Skip to content

 

Empowering Businesses with Robust Cybersecurity protection

Custom tailored cybersecurity and compliance solutions to fit your budget.

Mike-rotondo

Mike Rotondo

Founder

Our founder and principal Security and Compliance Architect Mike Rotondo who began his career with selling computer parts in the infancy of the IT industry, during the pre-dot.com era, in the early 1990s. During the dot-com era Mike worked with multiple IT Startups and was on the bleeding edge of technology. Mike began his work on the Cybersecurity and Compliance side of IT in 2006, as part of the growing Archive and Compliance practice focused on Sarbanes Oxley. He has been on the bleeding edge of technology in the Cybersecurity Industry for nearly 30 years, holding every position in IT from sales to help desk to Domain Architect.

Now on his second Cybersecurity venture, Mike has spent the last 10 years of his career focusing on stretching small and medium size business IT budgets to address the challenges of the ever-evolving cybersecurity landscape.

Certifications Held:
CISSP - Certified Information Systems Security Professional
CRISC - Certified in Risk and Information Systems Control
CEH - Certified Ethical Hacker
CPT - Certified Penetration Tester
PCIP - PCI Professional
ITIL - Foundation and SO Intermediate lifecycle Service Operations
ITIL -Foundation
MCSE

Connect on LinkedIn
mari-cherry

Mari Cherry

Director Operations

As Director of Operations, Mari oversees daily functions that keep our business running efficiently while aligning strategy with execution.
Mari’s goals are to specialize in streamlining processes, fostering cross-functional collaboration, and ensuring that our teams deliver consistent value to clients and stakeholders.
Her focus is on creating a balance between strategic oversight and hands-on leadership, driving operational excellence, improving performance, and building the foundation for sustainable growth.
 

Key Strengths

Operational Leadership – Proven ability to oversee daily business functions with a focus on efficiency, scalability, and sustainable growth.

Cross-Functional Collaboration – Strong experience in leading diverse teams, driving company-wide initiatives, and fostering seamless communication across departments.

Team Development – Dedicated mentor who empowers teams, nurtures talent, and builds high-performance cultures.

Client-Centric Approach – Committed to delivering consistent value to clients through operational excellence and exceptional service.

Connect on LinkedIn
Serge-1

Serge Tarazi

Board Member

Serge is an Aerospace and Technology management consultant with 35 years business experience, specializing in Project Management, Product Development, Sales & Marketing, Supply Chain, and P&L driven General Management.
Serge’s ability to assess complex situations and identify appropriate solutions underscores his ability to gain meaningful insight and follow up with thorough analysis. He is particularly skilled at group facilitation and enjoys forging consensus among people with diverging ideas and opinions. 
 
Key Positions and Experience Held
  • Management positions at Honeywell Inc
  • Leading Footprint Strategy for an $11B Aerospace business (including site transitions and shutdowns)
  • P&L responsibilities for Defense and Commercial business spanning up to $2B.
  • Sales and Marketing
  • Talent Building
  • Product Development
  • Program Management. 

Serge holds a BS in Electrical Engineering from Fairleigh Dickinson University.  

He has also earned an MBA from the Kellogg School of Management, Northwestern University.  

 

Connect on LinkedIn

Custom Cybersecurity solutions

Every company is unique due to the differences in technology and IT team member skill sets; in short, not everyone has the same tools in the toolbox. Unfortunately, we frequently see that, due to budget concerns, many small and medium-sized companies are forced into inflexible, standardized, cookie-cutter solutions that might check the security boxes but don’t really address their needs.

RITC Cybersecurity provides you options, all custom-tailored to the specific needs of your company. Whether you need a brand-new security program or a retooling and review of your existing security program, RITC Cybersecurity can help. RITC Cybersecurity employs industry best practices, knowledge gained from years of experience, and leverages our team’s training to lead your team through a needs assessment. We will then work with you to build the cybersecurity solution you need.

RITC Cybersecurity is technology-neutral and doesn’t sell technology-based solutions—in short, no dashboards or wonder tools that claim to solve all your problems, but actual real-world solutions and cybersecurity and governance programs tailored to your needs.

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.

You deserve expert Cybersecurity management

We get it. You need an experienced Cybersecurity partner that won’t break your budget who is local to Phoenix, AZ—Cybersecurity support that doesn't just put out fires but also prevents them. Our team, with over 50 years of combined experience, is equipped with not just Cybersecurity expertise but a passion for exceptional customer service.​ 

What's more?

More than being cybersecurity professionals; we are your partners in growth and ROI.

Our approach is simple: we listen, we understand, and we deliver. We listen to you and create a custom-tailored cybersecurity solution that will meet your needs and your budget.​

Our proactive approach ensures you're always a step ahead. We're here to make cybersecurity work for you, your customers, and your bottom line. 

RITCexpertcybersecurity

Featured posts

Are you seeking assistance with ?

 

  • Developing a cybersecurity roadmap for your future?
  • Developing your existing cybersecurity team and maximizing your existing tools and resources?
  • Building a formal cyber risk management program based on NIST, CIS, or ISO?
  • Understanding your current cyber risk exposure?
  • Answering security questionnaires?
  • Aligning to compliance requirements like HIPAA or CMMC?
  • Completing SOC 2, PCI-DSS, and other security audits?
  • Answering client and prospect cybersecurity questionnaires?
  • Addressing cyber risk management initiatives required by clients, prospective clients, or management?
  • Completing your HIPAA or Cybersecurity standards, policy, and procedure document library?
RITCcybersecurityconsult

Secure your business and your future with our exceptional professional cybersecurity services

RITC Cybersecurity is where cybersecurity challenges meet our undeniable expertise. Our mission is to  empower your business with fast, secure, and professional cybersecurity services that drive growth and efficiency.

Penetration Testing

We perform internal and external pen tests to identify vulnerable attack vectors in your web applications, cloud environments, and other critical systems.
 

Cyber Risk Assessment

We provide detailed cyber risk assessments to identify technical, administrative, and procedural risks in your environment and develop a plan to mitigate your risk.

 

Expert vCISO

We provide expert vCISO services to enhance your cybersecurity strategy and protect your organization.
 
 

Disaster Recovery and Incident Response

We design robust strategies to quickly restore operations and minimize downtime in the event of a disruption, safeguarding your data and maintaining continuity.

Change Management

Proper change management controls are critical to today's connected enterprise. We specialize in developing internal and external enterprise change management processes.

Compliance Audit Preparation 

We specialize in performing gap analysis and then preparing you for SOC 2 Type 1 and 2, PCI DSS, ISO 27001, CMMC, and other audits.

 

We'll transform your IT challenges into success stories

Do you need to meet a compliance deadline? Or meet customer requirements to grow your business?

We can show you how our cybersecurity services will not only secure you but help you increase revenue.
At RITC Cybersecurity, we get it. 
That's why we're committed to providing cybersecurity solutions and  transformations with our professional cybersecurity services. We're well-equipped to be your go-to cybersecurity partner. We provide custom tailored cybersecurity services for not only Phoenix, AZ but coast to coast! We provide custom tailored robust cybersecurity services your business needs to grow, compete and thrive in today’s ever changing and challenging cybersecurity world.
When you engage RITC Cybersecurity you can say goodbye to the days of frustrating cybersecurity issues and hello to a smoother, more secure business operation.  
RITCchallengetosuccess

Industries we serve

Tailored Cybersecurity Solutions for Various Sectors
system-integration
 

B2B Technology

  • SaaS
  • FinTech
  • MedTech
  • EdTech
  • System Integrators

financial
 

Financial Services

  • Bank & Credit Unions
  • Insurance Firms
  • Investment /Private Equity
  • Accounting Firms


hospital-building
 

Healthcare

  • Benefits Companies
  • Healthcare Facilities
  • Laboratories
  • Consulting Groups 


aerospace-engineering
 

Aerospace & Defense

  • Manufacturing
  • Product Design & Development
  • Contracting & Services


Didn't find yours? Please feel free to reach us, there's a lot under the hood..
expert (1)

What makes us the leading experts in cybersecurity

RITC Security excels in providing comprehensive cybersecurity solutions, expert vCISO consulting, and maximizing the value of your existing resources.

Cybersecurity requirements and Cyber Risk management gets more difficult to navigate every day and if you don’t have the budget to hire a dedicated CISO, how do you plan and develop a roadmap for the future?

RITC Cybersecurity provides experienced and credentialed Cybersecurity team members to custom tailor solutions for your cybersecurity needs. 

Custom Cybersecurity solutions

Every company is unique due to the differences in technology and IT team member skill sets; in short, not everyone has the same tools in the toolbox. Unfortunately, we frequently see that, due to budget concerns, many small and medium-sized companies are forced into inflexible, standardized, cookie-cutter solutions that might check the security boxes but don’t really address their needs.

RITC Cybersecurity provides you options, all custom-tailored to the specific needs of your company. Whether you need a brand-new security program or a retooling and review of your existing security program, RITC Cybersecurity can help. RITC Cybersecurity employs industry best practices, knowledge gained from years of experience, and leverages our team’s training to lead your team through a needs assessment. We will then work with you to build the cybersecurity solution you need.

RITC Cybersecurity is technology-neutral and doesn’t sell technology-based solutions—in short, no dashboards or wonder tools that claim to solve all your problems, but actual real-world solutions and cybersecurity and governance programs tailored to your needs.

Custom Cybersecurity solutions

Every company is unique due to the differences in technology and IT team member skill sets; in short, not everyone has the same tools in the toolbox. Unfortunately, we frequently see that, due to budget concerns, many small and medium-sized companies are forced into inflexible, standardized, cookie-cutter solutions that might check the security boxes but don’t really address their needs.

RITC Cybersecurity provides you options, all custom-tailored to the specific needs of your company. Whether you need a brand-new security program or a retooling and review of your existing security program, RITC Cybersecurity can help. RITC Cybersecurity employs industry best practices, knowledge gained from years of experience, and leverages our team’s training to lead your team through a needs assessment. We will then work with you to build the cybersecurity solution you need.

RITC Cybersecurity is technology-neutral and doesn’t sell technology-based solutions—in short, no dashboards or wonder tools that claim to solve all your problems, but actual real-world solutions and cybersecurity and governance programs tailored to your needs.

Expert vCISO consulting

Cybersecurity requirements and cyber risk management get more difficult to navigate every day, especially if you don’t have the budget to hire a dedicated CISO. When you need to take a proactive approach to strengthening your security team and developing a security plan and roadmap for the future, we provide experienced and credentialed cybersecurity team members as your fractional or even full-time virtual Chief Information Security Officer (vCISO).

RITC Cybersecurity will guide you in implementing a new security framework like NIST CSF, NIST 800-171, CIS, or ISO 27001. RITC Cybersecurity will identify any gaps in your current compliance requirements, such as HIPAA or PCI, help you pass a compliance audit like SOC 2, and answer customer security questionnaires.

RITC Cybersecurity’s team will provide you with guidance on how to best improve your cybersecurity posture based on our years of real-world experience—at a fraction of the price of hiring a full-time CISO. Our team members function as part of your team and will integrate effortlessly to provide the expertise needed to make informed decisions about your company’s security roadmap.

Maximize value from existing resources

RITC Cybersecurity doesn’t sell ANYTHING other than our services. We will work with you to maximize the ROI (Return on Investment) for your existing tools, technology, and your most valuable asset: your team.

RITC Cybersecurity helps you identify gaps in your current technologies and processes, performs a needs analysis for staffing, and can recommend tools we have found effective in the past, so you can make the best decision based on your needs and your budget.

Our goal is to utilize the team and the technologies you have in place and enable you to save time, costs, and potential lost KTLO time if and when new resources are brought online and other resources are decommissioned.

RITC Cybersecurity fine-tunes all our solutions to the unique characteristics of your company.

Cybersecurity Simplified

Tailored Solutions for Small Businesses

RITC Cybersecurity offers pre-structured hourly time block packages designed specifically for small businesses. These packages allow you to address your cybersecurity needs without overcommitting.

10-15 Hours

Block

Quick consultations, targeted assessments, or specific tasks like vulnerability scans.

20-30 Hours

Block

Smaller projects such as policy updates, employee training, or focused risk assessments.

40-60 Hours

Block

Comprehensive tasks like implementing cybersecurity frameworks, system audits, or strategic planning.

Cybersecurity Best Practices Checklist

Protect Your Business with These Essential Security Measures

A well-secured business starts with a strong cybersecurity strategy. Use this checklist to ensure your company is protected against potential threats.

Screenshot 2025-02-07 200712

Framework Basics For Small & Medium Size Companies

Screenshot 2025-02-07 200338

Framework Basics For All Companies

Screenshot 2025-02-07 200827

Basic HIPAA  Compliance Checklist Basics

Screenshot 2025-02-17 134725

SOC2 Security Audit Prep Checklist Basics

Proactive cyber defense for a safer future

RITC Cybersecurity is a cybersecurity firm run by cybersecurity professionals to serve small and medium-sized businesses. We know cybersecurity requirements and cyber risk management get more difficult and confusing to navigate every day. RITC Cybersecurity’s focus is small to medium-sized businesses, and we know two things:

First, your organization is unique in your staffing, budget, and market. Second, cost is always a concern. We also know how to turn your cybersecurity costs into an investment to grow your business.

RITC Cybersecurity custom-tailors cybersecurity solutions and provides compliance services for small and medium-sized companies across all industries, including healthcare, financial services, technology, manufacturing, aerospace, and defense industries.

image (43)

Certifications

These certifications showcase our commitment to cybersecurity excellence

CRISC
PCis
isaca
ISC2
CISSP

Book an appointment

Start working toward achieving IT security