{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"Embracing Digital Transformation","title":"#190 Product Security Assurance","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/861b51f8\"></iframe>","width":"100%","height":180,"duration":2001,"description":"In this episode Darren interviews Jerry Bryan Sr. Director of Product Assurance at Intel and fellow podcaster of Chips and Salsa. They discover the Zero Trust aspects of Product assurance for a silicon manufacturer. Product assurance is integral to digital security, especially within the silicon industry. Internationally renowned technology giant Intel is setting the bar high in this domain. Intel has taken a comprehensive approach to product assurance, striking an effective balance between proactive security measures and reactive mitigation strategies. Laying the Foundation of Security in TechnologyProduct assurance at Intel starts with embedding a security-first mindset across the organization. The objective is to equip Intel's engineers to understand a hacker's outlook and approach. This is achieved through extensive training and events. Simultaneously, the organization applies a diligent security development lifecycle. This proactive measure ensures potential security weaknesses are identified and resolved.Equally important is Intel's widespread commitment to product assurance, which goes beyond the product development phase. The firm has established a product security incident response team (PSIRT). The team is tasked with managing vulnerability reports, developing quick mitigations, and facilitating the prompt delivery of security updates to customers when vulnerabilities surface post-product launch. Investing in Offensive Security ResearchSupporting its commitment to product assurance, Intel has established an 'offensive security research team' that boasts more than 80 hardware security researchers worldwide. The team proactively identifies potential vulnerabilities in existing and under-development products, thereby setting a robust and forward-facing outlook toward product security at Intel. The Power of Crowd-Sourced Security: Intel's Bug Bounty ProgramIntel has also acknowledged the power of crowd-sourced cybersecurity efforts through its Bugs Bounty...","thumbnail_url":"https://img.transistorcdn.com/IRrW2aizIeoZDn3gKLEax-JYQ8V_WzaFpHdgsslDx3k/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jM2Ji/MDk1OTdiYzA4ZWMw/NWNlOTY0N2RhMWQ3/YmY5Mi5wbmc.webp","thumbnail_width":300,"thumbnail_height":300}