Crisis Management Consultants

Explore top LinkedIn content from expert professionals.

  • View profile for Flavio Queiroz, MSc, CISSP, CISM, CRISC, CCISO

    Cybersecurity Leader | Information Security | GRC | Security Operations | Mentor | GSOC, GCIH, GDSA, GISP, GPEN, GRTP, GCPN, GDAT, GCISP, GCTIA, CTIA, eCMAP, eCTHP, CTMP

    30,628 followers

    INCIDENT RESPONSE: NEW LIFE CYCLE MODEL BASED ON CSF 2.0 WITH THREAT INTELLIGENCE INTEGRATION ℹ️ NIST SP 800-61r3 provides updated guidance on how organizations should integrate incident response into their broader cybersecurity risk management strategy, aligning with the NIST Cybersecurity Framework (CSF) 2.0. ℹ️ This version significantly restructures the incident response approach by replacing the older cyclical model with a CSF 2.0-aligned life cycle. It emphasizes continuous improvement, cross-functional collaboration, and a shared taxonomy for incident response across sectors. 📍 KEY TAKEAWAYS ■ Incident Response as Risk Management: Incident response is no longer a standalone reactive process; it is now a core component of enterprise risk management, closely tied to all CSF 2.0 functions. ■ Cyber Threat Intelligence Integration: Emphasizes the importance of cyber threat intelligence (CTI) in detection, analysis, and response phases, particularly in improving early detection and proactive decision-making. 📍 CTI ELEMENTS ■ DE-AE-07: CTI and other contextual information are integrated into the analysis. Integrate up-to-date CTI and other contextual information into adverse event analysis to improve detection accuracy and characterize threat actors, their methods, and IoC. ■ ID-RA-02: CTI is received from information-sharing forums and sources, obtaining information on new threats, improving the accuracy of cybersecurity technologies with incident detection or response capabilities, and understanding TTPs used by attackers. ■ ID-RA-03: Internal and external threats to the organization are identified and recorded #csf2 #csirt #incidentresponse #riskmanagement #threathunting #threatdetection #threatanalysis #threatintelligence #cyberthreatintelligence #cyberintelligence #cybersecurity #cyberprotection #cyberdefense

  • View profile for Jason Murrell
    Jason Murrell Jason Murrell is an Influencer

    Cybersecurity Leader I EiR Fusion Cyber Lab | Chair at DSI (SMB1001) | Founder at MurFin | Advocate for SMB Protection & Growth | ‘Cyber Team Australia’ Strategist | Speaker & Thought Leader | Innovator

    37,433 followers

    ⚠ Updated Executive Guidance on Cyber Security Incident Response Planning! The latest updates from the Australian Signals Directorate, which has just released the revised "Cyber Security Incident Response Planning - Executive Guidance" (11 April 2024). This document is crucial for businesses across all sizes, from SMEs to large corporations and government entities. ☑ Preparation is Key ~ Organisations must identify critical systems and data, establish business continuity and disaster recovery plans and ensure they have an up to date, tested cyber security incident response plan. ☑ Communication Plans ~ The guidance stresses the importance of having a clear public communication strategy in place for when incidents occur. This includes defining roles for information release and maintaining consistent communication channels. ☑ Reporting to ASD ~ It's vital to report cyber security incidents promptly to the ASD for timely assistance, which can include investigations or remediation advice. ☑ Legislative Obligations ~ The document outlines the need for organisations to understand their legislative obligations regarding cyber security incident reporting. This guidance not only provides a structured approach to managing cyber threats but also integrates well with Australia's Cyber Security Strategy 2030, supporting our goal to position Australia as a global leader in cyber security. 📘 For a detailed understanding and to ensure your organisation is aligned with the best practices, access the full document here ~ https://lnkd.in/gYnRQU9e Stay ahead in securing your operations and safeguarding your business' future. #CyberSecurity #BusinessResilience #ASDGuidance #MurFinGroup #AustraliaCyberSecurityStrategy2030

  • Post 14  When Breaches Happen: GRC to the Rescue! 🚨 2:00 AM. The phone rings. A breach has been detected. Unusual traffic. Possible data exfiltration. The SOC is alert. The stakes are high. Now what? This is where all those “boring” GRC documents suddenly matter. If you’ve done Governance, Risk & Compliance right — you’re not scrambling. You’re executing a playbook. Because when crisis hits, GRC becomes the calm in the storm. Please Note - GRC does not refer to a specific team here but to the process. Before the Breach GRC ensures preparedness long before chaos begins with the mindset that ‘a breach is bound to happen — the real question is how fast we recover, and how little it hurts’.  - There’s an Incident Response Plan (IR) — who does what, when, and how.  - There is also a Cyber Crisis Management Plan (CCMP) - critical threat scenarios have been identified and documented and play books in place - Roles are clear; decision chains defined. - Simulations and tabletop exercises (cyber drills) have been run. - Contact lists, escalation paths, and regulator timelines are known. So when that 2:00 AM call comes, nobody’s guessing — they are acting. During the Breach As the technical teams fight the fire, GRC coordinates the response. • Ensures communication flows — up, down, and outward. • Keeps leadership informed in business language (impact, cost, recovery). • Tracks decisions and evidence — because compliance still counts in a crisis. • Makes sure regulators are notified within mandated windows — (6 hours under CERT-In in India). It’s control amid chaos — the difference between a crisis managed and a crisis multiplied. After the Breach The headlines may fade, but GRC’s work begins anew. Every incident becomes a lesson plan.  - Root-cause analysis: What failed — a process, a control, or a behavior?  - Remediation: Update the policy, enhance training, strengthen technology.  - Metrics: Track closure of actions, measure improvement, brief the board. That’s how resilience is built — one post-mortem at a time. A Quick Reality Check Companies with a tested IR plan/CCMP and team cut breach costs by millions on average. Not because the plan stops the hack — but because it stops the panic. Bottom Line GRC isn’t just paperwork before the storm. It’s structure during the storm, and wisdom after it. When Governance sets direction, Risk anticipates impact, and Compliance ensures accountability — GRC turns breach chaos into controlled recovery. 👇 Have you ever been part of an incident response? What was one lesson you took away? #CyberSecurity #GRC #DigitalTrust #WhatsInIt4Me #UmaRamani

  • The National Institute of Standards and Technology (NIST) released for public comment (open until May 20), Special Publication: “Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile.” A #NIST Cybersecurity Framework (CSF) Community Profile is a baseline of #CSF outcomes that is created and published to address shared interests and goals for reducing #cybersecurity risk among several organizations. The Community Profile is intended for use by most organizations regardless of sector, size, or other factors. This document seeks to assist organizations with incorporating cybersecurity #incidentresponse recommendations and considerations throughout their cybersecurity #risk. It also provides a common language that all organizations can use to communicate internally and externally regarding their #incident response plans and activities. The publication discusses how the incident response lifecycle has changed because incidents occur more frequently and cause far more damage. It uses the CSF 2.0 Core as the basis for highlighting and prioritizing cybersecurity outcomes that are important for incident response: • Govern: The organization’s cybersecurity #riskmanagement strategy, expectations, and policy are established, communicated, and monitored. • Identify: The organization’s current cybersecurity risks are understood. • Protect: Safeguards to manage the organization’s cybersecurity risks are used. • Detect: Possible cybersecurity attacks and compromises are found and analyzed. • Respond: Actions regarding a detected cybersecurity incident are taken. • Recover: Assets and operations affected by a cybersecurity incident are restored. Finally, the document provides a table covering Preparation (Govern, Identify, and Protect) and another one covering the Incident Response Lifecycle (Detect, Respond, and Recover). https://lnkd.in/enAzfmtB

  • View profile for Bryer FM

    Facilities Specialist at Startup

    6,741 followers

    🔴 INCIDENT REPORTING — The Most Critical Step in Safety & Facility Management Every incident is a lesson. But only a well-written incident report turns that lesson into action, prevention and compliance. Whether it's a minor safety lapse or a major system failure, here’s how to create a powerful, audit-ready and improvement-focused report that actually makes a difference. ✅ Step-by-Step Guide to Effective Incident Reports: 1️⃣ Basic Incident Information: Capture the essentials: 📅 Date & Time 📍 Exact Location (building, floor, zone) 👥 Persons Involved (employees, vendors, visitors) 🧾 Reporting Officer Details 📌 This sets the timeline and clarity for all stakeholders. 2️⃣ Incident Description: State only facts: What happened? Where and when? Who witnessed or responded? What systems/equipment were affected? 📝 Example: "At 3:45 PM, smoke was detected from the AHU panel on the rooftop of Building 3. Technicians responded immediately and isolated the power supply." 📌 Avoid assumptions or opinions—clarity is key. 3️⃣ Immediate Actions Taken: Mention the first response: 🔌 Was power isolated? 🧯 Was a fire extinguisher used? 📞 Were maintenance/safety teams alerted? 📌 This shows control measures and readiness. 4️⃣ Root Cause Analysis (RCA): Dig deep using: ❓5 Whys 🐠 Fishbone Diagram Identify: ⚙️ Equipment or component failure 👷 Human error 🛠️ Lack of preventive maintenance 📐 Design or system flaw 📌 This prevents recurrence, not just fixes the symptom. 5️⃣ Impact Assessment: Detail the effects: 🏗️ Equipment or asset damage ⏱️ Downtime or service disruption 🤕 Injury or health risk 💵 Financial implications 📌 Essential for risk evaluation and insurance. 6️⃣ Corrective & Preventive Actions (CAPA): Show action and commitment: ✔️ Corrective: Issue resolved (repairs, isolation) 🚫 Preventive: Future safety (training, SOP updates, PPM change) 📌 This is where safety culture truly evolves. 7️⃣ Photo & Log Evidence: Always attach: 📸 Damage area and restoration photos 📈 Logs, alarm screenshots, thermal scans 🔧 Equipment readings or reports 📌 Strengthens the report for audits and RCA verification. 8️⃣ Reporting and Documentation: Submit to: 📤 Internal stakeholders, client and management 🧑✈️ HSE / QHSE / Risk department 🗂️ Store soft and hard copies for audit trails 📌 Close the loop with CAPA tracking and documentation. 🚨 Why Incident Reports Matter 😲 Proactively prevent future incidents Comply with legal & audit requirements Strengthen vendor and team accountability Improve emergency readiness Support insurance and claim processes Build a zero-incident safety culture 🔎 An incident not reported is a risk repeated. Master the process, not just the paperwork. #IncidentReport #FacilityManagement #WorkplaceSafety #RootCauseAnalysis #EHS #CorrectiveAction #PreventiveMaintenance #OperationsExcellence #QHSE #Compliance #RiskManagement #SafetyFirst #ZeroHarm #FacilityOps

  • View profile for Mahesh Atapattu

    Transformational CIO / CISO | InfoSec Leader | Managing Risks, Driving Compliance (ISO 27001, 27701, GDPR, 27017) | Tech Enthusiast & IT Consultant | Lead Auditor | MSP | MSSP

    10,211 followers

    📢 The CrowdStrike Incident: A Wake-Up Call for Cybersecurity Professionals Recently, CrowdStrike, a leader in cybersecurity, faced a significant challenge that's sending ripples through our industry. Here's what happened and what we can learn: 🔍 The Incident: - A faulty update to CrowdStrike's Falcon Sensor caused widespread system instability - Users experienced frequent crashes, boot loops, and BSODs The issue required manual intervention, complicating the fix 🌐 The Impact: - Exposed a critical single point of failure in essential services - Affected numerous sectors, including aviation and banking - Highlighted the vulnerability of Windows-dependent systems 🔑 Key Takeaways for CISOs: 1. Diversify Your Infrastructure: Consider running critical servers on both Windows and Linux to mitigate OS-specific risks. 2. Prepare for Crisis Communication: Have a solid PR strategy ready to maintain customer trust during incidents. 3. Robust Testing Protocols: Implement rigorous testing for updates, especially for core components. 4. Automated Rollback Mechanisms: Develop systems that can quickly revert problematic updates without manual intervention. 5. Redundancy in Critical Systems: Ensure backup systems are in place to maintain operations during unforeseen issues. 💡 This incident serves as a crucial reminder: In cybersecurity, we must always prepare for the unexpected and continually refine our strategies. What are your thoughts on this incident? How does your organization prepare for similar scenarios? #Cybersecurity #IncidentResponse #TechLeadership #CISOLessons

  • View profile for Chris Drumgoole

    Chris Drumgoole | President of Global Infrastructure Services, DXC | Turning Complex Technology into Business Clarity

    18,350 followers

    If a major tech incident hit your organization tomorrow, would your executive team know how to respond? I’ve been in rooms where systems were down, information was incomplete, and every decision carried real consequences. In those moments, preparedness isn’t a binder sitting on a shelf. It shows up in the quality of leadership decision-making under pressure. There are three stages of crisis response during a cyber incident: before, during, and after. Each one requires different executive discipline. Before an incident - Clarify who has decision authority. - Align on risk tolerance at the board and executive level. - Rehearse executive communication plans. - Agree in advance on what transparency looks like during a crisis. During an incident - Avoid reactive decisions driven by fear. - Prioritize action over consensus-building. - Delegate execution to the technical experts. - Avoid speculation. Make decisions based on verified facts. After an incident - Run a rigorous, blameless review. - Fix structural weaknesses, not just surface symptoms. - Reinforce accountability without triggering defensiveness. - Institutionalize what was learned. Technology will fail at some point. That’s the nature of complex systems. What matters is whether your leadership team has already been tested before that moment arrives. #BusinessLeaders #Cybersecurity #RiskManagement #LeadershipDecisionMaking #TechnologyRisk

  • View profile for Sanjiv Cherian

    AI Synergist™ | CCO | Scaling Cybersecurity & OT Risk programs | GCC & Global

    21,943 followers

    “Cybersecurity isn’t failing because of tech, it’s failing because of leadership.” Last year, my team and I were called in to support a company after a major ransomware incident. The tech stack looked strong on paper: – EDR across endpoints – 24/7 SOC monitoring – Regular red team assessments But within the first hour of the incident briefing, the CFO said something that stuck: “We had the best tools. Why did everything still go down?” And that’s when it became clear— They had tools. They had dashboards. But they didn’t have the leadership structure to act decisively when it mattered. 🚫 No executive-level crisis playbook 🚫 No shared understanding of critical business systems 🚫 No communication bridge between security and the board Infosec spoke in threat vectors. The board needed answers in financial and reputational impact. Two different conversations. 📊 PwC’s 2024 Global Digital Trust Insights found: 74% of executives say their security leaders struggle to connect cyber risk to business goals. That’s the gap. Not lack of talent. Not lack of budget. But lack of alignment at the top. So how do we fix this? Here’s what security leaders can do right now to build better alignment with the board: ✅ Translate threats into impact. Don’t say “log4j vulnerability” — say “potential $3.2M outage risk.” ✅ Map risk to operations. Identify which 3–5 assets the business cannot afford to lose. ✅ Create a board-ready playbook. Define roles, escalation paths, and executive impact scenarios. ✅ Make metrics meaningful. Don’t show patching rates — show how exposure has dropped over time. ✅ Embed cyber in decision-making. Join strategic planning, not just audit reviews. Cybersecurity is no longer a technical function. It’s a leadership mandate. And the companies that thrive will be the ones where leadership owns the risk, not just the report. #CyberLeadership #CyberResilience #BoardroomSecurity #MCS #SecurityThatDelivers #BusinessAlignment #DigitalTrust #CyberForGrowth

  • View profile for Amr Eliwa

    Cybersecurity Defense Expert | CISSP | CISM |GCFA | GMON | GCIH |Cortex XSIAM| +10 Years of Experience

    15,976 followers

    Dear SOC Heroes, To detect and respond to any attack correctly, you must make a threat modeling to your business to understand all attacks and identify their attack surface and impact, then you should map each attack to an incident response framework that your organization follows. A well-structured approach that you follow, will enable you to manage and mitigate the impact of any attack. For example, let's map a data exfiltration attack to the NIST incident response framework. 1. Preparation - Establish Baselines: Understand normal data flows and behaviors within your network. - Implement Monitoring Tools: Deploy and configure SIEM, DLP, and IDS/IPS. - Develop Incident Response Plans: Have clear procedures and roles defined for responding to data exfiltration incidents. 2. Detection - Monitor Network Traffic: Look for unusual data transfer volumes, particularly to external IP addresses. - Analyze Logs: Check logs from firewalls, proxies, and network devices for anomalies. - Utilize Behavioral Analytics: Use tools to detect deviations from normal user and system behavior. - Build SIEM Use-Cases: Configure alerts for potential exfiltration activities, such as large data transfers or access to sensitive files. 3. Identification - Correlate Events: Use SIEM to correlate alerts and logs from different sources to identify patterns. - Validate Alerts: Confirm that alerts are not false positives by cross-referencing with known baselines and activities. - Identify Data Sources: Determine which data was accessed and potentially exfiltrated. 4. Containment - Isolate Affected Systems: Disconnect compromised systems from the network to prevent further data loss. - Block Malicious Traffic: Implement firewall rules to block data exfiltration channels. - Reset Credentials: Change passwords and revoke access for compromised accounts. 5. Eradication - Remove Malware: Conduct a thorough scan and clean-up of affected systems to remove any malicious software. - Patch Vulnerabilities: Apply patches and updates to fix exploited vulnerabilities. - Secure Configurations: Ensure systems and network configurations follow best security practices. 6. Recovery - Restore Systems: Rebuild or restore systems from clean backups. - Monitor for Recurrence: Closely watch the affected systems for signs of recurring issues. - Communicate: Inform clients/stakeholders and possibly affected individuals as required by law and policy. 7. Post-Incident Analysis - Conduct a Root Cause Analysis: Determine and document how the exfiltration occurred and why it wasn't detected earlier. - Review and Improve: Update security policies, incident response plans, and monitoring tools based on lessons learned. You must test this procedure/approach with your SOC team to make sure it's well understood and effective and will be followed once you are this type of attack. #SOC #IR #NIST_IR #Data_exfilteration #Cybersecurity

Explore categories