Skip to content

Cyber Attacks and Data Breaches: Who is Responsible for Security? | Intel Technology

Play Video

What are you responsible for when it comes to security in the tech you use? Do you know how to change your settings, and should you?

In this Cyber Security Inside video, Tom and Cammile dig into cyber responsibility with ​​Dr. Magda Chelly, Cybersecurity Leader, Author, and Entrepreneur. 

You’ll learn: 

  • Who holds responsibility for cyber security, and what that responsibility is.
  • What assumptions there are about cyber understanding and why we should simplify training and explanations.
  • What the security defaults in technology should be and why.
  • Why diversity in the field of cyber security is so important.
  • And more!

Check it out. For more information, previous podcasts, and full versions, visit our homepage at https://cybersecurityinside.com.

 

To read more about cybersecurity topics, visit our blog at https://cybersecurityinside.com/blog/.

#cyberresponsibility #cybersecurity #IoT

The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.

—–

If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the Cyber Security Inside podcast on your favorite podcast platforms.

Apple Podcast: https://podcasts.apple.com/us/podcast/cyber-security-inside-podcast/id1526572021 

Spotify: https://open.spotify.com/show/6RN4ATo5ZDGvgaEj8rLep7?si=EQyu5_A0RvaEDGMdmiiRug 

 

Follow our hosts Tom Garrison and Camille Morhardt:

Tom: @tommgarrison

Camille: @morhardt

 

Learn more about Intel Cybersecurity:

https://www.intel.com/content/www/us/en/security/overview.html 

Intel Compute Life Cycle (CLA):

https://www.intel.com/content/www/us/en/security/compute-lifecycle-assurance.html