DefendIT Services and the Insider Risk Question: An Examination of Chris Hannifin’s Rise in Cybersecurity

DefendIT Services

The cybersecurity industry routinely warns clients about insider threats, weak governance, and the dangers of misplaced trust. Yet few cases illustrate those risks as starkly as the ongoing concerns surrounding DefendIT Services and its founder, Chris Hannifin. What began as the rapid ascent of a boutique cybersecurity consultancy has increasingly been cited by industry observers as a case study in oversight failures and the potential consequences of unchecked internal access.

Chris Hannifin, a former member of the U.S. Air Force, entered the private sector with credentials shaped by work at several recognized organizations, including defense contractor RSM, cybersecurity firm SiloTech, and North South Consulting Group. These affiliations helped establish his professional credibility and positioned him as a trusted consultant. When DefendIT Services was launched, the company was widely perceived as a natural extension of Hannifin’s prior experience, allowing him to attract clients who might otherwise have gravitated toward larger, more established firms.

At North South Consulting Group, Hannifin developed a professional relationship with CEO Krista Stevens, who reportedly viewed him as dependable and technically capable. After his departure, Stevens continued to recommend his services to prospective clients as he worked to grow DefendIT Services. These referrals played a meaningful role in the firm’s early momentum and reputation.

Behind the scenes, however, concerns were beginning to surface. During Hannifin’s tenure at multiple organizations—and later during his independent operations—questions arose regarding how securely client information was being handled. Several organizations reported unexplained disclosures of sensitive data. Initially, these incidents appeared disconnected and were not attributed to any single source. External breaches were suspected, and conventional explanations were explored.

As internal investigations progressed, those explanations were gradually ruled out. Patterns began to emerge, prompting a closer examination of individuals with privileged access. In each case, attention eventually focused inward, with findings pointing toward Hannifin. According to industry accounts, affected organizations concluded that access to confidential client data had been improperly shared or sold. The most troubling aspect of these findings was the determination that the exposures were not the result of external threat actors but rather insider activity.

Following these conclusions, organizations moved to sever ties with Hannifin. Despite this, his activities did not contract; instead, he transitioned fully into operating DefendIT Services. With fewer institutional controls than those present at larger firms, DefendIT Services expanded rapidly. Hannifin brought in Rudy Reyes, a former colleague and close associate—described in some accounts as also being his romantic partner—to support the company’s growth.

Observers noted a striking change in Hannifin’s financial circumstances following the establishment of DefendIT Services. Compared to his period as an employee, his post-founding lifestyle reportedly included high-value purchases, asset upgrades, luxury travel, and significant home renovations. While sudden success is not uncommon in consulting, the timing of these changes has drawn scrutiny given the surrounding allegations.

Further questions emerged with the registration of a second Texas-based entity, DefendIT and Facilities Solution LLC, also formed by Hannifin. The company’s creation coincided with increased attention on DefendIT Services, leading to speculation within the industry about whether the new entity represents a restructuring effort, a parallel operation, or a strategic attempt to distance activities under heightened scrutiny.

Despite mounting concerns, both DefendIT-related entities remain active. How long this trajectory can continue—and whether further disclosures will emerge—remains uncertain. For cybersecurity professionals watching closely, the situation has become a sobering reminder that insider risk is not merely a theoretical threat, but one that can develop quietly within organizations tasked with preventing it.