Partner Spotlight: NCU-ISAO Members Gain Actionable Intelligence with TruSTAR

“TruSTAR is an intuitive, centralized data repository. The TruSTAR team was able to demonstrate through preexisting relationships that the company already understood a lot of our situations as an ISAO and what we are trying to accomplish, and it was an easy partnership from that point on.” — Brian Hinze, NCU-ISAO Vice President, Member Services and Operations

The National Credit Union Information Sharing and Analysis Organization (NCU-ISAO) was formed in 2016 to help the industry navigate the flooded waters of threat intelligence and alerts, and support credit union cyber resilience. NCU-ISAO has been using TruSTAR Intelligence Management technology, acquired by Splunk, since 2019.

We recently spoke with Brian Hinze, NCU-ISAO Vice President, Member Services and Operations, to learn more about why NCU-ISAO chose TurSTAR for intelligence management, and how member organizations are using TruSTAR for information sharing and collaboration.

How has NCU-ISAO evolved since its inception? From a member standpoint, the availability of technology has helped evolve the organization and the consumption of cyber threat intelligence. Previously, deployments of advanced technologies were very expensive, and you would need a person or persons to manage information on a daily basis in order to administer it. Now, the accessibility through third-party managed service providers as well as the availability of advanced technologies like artificial intelligence and SIEMs have led to more advanced cyber resilience capability for credit unions of all sizes.

How did NCU-ISAO manage intelligence prior to implementing TruSTAR? We were using a notable information sharing platform that was focused on some of those advanced large-scale deployments, and it was really designed around information sharing. The options for members were to either have some sort of advanced system that could consume TAXII only or they would have to manage spreadsheets. Our process consisted of correlating and collecting the data, trying to do our own manual enrichment and then compiling that information into standard spreadsheets. This meant that organizations had to automate with something like PowerShell or Python to consume it into a firewall, copy and paste the information manually, or they would have to have the ability to connect to the online platform that we were using.

We needed a platform that was more than just a data repository. We wanted to be able to pull information out, get additional insights on data, and make the information more accessible. Automation for information sharing was also a key consideration. TruSTAR is an intuitive, centralized data repository. The TruSTAR team was able to demonstrate through preexisting relationships that the company already understood a lot of our situations as an ISAO and what we are trying to accomplish, and it was an easy partnership from that point on.

What use cases does TruSTAR solve for NCU-ISAO? While we did have our data repository, getting data in from multiple sources had to be simple. We collect information not only from our members, which can come in a few different shapes and sizes, but also we collect information from private sector partnerships as well as formalized government partnerships. And pulling that information, it comes in a lot of different formats. TruSTAR streamlines operations; it quickly ingests information from multiple sources and parses it out into actionable information.

Additionally, our members use a variety of tools. Some have third-party managed security service providers that can consume information on their behalf, some have tools that consume a TAXII feed, and others use SIEM tools and want to consume intelligence via API. Integrations are a prominent feature of the TruSTAR community platform, and they make it easy to consume information in different formats, then correlate and standardize it as an output. TruSTAR integrates with many of the tools our members use, and the platform also integrates with various intelligence sources that we use such as The U.S. Department of Homeland Security Cyber Information Sharing and Collaboration Program (CISCP) and MISP.

Internally, the NCU-ISAO team uses TruSTAR to export data to our managed security service provider. They take the data out of TruSTAR and pull it into their communities, which helps protect our networks and NCU-ISAO members.

Can you speak to the benefits NCU-ISAO members receive from TruSTAR? We see requirements at all levels for actionable intelligence. TruSTAR benefits members whether they are smaller credit unions who outsource their information security functions in IT to a third party or larger organizations as an additional line of network defense. The platform provides members the ability to do their own investigations and correlations in the platform, and do that without having to necessarily share automatically with information sharing partners like ours. When members find information of value they can contribute back to other members with the click of a button.

Members also have access to the TruSTAR detection and triage capabilities, which provides a simple way of sharing information by forwarding any questionable emails privately. Then we can redact out any attributable information to that organization and share the anonymized key indicators of compromise to our other members. It helps us build a snapshot through member shares of what our credit union institutions and crediting industry stakeholders are seeing on a regular basis.

TruSTAR provides onboarding support to our members for Community Plus plan setup. The TruSTAR team listens to member use cases, answers their questions, and notes what information sharing community members need. The support received is a key component of our member benefits.

Outcomes:

Learn more about becoming a TruSTAR sharing group partner.

----------------------------------------------------
Thanks!
Mikala Vidal

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.