Crisis Management In Projects

Explore top LinkedIn content from expert professionals.

  • View profile for Adewale Adeife, CISM, CISSP

    Cyber Risk Management and Technology Consultant || GRC Professional || PCI-DSS Consultant || I help keep top organizations, Fintechs, and financial institutions secure by focusing on People, Process, and Technology.

    27,727 followers

    🚨 Mastering IT Risk Assessment: A Strategic Framework for Information Security In cybersecurity, guesswork is not strategy. Effective risk management begins with a structured, evidence-based risk assessment process that connects technical threats to business impact. This framework — adapted from leading standards such as NIST SP 800-30 and ISO/IEC 27005 — breaks down how to transform raw threat data into actionable risk intelligence: 1ļøāƒ£ System Characterization – Establish clear system boundaries. Define the hardware, software, data, interfaces, people, and mission-critical functions within scope. šŸ”¹ Output: System boundaries, criticality, and sensitivity profile. 2ļøāƒ£ Threat Identification – Identify credible threat sources — from external adversaries to insider risks and environmental hazards. šŸ”¹ Output: Comprehensive threat statement. 3ļøāƒ£ Vulnerability Identification – Pinpoint systemic weaknesses that can be exploited by these threats. šŸ”¹ Output: Catalog of potential vulnerabilities. 4ļøāƒ£ Control Analysis – Evaluate the design and operational effectiveness of current and planned controls. šŸ”¹ Output: Control inventory with performance assessment. 5ļøāƒ£ Likelihood Determination – Assess the probability that a given threat will exploit a specific vulnerability, considering existing mitigations. šŸ”¹ Output: Likelihood rating. 6ļøāƒ£ Impact Analysis – Quantify potential losses in terms of confidentiality, integrity, and availability of information assets. šŸ”¹ Output: Impact rating. 7ļøāƒ£ Risk Determination – Integrate likelihood and impact to determine inherent and residual risk levels. šŸ”¹ Output: Ranked risk register. 8ļøāƒ£ Control Recommendations – Prioritize security enhancements to reduce risk to acceptable levels. šŸ”¹ Output: Targeted control recommendations. 9ļøāƒ£ Results Documentation – Compile the process, findings, and mitigation actions in a formal risk assessment report for governance and audit traceability. šŸ”¹ Output: Comprehensive risk assessment report. When executed properly, this process transforms IT threat data into strategic business intelligence, enabling leaders to make informed, risk-based decisions that safeguard the organization’s assets and reputation. šŸ‘‰ Bottom line: An organization’s resilience isn’t built on tools — it’s built on a disciplined, repeatable approach to understanding and managing risk. #CyberSecurity #RiskManagement #GRC #InformationSecurity #ISO27001 #NIST #Infosec #RiskAssessment #Governance

  • View profile for Sonyia Richardson, Ph.D.

    Assistant Professor, UNC Chapel Hill

    6,116 followers

    A new study published in Cultural Diversity & Ethnic Minority Psychology emphasizes the urgent need for deep-structure cultural adaptations in suicide prevention. Unlike surface changes (e.g., images or wording), deep adaptations reshape the foundation of interventions by embedding cultural strengths, incorporating culture into crisis planning, and challenging cultural myths. Through focus groups with Black youth, caregivers, providers, and community leaders, researchers identified eight essential strategies for culturally adapted care: 1ļøāƒ£ Use wellness- and collective-focused language 2ļøāƒ£ Prioritize mutual trust and safe spaces 3ļøāƒ£ Reframe cultural myths about mental health 4ļøāƒ£ Integrate Black-focused content to validate identity 5ļøāƒ£ Affirm protective factors alongside stressors 6ļøāƒ£ Set relevant, attainable goals for youth and families 7ļøāƒ£ Infuse culture into crisis planning 8ļøāƒ£ Build Black-centered communities of care Implication: Suicide prevention for Black youth must move beyond one-size-fits-all approaches. By centering racial socialization, trust, and community strengths, we can design interventions that truly resonate and save lives. Kim Gryglewicz, PhD, MSW, Margaret Phipps-Bennett, Michelle Vance, PhD, MSW, John Williams III PhD, Isis Bey, LCSW, CCTP II, TTS, Rehaana Herbert, Marc Karver, Sarah Dennis. šŸ“– Read more: https://lnkd.in/eFZ7AGvz #BlackYouth #MentalHealthEquity #SuicidePrevention

  • View profile for Sean ConnellyšŸ¦‰
    Sean ConnellyšŸ¦‰ Sean ConnellyšŸ¦‰ is an Influencer

    Zscaler | Fmr CISA - Zero Trust Director & TIC Program Manager | CCIEx2, MS-IST, CISSP

    21,712 followers

    🚨Incoming: Key Insights from CISA's FY23 Risk and Vulnerability Assessment: Strengthening Critical Infrastructure Security🚨 As America's Cyber Defense Agency, CISA's FY23 Risk and Vulnerability Assessment (RVA) report, based on over 100 RVAs, provides essential insights into the cyber threats facing federal agencies and critical infrastructure. šŸ”‘ Key Attack Vectors: šŸ”¹Phishing & Default Credentials: "Assessors completed their most successful attacks via common methods, such as phishing, valid accounts, and default credentials," demonstrating the ongoing risk of fundamental cyber hygiene failures. šŸ”¹Valid Accounts: "The number of valid accounts used in privilege escalation and lateral movement increased significantly," highlighting how attackers exploit identity mismanagement to gain deeper network access. šŸ”¹Misconfigurations: "CISA assessment personnel used common vulnerabilities facilitated by shortcomings in secure-by-design and default principles and other misconfigurations to compromise systems." šŸ” Entities should implement mitigations-centered intrusion prevention, such as: šŸ”¹Deploying a centralized cyber threat intelligence platform to monitor and log critical data and use the platform to detect and remediate abnormal behavior promptly. šŸ”¹Implementing a secure network security architecture with multiple layers of protection—using next-generation firewalls, granular access controls, network segmentation, SIEM/SOAR, robust encryption, and secure communication. šŸ”¹Enhanced protection mechanisms alongside strong credential policies, such as phishing-resistant MFA, to safeguard sensitive accounts. šŸ“Š This report, based on over 100 assessments, closely aligns with NIST SP 800-207 on Zero Trust Architecture and CISA’s Zero Trust Maturity Model. The insights emphasize the importance of identity-centric security, segmentation, and least-privilege access—vital information for any cyber defender seeking to safeguard their environment against sophisticated threats. #cybersecurity #criticalInfrastructure #zerotrust #CISA #RiskManagement

  • View profile for Jon Macaskill
    Jon Macaskill Jon Macaskill is an Influencer

    Dad First šŸ”¹ Men Talking Mindfulness Podcast Cohost šŸ”¹ Keynote Speaker šŸ”¹ Entrepreneur šŸ”¹ Retired Navy SEAL Commander

    143,532 followers

    During my time as a Navy SEAL, precision and thorough analysis were not just practices but NECESSITIES! The "Five Whys" method exemplifies this approach outside the battlefield, presenting a clear path to problem-solving. Here's how it worked for the Lincoln Memorial's unexpected challenge: 1ļøāƒ£ Why is the memorial dirty?Because of bird droppings. 2ļøāƒ£ Why are there bird droppings?Birds are attracted to the area. 3ļøāƒ£ Why are birds attracted? They eat the spiders there. 4ļøāƒ£ Why are there spiders? Spiders eat the insects 5ļøāƒ£ Why are there insects? They're attracted to the lights left on at night. The solution? Adjust the lighting to reduce the insects to deter the spiders and birds, directly addressing the root of the cleanliness issue. This method isn't just for maintaining national monuments; it's a powerful tool for any leader or problem-solver in any field. The next time you're faced with a challenge, I urge you to employ the "Five Whys." Get deep. Understand the problem fully before jumping to solutions. By sharing this method, you're not just passing along a problem-solving tool; you're empowering others to think critically and act decisively. Be the one to inspire change, to lead by example.

  • View profile for Costa Vasili

    Founder & CEO | Ethnolink - Multicultural Communications Agency | Translation services in 150+ languages | Trusted by government and not-for-profits to engage multicultural communities

    14,132 followers

    One of the biggest mistakes communicators make? Waiting for a crisis to plan communications for non-English speaking audiences in Australia. It’s something I’ve seen over and over again during the past 14 years. A lack of planning means content is often rushed, unsuitable for translation, and ends up missing the mark. But imagine if your resources were ready to go before a crisis hit. Let's take COVID. We couldn’t predict the specifics of that pandemic—but we absolutely can plan for pandemics and epidemics. With a strategy in place, generic resources could have been prepared in advance and easily tailored when needed. Instead of starting from scratch, you’d already have the tools ready to mobilise. Or consider floods, fires, or storms. You can’t predict exactly where these events will occur, but you can create general resources about what to do in such disasters ahead of time. By planning early, you can take the time to co-design materials with communities. You can ensure resources reflect cultural nuances and account for differences in knowledge or experience. And most importantly, you can build trust by creating communications with communities—not just for them. This proactive approach makes all the difference. It leads to better outcomes and puts you in a position to act confidently—not react frantically. At Ethnolink, this is what we do every day. We work with clients to plan strategically, consult with communities, and co-design resources that are impactful and meaningful. The mistakes of the past don’t have to be repeated. Let’s start planning today—before the next crisis hits. #translation #CALD #multicultural #communications #culturaldiversity

  • View profile for Utpal Vaishnav

    Founder & CEO @ Upsquare • Co-building AI-first businesses with aligned partners

    10,194 followers

    The Case of the Costly Error Once upon a time, a critical bug in a bustling software company was reported in their flagship product just days before a major release. Panic spread through the team like wildfire. The bug was complex, and time was running out. At first, the team tried the usual approach—frantic debugging and patching. But the bug kept reappearing like a stubborn ghost. As deadlines loomed closer, frustration mounted. That's when Jane, one of the senior developers, stepped in. She suggested a different approach: structured problem-solving. She gathered the team in a meeting room and laid out a plan: 01. Define the Problem: They dissected the bug, identified its specific behaviors, and defined the problem statement clearly. 02. Collect Data: They gathered data on when the bug occurred, what actions triggered it, and the system conditions at that moment. 03. Generate Hypotheses: The team brainstormed potential causes, generating multiple hypotheses. 04. Test Hypotheses: They systematically tested each hypothesis individually, isolating variables and gathering more data. 05. Analyze Results: Based on the data collected, they analyzed the results of each test and eliminated hypotheses that didn't hold up. 06. Implement Solution: Finally, they identified the root cause and implemented a solution that fixed the bug once and for all. The bug was squashed, and the release went off without a hitch. What could have been a disaster turned into a valuable lesson. Structured problem-solving saved the day! → When faced with a daunting challenge, don't rush into solutions. Take a structured approach. #dhandhekafunda ps: Structured problem-solving approach acts as a compass when you are not emotionally trapped in the situation. If you are, have another competent individual take the lead. At least be that structured ;)

  • View profile for Sanjiv Cherian

    CEO at Microminder Cyber Security | Accelerating Cyber Security Transformation

    20,691 followers

    ā€œThe biggest threat to critical infrastructure? Thinking it’s secure.ā€ False confidence is the most dangerous vulnerability in the room. šŸ“– STORY: The Comfort That Almost Cost Millions Last year, a utilities operator proudly told us, ā€œOur systems are air-gapped. We’re not worried about attackers.ā€ But when we started our assessment, here’s what we found: A forgotten remote access port exposed to the internet An unmanaged engineering laptop still using default credentials Third-party contractors bypassing basic authentication The illusion of protection had replaced actual protection. And they were one phishing email away from operational shutdown. šŸ›‘ THE REAL PROBLEM: Security Posture ≠ Security Reality In critical infrastructure, it’s not the threats you see that destroy trust; it’s the ones you assume you’ve already mitigated. And that’s the mission for June: Break the illusion. Test what’s true. Expose what’s vulnerable. Because too many systems are secure on paper but wide open in practice. šŸ’” INSIGHT: Illusion Feels Safe; Until It Isn’t Ransomware doesn’t care about heatmaps. Nation-state actors don’t check your audit logs. And recovery plans that have never been tested don’t work when it matters most. The strongest leaders don’t ask, ā€œAre we secure?ā€ They ask, ā€œWhat are we assuming is true that might no longer be?ā€ šŸ”„ MINDSET SHIFT āŒ ā€œWe’ve got the certificationsā€ āœ… ā€œWhen was the last time we actually simulated a breach?ā€ āŒ ā€œNo one’s ever breached our OTā€ āœ… ā€œHave we tested the pathways they could use tomorrow?ā€ June isn’t about adding more controls. It’s about testing the ones you think are working. āœ… TAKEAWAYS šŸ”ø Don’t trust what hasn’t been validated šŸ”ø Run red teams. Simulate pressure. Learn where the gaps really are šŸ”ø Don’t wait for attackers to test your environment. Do it yourself šŸ”ø In OT/ICS, assumptions kill resilience šŸ“© CTA: Mission June Starts Now This month, my team and I are challenging critical infrastructure leaders to test their defenses; openly, aggressively, and honestly. šŸ“© DM me for our Critical Infrastructure Risk Reality Kit including red team checklists, breach path simulations, and false-confidence scenarios we’ve seen first-hand. šŸ‘‡ What’s the last assumption your team challenged and what did it reveal? #MissionJune #CriticalInfrastructure #CyberRealityCheck #Microminder #OTSecurity #ICSResilience #SecurityPosture #CyberLeadership #SecurityAssumptions #RedTeamReady #SecurityIsNotCompliance

  • View profile for Nanjira Sambuli

    Tech^(Political Economy x Governance x Culture x Diplomacy)^Africa. Africa is not poor, just mismanaged. āœŠšŸ¾

    7,490 followers

    ā€œToo many non-profits and funders still roll into communities with a clipboard and a mission to document everything "missing."Needs assessments have become a default tool for diagnosing deficits, reinforcing a saviour mentality where outsiders decide what's broken and needs fixing[…] People most impacted by crisis aren't blank slates waiting for external solutions; they're part of complex socio-, political-, cultural systems with adaptive capabilities that existed long before international actors arrived and will remain long after they've gone.[…] At the end of the day, any approach that isn't rooted in pedagogies of care, intersectionality, mutual learning, systems thinking, co-design, economic and environmental justice and will ultimately replicate the same power imbalances it claims to disrupt.ā€ šŸ‘šŸ¾šŸ‘šŸ¾šŸ‘šŸ¾ https://lnkd.in/dexSrtRg

  • View profile for Chris H.

    Cofounder @ Aquia | Chief Security Advisor @ Endor Labs | 3x Author | Veteran | Advisor

    73,903 followers

    Risk and Vulnerability Assessment Cybersecurity and Infrastructure Security Agency (CISA) recently released their FY 2023 Risk and Vulnerability Assessment (RVA) Report. The report combines findings from 143 RVA's across multiple critical infrastructure sectors. They overlaid the RVA's to MITRE ATT&CK, ultimately mapping real world activities to 11 of the 14 tactics. The information is very useful, and can be used to mitigate organizational risk , implement mitigations and understand technical attack paths. Some key themes: - Valid accounts were the MOST successful attack technique, involved in 41% of successful attacks This aligns with other reports which emphasize the role of compromised credentials in data breaches/incidents and the importance of identity as the new perimeter. - Exploiting public facing applications and externally exposed remote services was a core focus on APT's - End of life software and unpatched systems were a key target - A lack of network segmentation and weaknesses in network topologies and tooling helped facilitate lateral movement - An insane 94.4% of assessed entities had DEFAULT passwords in place These along with many other key takeaways are in the report, which is well organized and actionable. Check it out! šŸ‘‡ #cyber #ciso #zerotrust

  • View profile for Tony Ridley, MSc CSyP FSyI SRMCP

    Group Manager – Risk, Resilience, Insurance & Internal Audit | Chartered Security Professional (CSyP) | PhD Candidate | Strategic Risk & Resilience Leader | Critical Infrastructure

    44,647 followers

    #RiskManagement #Security "The Vulnerability Assessment & Mitigation (VAM) methodology takes a top-down approach and seeks to uncover not only vulnerabilities that are known and exploited or revealed today but also the vulnerabilities that exist yet have not been exploited or encountered during operation. Thus, the methodology helps to protect against future threats or system failures while mitigating current and past threats and weaknesses. Also, sophisticated adversaries are always searching for new ways to attack unprotected resources (the ā€œsoft underbellyā€ of the information systems). Thus, the methodology can be valuable as a way to hedge and balance both current and future threats. Also, the complexity of information systems and their increasing integration with organizational functions requires additional considerations to ensure that design or architectural weaknesses are mitigated. " "An ā€œobjectā€ is any part of the system that contributes to the function, execution, or management of the system. The partitioning of information system components into conceptual ā€œobjectsā€ facilitates the consideration of components that can otherwise be neglected in security assessments (i.e., security breaches can arise from weaknesses in physical security, human limits and behavior, social engineering, or compromised infrastructure in addition to the more publicized compromises, such as network attacks). It also allows the separation of vulnerability attributes from the system component that may have that attribute. " (p.xv) "MAPPING SECURITY NEEDS TO CRITICAL ORGANIZATIONAL FUNCTIONS The methodology employs the following six steps: 1. Identify your organization’s essential information functions. 2. Identify essential information systems that implement these functions. 3. Identify vulnerabilities of these systems. 4. Identify pertinent security techniques to mitigate these vulnerabilities. 5. Select and apply techniques based on constraints, costs, and benefits. 6. Test for robustness and actual feasibilities under threat. Repeat steps 3–6 as needed. " (p.xvi) Anton, P. S., Anderson, R. H., Mesic, R., & Scheiern, M. (2004). Finding and fixing vulnerabilities in information systems: the vulnerability assessment and mitigation methodology. Rand Corporation._p.xvii #risk #risks #enterpriserisk #enterprisesecurityriskmanagement #intelligence #threatlintelligence #riskmanagement #riskanalysis #riskassessment #riskmanagementframework #operationalriskmanagement #projectriskmanagement #projectrisk #operationalresilience #resilience #operationalrisk #riskintelligence #governance #security #securityriskmanagement #securitymanagement #securityrisks #enterprisesecurity #cybersecurity #physicalsecurity #informationsecurity #digitalsecurity #securityoperations #enterprisesecurityriskmanagement #securityassessment #intelligence #threatlintelligence #risk #riskmanagement #safety #safetyfirst #safetymanagement #safetyassessment #safetyrisks

Explore categories