Security
Determine security ramifications to protect personal data and information
106 Discussions

Chips & Salsa Episode 2: Security @ Intel

IPAS_Security
Employee
0 0 549
chips-salsae2-300x169.png

Hello again from Jerry and CRob!

In this latest episode of Chips & Salsa, our guest is Stephanie Domas and we are talking about new content just published to help customers understand our investments in security assurance practices and technology. In today’s ever changing threat landscape, securing hardware is foundational to all security efforts and at Intel, we take a broad approach in not only what we do, but also in how we do it. So please review the video and then download the document for complete details!

https://youtu.be/3N8Q85BU7hM

Thanks for watching!

Jerry & CRob

About our guest:

Stephanie Domas is the Director of Strategic Cybersecurity and Communications at Intel. Here, she leads development of complex security and communications strategies for the critical role that hardware and firmware security play in the digital ecosystem. Prior to Intel, Stephanie spent 8 years focused on medical device cybersecurity, leading a startup company and consulting with a broad range of manufacturers from the newest startups to the industry giants. She is the founder and lead trainer for cybersecurity training company DazzleCatDuo. Her past experience includes 10 years of reverse engineering and vulnerability analysis research as a defense contractor.

About the Chips & Salsa video series:

Chips and Salsa is a regular video series with hosts Jerry Bryant and Christopher “CRob” Robinson.  The videos cover such topics as vulnerability disclosures, security incident response, security assurance practices, security technologies with thought-provoking interviews with subject matter experts from Intel and across the security technology spectrum.
About the Author
Intel Product Assurance and Security (IPAS) is designed to serve as a security center of excellence – a sort of mission control – that looks across all of Intel. Beyond addressing the security issues of today, we are looking longer-term at the evolving threat landscape and continuously improving product security in the years ahead.