DEFENSESTORM

RESOURCES

Thought leadership and customer testimonials are some of the many ways we build a community of trust. These resources highlight our recent research and success stories.

DefenseStorm
Community West Case Study

Case Studies

Community West Case Study

Community West CU was preparing for an examination that would elevate them to the next peer group. Faced with the challenges of having only two personnel managing their security, numerous disjointed systems, and impending reporting obligations, they recognized the need for a more efficient cybersecurity solution.

NuMark Case Study

Case Studies

NuMark Case Study

Before they met DefenseStorm, the credit union was operating with an in-house system network administrator and realized they were drastically under-resourced to host the kind of system required to manage their level of cyber risk.

From Cybersecurity to Cyber Risk Management: Put Your Risk Assessments to Work Webinar

Webinars & Videos

From Cybersecurity to Cyber Risk Management: Put Your Risk Assessments to Work Webinar

DefenseStorm’s Senior Consultant for Risk and Governance, Jessica Caballero, discusses how changing your perspective on cyber can translate into more effective practices to protect your financial institution.

More Benefit, Less Burden from Your Risk Assessment Process Webinar

Webinars & Videos

More Benefit, Less Burden from Your Risk Assessment Process Webinar

Listen to DefenseStorm’s Senior Consultant for Risk and Governance, Jessica Caballero, explain how the risk assessment is a beneficial exercise that can support and improve your financial institution’s cyber readiness and compliance efforts.

GRID Active Self Service Restores

Insights

GRID Active Self Service Restores

Navigating the complex world of financial regulations and data retention just got easier with DefenseStorm’s latest innovation.

GRID Active Risk Assessment Quantitative Scoring Model

Insights

GRID Active Risk Assessment Quantitative Scoring Model

DefenseStorm offers a proactive approach to cyber risk management so financial institutions can stop cyberthreats before they become destructive cyberattacks, allowing them to better protect their account holder and communities.

Vulnerability Management

Datasheets

Vulnerability Management

Vulnerability scanning assesses your system by discovering the security weaknesses in a network an adversary may be able to exploit due to missing patches, uninstalled software updates, open ports, running services and misconfigurations.

2023 Annual Threat Report

eBooks & Reports

2023 Annual Threat Report

DefenseStorm experts share key insights about what makes your financial institutions vulnerable in the new year. Read more in the DefenseStorm 2023 Annual Threat report.

Gesa Case Study

Case Studies

Gesa Case Study

With broader and deeper access to data not previously available, Gesa teamed up with DefenseStorm to streamline investigations and stop threats before they became attacks.

BMTX Case Study

Case Studies

BMTX Case Study

BMTX and DefenseStorm partner to stop cyber fraud in its tracks. DefenseStorm’s CyberFraud product, powered by GRID, provided real results to thwart attacks on BMTX before they happened.

Four New Frameworks in GRID Active Governance Program

Insights

Four New Frameworks in GRID Active Governance Program

Within our DefenseStorm Governance Program, our clients can systematically collect evidence from across the platform to document adherence to frameworks and self-assessments.

Is It Possible to Take the Pain Out of Cyber Risk Assessments?

Insights

Is It Possible to Take the Pain Out of Cyber Risk Assessments?

If you’ve ever been involved with a risk assessment, you know just how painful it can be. Learn how you can reframe how you think about risk assessments and consider some new, fresh approaches.

Live Oak Bank Case Study

Case Studies

Live Oak Bank Case Study

With a new line of business on the horizon – checking accounts with debit cards – Live Oak Bank determined it was time to get ahead of fraud and turned to DefenseStorm to implement our “built for banking” CyberFraud solution.

How I’ve Loved What I Do – or Learned to Move On!

Insights

How I’ve Loved What I Do – or Learned to Move On!

The older and hopefully wiser I get, the more I find myself both grateful and amazed to get paid to do the work I love.

What Banks & Credit Unions Must Know About the New Computer Security Incident Notification Rule Part 2

Insights

What Banks & Credit Unions Must Know About the New Computer Security Incident Notification Rule Part 2

In part one of this blog post, we gave you an in-depth look into the new Computer Security Incident Notification Rule. This is the rest of the story…

What Banks & Credit Unions Must Know About the New Computer Security Incident Notification Rule Part 1

Insights

What Banks & Credit Unions Must Know About the New Computer Security Incident Notification Rule Part 1

The OCC, Board, and FDIC released the final rule, Computer-Security Incident Notification Requirements for Banking Organizations and Their Bank Service Providers, on Nov. 23, 2021, which goes into effect April 1, 2022, and requires mandatory compliance on May 1, 2022.

Thriving in a Male-Dominated Industry (As A Woman)

Insights

Thriving in a Male-Dominated Industry (As A Woman)

Open dialog and idea sharing are how we build a community of trust at DefenseStorm, and everyone plays a role in that – speak up and encourage others to do the same!

Help Wanted: How to Think Creatively to Fill the Cybersecurity Skills Gap

Insights

Help Wanted: How to Think Creatively to Fill the Cybersecurity Skills Gap

It’s a matter of supply and demand. As in, the supply of cybersecurity professionals in the United States – and actually worldwide – is much lower than demand calls for.

What Did the Super Bowl Teach Us About Cybersecurity: It Only Takes One Mistake

Insights

What Did the Super Bowl Teach Us About Cybersecurity: It Only Takes One Mistake

We owe our information security teams the same kind of focused support the NFL provides to their officials, coaches and teams. The job is challenging. The stakes are high. And they “only need to be wrong once.”

Why Machine Learning is Integral to Maintaining Trust with Your Customers Part 2

Insights

Why Machine Learning is Integral to Maintaining Trust with Your Customers Part 2

If you have good data, if you’re monitoring your ML, and if you pair it with great people, then you’re much better off in protecting your institution as cyberthreats continue to involve.

Why Machine Learning is Integral to Maintaining Trust with Your Customers Part 1

Insights

Why Machine Learning is Integral to Maintaining Trust with Your Customers Part 1

Artificial intelligence and machine learning are terms that are used so frequently these days, it’s not clear what they even mean anymore, what’s real, and what’s not… and this is coming from someone who’s worked in the space for quite some time.

Cybersecurity Executive Order Mandates Certain Organizations Boost Their Defenses Against Cyberattacks

Insights

Cybersecurity Executive Order Mandates Certain Organizations Boost Their Defenses Against Cyberattacks

The Biden administration has issued one of the most wide-reaching orders mandating that most federal agencies must patch hundreds of cybersecurity vulnerabilities considered major risks for damaging intrusions into government computer systems. What does this mean for your financial institution?

Defending the Enterprise Part 2: The Exploitation of Unpatched Systems

Insights

Defending the Enterprise Part 2: The Exploitation of Unpatched Systems

Part two of this series will focus on the exploitation of unpatched systems and explore the processes your financial institution should have in place to keep bad actors at bay.

Defending the Enterprise Part 1: The Human Firewall

Insights

Defending the Enterprise Part 1: The Human Firewall

There are two lines of defense when it comes to protecting the enterprise and keeping the bad guys at bay: Strengthening the human firewall and patching vulnerable systems. Part one of this series will focus on the human firewall.

Why It Pays to Discover Your Company’s “Why”

Insights

Why It Pays to Discover Your Company’s “Why”

Struggling to connect with prospects and motivate employees? The problem may be a lack of clarity on your organization’s “why.”

3 Ways to Improve Your Credit Union’s Cybersecurity

Insights

3 Ways to Improve Your Credit Union’s Cybersecurity

With increased digitization in everyday life, financial institutions know that strong cybersecurity is critical.

What Cyberattacks Are Really Costing Your Credit Union

Insights

What Cyberattacks Are Really Costing Your Credit Union

Credit unions have been spurred to accelerate their move toward digital platforms and services after coronavirus, making the member experience more seamless than ever. With the increased use of technology, however, comes the ever-present risk of cyber vulnerabilities.

Data Security Whitepaper

eBooks & Reports

Data Security Whitepaper

Data security is central to every organization’s security posture. Data sent to DefenseStorm is secure in transit, at rest, and between services internal to our cloud infrastructure.

Axos Bank Case Study

Case Studies

Axos Bank Case Study

Axos bank was looking for a simple-to-learn, easy-to-use, multiple-purpose cybersecurity solution that employees trust to make them threat-ready. DefenseStorm checked all the boxes.

Endpoint Detection and Response (EDR)

Datasheets

Endpoint Detection and Response (EDR)

Threat detection is the number one priority for cybersecurity teams. If you don’t see the bad actors in your network, you can’t respond appropriately. Learn how DefenseStorm EDR uses a mix of technology and expertise to continuously look for threats.