Stars-image

Blog

Welcome to Silent Sector's blog, news, and resource area.

Zach Fuller

Zach Fuller
Zach Fuller is an entrepreneur who has built businesses in multiple industries. He served as Green Beret in the U.S. Army, conducting highly sensitive combat operations in Afghanistan. Zach was awarded a Bronze Star Medal and other decorations for his actions overseas. He later built an investor relations team for a private equity company. Holding the role of Executive Vice President, he lead the team to raising well over $300,000,000 in private capital to acquire real estate assets and making it to the Inc. 500 list of Fastest Growing Private Companies. Zach is a Certified Ethical Hacker and founding partner of Silent Sector, where he is focused on mid-market and emerging companies which he considers to be the backbone of the American economy and our way of life.
Find me on: Medium.com, Apple Podcasts, Amazon, and Businesswire.com

Recent Posts

0 Comments

What is CISO as a Service and Why Do Businesses Use Them?

Securing your business’s online presence is not an easy task. It’s complex, resource-heavy that many businesses don’t quite know how to approach or manage effectively. There’s a lot of misinformation out there; it’s tricky for executives to know what security direction to go in without an internal Chief Information Security Officer (CISO) or a CISO as a Service provider.

Read More
0 Comments

Meet Serge Tarazi - Executive Leader & Growth Expert

Major initiatives, including cybersecurity, can be a challenge when everyone is already filling multiple roles in a growing organization. In this situation, it makes sense to look at operations holistically to ensure your projects are being implemented efficiently and will be sustainable.

Read More
0 Comments

Episode # 90 - Supercomputing with Ken Wiley

This week, the guys welcome IT leader Ken Wiley, who shares about cutting-edge work in the field of supercomputing, insights gained from a highly successful IT and cybersecurity career, plus some current tech trends to watch closely. 

For more on Ken and Silverdraft, please see the links below. 

https://www.linkedin.com/in/wileyken/

https://silverdraft.com/

Read More
0 Comments

What is the Purpose of Penetration Testing and Why is Penetration Testing Important?

"Do we need penetration testing?"

Read More
0 Comments

Security Requirements Dilemma

Read More
0 Comments

Cybersecurity Grows Revenue

Read More
0 Comments

The "Big 4" Methods of Building a Cybersecurity Program

Companies looking to build a cyber risk management program have four options. This video describes the various options, plus pros and cons of each. It is important to understand what is available so you can make the best choice for your organization's protection and longevity.

 

Read More