Blue virtual technology background with lines and grids.jpeg

About Silent Sector

Get to know Silent Sector and you'll meet a team of passionate professionals that always put your and your organization first.
    Businessman standing in front of opened doors and making decision.jpeg

    What We Do


    The Silent Sector team provides the expertise and resources to transform your data and technologies into hard targets, so cyber criminals move on. While our team has worked extensively with large corporations, we now primarily serve organizations between 50 to 5,000 employees (often referred to as small-midsize businesses or SMB's).

    Whether you’re looking to tackle a specific project, or need a continuous cyber security solution, we'll provide the customized services you need. Our team integrates with your in-house or outsourced technology professionals, for seamless collaboration and development of a highly effective security posture.

    We are not a "magic solution" or software platform.  We are truly the "boots on the ground" fighting to protect your organization from cyber attacks.

    American Flag

    Who We Are

    Silent Sector is an elite team of experienced and credentialed, US based cybersecurity professionals.  We have served a wide variety of organizations across many industries.  Each team member is hand-picked, credentialed, and vetted, forming a tight-knit group of experts that become an extension of your team.

    Our leadership's certifications include:
    CISSP, CRISC, CEH, CPT, PCI-P, CCNP +S, ITILV3, MCSE 1998, OSCP, Security+, Network+, and more.

    Our Mission

    Silent Sector provides effective and accessible cybersecurity solutions that reduce cost and risk, while creating simplicity and a secured technology model.

    Our Vision

    Silent Sector brings cybersecurity out of the dark and murky, misunderstood place where it has been for so long. Our clients see cybersecurity as the asset that it is. Rather than being seen as an obligation, cybersecurity is recognized for growing revenue, building brand credibility, and creating a comfortable experience for the customers, staff, and stakeholders of performance driven organizations.

    Eye viewing digital information represented by circles and signs.jpeg


    The plan and proposal for your ideal cybersecurity solution is just three quick steps away.
    1. Introduction Call
    2. Scoping Discussion
    3. Plan & Proposal Delivery


    Silent Sector's founders oversee all client projects and are backed by a team of vetted and credentialed, U.S. based cybersecurity professionals.
    Zach Fuller
    Cybersecurity Advocate
    Zach Fuller
    Cybersecurity Advocate

    Zach Fuller has built businesses in industries including website design, information marketing, ecommerce, real estate investment, private equity, and cybersecurity. He served as Green Beret in the U.S. Army, conducting highly sensitive combat operations in Afghanistan.  Zach was awarded a Bronze Star Medal, Meritorious Service Medal, and other decorations for his actions overseas. He later went into real estate investment and private equity, building an investor relations team for Caliber Companies and holding the role of Executive Vice President. He and his team raised well over $140,000,000 in private capital to fund residential and commercial real estate investments, making Caliber an Inc. 500 Fastest Growing Private Company in America. Zach is a founding partner of Silent Sector, where he is focused on changing the dynamic of the industry by showing the benefits and impact security brings to proactive organizations.

    Technical Certifications and Education:

    • John F. Kennedy Special Warfare School Graduate
    • CompTIA Security+
    • CompTIA Network+
    • CompTIA A+
    • Certified Cyber Intelligence Professional (CCIP)
    Michael Rotondo
    Master Security Architect
    Michael Rotondo
    Master Security Architect

    Michael Rotondo has been engaged in all areas of IT over his 20+ year career which began with selling computer parts in the infancy of the IT industry during the era in the early 1990's and quickly transitioned to the operations side of the industry. Mike has been on the bleeding edge of technology in the Cyber Security Industry. Mike has held every position in IT from help desk to architect.

    Technical Certifications and Education:

    • CISSP-Certified Information Systems Security Professional
    • CRISC - Certified in Risk and Information Systems Control
    • CEH- Certified Ethical Hacker
    • CPT- Certified Penetration Tester
    • PCIP- PCI Professional
    • Member of ISC2 Phoenix Chapter
    Lauro Chavez
    Master Security Architect
    Lauro Chavez
    Master Security Architect

    Lauro developed an aptitude for computers & electronics at a young age. By age 10, he was experimenting with BASIC on an old Atari and by age 15 managing his own Windows NT domain at home. In high school he assisted teachers and students as a part of the high school computer help-desk team. After high school Lauro joined the US Army where he obtained more technical training in signal communications, cryptography, computer/network engineering and automation. It was during this advanced training that Lauro found he had an aptitude for identifying security flaws and stress testing applications and systems to validate integrity. Lauro provided system/network engineering and cyber-security support to U.S. Army base level communications networks and for sensitive missions during Operation Enduring Freedom in Afghanistan. After eight years of active duty and an honorable discharge, Lauro began working for the Department of Defense.  He supported "black" projects like the Joint Strike Fighter and other highly sensitive endeavors being developed by the U.S. Air Force and NASA.

    Lauro went on to build his own cybersecurity consulting practice where he has helped over 40 organizations develop a cybersecurity program, maintain a strong security posture, and meet compliance initiatives such as PCI, COBIT, FIPS-140 and NIST.  His twenty plus years of experience spans the system/network engineering, architecture and GRC spaces. He is a founding partner of Silent Sector and privacy advocate.

    Technical Certifications and Education:

    • CRISC - Certified in Risk and Information Systems Control
    • Oracle Certified Expert - Oracle Solaris 10 Security Administrator
    • CCNP +S - Cisco Certified Network Professional + Security
    • PCI-P - Payment Card Industry Professional
    • OSCP - Offensive Security Certified Professional
    business people group on meeting and presentation  in bright modern office with construction engineer architect and worker looking building model and blueprint  plans.jpeg

    Problem Solved!

    The case studies below show a few examples of organizations leveraging Silent Sector's unique processes and expertise to achieve far more in less time, using fewer resources.
    Rapidly Growing Software Company
    Requiring Cost Effective Penetration Testing
    A B2B software company had grown very quickly due to rapid market adoption of its innovative product. With the CTO and founding partner's growing responsibilities, as well as the growth of the development team, it was no longer possible ... Read More
    Multinational Technology Company
    Seeking Guidance for PCI-DSS Compliance
    A very large, prominent name in the technology world began to undergo Payment Card Industry certification (PCI DSS Compliance). During this process they identified they did not have adequate resources or expertise in this compliance framework. ... Read More
    Software as a Service Company
    Developing an Effective Cybersecurity Posture
    A small software as a service (SaaS) company found itself with very large Fortune 1000 clients wanting to use their services. When the large companies began negotiating initial contracts, the small SaaS company realized there was a demand ... Read More
    State Department of Insurance
    Suspected Malicious Employee
    A Department of Insurance for a Mid-Western state required a forensic investigation for alleged data theft. The courts required a 3rd party to ascertain what data was taken and the methods used to extract the data from the insurance department's ... Read More
    Medical Company
    Needed Immediate Clarity on a Vulnerability
    A medical device company with no internal cyber security structure ran into an issue when their customers began questioning the security of their products since they were used in large hospitals and connected to the hospitals networks ... Read More
    Regional Bank
    Short on Cybersecurity Staff and Guidance
    Due to personnel decisions, expanding business opportunities, as well as attrition a regional bank found itself with no senior staff to run their cybersecurity business.  It had been relying on contractors and consultants which cost an exorbitant ... Read More

    Why proactive organizations
    choose Silent Sector

    a completely new experience
    You’ll experience a refreshing difference when you meet the Silent Sector team.  You’ll only hear the facts and most effective solutions, rather than “what’s hot” in the media.   We believe in a logical approach.  We believe in “cybersecurity done right."
    Money should not be wasted on covering threats that are not real and vulnerabilities with no attack surface.  We focus time and resources on what really matters for your organization.
    We believe in bringing security out of the shadows by creating clarity and simplicity through education.  Our advisory and training helps your team adopt and maintain a secure mindset individually and in the workplace.
    Effective security should be within reach of a wide range of organizations, not just the Fortune 500.  We deliver a higher quality of service at a far lower cost than the large, world-wide firms can provide. 
    It is common in our industry for firms to advise their clients, then leave them with large to-do lists.   We know your time and resources are limited.  Let us handle tasks with a hands on approach, completing all requirements with your team, or independently as needed.
    Need to have a security discussion in a high value sales meeting?  We’ll be there!  Let us help you leverage your security investment to gain a competitive advantage and some extra sales firepower.
    We’ll help your organization build and keep the trust it deserves.  By studying others in your industry, we can help you describe how you stand apart with the security of your clients’ critical information.
    Our team understands the every changing world of compliance requirements.  We also know how to navigate team and personality dynamics to ensure standards are achieved.
    As veterans of IT, cybersecurity, and military special operations, with experience from Fortune 500 companies to the battle fields of Afghanistan, our team clearly understands what is real and what drives results.
    We live for protecting great people and great organizations that create a positive impact in our society.  Getting to know each of our clients on an individual level lets us ensure that we're doing everything in our power to help them succeed.