Protecting what matters.
Bringing clarity, courage, and control to your cyber defense. Rhindon Cyber helps organizations build resilience against evolving threats — with expertise you can trust, so your focus remains on your business goals.

So you can focus on your business goals.
Rhindon offers virtual Chief Information Security Officer services, leveraging multiple software platforms to manage your cybersecurity program.
Built for Resilience. Driven by Integrity.
Executive Governance
Protected Data Discovery
Implementation Planning
Measurement against standards-based cybersecurity frameworks with gap analysis and project planning with detailed tasks.
Continual Protection

More than cybersecurity — A trusted guard.
Inspired by the noble sword of Narnia, Rhindon stands for more than strength. It represents the courage to do what’s right, the discipline to defend, and the wisdom to lead. We bring that same spirit to every engagement.

David Mosher, CEO & Founder
A Human-Centered Approach to Cyber Security and Defense
Tiers of Support
Tiers of Support
Fundamentals of Security Governance
- Executive Governance
- Assessment and Plan Execution
- Protected Data Classification and Protection
Enhanced Security Governance
- All of the fundamentals, plus:
- Continuous Monitoring
- Security Awareness Training and Testing
- Third Party Risk Management
- Incident Response Planning and Testing
Optional Services
- 24/7 Monitoring
- Incident Response
Trusted by Teams that Refuse to Compromise
Dave has led our Board of Trustee efforts around cybersecurity and has proven to be a strong partner in our mission.
Dave has been integral in leading the development and retooling of our security program. He represented our security program to the SEC and coordinates annually with our auditors, in each case without ever receiving an adverse finding.
Dave’s cybersecurity expertise is deep, and he communicates clearly with executives, technology leaders, and small company owners alike.
Latest Updates
3 steps to create Third-Party Cybersecurity Risk Assessments for Small Business
8 min read
Catholic Ethics in Cybersecurity: Encrypted Communications and Terrorism
6 min read
Why I Chose a Cybersecurity Masters in Science Degree Over the CISSP Certification
6 min read