Welcome to Cybersecurity Growth β the show for aspiring and current cybersecurity leaders who want to stay informed on real policy, practical security trends, and what they mean for organizations.
In this episode, we break down the new White House Cybersecurity Executive Order (14144), explore its key directives, and connect the dots to secure development, third-party risk, SBOMs, AI, post-quantum cryptography, and more.
π Episode Overview
We open with a brief introduction, followed by a discussion of the latest cybersecurity executive order out of the White House. This episode isnβt just summary β we unpack what matters most to security leaders, developers, and executives focused on risk, compliance, and long-term program strategy.
πΊ Watch the full episode here:
π§ Or listen to the audio here:
π§ Hot Topic: White House Cybersecurity Executive Order
We spend the early part of the show on the new executive order (EO 14144), examining its scope and how it builds on prior directives:
- How this new EO expands on Executive Order 14028 (2021)
- The context of federal revocations under the previous administration
- Where this latest policy is focusing β and why it matters
π Key Areas Covered
Here are the strategic themes and technical priorities we dive into:
π¨ Third Party Risk Assessments
We discuss how the new order emphasizes third-party risk, what types of assessments may be required, and how organizations can prepare.
π Secure SDLC
Security leaders need to bake security into development β and we talk about what a Secure Software Development Life Cycle means in practice.
π§© Open Source Software Security
With open source increasingly central to modern apps, we dissect how to track, assess, and manage risk from OSS components.
π Technical Priorities Activated by the EO
π§Ύ Software Bill of Materials (SBOM)
SBOMs continue to gain traction. We explain the concept and how it supports transparency across software supply chains.
π Web Authentication
We break down the push toward stronger authentication standards and what that means for enterprise security.
β Post-Quantum Cryptography
As quantum threats loom, we talk about the move toward PQC and what early adapters should be thinking about.
π€ Artificial Intelligence
AI shows up across policy and practice β we discuss how AI considerations are being incorporated into security conversations at the national level.
π¬ Full Episode Timeline
Use these timestamps to jump to moments you care about most:
- 00:00 β Intro
- 01:10 β Sponsorship: Cybersecurity Growth Training
- 02:35 β Hot Topic: White House Cybersecurity Executive Order
- 04:39 β Review of EO 14028 (2021)
- 05:27 β Trump administration revocations
- 07:29 β Sources of show content
- 09:32 β Third party risk assessments
- 10:57 β Secure SDLC
- 11:53 β Open source software security
- 12:45 β Sponsorship: Cybersecurity Growth Consulting
- 17:35 β SBOM: Software Bill of Materials
- 19:45 β Web authentication
- 23:05 β Post-quantum cryptography
- 28:30 β Artificial intelligence
- 33:55 β Sponsorship: Cybersecurity Growth Merch Store
- 36:15 β Upcoming shows
- 39:10 β Thatβs a wrap
π Why This Matters
Whether youβre leading security in enterprise, government, or a startup β executive orders like this help signal where risk management, compliance, and security strategy are headed. Understanding not just the what but the why empowers leaders to proactively adapt β not just react.
Thanks for tuning in and staying part of the Cybersecurity Growth community. Weβre here to help you learn faster, lead stronger, and grow your impact.
β Shawn & the Cybersecurity Growth Team
* Cybersecuritygrowth.com and cybersecuritygrowth.com/webcasts
* Live on members.cybersecuritygrowth.com bi-weekly, Fridays at 2:30 PM ET, 11:30 AM PT, 6:30 PM GMT in your pod feeds a few days later.
π Hire a cybersecurity consultant or vCISO: https://cybersecuritygrowth.com/services
π’ Free Blogs, Videos and Podcasts: https://cybersecuritygrowth.com/webcasts/
π₯ Become a Member of our Self-paced Cybersecurity Training & Community: https://members.cybersecuritygrowth.com/
π Get your Cybersecurity Growth Merch: https://cybersecuritygrowth.com/store/
———————————————————————————–
CYBERSECURITY GROWTH SOCIALS
Website:Β https://cybersecuritygrowth.com
TikTok:Β https://www.tiktok.com/@cybersecgrowth
Facebook:Β https://www.facebook.com/100066411043800/
LinkedIn:Β https://www.linkedin.com/company/cybersecurity-growth