14 – Day Managed Security Services Trial

Complimentary Cyber Workshop

Anti-Predator Project 
Partnership

FTC updates Safeguards Rule

Goliath’s Cyber (in)Sanity podcast series…

Episode 17- Financial Sector Cybersecurity Discussion w/special guest Nathan Knottingham

Goliath Cyber Security Group Cyber (in)Sanity podcast with special guest Nathan Knottingham  of Be My Neighbor Mortgage sharing his insights on the security threat landscape and diving into the recent threats to the Financial Sector and sharing security insights. With financial data becoming increasingly vulnerable to cyber threats, Nathan provides valuable expertise on emerging risks and practical strategies for safeguarding sensitive information.

Listeners gain actionable steps to enhance their digital resilience in the face of evolving cyber threats, making this episode essential listening for anyone in the Financial Sector seeking to bolster their defenses.

Don’t miss this episode!

Subscribe now for a dose of Cyber (in)Sanity!

Our Services

CYBER ADVISORY SERVICES

Cybersecurity risks can result in significant financial losses, reputational damage, and legal repercussions. Our Cyber Advisory Services provide comprehensive solutions to help businesses protect themselves against cyber threats.

We work closely with you to understand your security requirements and develop a customized strategy to address potential threats.

Our services include but not limited to:

  • Executive Cyber Advisory Services (vCISO as a Service)
  • Incident Response Management 
  • Risk & Compliance
  • Vulnerability Management
  • CMMC Readiness & Gap Assessment
  • Network Vulnerability & Penetration Testing
  • Web Application Security Assessments
  • PenTesting as a Service (PTaaS)
  • Wireless Security Assessments
  • Red & Purple Teaming
  • Cyber Due Diligence
  • Tabletop Exercises

Goliath 360 – MANAGED SECURITY SERVICES

Are you concerned about the increasing threat of cyber attacks and data breaches? Do you want to ensure that your business is protected from potential security risks?

Goliath 360 offers a comprehensive managed security stack that provide businesses with the peace of mind they need to focus on their core operations.

Our services include but not limited to:

  • 24/7 Security Monitoring and Analysis
  • Real-Time Threat Detection and Prevention
  • Automated Remediation
  • Analysis of Both Internal and External Traffic
  • Integrated Threat Intelligence
  • Machine Learning Based Prevention
  • Active Vulnerability Scanning
  • Ongoing Regulatory Compliance Support
  • Executive Cyber Advisory Services (vCISO as a Service)
  • Cyber Security Awareness Training
  • Password Management
  • PREVENT | DETECT | REMEDIATE

Supporting Business Needs

We provide you with high quality Cyber Advisory services to assist with company growth and regulatory compliance.

Executive Cyber Advisory Services

In just a few hours you can have a security expert on staff who can assist with compliance, threats and vulnerability management for your organization.

Risk and Compliance

Obtain Audit and Audit assessment on compliance controls for CMMC, NIST, SOC 1/2/3, PCI, GDPR and many other compliance frameworks.

DevSecOps and SecOps

We have secure blueprints to start your journey into DevSecOps and supporting cyber security teams with SecOps.

Penetration Testing

While some might consider pen tests as just a vulnerability scan meant to check the box on a compliance requirement, Goliath believes the exercise should actually be much more.

Our Executive Team

Goliath Cyber has brought some of the best minds from the military, government intelligence, and enterprise security space together to create a true and trusted Cyber Advisory Security company.

dave ackley_cybersecurity framework and compliance_Goliath Cyber Security Group

Dave Ackley

Founder
CEO

Tim Rose

Chief Sales & Strategy
Officer

Andrew Berkuta

COO / Head of Cyber Advisory Services

Angelo Longo

Head of Executive Cyber Advisory Services

News, Blogs & Articles

The FHA has issued Mortgagee Letter 2024-10. It outlines strict rules for reporting major cybersecurity incidents. It’s based on advice from the Department of Homeland Security (DHS). This solution follows the Federal Information Security Modernization Act (FISMA) from 2014. It also follows the recommendations of many […]
The program was established by the U.S. Department of Defense (DOD) in September 2020 to provide guidelines around security-critical data and digital assets for all entities that interact with the DOD. CMMC recently launched its 2.0 model based off the well-known NIST cybersecurity framework. The DOD’s phased rollout plan […]
At Goliath Cyber we focus on bringing in partnerships that complement our Cyber Advisory services and make an actual difference for our clients. We bridge the gap for our clients helping build a more mature cyber program while meeting regulations and requirements. This allows them to […]
healthcare_cyber
Cyberthreats continue to grow exponentially for healthcare practices, and cyber-attacks are costly. They drain financial resources, disrupt practice productivity, endanger patient privacy, and compromise care quality. Protect your patient data, practice productivity, and financial health by applying the cybersecurity best practices for healthcare practices that follow.    […]
What do you think the reaction would be from a client or partner if you could NOT answer their questions immediately and/or prove that you are following proper and protective cybersecurity requirements?  Do you think they’d lose confidence in you? Do you think they’d start questioning […]
Mortgage Brokers, Lenders & Cybersecurity_Goliath Cyber Security Group
Cybersecurity services and solutions to protect customer data and maintain FTC Safeguards Rule compliance. Is Your Company Compliant to The New FTC Rule Changes? Changes to an important Federal Trade Commission (FTC) Rule shine a light at the information security practices of mortgage brokers, lenders, and agents. […]
Everyone benefits, the CISO, the company, and the insurer when CISOs are included in cyber insurance negotiations. Generally speaking, negotiating cyber insurance policies falls to the general counsel, chief financial officer, or chief operations officer. Having the CISO at the table when negotiating with insurance companies […]
Why Your IT MSP needs a Cybersecurity partner_Goliath Cyber Security
Many small and medium-sized businesses (SMBs) turn to IT Managed Service Providers (MSP’s) for their IT needs, but often find that they do not provide the necessary cybersecurity tools, solutions, and expertise. Let’s explore some of the reasons why your MSP is most likely not be […]
The Importance of E-commerce Application Security Testing_Goliath Cyber Security Group
Cyber attacks on e-commerce applications are a common trend in 2023 as e-commerce businesses become more omnichannel, they build and deploy increasingly more API interfaces, with threat actors constantly exploring more ways to exploit vulnerabilities. This is why regular testing and ongoing monitoring are necessary to […]
Many organizations have begun prioritizing cybersecurity competency at every level of seniority. A rule proposed by the SEC in April of 2022, which requires stricter qualifications for cybersecurity expertise on boards and in senior management, is tentatively scheduled to be finalized by October 2023.  As organizations across all […]
The Changing Dynamics of Cyber Insurance_Goliath Cyber Security Group
For the last couple of years, insurance companies have become increasingly careful about underwriting cyber-insurance policies, making it harder for organizations to purchase policies at an affordable price point with the coverage level needed. It’s not difficult to figure out why insurers are hesitant, cyberattacks continue […]
Cyber Insurance Coverage Checklist_Goliath Cyber Insurance Group
These days, cybercrime is rampant. More businesses than ever before, regardless of size, face various security challenges that pose major threats such as an all-out data breach. Most organizations have heard about the daunting consequences of a data breach. So it’s no surprise that cyber insurance […]