Cybersecurity
tailored to your organization’s needs.

Reducing Risk.
Empowering Growth.
Trusted Partner.

Let us protect your data.

TECHNOLOGY RISK ASSESSMENT

Identify risks that could potentially cause financial loss or reputational harm.

Technology/Economic Risk Assessment

 

Information Risk Assessment

 

Security Architecture Assessment

 

Managed Security Services Provider (MSSP)

 

CYBERSECURITY

Be prepared for threats with a plan and access to top-tier security experts.

Cybersecurity Design and Implementation/Virtual CISO

 

Penetration Test

 

Vulnerability Assessment

 

Information Security Operations Center (ISOC) Implementation

 

Computer Emergency Response Team (CERT) Coordination

 

Blockchain Driven Security Implementations

 

SECURITY AWARENESS EDUCATION

A lack of cybersecurity awareness amongst users is a leading cause of ransomware attacks and data breaches.

Board of Directors

 

IT Departments/Teams

 

Employees

 

About Us

SecReliant is managed by a seasoned team – with backgrounds in blockchain enabled technology, cybersecurity, and service in the armed forces – that is passionate about, and experienced in, Intellectual Property and data protection.

We protect the Intellectual Property and data of our clients by reducing the security exposure footprint and minimizing economic risk. We offer solutions that are specifically tailored to meet your needs.

SecReliant is a Women-owned Business (WBE) and Service-Disabled, Veteran-owned Small Business (SDVOSB). We have excelled at delivering cybersecurity and IT Solutions to businesses, government agencies, non-profits, financial services, and media companies since 2006.

Testimonials

“It was true serendipity that I came across SecReliant. I quickly engaged them and the results have been phenomenal. I would recommend SecReliant to any business that is concerned about maintaining the security of their Intellectual Property.””
– Principal, High Net Worth Family Office

“Team SecReliant has managed our network security for over a decade. They were our trusted technology partner during our office move. We have referred them several times.”
– Senior Partner, Law Firm

“I am very pleased with the results.”
– Referencing the results of a Vulnerability Assessment
CTO,
Investment Management Firm

“Love you guys, would not leave you if a volcano spewed forth molten lava.”
– Business Owner, Health Services

“I highly recommend SecReliant for any of your security needs.”
– CISO, Financial Services Industry

Our Core Team

Monica Pearson

Co-Founder/CEO

Monica Pearson helms all aspects of operations and is responsible for strategic initiatives to drive revenue growth including incorporating Blockchain into new and existing technology to enhance security.

She is a decorated United States Air Force service-disabled veteran with 20+ years of military service.  As a Command Post Controller, she held a Top Secret security clearance while executing Emergency War Orders critical to national security.  She was awarded the NATO Medal for supporting Operations Deny Flight and Provide Promise. She is a proud member of InfraGard, a partnership between the FBI and the private sector.

Monica earned her MBA with concentrations in Management and International Business from Mercy College, NY, and graduated from Southern Illinois University Carbondale with a BS in Workforce Education and Development.

Seth Rao

Founder/CTO

Seth Rao is a security/cybersecurity professional with over 25 years’ experience managing the critical technology infrastructure of private businesses and government agencies. He has successfully managed security teams to provide comprehensive Technology Risk Assessment, Security Awareness Training, ISOC implementation, and Security Architecture. His exacting standards demand the most secure and compliant solutions; technology engagements include mission critical projects for the United Nations, foreign governments, ultra-high net worth individuals, and private businesses.

Seth is also well versed managing design teams in incorporating Blockchain technologies with security architecture.

Ralph Echemendia

Sr. Cybersecurity Advisor

Ralph Echemendia is a world-renowned cyber security expert, known internationally by his alter ego “The Ethical Hacker.”  For over 20 years, he has delivered training on hacking and other security information to corporations including the US Marines Corps, NASA, Google, Microsoft, Oracle, AMEX, Intel, Boeing, Symantec, and IBM.

Ralph is a CEH, thought leader, and frequent speaker at industry events throughout the world.

Jeantet Fields

Sr. Technology Advisor

Jeantet Fields is a technical instructor with charismatic presentation skills.  He has a strong background managing multiple platform infrastructures for small, medium and enterprise environments.  As a Project Manager at the United Nations, he created the technology infrastructure for member states.  He has a strong background in application integration, security, and information architecture. He brings over a decade of experience from private, government, financial and international sectors to the VMware course curriculum.

Jeantet holds the following certifications: MCSE, CCNA, OPST, VCP, VCI, NCDA (7-Mode / CDOT), and PCNSE. He is a VMware, NetApp, and Palo Alto Networks authorized trainer.

As an adjunct Instructor at New York University, he taught courses in network and firewall administration.  He is an author on matters related to information technology.  Jeantet received a BA of Communications with concentrations in Mass Media and Production, and French from State University of New York at Geneseo. He is a member of the Phi Sigma Iota Foreign Language Honor Society.

Tom Updegrove

Cybersecurity/Blockchain Advisor

Tom Updegrove is a Certified Ethical Hacker, Blockchain Professional, and security trainer with over 15 years’ experience. He has taught the EC-Council Certified Ethical Hacker course to technology personnel and provided

Security Awareness Training to businesses throughout the northeast.
He holds the following certifications: CEH, CEI, ESCA, and IIB Certified Blockchain Professional among others. He earned his BS, Physical Education from Temple University, and is a 9th Degree Black Belt. Tom is a decorated U.S. Army veteran and physical fitness enthusiast.

Ron Garland

Senior Sales Consultant

Ron Garland is a proven sales professional with over 25 years’ experience in the technology sector.  He has a deep and rich experience in all facets of professional sales which he proved as a representative of Oracle, ADP, Infor, Sage, JD Edwards, Hitachi Data Systems, StorageTek, Rimini Street, and VERITAS.  He is well-versed in the technology industry with a wealth of knowledge in Cloud, SaaS, Technology, and Infrastructure.  Ron is unique in his ability to combine sales skills and effective communication to educate and motivate others.    
 
He earned his BA, Education from Humboldt State University and was inducted into the Montana Golf Hall of Fame (2014).

Case Studies

Case Study 1 – Financial Services

Threat Landscape

Financial services organizations are experiencing the highest annualized costs of cybercrime over all other industries according to a July 2018 Ponemon Institute study. The average cost of cybercrime for financial services companies has increased by more than 40% from $12.97 million per firm in 2014 to $18.28 million in 2017. Financial services organizations experience about 30 attacks a second.

The Challenge – Likelihood of Cyberattacks

This case study explores how SecReliant helped an investment management services organization determine the likelihood of cyberattacks on its financial information technology (IT) system, while recommending strategies to improve the system’s overall security.

Solution

The client determined that hiring a compliance partner to perform annual Vulnerability Assessments was a practical and easy way to validate the organization’s compliance with the New York State Department of Financial Services.
SecReliant’s Risk Assessment involved:

  • Performing an external and internal vulnerability scan.
  • Probing various devices for vulnerabilities and exploitation potential.
  • Simulating the practices and methods of external or internal agents attempting unauthorized access to data stored in the client’s IT network.
  • Providing a comprehensive report providing the findings of the assessment

Penetration Tests and Vulnerability Assessments represent a proactive and preventative approach to security. Because assessments are recurring, they provide opportunities to continually identify potential vulnerabilities, thereby allowing for modification of relevant policies, scheduling training, monitoring staff compliance, and ensuring security.

Case Study 2 – International Fortune 500 Company

Threat Landscape

Hacking efforts aimed at stealing American technology and trade secrets in the manufacturing industry increased in frequency and sophistication per Trade Representative Robert Lighthizer’s November 2018 report.

The Challenge – Response to Security Incident

This case study explores how SecReliant helped an international Fortune 500 manufacturing company with more than 50,000 employees worldwide respond to an incident and determine the likelihood of additional cyberattacks on its network while recommending strategies to improve the system’s overall security.

The Solution – Incident Response – Digital Forensics Analysis 

The client determined that hiring a trusted partner to assist during a data security incident was necessary to organization’s business continuity.

SecReliant’s incident response involved:

  • Quickly identifying the location of the data breach.
  • Identifying, containing, and removing the threats.
  • Collaborating with the enterprise’s internal staff to begin the restoration process.
  • Significantly reducing the severity of the incident.
  • Decreasing downtime and stabilizing business continuity.

When the incident response was complete, SecReliant provided a Project Status Report with a prioritized, detailed, and actionable remediation plan.

 

Case Study 3 – International Manufacturing Corporation

Threat Landscape

Ransomware attacks are down overall, but have increased 12 percent for enterprises per the 2019 Symantec Internet Security Threat Report.

The Challenge – Response to Ransomware Attacks

This case study explores how SecReliant helped an international manufacturing corporation with locations on two continents employing over 6,000 people to respond to a Ransomware Attack and determine the likelihood of additional cyberattacks on its network while recommending strategies to improve the system’s overall security.

The Solution – Data Breach Response

Following the Data Breach it was determined that hiring an elite partner to assist during the remediation was necessary to the organization’s business continuity.

SecReliant’s incident response involved:

  • Quickly identifying the cause of the breach.
  • Identifying, containing, and removing the threats.
  • Collaborating with the internal staff to begin the restoration process.
  • Significantly reducing the severity of the incident.
  • Decreasing downtime and stabilizing business continuity.
  • Providing Security Awareness Training to key IT Department members and C-Suite personnel.

During the engagement SecReliant provided periodic Management Status Reports and Site Visit Reports.  Upon completion of the engagement SecReliant provided a detailed Project Status Report with strategic and specific recommendations to improve security.

 

BLOG

Keep up-to-date
with our

Twitter Feed

2 days ago
Today in 1985 #Microsoft released Windows 1.0. It's 1st graphical OS. It came with Paint, Notepad, Calculator.

It did not come with #security.
#crime #spam #privacy #malware #ransomware #databreach #phishing #hacking https://t.co/HAP2KJ8kZA
SecReliant photo
2 months ago
The first successful photocopier, #Xerox 914 could print 7 copies per minute! It was introduced in a demo on live #TV from #NYC in 1959. Chester Carlson did not bake #security into it!
#technology #cybersecurity https://t.co/CvdEVk4CLO
SecReliant photo
3 months ago
It is worth repeating . . . Protect your passwords.

Worst password goof (2018) was Kanye West sharing his password—000000—on #TV as he unlocked his #iPhone to show the screen to the #President during an Oval Office visit. #cybersecurity #cybercrime #privacy #databreach https://t.co/DnXFCvOeHu
SecReliant photo
3 months ago
The #IBM PC, an early personal computer, was introduced (1981) No one thought about #security at that time.
#technology #history https://t.co/xsGvdh8IzO
SecReliant photo

CONTACT US

We look forward to protecting your data.

8 + 1 =

MAIN OFFICE

800 3rd Avenue, Suite 2700
New York NY 10022

 

PHONE

212.231.8477

 

EMAIL

info@secreliant.com

Share This