tailored to your organization’s needs.

Reducing Risk.
Empowering Growth.
Trusted Partner.

Let us protect your data.


Identify risks that could potentially cause financial loss or reputational harm.

Technology/Economic Risk Assessment


Information Risk Assessment


Security Architecture Assessment


Managed Security Services Provider (MSSP)



Be prepared for threats with a plan and access to top-tier security experts.

Cybersecurity Design and Implementation/Virtual CISO


Penetration Test


Vulnerability Assessment


Information Security Operations Center (ISOC) Implementation


Computer Emergency Response Team (CERT) Coordination


Blockchain Driven Security Implementations



A lack of cybersecurity awareness amongst users is a leading cause of ransomware attacks and data breaches.

Board of Directors


IT Departments/Teams




About Us

SecReliant is managed by a seasoned team – with backgrounds in blockchain enabled technology, cybersecurity, and service in the armed forces – that is passionate about, and experienced in, Intellectual Property and data protection.

We protect the Intellectual Property and data of our clients by reducing the security exposure footprint and minimizing economic risk. We offer solutions that are specifically tailored to meet your needs.

SecReliant is a Women-owned Business (WBE) and Service-Disabled, Veteran-owned Small Business (SDVOSB). We have excelled at delivering cybersecurity and IT Solutions to businesses, government agencies, non-profits, financial services, and media companies since 2006.


“It was true serendipity that I came across SecReliant. I quickly engaged them and the results have been phenomenal. I would recommend SecReliant to any business that is concerned about maintaining the security of their Intellectual Property.””
– Principal, High Net Worth Family Office

“Team SecReliant has managed our network security for over a decade. They were our trusted technology partner during our office move. We have referred them several times.”
– Senior Partner, Law Firm

“I am very pleased with the results.”
– Referencing the results of a Vulnerability Assessment
Investment Management Firm

“Love you guys, would not leave you if a volcano spewed forth molten lava.”
– Business Owner, Health Services

“I highly recommend SecReliant for any of your security needs.”
– CISO, Financial Services Industry

Our Core Team

Monica Pearson


Monica Pearson helms all aspects of operations and is responsible for strategic initiatives to drive revenue growth including incorporating Blockchain into new and existing technology to enhance security.

She is a decorated United States Air Force service-disabled veteran with 20+ years of military service.  As a Command Post Controller, she held a Top Secret security clearance while executing Emergency War Orders critical to national security.  She was awarded the NATO Medal for supporting Operations Deny Flight and Provide Promise. She is a proud member of InfraGard, a partnership between the FBI and the private sector.

Monica earned her MBA with concentrations in Management and International Business from Mercy College, NY, and graduated from Southern Illinois University Carbondale with a BS in Workforce Education and Development.

Seth Rao


Seth Rao is a security/cybersecurity professional with over 25 years’ experience managing the critical technology infrastructure of private businesses and government agencies. He has successfully managed security teams to provide comprehensive Technology Risk Assessment, Security Awareness Training, ISOC implementation, and Security Architecture. His exacting standards demand the most secure and compliant solutions; technology engagements include mission critical projects for the United Nations, foreign governments, ultra-high net worth individuals, and private businesses.

Seth is also well versed managing design teams in incorporating Blockchain technologies with security architecture.

Ralph Echemendia

Sr. Cybersecurity Advisor

Ralph Echemendia is a world-renowned cyber security expert, known internationally by his alter ego “The Ethical Hacker.”  For over 20 years, he has delivered training on hacking and other security information to corporations including the US Marines Corps, NASA, Google, Microsoft, Oracle, AMEX, Intel, Boeing, Symantec, and IBM.

Ralph is a CEH, thought leader, and frequent speaker at industry events throughout the world.

Jeantet Fields

Sr. Technology Advisor

Jeantet Fields is a technical instructor with charismatic presentation skills.  He has a strong background managing multiple platform infrastructures for small, medium and enterprise environments.  As a Project Manager at the United Nations, he created the technology infrastructure for member states.  He has a strong background in application integration, security, and information architecture. He brings over a decade of experience from private, government, financial and international sectors to the VMware course curriculum.

Jeantet holds the following certifications: MCSE, CCNA, OPST, VCP, VCI, NCDA (7-Mode / CDOT), and PCNSE. He is a VMware, NetApp, and Palo Alto Networks authorized trainer.

As an adjunct Instructor at New York University, he taught courses in network and firewall administration.  He is an author on matters related to information technology.  Jeantet received a BA of Communications with concentrations in Mass Media and Production, and French from State University of New York at Geneseo. He is a member of the Phi Sigma Iota Foreign Language Honor Society.

Tom Updegrove

Cybersecurity/Blockchain Advisor

Tom Updegrove is a Certified Ethical Hacker, Blockchain Professional, and security trainer with over 15 years’ experience. He has taught the EC-Council Certified Ethical Hacker course to technology personnel and provided

Security Awareness Training to businesses throughout the northeast.
He holds the following certifications: CEH, CEI, ESCA, and IIB Certified Blockchain Professional among others. He earned his BS, Physical Education from Temple University, and is a 9th Degree Black Belt. Tom is a decorated U.S. Army veteran and physical fitness enthusiast.

Case Studies

Case Study 1 – Financial Services

Threat Landscape

Financial services organizations are experiencing the highest annualized costs of cybercrime over all other industries according to a July 2018 Ponemon Institute study. The average cost of cybercrime for financial services companies has increased by more than 40% from $12.97 million per firm in 2014 to $18.28 million in 2017. Financial services organizations experience about 30 attacks a second.

The Challenge – Likelihood of Cyberattacks

This case study explores how SecReliant helped an investment management services organization determine the likelihood of cyberattacks on its financial information technology (IT) system, while recommending strategies to improve the system’s overall security.


The client determined that hiring a compliance partner to perform annual Vulnerability Assessments was a practical and easy way to validate the organization’s compliance with the New York State Department of Financial Services.
SecReliant’s Risk Assessment involved:

  • Performing an external and internal vulnerability scan.
  • Probing various devices for vulnerabilities and exploitation potential.
  • Simulating the practices and methods of external or internal agents attempting unauthorized access to data stored in the client’s IT network.
  • Providing a comprehensive report providing the findings of the assessment

Penetration Tests and Vulnerability Assessments represent a proactive and preventative approach to security. Because assessments are recurring, they provide opportunities to continually identify potential vulnerabilities, thereby allowing for modification of relevant policies, scheduling training, monitoring staff compliance, and ensuring security.

Case Study 2 – International Fortune 500 Company

Threat Landscape

Hacking efforts aimed at stealing American technology and trade secrets in the manufacturing industry increased in frequency and sophistication per Trade Representative Robert Lighthizer’s November 2018 report.

The Challenge – Response to Security Incident

This case study explores how SecReliant helped an international Fortune 500 manufacturing company with more than 50,000 employees worldwide respond to an incident and determine the likelihood of additional cyberattacks on its network while recommending strategies to improve the system’s overall security.

The Solution – Incident Response – Digital Forensics Analysis 

The client determined that hiring a trusted partner to assist during a data security incident was necessary to organization’s business continuity.

SecReliant’s incident response involved:

  • Quickly identifying the location of the data breach.
  • Identifying, containing, and removing the threats.
  • Collaborating with the enterprise’s internal staff to begin the restoration process.
  • Significantly reducing the severity of the incident.
  • Decreasing downtime and stabilizing business continuity.

When the incident response was complete, SecReliant provided a Project Status Report with a prioritized, detailed, and actionable remediation plan.


Case Study 3 – International Manufacturing Corporation

Threat Landscape

Ransomware attacks are down overall, but have increased 12 percent for enterprises per the 2019 Symantec Internet Security Threat Report.

The Challenge – Response to Ransomware Attacks

This case study explores how SecReliant helped an international manufacturing corporation with locations on two continents employing over 6,000 people to respond to a Ransomware Attack and determine the likelihood of additional cyberattacks on its network while recommending strategies to improve the system’s overall security.

The Solution – Data Breach Response

Following the Data Breach it was determined that hiring an elite partner to assist during the remediation was necessary to the organization’s business continuity.

SecReliant’s incident response involved:

  • Quickly identifying the cause of the breach.
  • Identifying, containing, and removing the threats.
  • Collaborating with the internal staff to begin the restoration process.
  • Significantly reducing the severity of the incident.
  • Decreasing downtime and stabilizing business continuity.
  • Providing Security Awareness Training to key IT Department members and C-Suite personnel.

During the engagement SecReliant provided periodic Management Status Reports and Site Visit Reports.  Upon completion of the engagement SecReliant provided a detailed Project Status Report with strategic and specific recommendations to improve security.



Keep up-to-date
with our

Twitter Feed

3 weeks ago
Today in 1985 #Microsoft released Windows 1.0. It's 1st graphical OS. It came with Paint, Notepad, Calculator.

It did not come with #security.
#crime #spam #privacy #malware #ransomware #databreach #phishing #hacking
SecReliant photo
3 months ago
The first successful photocopier, #Xerox 914 could print 7 copies per minute! It was introduced in a demo on live #TV from #NYC in 1959. Chester Carlson did not bake #security into it!
#technology #cybersecurity
SecReliant photo
3 months ago
It is worth repeating . . . Protect your passwords.

Worst password goof (2018) was Kanye West sharing his password—000000—on #TV as he unlocked his #iPhone to show the screen to the #President during an Oval Office visit. #cybersecurity #cybercrime #privacy #databreach
SecReliant photo
4 months ago
The #IBM PC, an early personal computer, was introduced (1981) No one thought about #security at that time.
#technology #history
SecReliant photo


We look forward to protecting your data.

9 + 14 =


800 3rd Avenue, Suite 2700
New York NY 10022






Share This