
Cybersecurity
tailored to your organization’s needs.
Reducing Risk.
Empowering Growth.
Trusted Partner.

Let us protect your data.
TECHNOLOGY RISK ASSESSMENT
Identify risks that could potentially cause financial loss or reputational harm.
Technology/Economic Risk Assessment
Information Risk Assessment
Security Architecture Assessment
Managed Security Services Provider (MSSP)
CYBERSECURITY
Be prepared for threats with a plan and access to top-tier security experts.
Cybersecurity Design and Implementation/Virtual CISO
Penetration Test
Vulnerability Assessment
Information Security Operations Center (ISOC) Implementation
Computer Emergency Response Team (CERT) Coordination
Blockchain Driven Security Implementations
SECURITY AWARENESS EDUCATION
A lack of cybersecurity awareness amongst users is a leading cause of ransomware attacks and data breaches.
Board of Directors
IT Departments/Teams
Employees

About Us
SecReliant is managed by a seasoned team – with backgrounds in blockchain enabled technology, cybersecurity, and service in the armed forces – that is passionate about, and experienced in, Intellectual Property and data protection.
We protect the Intellectual Property and data of our clients by reducing the security exposure footprint and minimizing economic risk. We offer solutions that are specifically tailored to meet your needs.
SecReliant is a Women-owned Business (WBE) and Service-Disabled, Veteran-owned Small Business (SDVOSB). We have excelled at delivering cybersecurity and IT Solutions to businesses, government agencies, non-profits, financial services, and media companies since 2006.



Testimonials
– Principal, High Net Worth Family Office
– Senior Partner, Law Firm
– Referencing the results of a Vulnerability Assessment
CTO,
Investment Management Firm
– Business Owner, Health Services
– CISO, Financial Services Industry
Our Core Team

Monica Pearson
Co-Founder/CEO
She is a decorated United States Air Force service-disabled veteran with 20+ years of military service. As a Command Post Controller, she held a Top Secret security clearance while executing Emergency War Orders critical to national security. She was awarded the NATO Medal for supporting Operations Deny Flight and Provide Promise. She is a proud member of InfraGard, a partnership between the FBI and the private sector.
Monica earned her MBA with concentrations in Management and International Business from Mercy College, NY, and graduated from Southern Illinois University Carbondale with a BS in Workforce Education and Development.

Seth Rao
Founder/CTO
Seth is also well versed managing design teams in incorporating Blockchain technologies with security architecture.

Ralph Echemendia
Sr. Cybersecurity Advisor
Ralph is a CEH, thought leader, and frequent speaker at industry events throughout the world.

Jeantet Fields
Sr. Technology Advisor
Jeantet holds the following certifications: MCSE, CCNA, OPST, VCP, VCI, NCDA (7-Mode / CDOT), and PCNSE. He is a VMware, NetApp, and Palo Alto Networks authorized trainer.
As an adjunct Instructor at New York University, he taught courses in network and firewall administration. He is an author on matters related to information technology. Jeantet received a BA of Communications with concentrations in Mass Media and Production, and French from State University of New York at Geneseo. He is a member of the Phi Sigma Iota Foreign Language Honor Society.

Tom Updegrove
Cybersecurity/Blockchain Advisor
Tom Updegrove is a Certified Ethical Hacker, Blockchain Professional, and security trainer with over 15 years’ experience. He has taught the EC-Council Certified Ethical Hacker course to technology personnel and provided
Security Awareness Training to businesses throughout the northeast.
He holds the following certifications: CEH, CEI, ESCA, and IIB Certified Blockchain Professional among others. He earned his BS, Physical Education from Temple University, and is a 9th Degree Black Belt. Tom is a decorated U.S. Army veteran and physical fitness enthusiast.
Case Studies

Case Study 1 – Financial Services
Threat Landscape
Financial services organizations are experiencing the highest annualized costs of cybercrime over all other industries according to a July 2018 Ponemon Institute study. The average cost of cybercrime for financial services companies has increased by more than 40% from $12.97 million per firm in 2014 to $18.28 million in 2017. Financial services organizations experience about 30 attacks a second.
The Challenge – Likelihood of Cyberattacks
This case study explores how SecReliant helped an investment management services organization determine the likelihood of cyberattacks on its financial information technology (IT) system, while recommending strategies to improve the system’s overall security.
Solution
The client determined that hiring a compliance partner to perform annual Vulnerability Assessments was a practical and easy way to validate the organization’s compliance with the New York State Department of Financial Services.
SecReliant’s Risk Assessment involved:
- Performing an external and internal vulnerability scan.
- Probing various devices for vulnerabilities and exploitation potential.
- Simulating the practices and methods of external or internal agents attempting unauthorized access to data stored in the client’s IT network.
- Providing a comprehensive report providing the findings of the assessment
Penetration Tests and Vulnerability Assessments represent a proactive and preventative approach to security. Because assessments are recurring, they provide opportunities to continually identify potential vulnerabilities, thereby allowing for modification of relevant policies, scheduling training, monitoring staff compliance, and ensuring security.

Case Study 2 – International Fortune 500 Company
Threat Landscape
Hacking efforts aimed at stealing American technology and trade secrets in the manufacturing industry increased in frequency and sophistication per Trade Representative Robert Lighthizer’s November 2018 report.
The Challenge – Response to Security Incident
This case study explores how SecReliant helped an international Fortune 500 manufacturing company with more than 50,000 employees worldwide respond to an incident and determine the likelihood of additional cyberattacks on its network while recommending strategies to improve the system’s overall security.
The Solution – Incident Response – Digital Forensics Analysis
The client determined that hiring a trusted partner to assist during a data security incident was necessary to organization’s business continuity.
SecReliant’s incident response involved:
- Quickly identifying the location of the data breach.
- Identifying, containing, and removing the threats.
- Collaborating with the enterprise’s internal staff to begin the restoration process.
- Significantly reducing the severity of the incident.
- Decreasing downtime and stabilizing business continuity.
When the incident response was complete, SecReliant provided a Project Status Report with a prioritized, detailed, and actionable remediation plan.

Case Study 3 – International Manufacturing Corporation
Threat Landscape
Ransomware attacks are down overall, but have increased 12 percent for enterprises per the 2019 Symantec Internet Security Threat Report.
The Challenge – Response to Ransomware Attacks
This case study explores how SecReliant helped an international manufacturing corporation with locations on two continents employing over 6,000 people to respond to a Ransomware Attack and determine the likelihood of additional cyberattacks on its network while recommending strategies to improve the system’s overall security.
The Solution – Data Breach Response
Following the Data Breach it was determined that hiring an elite partner to assist during the remediation was necessary to the organization’s business continuity.
SecReliant’s incident response involved:
- Quickly identifying the cause of the breach.
- Identifying, containing, and removing the threats.
- Collaborating with the internal staff to begin the restoration process.
- Significantly reducing the severity of the incident.
- Decreasing downtime and stabilizing business continuity.
- Providing Security Awareness Training to key IT Department members and C-Suite personnel.
During the engagement SecReliant provided periodic Management Status Reports and Site Visit Reports. Upon completion of the engagement SecReliant provided a detailed Project Status Report with strategic and specific recommendations to improve security.
BLOG
Keep up-to-date
with our
Twitter Feed
Today in 1985 #Microsoft released Windows 1.0. It's 1st graphical OS. It came with Paint, Notepad, Calculator.
It did not come with #security.
#crime #spam #privacy #malware #ransomware #databreach #phishing #hacking https://t.co/HAP2KJ8kZA

Google was founded as a new search engine (1998)
#computers #technology #Google #history #search https://t.co/Y9Mv5ejxwO

Has #Google achieved #quantum supremacy?
https://t.co/sA0nf3fWkF
#future #leadership #security #cyber #tech #business #data #read #computer
The first successful photocopier, #Xerox 914 could print 7 copies per minute! It was introduced in a demo on live #TV from #NYC in 1959. Chester Carlson did not bake #security into it!
#technology #cybersecurity https://t.co/CvdEVk4CLO

It is worth repeating . . . Protect your passwords.
Worst password goof (2018) was Kanye West sharing his password—000000—on #TV as he unlocked his #iPhone to show the screen to the #President during an Oval Office visit. #cybersecurity #cybercrime #privacy #databreach https://t.co/DnXFCvOeHu

The #IBM PC, an early personal computer, was introduced (1981) No one thought about #security at that time.
#technology #history https://t.co/xsGvdh8IzO

CONTACT US
We look forward to protecting your data.
MAIN OFFICE
800 3rd Avenue, Suite 2700
New York NY 10022
PHONE
212.231.8477