Jonathan Sargent is the Chief Executive Officer of Padlon Security, where he leads the company’s mission to deliver cutting-edge cybersecurity solutions that help businesses navigate today’s evolving threat landscape. With over 26 years of experience as a senior IT and cybersecurity executive, Jonathan brings a wealth of expertise in cloud security, regulatory compliance, and strategic risk management.
Jonathan has held leadership positions at Fortune 100 financial institutions and major technology firms, where he spearheaded global IT integration efforts, cloud security transitions, and cybersecurity governance programs. He is highly regarded for his ability to translate complex technical challenges into actionable business strategies, making him a trusted advisor to senior leadership teams and boards of directors.
In addition to his role at Padlon, Jonathan is passionate about building resilient cyber ecosystems and promoting a culture of security awareness in organizations of all sizes. He holds an MBA from Georgetown University and an MS in Information Technology from the University of Maryland.
Jonathan’s vision for Padlon is to bring Fortune 100 expertise to the broader market, empowering companies to secure their digital assets, maintain compliance, and effectively manage cyber risk in an increasingly connected world.
• Proactive Compliance Management: Reduce the burden of manually tracking changing regulations by leveraging automated tools and expert guidance.
• Audit-Ready at All Times: Stay ready for audits and regulatory inquiries with real-time compliance dashboards and reporting.
• Cost and Risk Reduction: Minimize potential fines and penalties by ensuring complete regulatory adherence, preventing breaches, and enhancing data privacy practices.
• Business-Driven Security: Align security controls with your cloud transformation goals, ensuring that security enables rather than hinders innovation.
• Reduced Cloud Risks: Secure your cloud environments and reduce risks from misconfigurations, improper access controls, and third-party vulnerabilities.
• Enhanced Agility with Security: Enable rapid, secure adoption of cloud services while ensuring governance and visibility across all environments.
• Increased Executive Buy-In: By framing cyber risks in business terms, CISOs can secure executive support for security initiatives, ensuring that cybersecurity is seen as a strategic business enabler rather than just a cost center.
• Strategic Decision-Making: Enable board members and executives to make informed decisions based on clear, quantified risk data, leading to better resource allocation and prioritization of cybersecurity investments.
• Improved Crisis Preparedness: Ensure that the board and leadership team are ready to respond effectively in the event of a breach, reducing the likelihood of reputational damage and financial loss.
If you are currently experiencing a security breach, please call us at
(800) 917-0551 for immediate assistance.
• Compliance Readiness Audits: We conduct a comprehensive review of your current systems, controls, and policies to ensure compliance with relevant regulations. This includes a gap analysis, risk assessments, and remediation plans.
• Regulatory Change Monitoring & Reporting: We provide continuous monitoring of regulatory changes and ensure that your security policies adapt accordingly. Our team will deliver periodic reports outlining the key regulatory shifts that affect your industry.
• Automated Compliance Reporting Tools: Implement automation tools that streamline compliance reporting, ensuring that all necessary reports and evidence are generated in real-time for audits or regulatory inspections.
• Data Privacy Impact Assessments: For regulations like GDPR and CCPA, we conduct detailed data privacy assessments to ensure that personal data is handled in accordance with legal requirements, preventing unauthorized access or breaches.
• Third-Party Compliance Assurance: Ensure your vendor ecosystem aligns with your compliance requirements. We assess third-party vendors to identify risks and implement safeguards.
It’s no longer a matter of IF, but WHEN your will be attacked; companies similar to yours are experiencing breaches daily. Regardless of the size of your business, we are all a potential target for a hacker.
• Cloud Security Posture Assessment (CSPA): We assess the security of your cloud infrastructure (AWS, Azure, Google Cloud, hybrid environments) to ensure that configurations, policies, and controls meet best practices and compliance standards.
• Identity & Access Management (IAM) Optimization: Implement or enhance IAM solutions to ensure that the right users have the right access at the right times, protecting against unauthorized access and data breaches.
• Zero-Trust Architecture Implementation: We help design and deploy zero-trust frameworks to secure networks, devices, and users, ensuring that trust is continuously verified at every layer of your infrastructure.
• Secure Digital Transformation Roadmaps: We work with your executive team to integrate security into every phase of your digital transformation projects. From DevSecOps to secure cloud migration, we ensure that innovation doesn’t come at the cost of security.
• Cloud Incident Response & Threat Monitoring: Provide ongoing monitoring, detection, and response services tailored to cloud environments, ensuring that breaches or misconfigurations are swiftly identified and addressed.
• Cyber Risk Quantification & Executive Reporting: Transform technical risk data into financial metrics that align with business objectives. We provide frameworks that quantify risks, helping CISOs present cybersecurity issues in terms of potential business impact, ROI, and risk mitigation.
• Board-Level Cybersecurity Training: Equip board
• Cyber Risk Quantification & Executive Reporting: Transform technical risk data into financial metrics that align with business objectives. We provide frameworks that quantify risks, helping CISOs present cybersecurity issues in terms of potential business impact, ROI, and risk mitigation.
• Board-Level Cybersecurity Training: Equip board members and executive leadership with the knowledge and tools they need to understand cybersecurity at a high level. We offer custom training programs that bridge the gap between technical risk and strategic business concerns.
• Cybersecurity Investment Roadmaps: We work with CISOs to develop long-term, strategic investment roadmaps for cybersecurity. These roadmaps will detail how and where to allocate resources based on evolving threats, emerging technologies, and organizational goals.
• Executive Incident Response Tabletop Exercises: Conduct incident response drills and tabletop exercises with the executive team, simulating real-world scenarios. These exercises help executives understand their roles in a crisis, and allow them to be better prepared when an actual event occurs.
• CISO/Board Alignment Workshops: Facilitate workshops to improve alignment between the CISO’s priorities and the board’s expectations, ensuring that cybersecurity is embedded in the company’s overall risk management framework.
Toll Free (800) 917-0551
Monday - Friday: 9am - 5pm
Saturday - Sunday: Closed