Matthew Maynard

With a robust career spanning 7 years in the ever-evolving field of cybersecurity, Matthew is a Certified Information Security Professional (CISSP) and EC-Council Certified Computer Hacking Forensic Investigator (CHFI). Matthew’s expertise includes Digital Forensics, Incident Response, and Ethical Hacking, supported by essential certifications such as CompTIA Advanced Security Practitioner (CASP+) and CompTIA Security+ (SEC+).

In Matthew’s current capacity as an IT Security Incident Response Analyst III at BJC Healthcare, Matthew orchestrates the vigilant oversight of security operations, employing a keen eye for incident investigations and contributing significantly to the development and execution of robust Incident Response plans. Matthew’s other roles involve leading purple team exercises and “Think like a hacker” sessions to bring clarity to Blue Team members on the TTP of threat actors. Matthew’s tenure at Parameter Security is where Matthew served as an Ethical Hacker conducting thorough security assessments and penetration testing.

Outside of Matthew’s professional roles, Matthew is a loving father of three and enjoys anything that involves food. Matthew is also a published author for Hakin9 magazine “Cyber Warfare Methodologies & Case Studies” edition and deeply engaged in the cybersecurity community as a member of OWASP St. Louis, ISC2, and CompTIA.

Be sure to catch Matthew’s talk at ShowMeCon!

________________________________________________________________________________________________________________

Empowering Blue Teams: Understanding TTPs and Navigating the Dark Web

I want to emphasize the critical role of blue team members in our cybersecurity efforts. As guardians of
our digital infrastructure, it’s imperative for us to stay one step ahead of malicious actors. To do this, we
must have a deep understanding of their Tactics, Techniques, and Procedures (TTPs). Understanding the
TTPs of our adversaries is akin to learning their playbook. It allows us to predict their moves, detect their
actions, and ultimately thwart their efforts. By knowing their methods, we can fortify our defenses, identify
anomalies, and respond effectively.

One often overlooked aspect of cybersecurity is the dark web. This hidden part of the internet harbors a multitude of cyber threats, including forums, marketplaces, and communication channels where malicious actors operate. As blue team members, it is crucial for us to familiarize ourselves with this realm. By gaining insights into the dark web, we can proactively monitor for potential threats, track trends, and gather intelligence on emerging attack vectors. This knowledge empowers us to adapt our defenses and stay ahead of evolving threats.