<p>Cybersecurity is a battle fought in the shadows, where threats emerge unseen, and defenses must anticipate the unpredictable. From threat modeling to AI-driven security shifts, this episode explores the evolving tactics of attackers and defenders, the future of automation in cyber risk, and the challenges of building resilient security architectures in an ever-changing landscape.</p><p><br></p><p><strong>Derek Fisher</strong> is a cybersecurity and engineering expert with nearly 30 years of experience across financial, healthcare, military, and commercial sectors. Beyond his extensive career, Derek has made a lasting impact through his authorship, teaching, and contributions to the security community. We discuss the art and science of threat modeling, the future of AI in security, and what it really takes to break into the industry today.</p><p><br>In this conversation, Derek discusses his 30 years of experience and the impact of AI and cloud computing on cybersecurity. Derek emphasizes the importance of secure design, the challenges in the job market, and the gap between academic education and real-world skills. He also highlights his efforts to inspire the next generation through children&#39;s books and shares insights on future trends like robotics and quantum computing.</p><p><br></p><p>TIMESTAMPS:</p><p>00:00 Introduction to Cybersecurity and Derek Fisher&#39;s Background</p><p>10:09 The Impact of AI and Cloud on Cybersecurity</p><p>19:19 Understanding Threat Modeling in Cybersecurity</p><p>27:47 Navigating the Security Hiring Process</p><p>35:48 Navigating the Job Market in Cybersecurity</p><p>36:40 Breaking into Cybersecurity: Finding Your Path</p><p>44:16 Bridging the Gap: Academia vs. Industry</p><p>47:24 Inspiring the Next Generation: Writing for Kids</p><p>50:46 The Challenges of Parenting in a Digital Age</p><p>54:08 Future Trends in Cybersecurity and Technology</p><p>56:52 Creating a Cybersecurity-Themed Bar: A Fun Concept</p><p><br></p><p>SYMLINKS:</p><p>[Derek Fisher&#39;s LinkedIn Profile ]- <a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fderek-fisher-sec-arch%3Ffbclid%3DIwZXh0bgNhZW0CMTAAAR0z5l7r7ifJpokX5CFNW-BMcNCENQ1feHCtNC5mx2j1UEIatWvdPRALT0Q_aem_jNI1JYQwxV3O_kHWQAJwqg&h=AT2-mSe0etIn7LIs-0bdhtMyFp9om3kVbcjq5Twp2rPJzttFJZVBijjclyM2FPi71zmcTsTiSbcUxcNgroLQ4fOb5xk97NHwWSuKrpOYEj8fNgmvcOLe_lyFWEIBvB3Vqt1ySw" target="_blank" rel="ugc noopener noreferrer">https://www.linkedin.com/in/derek-fisher-sec-arch</a>Connect with Derek Fisher on LinkedIn to learn more about his professional background and expertise in cybersecurity.</p><p>[Securely Built Website] - <a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.securelybuilt.com%2F%3Ffbclid%3DIwZXh0bgNhZW0CMTAAAR0z5l7r7ifJpokX5CFNW-BMcNCENQ1feHCtNC5mx2j1UEIatWvdPRALT0Q_aem_jNI1JYQwxV3O_kHWQAJwqg&h=AT2-mSe0etIn7LIs-0bdhtMyFp9om3kVbcjq5Twp2rPJzttFJZVBijjclyM2FPi71zmcTsTiSbcUxcNgroLQ4fOb5xk97NHwWSuKrpOYEj8fNgmvcOLe_lyFWEIBvB3Vqt1ySw" target="_blank" rel="ugc noopener noreferrer">https://www.securelybuilt.com/</a>Explore Securely Built, founded by Derek Fisher, offering tailored cybersecurity advisory services, training programs, and resources to help businesses develop robust cybersecurity programs. </p><p>[Secure Work Coach] - <a href="https://www.secureworkcoach.com/about?fbclid=IwZXh0bgNhZW0CMTAAAR3SN4Ud_Mdzg72pPADcYmaImvPnGsqTGaCps_TeNrNEk12YTiKUNOUCgGw_aem_QaifubiCfJSeCDQZzPuTJg" target="_blank" rel="ugc noopener noreferrer">https://www.secureworkcoach.com/about</a>Access specialized cybersecurity courses and training materials provided by Secure Work Coach, founded by Derek Fisher, a seasoned cybersecurity expert with 30 years of engineering </p><p>[Derek Fisher&#39;s Udemy Instructor Profile] - <a href="https://www.udemy.com/user/derek-fisher-8/?fbclid=IwZXh0bgNhZW0CMTAAAR2bhlg8ecSCZgTohd083-enRGfnPum5XEyrPE-gS4sUD--wDJ3uvMeESRw_aem_aBkGT9YzmC50nYbSYryFtA" target="_blank" rel="ugc noopener noreferrer">https://www.udemy.com/user/derek-fisher-8/</a>Enroll in cybersecurity courses taught by Derek Fisher on Udemy, covering topics such as application security and CISSP exam preparation.</p><p>[Ultimate Cybersecurity Course &amp; CISSP Exam Prep] - <a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.udemy.com%2Fcourse%2Fultimate-cyber-security-course%2F%3Ffbclid%3DIwZXh0bgNhZW0CMTAAAR1M4vaCkgK3KpTpMkH0PHZwWAEJqMz5xLroJTBSEuzuh2Fh9S7oAihEaXg_aem_pJhTdP1Y3Ni0Y2u3lBunxg&h=AT2-mSe0etIn7LIs-0bdhtMyFp9om3kVbcjq5Twp2rPJzttFJZVBijjclyM2FPi71zmcTsTiSbcUxcNgroLQ4fOb5xk97NHwWSuKrpOYEj8fNgmvcOLe_lyFWEIBvB3Vqt1ySw" target="_blank" rel="ugc noopener noreferrer">https://www.udemy.com/course/ultimate-cyber-security-course/</a>Develop your cybersecurity skills and prepare for the CISSP exam with this comprehensive course by Derek Fisher.</p><p>[The Application Security Program Handbook] - <a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.securelybuilt.com%2Fmedia%3Ffbclid%3DIwZXh0bgNhZW0CMTAAAR1M4vaCkgK3KpTpMkH0PHZwWAEJqMz5xLroJTBSEuzuh2Fh9S7oAihEaXg_aem_pJhTdP1Y3Ni0Y2u3lBunxg&h=AT2-mSe0etIn7LIs-0bdhtMyFp9om3kVbcjq5Twp2rPJzttFJZVBijjclyM2FPi71zmcTsTiSbcUxcNgroLQ4fOb5xk97NHwWSuKrpOYEj8fNgmvcOLe_lyFWEIBvB3Vqt1ySw" target="_blank" rel="ugc noopener noreferrer">https://www.securelybuilt.com/media</a>Learn about building an application security program through this comprehensive guide authored by Derek Fisher.</p><p>[Alicia Connected Series ] - <a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.aliciaconnected.com%2F%3Ffbclid%3DIwZXh0bgNhZW0CMTAAAR1uRW3U4q-8N02P8EVa6jbEa3nR-DA2zyluBe6YEQue_iwaHLj51HSy8iI_aem_M8pGFj8OpWh_uArjhOgdUg&h=AT2-mSe0etIn7LIs-0bdhtMyFp9om3kVbcjq5Twp2rPJzttFJZVBijjclyM2FPi71zmcTsTiSbcUxcNgroLQ4fOb5xk97NHwWSuKrpOYEj8fNgmvcOLe_lyFWEIBvB3Vqt1ySw" target="_blank" rel="ugc noopener noreferrer">https://www.aliciaconnected.com/</a>Discover the &quot;Alicia Connected&quot; children&#39;s book series by Derek Fisher, focusing on safe technology usage for kids.</p><p>[Securely Built YouTube Channel] - <a href="https://www.youtube.com/@securelybuilt?fbclid=IwZXh0bgNhZW0CMTAAAR1M4vaCkgK3KpTpMkH0PHZwWAEJqMz5xLroJTBSEuzuh2Fh9S7oAihEaXg_aem_pJhTdP1Y3Ni0Y2u3lBunxg" target="_blank" rel="ugc noopener noreferrer">https://www.youtube.com/@securelybuilt</a>Watch cybersecurity tutorials and discussions on the Securely Built YouTube channel.</p><p>[Derek Fisher&#39;s Articles on SecureWorld News] - <a href="https://www.secureworld.io/industry-news/author/derek-fisher?fbclid=IwZXh0bgNhZW0CMTAAAR1uRW3U4q-8N02P8EVa6jbEa3nR-DA2zyluBe6YEQue_iwaHLj51HSy8iI_aem_M8pGFj8OpWh_uArjhOgdUg" target="_blank" rel="ugc noopener noreferrer">https://www.secureworld.io/industry-news/author/derek-fisher</a>Read articles authored by Derek Fisher on SecureWorld News, covering various cybersecurity topics.</p>

BarCode

Chris Glanden

Silent War

MAR 16, 202563 MIN
BarCode

Silent War

MAR 16, 202563 MIN

Description

<p>Cybersecurity is a battle fought in the shadows, where threats emerge unseen, and defenses must anticipate the unpredictable. From threat modeling to AI-driven security shifts, this episode explores the evolving tactics of attackers and defenders, the future of automation in cyber risk, and the challenges of building resilient security architectures in an ever-changing landscape.</p><p><br></p><p><strong>Derek Fisher</strong> is a cybersecurity and engineering expert with nearly 30 years of experience across financial, healthcare, military, and commercial sectors. Beyond his extensive career, Derek has made a lasting impact through his authorship, teaching, and contributions to the security community. We discuss the art and science of threat modeling, the future of AI in security, and what it really takes to break into the industry today.</p><p><br>In this conversation, Derek discusses his 30 years of experience and the impact of AI and cloud computing on cybersecurity. Derek emphasizes the importance of secure design, the challenges in the job market, and the gap between academic education and real-world skills. He also highlights his efforts to inspire the next generation through children&#39;s books and shares insights on future trends like robotics and quantum computing.</p><p><br></p><p>TIMESTAMPS:</p><p>00:00 Introduction to Cybersecurity and Derek Fisher&#39;s Background</p><p>10:09 The Impact of AI and Cloud on Cybersecurity</p><p>19:19 Understanding Threat Modeling in Cybersecurity</p><p>27:47 Navigating the Security Hiring Process</p><p>35:48 Navigating the Job Market in Cybersecurity</p><p>36:40 Breaking into Cybersecurity: Finding Your Path</p><p>44:16 Bridging the Gap: Academia vs. Industry</p><p>47:24 Inspiring the Next Generation: Writing for Kids</p><p>50:46 The Challenges of Parenting in a Digital Age</p><p>54:08 Future Trends in Cybersecurity and Technology</p><p>56:52 Creating a Cybersecurity-Themed Bar: A Fun Concept</p><p><br></p><p>SYMLINKS:</p><p>[Derek Fisher&#39;s LinkedIn Profile ]- <a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fderek-fisher-sec-arch%3Ffbclid%3DIwZXh0bgNhZW0CMTAAAR0z5l7r7ifJpokX5CFNW-BMcNCENQ1feHCtNC5mx2j1UEIatWvdPRALT0Q_aem_jNI1JYQwxV3O_kHWQAJwqg&h=AT2-mSe0etIn7LIs-0bdhtMyFp9om3kVbcjq5Twp2rPJzttFJZVBijjclyM2FPi71zmcTsTiSbcUxcNgroLQ4fOb5xk97NHwWSuKrpOYEj8fNgmvcOLe_lyFWEIBvB3Vqt1ySw" target="_blank" rel="ugc noopener noreferrer">https://www.linkedin.com/in/derek-fisher-sec-arch</a>Connect with Derek Fisher on LinkedIn to learn more about his professional background and expertise in cybersecurity.</p><p>[Securely Built Website] - <a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.securelybuilt.com%2F%3Ffbclid%3DIwZXh0bgNhZW0CMTAAAR0z5l7r7ifJpokX5CFNW-BMcNCENQ1feHCtNC5mx2j1UEIatWvdPRALT0Q_aem_jNI1JYQwxV3O_kHWQAJwqg&h=AT2-mSe0etIn7LIs-0bdhtMyFp9om3kVbcjq5Twp2rPJzttFJZVBijjclyM2FPi71zmcTsTiSbcUxcNgroLQ4fOb5xk97NHwWSuKrpOYEj8fNgmvcOLe_lyFWEIBvB3Vqt1ySw" target="_blank" rel="ugc noopener noreferrer">https://www.securelybuilt.com/</a>Explore Securely Built, founded by Derek Fisher, offering tailored cybersecurity advisory services, training programs, and resources to help businesses develop robust cybersecurity programs. </p><p>[Secure Work Coach] - <a href="https://www.secureworkcoach.com/about?fbclid=IwZXh0bgNhZW0CMTAAAR3SN4Ud_Mdzg72pPADcYmaImvPnGsqTGaCps_TeNrNEk12YTiKUNOUCgGw_aem_QaifubiCfJSeCDQZzPuTJg" target="_blank" rel="ugc noopener noreferrer">https://www.secureworkcoach.com/about</a>Access specialized cybersecurity courses and training materials provided by Secure Work Coach, founded by Derek Fisher, a seasoned cybersecurity expert with 30 years of engineering </p><p>[Derek Fisher&#39;s Udemy Instructor Profile] - <a href="https://www.udemy.com/user/derek-fisher-8/?fbclid=IwZXh0bgNhZW0CMTAAAR2bhlg8ecSCZgTohd083-enRGfnPum5XEyrPE-gS4sUD--wDJ3uvMeESRw_aem_aBkGT9YzmC50nYbSYryFtA" target="_blank" rel="ugc noopener noreferrer">https://www.udemy.com/user/derek-fisher-8/</a>Enroll in cybersecurity courses taught by Derek Fisher on Udemy, covering topics such as application security and CISSP exam preparation.</p><p>[Ultimate Cybersecurity Course &amp; CISSP Exam Prep] - <a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.udemy.com%2Fcourse%2Fultimate-cyber-security-course%2F%3Ffbclid%3DIwZXh0bgNhZW0CMTAAAR1M4vaCkgK3KpTpMkH0PHZwWAEJqMz5xLroJTBSEuzuh2Fh9S7oAihEaXg_aem_pJhTdP1Y3Ni0Y2u3lBunxg&h=AT2-mSe0etIn7LIs-0bdhtMyFp9om3kVbcjq5Twp2rPJzttFJZVBijjclyM2FPi71zmcTsTiSbcUxcNgroLQ4fOb5xk97NHwWSuKrpOYEj8fNgmvcOLe_lyFWEIBvB3Vqt1ySw" target="_blank" rel="ugc noopener noreferrer">https://www.udemy.com/course/ultimate-cyber-security-course/</a>Develop your cybersecurity skills and prepare for the CISSP exam with this comprehensive course by Derek Fisher.</p><p>[The Application Security Program Handbook] - <a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.securelybuilt.com%2Fmedia%3Ffbclid%3DIwZXh0bgNhZW0CMTAAAR1M4vaCkgK3KpTpMkH0PHZwWAEJqMz5xLroJTBSEuzuh2Fh9S7oAihEaXg_aem_pJhTdP1Y3Ni0Y2u3lBunxg&h=AT2-mSe0etIn7LIs-0bdhtMyFp9om3kVbcjq5Twp2rPJzttFJZVBijjclyM2FPi71zmcTsTiSbcUxcNgroLQ4fOb5xk97NHwWSuKrpOYEj8fNgmvcOLe_lyFWEIBvB3Vqt1ySw" target="_blank" rel="ugc noopener noreferrer">https://www.securelybuilt.com/media</a>Learn about building an application security program through this comprehensive guide authored by Derek Fisher.</p><p>[Alicia Connected Series ] - <a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.aliciaconnected.com%2F%3Ffbclid%3DIwZXh0bgNhZW0CMTAAAR1uRW3U4q-8N02P8EVa6jbEa3nR-DA2zyluBe6YEQue_iwaHLj51HSy8iI_aem_M8pGFj8OpWh_uArjhOgdUg&h=AT2-mSe0etIn7LIs-0bdhtMyFp9om3kVbcjq5Twp2rPJzttFJZVBijjclyM2FPi71zmcTsTiSbcUxcNgroLQ4fOb5xk97NHwWSuKrpOYEj8fNgmvcOLe_lyFWEIBvB3Vqt1ySw" target="_blank" rel="ugc noopener noreferrer">https://www.aliciaconnected.com/</a>Discover the &quot;Alicia Connected&quot; children&#39;s book series by Derek Fisher, focusing on safe technology usage for kids.</p><p>[Securely Built YouTube Channel] - <a href="https://www.youtube.com/@securelybuilt?fbclid=IwZXh0bgNhZW0CMTAAAR1M4vaCkgK3KpTpMkH0PHZwWAEJqMz5xLroJTBSEuzuh2Fh9S7oAihEaXg_aem_pJhTdP1Y3Ni0Y2u3lBunxg" target="_blank" rel="ugc noopener noreferrer">https://www.youtube.com/@securelybuilt</a>Watch cybersecurity tutorials and discussions on the Securely Built YouTube channel.</p><p>[Derek Fisher&#39;s Articles on SecureWorld News] - <a href="https://www.secureworld.io/industry-news/author/derek-fisher?fbclid=IwZXh0bgNhZW0CMTAAAR1uRW3U4q-8N02P8EVa6jbEa3nR-DA2zyluBe6YEQue_iwaHLj51HSy8iI_aem_M8pGFj8OpWh_uArjhOgdUg" target="_blank" rel="ugc noopener noreferrer">https://www.secureworld.io/industry-news/author/derek-fisher</a>Read articles authored by Derek Fisher on SecureWorld News, covering various cybersecurity topics.</p>