Jon Matthews

Jon Matthews

Jon Matthews is the Vice President of Cybersecurity Operations for CyberMaxx where he leads the Security Operations Center, Security Engineering, and Digital Forensics and Incident Response teams.

Jon is a highly experienced and trusted leader in computer and network forensics with over twelve years of experience. He leads investigations around high-profile digital forensic and incident response matters helping clients determine the root cause and extent of breaches.

Before joining CyberMaxx, Jon retired from the U.S. Army with over 20 years of service. He was a Special Agent with U.S. Army Counterintelligence for nine years and specialized in digital forensics for espionage and APT investigations. Jon also worked with Aon’s Cyber Solutions (Stroz Friedberg) leading their Washington, DC forensic lab and conducting digital forensic and incident response investigations for two and a half years.

Education, Certifications, and Training: Jon holds a Bachelor of Science degree in Computer Networks Security from the University of Maryland University College, and holds a Graduate Certificate in Incident Response from the SANS Technology Institute. Jon was a certified Computer Crime Investigator while working in the U.S. Army. His certifications include being a CISSP, Certified Incident Handler, Certified Forensic Analyst, Network Forensic Analyst, Reverse Engineering Malware, Advanced Smartphone Forensics, Certified Ethical Hacker, Secure Infrastructure Specialist, A +, Network +, and Security +.

What are the Different Types of Security Controls in Cybersecurity?

What are the Different Types of Security Controls in Cybersecurity?

Articles

2 min

Five of the Top Proactive Cybersecurity Measures

Five of the Top Proactive Cybersecurity Measures

Articles

3 min

Threat Modeling: More than Checking for Tripping Hazards on the Runway

Threat Modeling: More than Checking for Tripping Hazards on the Runway

Articles

3 min

How Do Threat Actors Gain Access Into Networks?

How Do Threat Actors Gain Access Into Networks?

Articles

5 min

How To Prevent A Data Breach In Your Healthcare Organization [Updated]

How To Prevent A Data Breach In Your Healthcare Organization [Updated]

Articles

4 min

Ransomware and Common Attack Vectors

Ransomware and Common Attack Vectors

Articles

3 min

Important Information Regarding Spring Framework Remote Code Execution (CVE-2022-22965)

Important Information Regarding Spring Framework Remote Code Execution (CVE-2022-22965)

Blog Post

1 min

Cybersecurity Facts: What is Ransomware and How to Avoid Becoming a Victim?

Cybersecurity Facts: What is Ransomware and How to Avoid Becoming a Victim?

Articles

4 min

The Cyber Kill Chain

The Cyber Kill Chain

Articles

4 min

CISA says ‘Shields Up’ and Warns of Possible Russian Cyberattacks as Invasion Fears Mount

CISA says ‘Shields Up’ and Warns of Possible Russian Cyberattacks as Invasion Fears Mount

Articles

1 min

4 Tactics to Protect Against Harmful Ransomware

4 Tactics to Protect Against Harmful Ransomware

Articles

5 min

4 Steps To Protect Your Cloud Environment with SIEM

4 Steps To Protect Your Cloud Environment with SIEM

Articles

2 min