New Awards Recognize Software Product Security Executives

Deb Radcliff interviews Malcolm Harkins, Chief Security & Trust Officer with Exposure Management Vendor Epiphany Systems, who in the past was the first CISO at Intel Corporation, then became Intel’s Chief Security and Privacy Officer until he left in 2015. 

Planes, trains, automobiles, missile launchers, and medical devices. Embedded systems are everywhere. In recent years, the software products running these systems have come under scrutiny from DHS and other federal agencies calling for more visibility and security into critical commercial and embedded software products to protect the nation’s infrastructure.

 

With all this attention on software security, now seems like the right time to recognize and reward product executives whose contributions have delivered advancements in security for embedded or commercial software products.

 

“For me, there’s an inextricable link between information security and product security. That’s why over time at Intel, I became the Chief Security and Privacy Officer and started overseeing not just information security, but also product security and procedures,” says Malcolm Harkins, currently the Chief Security & Trust Officer with Exposure Management Vendor Epiphany Systems. 

 

Enter the Product Security Executive (PSE) of the Year Award announced this week by GrammaTech and T.E.N., Inc. Malcolm is one of the judges for the PSE award, and in this interview, he explains why this recognition is important while offering some criteria to measure the executive’s positive impact on the security of their products. 

 

For example, he says, “On the product security side, a lot of organizations are focused on protecting themselves, but not protecting their customers. One way to look at that is how often the product security executive is included in the audit committee and board presentations.”

 

This mindset is changing as agencies demand more transparency into software products.  

 

Resources:

  • For more information on the awards, to enter or nominate an individual visit PSE Award Nominations.
  • Awards are open to U.S.-based executives, including those with director, vice president, chief product security officer or similar titles, who are responsible for product security management are eligible for consideration. This includes individuals overseeing security at all stages of the product development lifecycle for software, firmware and/or embedded code; as well as secure product design, risk and vulnerability management and standards/regulatory compliance.

Nominations are now being accepted through October 10, and winners will be announced at the ISE® West Summit and Awards event on November 15 in Dallas, and at embedded.com, which is the media partner of the Awards.

 

*** This is a Security Bloggers Network syndicated blog from Shift Left authored by Deb Radcliff. Read the original post at: https://shiftleft.grammatech.com/new-awards-recognize-software-product-security-executives

Recent Posts

USENIX Security ’23 – Inductive Graph Unlearning

Authors/Presenters: *Cheng-Long Wang, Mengdi Huai, Di Wang* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content,…

2 hours ago

From DAST to dawn: why fuzzing is better solution | Code Intelligence

Security testing allows you to evaluate the robustness of applications and systems and identify potential weaknesses that attackers may exploit.…

2 hours ago

Scaling Application Security With Application Security Posture Management (ASPM)

Did you know that the total number of data breaches more than tripled between 2013 and 2022?  These breaches exposed…

5 hours ago

Crunching Some Numbers on PHP Support

PHP Extended Lifecycle Support (ELS) allows you to continue using older versions of PHP while still receiving security updates for…

9 hours ago

Google Chrome DBSC Protection Tested Against Cookie Attacks

In light of cookie stealing attacks and to ensure Chrome browser protection, Google has recently piloted its new Chrome DBSC.…

10 hours ago

What is SOC 2 Compliance Audit?

Our digital world is based on connectivity, but with that comes great responsibility. Businesses manage vast amounts of client information.…

11 hours ago