions to business problems and effectively manage and execute IT strategies.
Computerworld's Premier 100 IT Leaders issue, published each year, highlights the accomplishments of the honorees, focusing on how they have used technology to have a positive impact on their organization. -
2010 RSA Conference Award - Excellence in the field of Security Practices
RSA Conference
Malcolm Harkins is among the first of Chief Information Security Officers to embrace social media while mitigating its risk. Harkins investigated social media threats and determined the impact to Intel. He then educated employees of potential threats, ensuring they were equipped to deal with the risks associated with social media, and architected an environment that used tools and processes to provide additional layers of protection.
Harkins also developed a global marketing and…Malcolm Harkins is among the first of Chief Information Security Officers to embrace social media while mitigating its risk. Harkins investigated social media threats and determined the impact to Intel. He then educated employees of potential threats, ensuring they were equipped to deal with the risks associated with social media, and architected an environment that used tools and processes to provide additional layers of protection.
Harkins also developed a global marketing and communications plan – making security relevant, engaging and effective for all users at Intel. He has made information security a “way of life” for Intel employees by creating a security portal and providing anti-virus software for both personal and professional use.
Organizations
-
Institute for Critical Infrastructure Technology
Fellow
- PresentThe Institute for Critical Infrastructure Technology is a non-partisan think-tank providing objective advisement on cybersecurity and technology issues to the House and Senate, federal agencies and critical infrastructure sector stakeholders. ICIT Fellows contribute their expertise and cutting edge research to legislative briefs and other publications as well as participate in legislative briefings and speaking engagements to help educate our Nation's technology leaders. www.ICITech.org.
-
Professional Development Academy
Executive Vice Chair - Enterprise Security
- Presenthttps://www.evantaacademy.com/
-
CISO Institute - UC Berkley Center for Executive Education - Haas School of Business
Faculty Member
- Presenthttp://executive.haas.berkeley.edu/programs/ciso-institute
-
CISO Coalition
National Advisory Board
- PresentThe CISO Coalition connects you to your most powerful resource, your peers. For real-time collaboration on information security, risk management, intelligence, board readiness and other relevant topics.
-
UC Davis Graduate School of Management
Dean's Advisory Council
- Presenthttp://gsm.ucdavis.edu/deans-advisory-council
-
Defense of International Markets and Exchanges Symposium
Program Committee
- PresentDIMES is an exclusive forum for the international market and exchange community to gather and discuss the latest cyber security developments and threats within the industry http://www.nasdaqomx.com/dimes/committee
-
LifeJourney
CISO Mentor
- Presenthttps://www.lifejourney.us/
-
Arizona Cyber Threat Response Alliance
Board of Advisors
- Presenthttp://azinfragard.org/?page_id=8
-
Infraguard
Sacramento Region - Executive Board
- Presenthttps://www.infragard.org/
-
Security Business Innovation Council
-
- Presenthttp://www.emc.com/emc-plus/rsa-thought-leadership/sbic/index.htm
-
National Security Business Alliance Council
-
- Presenthttp://www.fbi.gov/about-us/investigate/counterintelligence/us-business-1
-
CISO Executive Summit
Governing Body Chair Member
- Presenthttp://www.evanta.com/ciso
-
Bay Area CSO Council
-
- Present -
Executive Security Action Forum
Program Committee
- Presenthttps://www.rsaconference.com/ESAF
-
Industry Consortium for Advancement of Security on the Internet
Founding Board Member - Treasurer
-http://www.icasi.org/
-
Susquehanna University
Adjunct Professor
-Undergraduate class covering a broad set of topics across information risk and security including risk analysis, threat analysis, privacy, SOX, privacy, business continuity, war gaming, and incident response
-
Center for the Protection of National Infrastructure
-
http://www.cpni.gov.uk/
-
International Association of Privacy Professionals
Member
Recommendations received
7 people have recommended Malcolm
Join now to viewMore activity by Malcolm
-
I am excited to share with you an upcoming event where we’ll be focusing on the crucial role of #cybersecurity expertise in #Congress. In an era…
I am excited to share with you an upcoming event where we’ll be focusing on the crucial role of #cybersecurity expertise in #Congress. In an era…
Liked by Malcolm Harkins
-
I want to extend my heartfelt thanks to everyone for the birthday wishes. This past month has been nothing short of amazing: - Married my best…
I want to extend my heartfelt thanks to everyone for the birthday wishes. This past month has been nothing short of amazing: - Married my best…
Liked by Malcolm Harkins
-
What is AI Red Teaming? In cybersecurity, different methodologies are employed to identify, assess, and mitigate vulnerabilities within an…
What is AI Red Teaming? In cybersecurity, different methodologies are employed to identify, assess, and mitigate vulnerabilities within an…
Liked by Malcolm Harkins
-
Self portrait - spraypaint on canvas. I haven’t thought of a title yet. Any suggestions?
Self portrait - spraypaint on canvas. I haven’t thought of a title yet. Any suggestions?
Liked by Malcolm Harkins
-
It is great to continue to see the recognition for what we are doing for #security4AI #ciso #cso #protect2enable
It is great to continue to see the recognition for what we are doing for #security4AI #ciso #cso #protect2enable
Shared by Malcolm Harkins
-
🏆 We are excited to announce that HiddenLayer is a finalist for the 2024 Tech Innovators Awards! Thank you, The Channel Company, for recognizing…
🏆 We are excited to announce that HiddenLayer is a finalist for the 2024 Tech Innovators Awards! Thank you, The Channel Company, for recognizing…
Liked by Malcolm Harkins
-
As a veteran from the “endpoint security wars” for nearly 20 years, I’ve always recognized the critical importance of competitive intelligence…
As a veteran from the “endpoint security wars” for nearly 20 years, I’ve always recognized the critical importance of competitive intelligence…
Liked by Malcolm Harkins
-
Join me this year at SEMICON West 2024 as I will be participating in the Global Cybersecurity Forum to present on Cyber Resilience Through…
Join me this year at SEMICON West 2024 as I will be participating in the Global Cybersecurity Forum to present on Cyber Resilience Through…
Liked by Malcolm Harkins
-
👻 If you are looking for an API security solution that provides comprehensive discovery capabilities and immediate ROI, join us for our next…
👻 If you are looking for an API security solution that provides comprehensive discovery capabilities and immediate ROI, join us for our next…
Liked by Malcolm Harkins
-
We're super proud of Nicole Scout Basinski and Susan Kearns, who crushed it at Women in Analytics (WIA) DataConnect Conference 💪 Amazing…
We're super proud of Nicole Scout Basinski and Susan Kearns, who crushed it at Women in Analytics (WIA) DataConnect Conference 💪 Amazing…
Liked by Malcolm Harkins
-
I attended and spoke at Converge Security Conference last year and it was an amazing event bringing CISO and CSO level customers together with the…
I attended and spoke at Converge Security Conference last year and it was an amazing event bringing CISO and CSO level customers together with the…
Liked by Malcolm Harkins
-
Was there every any doubt? Congrats to Chris Sestito and the HiddenLayer team!
Was there every any doubt? Congrats to Chris Sestito and the HiddenLayer team!
Liked by Malcolm Harkins
-
More great news to share … #ciso #cso #protect2enable #security4AI
More great news to share … #ciso #cso #protect2enable #security4AI
Shared by Malcolm Harkins
-
📊 CB Insights has highlighted the growing machine learning security (MLSec) market, and we have exciting news. HiddenLayer has been recognized as…
📊 CB Insights has highlighted the growing machine learning security (MLSec) market, and we have exciting news. HiddenLayer has been recognized as…
Liked by Malcolm Harkins
-
We're off and running at the CyberRisk Collaborative LA Leadership Exchange! Great to start the day off by having breakfast with Mel Rico…
We're off and running at the CyberRisk Collaborative LA Leadership Exchange! Great to start the day off by having breakfast with Mel Rico…
Liked by Malcolm Harkins
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Malcolm Harkins
-
malcolm harkins
Independent Mechanical or Industrial Engineering Professional
-
Malcolm Harkins
--
-
Malcolm Harkins
Music Professional
-
Malcolm Harkins
None
4 others named Malcolm Harkins are on LinkedIn
See others named Malcolm Harkins