Securely Built

Securely Built

Computer and Network Security

Greater Philadelphia Area, Pennsylvania 66 followers

Providing cybersecurity services and education for businesses and individuals.

About us

Our mission is to empower individuals and small businesses with the knowledge and tools necessary for robust cybersecurity, fostering a secure digital environment through out tools, education, and personalized consulting services. We commit to guiding our clients with calm, patience, and presence, ensuring they feel supported and confident in protecting their business and customers. By embracing a philosophy of altruistic support, we aim to not only safeguard the digital landscape but also to cultivate a community where security and peace of mind are accessible to all who need it.

Industry
Computer and Network Security
Company size
2-10 employees
Headquarters
Greater Philadelphia Area, Pennsylvania
Type
Self-Owned
Founded
2019
Specialties
Security Training, Threat Modeling, Secure SDLC, Security Awareness, Risk Assessment, Product Security, Cybersecurity, and Vulnerability Management

Locations

Updates

  • View organization page for Securely Built, graphic

    66 followers

    🚀 Boost Your Cybersecurity Workforce with the NICE Framework 🚀 Sixteen years ago, the NICE Framework was established by NIST in collaboration with government, private sector, and academia to create a unified approach to defining cybersecurity roles and skills. With 7 work role categories, 52 work roles, and over 2,200 tasks, skills, and knowledge (TSK) statements, the NICE Framework provides a detailed breakdown of the cybersecurity landscape. This structure helps align job seekers with job providers by offering a common language and understanding of what each role entails. For employers, the NICE Framework can transform how you create job descriptions and hire talent, ensuring that expectations match the realities of the role. For educators, it provides a pathway to develop curricula that truly prepares students for the specific demands of cybersecurity work. Job seekers can use the framework to identify roles that match their skills and to guide their professional development. By integrating the NICE Framework into your hiring, training, and education practices, you can build a robust and effective cybersecurity workforce ready to tackle today’s challenges. Ready to enhance your approach? Explore how the NICE Framework can align your needs with the talent and skills required to protect your organization. Learn more about NICE below: #CyberSecurity #NICEFramework #WorkforceDevelopment #Hiring #Education #CyberCareers

    Playing NICE for a better cyber world

    Playing NICE for a better cyber world

    securelybuilt.substack.com

  • View organization page for Securely Built, graphic

    66 followers

    Posture management employs tools that predict, assess, prevent, mitigate, and remediate cyber threats to maintain operational integrity and protect critical assets. While #CSPM and #ASPM are well-known, other tools include: ☁ CSPM: Secures cloud environments like AWS, Azure, and Google Cloud, ensuring compliance. 🔢 DSPM: Safeguards sensitive data, essential for meeting GDPR, HIPAA, and other regulations. 🈸 ASPM: Integrates security within the app development lifecycle, promoting a DevSecOps culture. 📶 NSPM: Manages network configurations and traffic to detect and counter threats effectively. By integrating these tools, organizations can develop a robust security framework to effectively combat complex cyber threats. Learn more about how these tools can strengthen your cybersecurity posture and minimize risks.

    Posture Management

    Posture Management

    securelybuilt.substack.com

  • Securely Built reposted this

    View profile for Derek Fisher, graphic

    Cybersecurity Extraordinaire | Award-Winning Author & Speaker | Educator & Industry Leader | CISSP, CSSLP, AWS

    The roles of "breakers" and "builders" represent two fundamental yet complementary approaches. 🛡️🔍 🔓 Breakers are the skilled penetration testers and ethical hackers whose main goal is to think like attackers. They proactively seek out system vulnerabilities to address them before they can be exploited by malicious entities. Their ability to uncover and exploit these weaknesses is crucial for pre-empting potential security breaches, ensuring systems are both tested and trustworthy. 🏗️ Builders, on the other hand, are focused on constructing resilient systems designed to resist cyber attacks. These professionals are instrumental in developing secure software, crafting robust network security protocols, and integrating comprehensive cybersecurity measures right from the design phase. Their work lays the foundation for secure infrastructures that safeguard an organization’s digital assets. ⭕Both roles are essential. Together, breakers and builders forge a dynamic that continuously strengthens an organization's cybersecurity framework. By identifying and addressing flaws, they not only enhance the security of individual systems but also raise the overall security standards of the industry. #cybersecurity #informationsecurity #ethicalhacking #productsecurity

    Breakers or Builders

    Breakers or Builders

    securelybuilt.substack.com

  • View organization page for Securely Built, graphic

    66 followers

    How much is data worth on the dark web? Find out more below!

    View profile for Derek Fisher, graphic

    Cybersecurity Extraordinaire | Award-Winning Author & Speaker | Educator & Industry Leader | CISSP, CSSLP, AWS

    The Price of Healthcare Data on the Dark Web It's alarming to realize the magnitude of data being collected and sold on the dark web. 💰A Social Security number can be worth anywhere from $1 to $5. 💰Credit card numbers are even more valuable, ranging from $5 to $30. 💰However, the most concerning is the price of a complete medical record, which can fetch around $1000. This is because medical records contain a wealth of information, including personal, financial, and medical details. Cybercriminals can use this data for various malicious activities, such as committing insurance fraud, blackmail, or targeted phishing attacks. For healthcare IT professionals, it's crucial to understand the value of the data being handled and take necessary measures to protect it from falling into the wrong hands. Here's a little more on that from a recent talk I gave. #HealthcareIT #DataSecurity #CyberSecurity #DarkWeb

  • View organization page for Securely Built, graphic

    66 followers

    Nice work on breaking down what healthcare IT looks like!

    View profile for Derek Fisher, graphic

    Cybersecurity Extraordinaire | Award-Winning Author & Speaker | Educator & Industry Leader | CISSP, CSSLP, AWS

    I took a recent deep dive into healthcare IT security, examining the complex environment hospitals navigate to protect patient data. Here’s a tease to the full video and what I cover: 🏥 Extensive Data Collection: Hospitals are not just centers of care but also vast data hubs. From clinical applications to advanced medical devices like MRI machines and even IoT devices such as pacemakers and smartwatches, every piece contributes to a rich tapestry of data that feeds into Electronic Health Records (EHR). 🔗 Data Integration and Sensitivity: The integration of diverse data sources into EHRs creates a detailed repository of sensitive patient information. This makes robust security measures essential to safeguard data from unauthorized access and potential breaches. Stay tuned for the next parts where I'll talk about some of the other unique challenges in this space. Protecting patient data is not just a technical challenge but a fundamental component of patient care today. #HealthcareIT #Cybersecurity #DataProtection #EHR #PatientCare #DigitalHealth

  • View organization page for Securely Built, graphic

    66 followers

    Great write up on some of the features in GitLab that help support a secure SDLC!

    View profile for Derek Fisher, graphic

    Cybersecurity Extraordinaire | Award-Winning Author & Speaker | Educator & Industry Leader | CISSP, CSSLP, AWS

    The more you know! If you're not familiar, GitLab provides several features that align well with the National Institute of Standards and Technology (NIST) Secure Software Development Framework (#SSDF). 🗺 The SSDF is a set of guidelines designed to help organizations incorporate security into the #software development lifecycle. 🗺 GitLab’s platform supports many of the practices recommended by the SSDF to ensure #security is integrated throughout the software development lifecycle. A few ways (not all) GitLab supports the four SSDF practices: Prepare the Organization (PO): 📜 GitLab allows organizations to set and enforce policies across their development projects, helping to ensure that security practices are followed consistently. 🛂 GitLab supports RBAC, which helps manage who can access certain parts of the project, ensuring that only authorized personnel can make changes to sensitive parts of the codebase. Protect the Software (PS): 📉 GitLab includes built-in tools for scanning vulnerabilities in the code and in its dependencies. This aligns with the SSDF’s recommendation to analyze code for vulnerabilities and manage the risk associated with third-party components. 🥫Container Scanning: GitLab can scan containers for vulnerabilities, which is crucial for ensuring the security of containerized applications. Produce Well-Secured Software (PW): 🔎 GitLab provides integrated ASTs (SAST, fuzz testing, secret detection, etc) tools that help developers identify and fix security vulnerabilities within their code before it’s deployed. 🕵♀️ Support for DAST, which tests running applications for vulnerabilities, a key practice for ensuring that the software behaves securely under malicious conditions. Respond to Vulnerabilities (RV): 🐛 GitLab has built-in features for tracking issues, including security vulnerabilities. This helps organizations respond promptly to vulnerabilities and manage patches or updates effectively. 🛠 GitLab facilitates the integration of fixes through its merge request features, enabling a quick turnaround on #vulnerability patches and ensuring that changes are reviewed and approved before deployment. By leveraging these and other integrated DevOps tools, GitLab helps organizations adhere to SSDF practices, making it easier to embed security throughout the software development lifecycle. This not only improves the security posture but also enhances the overall efficiency of development teams. Are you using this in your secure SDLC? What did I miss? #devops #devsecops

  • View organization page for Securely Built, graphic

    66 followers

    Another great article on supply chain impacts in the financial system.

    View profile for Derek Fisher, graphic

    Cybersecurity Extraordinaire | Award-Winning Author & Speaker | Educator & Industry Leader | CISSP, CSSLP, AWS

    Unlike the straightforward path of a physical product from creation to consumer, the #financial #supplychain is layered and complexity, involving everything from the initial customer interaction to third-party relationships that banks rely on. 💰 Something as "simple" as opening a bank account can involve multiple third-party services from identity verification to the issuance of banking tools. 📃 Cybersecurity, compliance, operational, and reputational risks associated with third-party interactions can cripple a bank or even have global ripple effects. Additionally, strict regulatory frameworks like #SOX, #PCI DSS, and #GDPR can influence third-party management for financial institutions. 🌐 Geopolitical tensions and rising nationalism affect international #banking, compelling banks to adapt their #data management practices to comply with local data residency #laws. ⛓ However, while there are challenges, there are opportunities that lie ahead for banks in managing their supply chain security over the next decade. Let me know your thoughts on the hidden dynamics that drive the financial services we use every day.

    Did someone leave the vault open?

    Did someone leave the vault open?

    Derek Fisher on LinkedIn

  • View organization page for Securely Built, graphic

    66 followers

    If you haven't heard of Cornucopia from OWASP® Foundation, time to check it out. This has actually been around for a while, but it's a great way to learn about #threatmodeling in an interactive and creative way. Here’s how developers can utilize OWASP Cornucopia to understand and enhance their threat modeling practices: 1. Interactive Learning through Gaming: OWASP Cornucopia is designed as a card game that facilitates interactive #learning. This approach transforms the typically technical and often tedious process of threat modeling into an engaging and collaborative activity. Developers can use this game to simulate threat identification and mitigation strategies in a dynamic and enjoyable setting, which increases participation and retention of information. 2. Integration with Industry Standards: Cornucopia aligns with major security standards and frameworks such as OWASP ASVS, MASVS, MASTG, SAFECode, SCP, and CAPEC. By using this tool, developers can ensure that their security designs and threat models are compliant with established best practices and benchmarks. This alignment helps in systematically addressing security requirements without prior extensive knowledge of these frameworks. 3. Enhanced Team Collaboration and Ownership: The game format encourages team interaction, which in turn fosters a deeper understanding and shared responsibility for security. As described in the narrative, teams not only engage more actively but also start taking initiative in the threat modeling process. This leads to better identification of security threats and the development of robust mitigation strategies. 4. Practical Application and Delegation: Utilizing Cornucopia in threat modeling sessions helps teams move from theoretical discussions to practical applications. It delegates security responsibilities effectively across team members, regardless of their initial knowledge levels. This delegation improves overall team capability in security planning and penetration testing, reducing reliance on external security assessments. 5. Real-World and Fun Learning Environment: Cornucopia makes learning about threat modeling fun, which can significantly enhance the effectiveness of security training sessions. Engaged participants are more likely to contribute actively and remember the strategies discussed. The game’s competitive nature can lead to innovative thinking and problem-solving regarding #security vulnerabilities. 6. Adaptability and Updates: The latest version, Cornucopia 2.0, includes updates like mapping to the latest OWASP ASVS and the introduction of a new mobile app edition, ensuring the tool remains relevant with current technology trends and security challenges. This adaptability makes it a sustainable choice for ongoing security education and practice.

Similar pages

Browse jobs