Securely Built

Securely Built

Computer and Network Security

Greater Philadelphia Area, Pennsylvania 75 followers

Providing cybersecurity services and education for businesses and individuals.

About us

Our mission is to empower individuals and businesses with the knowledge and tools necessary for robust cybersecurity, fostering a secure digital environment through our tools, education, and personalized consulting services. We are committed to guiding our clients through complex and emerging risk, ensuring they feel supported and confident in protecting their business and customers. We aim to not only safeguard the digital landscape but also to cultivate a community where security and peace of mind are accessible to all who need it.

Industry
Computer and Network Security
Company size
2-10 employees
Headquarters
Greater Philadelphia Area, Pennsylvania
Type
Self-Owned
Founded
2019
Specialties
Security Training, Threat Modeling, Secure SDLC, Security Awareness, Risk Assessment, Product Security, Cybersecurity, and Vulnerability Management

Locations

Updates

  • View organization page for Securely Built, graphic

    75 followers

    Don't take threat modeling lightly!

    View profile for Derek Fisher, graphic

    Cybersecurity Extraordinaire | Award-Winning Author & Speaker | Educator & Industry Leader | CISSP, CSSLP, AWS

    🔍 Navigating Security in System Design 🔍 Threat modeling, simply put, is the process of identifying threats, determining countermeasures, and evaluating whether these countermeasures effectively address potential risks in an architecture. When conducting threat modeling, we typically guide our analysis with four basic questions: 👉 What are we building? 👉 What can go wrong? 👉 What are we going to do about it? 👉 Did we do a good job? These questions might sound familiar because we subconsciously use a similar decision making process in everyday life, whether deciding on a commute route, planning an outing, or even something as mundane as choosing a dinner location. However, the stakes and complexity significantly increase when applied to technical architectures that handle sensitive data, interact with third parties, or operate within potentially hostile environments. The process is crucial in today’s digital landscape, where systems not only store and process critical data but also integrate deeply with physical components in cyberphysical systems. By embedding threat modeling into the development process, organizations can proactively identify vulnerabilities, implement effective safeguards, and ensure that their systems are resilient against both current and emerging threats. #threatmodeling #threats #productsecurity

    • No alternative text description for this image
  • View organization page for Securely Built, graphic

    75 followers

    DevSecOps integrates security into every phase of development and threat modeling plays a vital role in this transition. In this article, we explore how threat modeling moves beyond traditional pre-development activities to become a continuous, integral practice throughout the software lifecycle, ensuring security isn't compromised in the race to deployment. Threat modeling in a DevSecOps context doesn't just identify potential threats, it fosters a proactive security culture that is agile enough to adapt to the rapid iterations of modern development environments. This means not only planning for security from the start but also continuously revising threat models as applications evolve and new threats emerge. Discover how integrating threat modeling with DevSecOps can transform security practices from a periodic task to a fundamental aspect of every development cycle, enhancing both the security and the functionality of applications. #devsecops #cybersecurity #threatmodeling #softwaredevelopment #agilesecurity

    Redefining Security in DevSecOps

    Redefining Security in DevSecOps

    securelybuilt.substack.com

  • View organization page for Securely Built, graphic

    75 followers

    It's fall y'all and it's time to start talking about trees. While the leaves are changing colors for many of us, there is another type of tree to consider. #attacktrees are a specific graphical technique within threat modeling used to visualize potential threat scenarios hierarchically. They illustrate from a primary malicious activity to sub-goals and strategies employed by adversaries, offering a structured view of attack paths and aiding in early threat identification and mitigation within the development lifecycle. Read more here: #threatmanagement #risk #securityarchitecture #MITREATTACK #cyberresilience

    Attack Trees

    Attack Trees

    securelybuilt.substack.com

  • View organization page for Securely Built, graphic

    75 followers

    🚀 Boost Your Cybersecurity Workforce with the NICE Framework 🚀 Sixteen years ago, the NICE Framework was established by NIST in collaboration with government, private sector, and academia to create a unified approach to defining cybersecurity roles and skills. With 7 work role categories, 52 work roles, and over 2,200 tasks, skills, and knowledge (TSK) statements, the NICE Framework provides a detailed breakdown of the cybersecurity landscape. This structure helps align job seekers with job providers by offering a common language and understanding of what each role entails. For employers, the NICE Framework can transform how you create job descriptions and hire talent, ensuring that expectations match the realities of the role. For educators, it provides a pathway to develop curricula that truly prepares students for the specific demands of cybersecurity work. Job seekers can use the framework to identify roles that match their skills and to guide their professional development. By integrating the NICE Framework into your hiring, training, and education practices, you can build a robust and effective cybersecurity workforce ready to tackle today’s challenges. Ready to enhance your approach? Explore how the NICE Framework can align your needs with the talent and skills required to protect your organization. Learn more about NICE below: #CyberSecurity #NICEFramework #WorkforceDevelopment #Hiring #Education #CyberCareers

    Playing NICE for a better cyber world

    Playing NICE for a better cyber world

    securelybuilt.substack.com

  • View organization page for Securely Built, graphic

    75 followers

    Posture management employs tools that predict, assess, prevent, mitigate, and remediate cyber threats to maintain operational integrity and protect critical assets. While #CSPM and #ASPM are well-known, other tools include: ☁ CSPM: Secures cloud environments like AWS, Azure, and Google Cloud, ensuring compliance. 🔢 DSPM: Safeguards sensitive data, essential for meeting GDPR, HIPAA, and other regulations. 🈸 ASPM: Integrates security within the app development lifecycle, promoting a DevSecOps culture. 📶 NSPM: Manages network configurations and traffic to detect and counter threats effectively. By integrating these tools, organizations can develop a robust security framework to effectively combat complex cyber threats. Learn more about how these tools can strengthen your cybersecurity posture and minimize risks.

    Posture Management

    Posture Management

    securelybuilt.substack.com

  • Securely Built reposted this

    View profile for Derek Fisher, graphic

    Cybersecurity Extraordinaire | Award-Winning Author & Speaker | Educator & Industry Leader | CISSP, CSSLP, AWS

    The roles of "breakers" and "builders" represent two fundamental yet complementary approaches. 🛡️🔍 🔓 Breakers are the skilled penetration testers and ethical hackers whose main goal is to think like attackers. They proactively seek out system vulnerabilities to address them before they can be exploited by malicious entities. Their ability to uncover and exploit these weaknesses is crucial for pre-empting potential security breaches, ensuring systems are both tested and trustworthy. 🏗️ Builders, on the other hand, are focused on constructing resilient systems designed to resist cyber attacks. These professionals are instrumental in developing secure software, crafting robust network security protocols, and integrating comprehensive cybersecurity measures right from the design phase. Their work lays the foundation for secure infrastructures that safeguard an organization’s digital assets. ⭕Both roles are essential. Together, breakers and builders forge a dynamic that continuously strengthens an organization's cybersecurity framework. By identifying and addressing flaws, they not only enhance the security of individual systems but also raise the overall security standards of the industry. #cybersecurity #informationsecurity #ethicalhacking #productsecurity

    Breakers or Builders

    Breakers or Builders

    securelybuilt.substack.com

  • View organization page for Securely Built, graphic

    75 followers

    How much is data worth on the dark web? Find out more below!

    View profile for Derek Fisher, graphic

    Cybersecurity Extraordinaire | Award-Winning Author & Speaker | Educator & Industry Leader | CISSP, CSSLP, AWS

    The Price of Healthcare Data on the Dark Web It's alarming to realize the magnitude of data being collected and sold on the dark web. 💰A Social Security number can be worth anywhere from $1 to $5. 💰Credit card numbers are even more valuable, ranging from $5 to $30. 💰However, the most concerning is the price of a complete medical record, which can fetch around $1000. This is because medical records contain a wealth of information, including personal, financial, and medical details. Cybercriminals can use this data for various malicious activities, such as committing insurance fraud, blackmail, or targeted phishing attacks. For healthcare IT professionals, it's crucial to understand the value of the data being handled and take necessary measures to protect it from falling into the wrong hands. Here's a little more on that from a recent talk I gave. #HealthcareIT #DataSecurity #CyberSecurity #DarkWeb

  • View organization page for Securely Built, graphic

    75 followers

    Nice work on breaking down what healthcare IT looks like!

    View profile for Derek Fisher, graphic

    Cybersecurity Extraordinaire | Award-Winning Author & Speaker | Educator & Industry Leader | CISSP, CSSLP, AWS

    I took a recent deep dive into healthcare IT security, examining the complex environment hospitals navigate to protect patient data. Here’s a tease to the full video and what I cover: 🏥 Extensive Data Collection: Hospitals are not just centers of care but also vast data hubs. From clinical applications to advanced medical devices like MRI machines and even IoT devices such as pacemakers and smartwatches, every piece contributes to a rich tapestry of data that feeds into Electronic Health Records (EHR). 🔗 Data Integration and Sensitivity: The integration of diverse data sources into EHRs creates a detailed repository of sensitive patient information. This makes robust security measures essential to safeguard data from unauthorized access and potential breaches. Stay tuned for the next parts where I'll talk about some of the other unique challenges in this space. Protecting patient data is not just a technical challenge but a fundamental component of patient care today. #HealthcareIT #Cybersecurity #DataProtection #EHR #PatientCare #DigitalHealth

  • View organization page for Securely Built, graphic

    75 followers

    Great write up on some of the features in GitLab that help support a secure SDLC!

    View profile for Derek Fisher, graphic

    Cybersecurity Extraordinaire | Award-Winning Author & Speaker | Educator & Industry Leader | CISSP, CSSLP, AWS

    The more you know! If you're not familiar, GitLab provides several features that align well with the National Institute of Standards and Technology (NIST) Secure Software Development Framework (#SSDF). 🗺 The SSDF is a set of guidelines designed to help organizations incorporate security into the #software development lifecycle. 🗺 GitLab’s platform supports many of the practices recommended by the SSDF to ensure #security is integrated throughout the software development lifecycle. A few ways (not all) GitLab supports the four SSDF practices: Prepare the Organization (PO): 📜 GitLab allows organizations to set and enforce policies across their development projects, helping to ensure that security practices are followed consistently. 🛂 GitLab supports RBAC, which helps manage who can access certain parts of the project, ensuring that only authorized personnel can make changes to sensitive parts of the codebase. Protect the Software (PS): 📉 GitLab includes built-in tools for scanning vulnerabilities in the code and in its dependencies. This aligns with the SSDF’s recommendation to analyze code for vulnerabilities and manage the risk associated with third-party components. 🥫Container Scanning: GitLab can scan containers for vulnerabilities, which is crucial for ensuring the security of containerized applications. Produce Well-Secured Software (PW): 🔎 GitLab provides integrated ASTs (SAST, fuzz testing, secret detection, etc) tools that help developers identify and fix security vulnerabilities within their code before it’s deployed. 🕵♀️ Support for DAST, which tests running applications for vulnerabilities, a key practice for ensuring that the software behaves securely under malicious conditions. Respond to Vulnerabilities (RV): 🐛 GitLab has built-in features for tracking issues, including security vulnerabilities. This helps organizations respond promptly to vulnerabilities and manage patches or updates effectively. 🛠 GitLab facilitates the integration of fixes through its merge request features, enabling a quick turnaround on #vulnerability patches and ensuring that changes are reviewed and approved before deployment. By leveraging these and other integrated DevOps tools, GitLab helps organizations adhere to SSDF practices, making it easier to embed security throughout the software development lifecycle. This not only improves the security posture but also enhances the overall efficiency of development teams. Are you using this in your secure SDLC? What did I miss? #devops #devsecops

  • View organization page for Securely Built, graphic

    75 followers

    Another great article on supply chain impacts in the financial system.

    View profile for Derek Fisher, graphic

    Cybersecurity Extraordinaire | Award-Winning Author & Speaker | Educator & Industry Leader | CISSP, CSSLP, AWS

    Unlike the straightforward path of a physical product from creation to consumer, the #financial #supplychain is layered and complexity, involving everything from the initial customer interaction to third-party relationships that banks rely on. 💰 Something as "simple" as opening a bank account can involve multiple third-party services from identity verification to the issuance of banking tools. 📃 Cybersecurity, compliance, operational, and reputational risks associated with third-party interactions can cripple a bank or even have global ripple effects. Additionally, strict regulatory frameworks like #SOX, #PCI DSS, and #GDPR can influence third-party management for financial institutions. 🌐 Geopolitical tensions and rising nationalism affect international #banking, compelling banks to adapt their #data management practices to comply with local data residency #laws. ⛓ However, while there are challenges, there are opportunities that lie ahead for banks in managing their supply chain security over the next decade. Let me know your thoughts on the hidden dynamics that drive the financial services we use every day.

    Did someone leave the vault open?

    Did someone leave the vault open?

    Derek Fisher on LinkedIn

Similar pages

Browse jobs