starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
Derek Fisher

Derek Fisher

Advisory servicesCloud SecurityCybersecurityData Security and Access ControlsCyber Security

Derek Fisher

    About

    Derek Fisher brings nearly 30 years of experience in cybersecurity and engineering across sectors including finance, healthcare, and defense. He’s the author of Alicia Connected, a children’s book series on cybersecurity, and The Application Security Program Handbook. As Program Director and Associate Professor at Temple University, Derek teaches software security and leads efforts to develop the next generation of cyber professionals. A frequent speaker and content creator, he’s passionate about making security accessible and impactful—from classrooms to codebases.

    Advisory servicesCloud SecurityCybersecurityData Security and Access ControlsCyber SecurityCyber Security AwarenessCybersecurity ToolsCybersecurity ImplementationCybersecurity managementInformation SecurityIT securityInformation Security ManagementInformation Security implementationNetwork and Application SecurityRobust security programSecuritySecurity and risksSecurity Architecture and DesignSecurity policiesCybersecurity Best PracticesSecurity Awareness TrainingWeb Application SecuritySecurity ArchitectureMastering Cybersecurity