Events , Governance & Risk Management , Infosecurity Europe 2023

What Info Security Can Learn From Product Security

Quentyn Taylor of Canon EMEA on the Value of Product Security Teams
Quentyn Taylor, director of information security, Canon Europe, Middle East and Africa

Product security is the other half of the security picture. While enterprise IT security primarily focuses on an internal audience, product security teams must respond quickly to issues identified by customers and researchers. Canon Europe’s Quentyn Taylor recently discussed the value of product security programs.

See Also: Live Webinar | A Practical Guide To Achieving Continuous Software Supply Chain GRC

Product security is challenging because fixes need to created, thoroughly tested and released rapidly. And because they could affect customers, companies need to meet intense requirements based on what is needed to secure products - not just what customers ask for, said Taylor, director of information security for Canon Europe, Middle East and Africa.

In this video interview with Information Security Media Group at Infosecurity Europe 2023, Taylor discussed:

  • Prioritization of security vulnerabilities and the benefits of becoming a CVE numbering authority;
  • Effective management of resources beyond information security to meet customers' needs;
  • Why CISOs need to adopt a broader commercial perspective.

Taylor delivers high quality, cost-effective security that meets business objectives. He is able to present to both the board and technical teams and achieves positive results for end customers and the company.


About the Author

Tony Morbin

Tony Morbin

Executive News Editor, EU

Morbin is a veteran cybersecurity and tech journalist, editor, publisher and presenter working exclusively in cybersecurity for the past decade – at ISMG, SC Magazine and IT Sec Guru. He previously covered computing, finance, risk, electronic payments, telecoms, broadband and computing, including at the Financial Times. Morbin spent seven years as an editor in the Middle East and worked on ventures covering Hong Kong and Ukraine.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.