Skip to main content
Stickley on Security logo

Empower Your Staff with Stickley on Security Cybersecurity Training

Stickley on Security provides cybersecurity awareness and education solutions for financial institutions, leveraging real-world expertise to mitigate human risk.

Overview

Stickley on Security is a premier provider of cybersecurity education and awareness solutions, specifically designed to address the unique regulatory and operational needs of the financial services sector. Founded by Jim Stickley, a globally recognized authority in social engineering and physical security, the company has established a significant market presence as a trusted advisor to credit unions and community banks across the United States.

The company’s core mission is to bridge the gap between technical security measures and human behavior. While most organizations invest heavily in firewalls and encryption, Stickley on Security focuses on the most vulnerable link in the security chain: the individual. Their comprehensive service portfolio includes employee awareness training, executive briefings, and customer-facing security education platforms.

Historically, the firm evolved from a high-level security consultancy into a scalable content and software provider. This transition allowed them to democratize high-level security insights for smaller institutions that require sophisticated protection strategies but may have limited internal resources. Today, their focus remains steadfast on providing actionable intelligence that helps organizations stay ahead of evolving threats like identity theft, business email compromise (BEC), and sophisticated social engineering.

Positioning

Stickley on Security positions itself as the "Expert’s Choice" for human risk management. Their strategy centers on the credibility of their founder and the practical, "in-the-trenches" origin of their educational content. In a crowded market of generic Learning Management Systems (LMS), Stickley differentiates by being a domain-specific specialist for financial institutions.

Their messaging focuses on three core pillars:

  1. Authenticity: Positioning their training as coming from people who actually know how to break into systems, rather than HR-led compliance checklists.
  2. Customer Trust: Helping financial institutions build "security stickiness" with their own members and customers by providing value-add educational resources.
  3. Regulatory Ease: Specifically targeting the pain points of the NCUA and FDIC exam processes by providing turnkey reporting and documentation.

Unlike broad-market competitors like KnowBe4 or Proofpoint, which target every vertical, Stickley on Security leans into its niche. They brand themselves not just as a software vendor, but as a strategic partner that understands the specific compliance landscape and reputational risks unique to banking and finance.

Differentiation

The primary differentiator of Stickley on Security’s product suite is the quality and relevance of its content, which is rooted in real-world exploit experience. Their flagship offerings, such as the StickleyPro platform, move beyond static slides to provide dynamic, video-based education that is easily digestible for employees and executives alike.

Key product advantages include:

  • Expert-Led Content: Training modules are developed based on actual social engineering tactics discovered during professional security engagements, ensuring the material is current and credible.
  • The Advisor Series: A unique service providing branded security content that institutions can share with their own customers, positioning the bank as a proactive protector of client data.
  • Simulated Phishing and Assessments: Integrated tools that allow administrators to test employee resilience against modern phishing, vishing, and smishing attacks.
  • Compliance Alignment: Products are specifically mapped to regulatory requirements for financial institutions, making it easier for CISOs to demonstrate due diligence during audits.

By focusing on high-production value and relatable storytelling, their products achieve higher engagement rates than traditional compliance-heavy training, leading to a more measurable reduction in human-centric security incidents.

Ideal Customer Profile

The ideal customer for Stickley on Security typically fits the following profile:

  • Industry: Heavily concentrated in Financial Services (Credit Unions, Community Banks), but also applicable to Healthcare, Legal, and Government sectors.
  • Company Size: Small to Mid-Market (50 to 5,000 employees), though they scale to larger enterprises.
  • Technical Maturity: Moderate. They have an internal IT or Security person but need to outsource the specialized, labor-intensive task of content creation and threat research.
  • Budget: Organizations that prioritize "quality over quantity" and are willing to pay for premium, expert-led content rather than the cheapest generic training available.
  • Team Composition: Often led by a CISO, IT Manager, or Compliance Officer who needs a "set-it-and-forget-it" solution for continuous education.

Best Fit

Stickley on Security excels in the following scenarios:

  • High-Touch Financial Services: Specifically designed for credit unions and community banks that need to maintain high levels of trust with members while meeting rigorous NCUA or FDIC oversight.
  • Small to Mid-Sized Organizations (SMBs): Ideal for companies that lack a massive in-house cybersecurity research team but require "Tier 1" intelligence and professional-grade training materials.
  • Compliance-Driven Environments: When an organization needs to prove to auditors that they are providing continuous, updated security awareness training that addresses the latest social engineering tactics.
  • Customer/Member Education: Unlike many platforms that focus only on internal employees, Stickley is a premier choice for institutions that want to provide security value-adds directly to their end customers to reduce fraud losses.

Offerings

Stickley on Security offers several distinct packages:

  • Employee Security Awareness (ESA): A comprehensive internal program featuring monthly videos, phishing simulations, and employee newsletters.
  • Customer/Member Security Awareness (CSA): A public-facing version of the platform designed to be hosted on the institution's website to educate the end-user base.
  • The Stickley Phishing Simulator: A standalone or integrated tool for testing employee vigilance with customizable templates and automated "teachable moment" landing pages.
  • Security Minutes: Short, 60-second video bursts designed for quick consumption, perfect for intranet headers or digital signage in offices.
  • On-Site/Virtual Speaking: Keynote presentations and deep-dive sessions by Jim Stickley himself for high-stakes corporate events or board meetings.

Get our evaluation of Stickley on Security

Our advisory team has deep experience with Stickley on Security. We'll give you an honest, independent assessment — including how they compare to alternatives and what to watch out for.

Request Evaluation

Buying Guide: Stickley on Security

Everything you need to evaluate Stickley on Security— from features and pricing to implementation and security.

Introduction

Welcome to the definitive buying guide for Stickley on Security. In an era where human error accounts for the vast majority of data breaches, organizations—particularly in the financial sector—require more than just static firewalls; they need a "human firewall." Founded by renowned cybersecurity expert Jim Stickley, this platform provides a unique blend of high-quality video education, real-world cyber-attack simulations, and automated security awareness content designed to keep both employees and customers safe.

This guide will walk you through the core capabilities of Stickley on Security, from its industry-leading video production to its automated phishing simulators. You will learn how the platform fits into a broader risk management strategy, the technical prerequisites for a successful rollout, and how to determine if this solution aligns with your organization's specific compliance and educational needs. Whether you are a Credit Union looking to protect your members or a mid-market firm seeking to harden your internal defenses, this guide provides the objective insights necessary for an informed procurement decision.

Key Features

Stickley on Security offers a comprehensive suite of tools focused on the human element of security:

  • Professional Video Education: High-production-value videos featuring Jim Stickley that explain complex threats (like business email compromise or SIM swapping) in relatable, non-technical terms.
  • Automated Phishing Simulations: A robust testing engine that allows IT teams to send realistic, "Stickley-crafted" phishing emails to employees to identify vulnerabilities and trigger immediate point-of-failure training.
  • The Stickley Security Center: A white-labeled, hosted portal that serves as a central hub for security articles, videos, and news, which can be shared with employees and customers alike.
  • Monthly "Security Awareness" Content: Regular updates including newsletters, social media posts, and "Security Minutes" that ensure the educational content never becomes stale.
  • Compliance Reporting: Detailed analytics and tracking that provide proof of training for auditors, showing which employees have completed modules and how the organization is performing in phishing tests.
  • Real-World Threat Intel: Content is based on current, active exploits seen in the wild, often before they hit mainstream headlines.

Use Cases

  • The Community Bank Breach Prevention: A mid-sized bank uses Stickley’s phishing simulator monthly. After six months, they saw a 40% reduction in "click rates" on suspicious emails, significantly lowering their risk of ransomware.
  • Credit Union Member Value-Add: A Credit Union embeds the Stickley Security Center on their public website. Members use the "Search" feature to learn about the latest "Grandparent Scams," reducing the number of fraudulent wire transfers the CU has to investigate.
  • Annual Compliance Fulfillment: A healthcare provider uses Stickley's video modules to fulfill their HIPAA-mandated security awareness training requirements, providing a more engaging experience than the standard "death-by-PowerPoint" methods.
  • Rapid Incident Response Education: Following a high-profile national data breach, an organization pushes out a Stickley "Breaking News" video to all staff within 24 hours to explain the threat and how to avoid similar tactics.

Pricing Models

Stickley on Security typically utilizes a subscription-based model tailored to the size and scope of the organization:

  • Annual Subscription: Most contracts are billed annually.
  • Tiered by Employee/Member Count: Pricing is often scaled based on the number of employees (for internal training) or the number of members/customers (for the public-facing Security Center).
  • Module-Based Pricing: Organizations can choose to subscribe to specific components, such as the Employee Awareness suite, the Customer Education portal, or the Phishing Simulator, or bundle them for a discount.
  • No Hidden "Per-Phish" Fees: Unlike some competitors, Stickley generally offers unlimited phishing simulations within the subscription tier.
  • Setup Fees: A one-time initial configuration and branding fee may apply for white-labeled portals.

Technical Requirements

The platform is a SaaS (Software as a Service) solution with minimal infrastructure impact:

  • Browser Compatibility: Fully supports modern browsers including Chrome, Edge, Safari, and Firefox.
  • Email Whitelisting: Requires the ability to whitelist specific IP addresses and domains in the organization’s email gateway (e.g., Mimecast, Proofpoint, or Microsoft Defender) to ensure phishing simulations are delivered.
  • Internet Access: Standard high-speed internet for video streaming (vimeo/proprietary players).
  • Mobile Readiness: Portals are responsive and accessible via iOS and Android mobile devices for on-the-go learning.
  • No Local Installation: No agents or software need to be installed on local workstations.

Business Requirements

To successfully deploy Stickley on Security, organizations should meet the following prerequisites:

  • Stakeholder Buy-in: Leadership must view cybersecurity as a cultural priority rather than a checkbox exercise, as the platform works best when integrated into regular communication channels.
  • Marketing/Communications Alignment: Since the platform provides branded content, the internal marketing or comms team should be involved to ensure the "Stickley" content aligns with brand voice and distribution schedules.
  • Designated Administrator: While the platform is low-maintenance, a point person (typically in IT or Compliance) is needed to select monthly topics, review phish-test results, and manage user lists.
  • Training Culture: A willingness to move away from "once-a-year" training toward a "continuous micro-learning" model is essential for maximizing the ROI of the service.

Implementation Timeline

Implementation of Stickley on Security is typically rapid compared to enterprise ERP or CRM systems:

  • Phase 1: Discovery & Branding (Week 1): Initial kickoff call to define goals, provide brand assets (logos/colors) for the portal, and identify key target audiences (employees vs. customers).
  • Phase 2: Technical Setup & Whitelisting (Week 2): Configuring email servers to allow simulated phishing attacks and setting up SSO if applicable.
  • Phase 3: Content Selection & Integration (Week 3): Choosing the initial "Stickley" videos and articles to be featured on the organization's website or intranet.
  • Phase 4: Launch & Training (Week 4): Rolling out the first training module to employees and announcing the new security resources to customers.
  • Go-Live: Full platform access is usually achieved within 30 days of contract signing.

Support Options

Stickley on Security provides several layers of support to ensure client success:

  • Dedicated Account Management: Enterprise clients are often assigned a success manager to help with content strategy and campaign planning.
  • Technical Support: Help desk support is available via email and phone during standard business hours (typically Eastern Time).
  • Resource Library: A comprehensive knowledge base including "How-to" guides for whitelisting, SSO configuration, and portal customization.
  • Content Updates: Automatic delivery of new video and written content as part of the subscription, requiring no manual intervention from the client.
  • Professional Services: Available for organizations that require custom video production or specialized on-site speaking engagements with Jim Stickley.

Integration Requirements

Stickley on Security is designed to be "plug-and-play" with standard corporate infrastructure:

  • Web Integration: Provides easy-to-use scripts and widgets for embedding the "Stickley Security Center" directly into existing corporate websites or member portals.
  • Email Systems: Compatible with Microsoft 365, Google Workspace, and on-premise Exchange for the delivery of newsletters and phishing simulations.
  • Single Sign-On (SSO): Supports SAML 2.0 and other standard protocols to allow employees to access training modules without needing separate credentials.
  • LMS Compatibility: Content can often be exported or accessed in formats compatible with standard Learning Management Systems (SCORM/AICC) depending on the tier.
  • API Access: Limited API availability for reporting data to be pulled into centralized GRC (Governance, Risk, and Compliance) tools.

Security & Compliance

Stickley on Security is built to meet the high standards of the financial services industry:

  • SOC 2 Compliance: The platform typically maintains SOC 2 Type II certification to ensure data privacy and operational security.
  • Data Encryption: All data in transit is encrypted via TLS, and data at rest is protected using industry-standard AES-256 encryption.
  • Privacy Controls: Minimal Personally Identifiable Information (PII) is required for the platform to function, usually limited to employee names and work email addresses.
  • Audit Trails: Detailed logs are maintained for all administrative actions and user training completions.
  • Regulatory Alignment: Content is specifically mapped to help organizations meet requirements for FFIEC, NCUA, GLBA, and GDPR awareness training.

More AI Platform & Governance Vendors

View all

Considering Stickley on Security?

Independent. Vendor-funded. Expert-backed.

We'll help you evaluate Stickley on Securityagainst alternatives, negotiate better terms, and ensure a successful implementation. Our advisory services are funded through the vendor ecosystem — at no cost to you.