Jeffrey Crump

Jeffrey Crump

CISSP, C2MP2, PMP, CSMAZ, US
Reduce cyber risk and increase organizational resilience through innovative, diverse, and enriching educational and awareness programs.

Mr. Crump is the author of Cyber Crisis Management Planning: How to reduce cyber risk and increase organizational resilience. He is also the course author for the Cyber Crisis Management cerification series including: Cyber Crisis Management Planning Professional, Cyber Crisis Management Exercise Professional, and Cyber Crisis Management Leadership Professional.

Mr. Crump has led business/security-aligned initiatives to fundamentally transform how cyber risk is identified, managed, and achieved including:

  • Led the development and validation of cyber crisis management plans for entities in the United States, China, Canada, Mexico, Russia, and India
  • Led the development of information technology and information security policies and standards for the American Express joint venture in China
  • Led multiple core security capability program workstreams (internationally) for Deloitte & Touche to develop strategically aligned shared cyber risk services to meet five-year global revenue goals
  • Led multiple capability gap analyses and resulting strategic roadmaps, the most current being the assessment of and resulting optimized supply chain security program for Intel, including sub-fab industrial control systems

PUBLISHED WORKS:

  • Book author of Cyber Crisis Management Planning: How to reduce cyber risk and increase organizational resilience available for sale on Amazon
  • Article author of How China, Iran, and Russia Have, Are, and Will Attack the US, published on Medium
  • Authored a three-part article series on Cyber Threat Actor Cultural and Psychological Factors
  • Article author of Myers-Briggs Type Indicator for Cybercriminal Psychology Offender Profiling
  • On-going series author of Doxxing the Puppet, which describes my personal account of using open-source intelligence to (possibly) identify one the world's most wanted hackers, Phineas Fisher
  • Article author on security awareness for Human Resources Magazine, the print and online publication from the Hong Kong Institute of Human Resource Management (HKIHRM)
  • Article author of Creating leaders on the cyber battlefield for the print and online publication, Crisis Response Journal

Mr. Crump is the author of Cyber Crisis Management Planning: How to reduce cyber risk and increase organizational resilience. He is also the course author for the Cyber Crisis Management cerification series including: Cyber Crisis Management Planning Professional, Cyber Crisis Management Exercise Professional, and Cyber Crisis Management Leadership Professional.

Mr. Crump has led business/security-aligned initiatives to fundamentally transform how cyber risk is identified, managed, and achieved including:

  • Led the development and validation of cyber crisis management plans for entities in the United States, China, Canada, Mexico, Russia, and India
  • Led the development of information technology and information security policies and standards for the American Express joint venture in China
  • Led multiple core security capability program workstreams (internationally) for Deloitte & Touche to develop strategically aligned shared cyber risk services to meet five-year global revenue goals
  • Led multiple capability gap analyses and resulting strategic roadmaps, the most current being the assessment of and resulting optimized supply chain security program for Intel, including sub-fab industrial control systems

PUBLISHED WORKS:

  • Book author of Cyber Crisis Management Planning: How to reduce cyber risk and increase organizational resilience available for sale on Amazon
  • Article author of How China, Iran, and Russia Have, Are, and Will Attack the US, published on Medium
  • Authored a three-part article series on Cyber Threat Actor Cultural and Psychological Factors
  • Article author of Myers-Briggs Type Indicator for Cybercriminal Psychology Offender Profiling
  • On-going series author of Doxxing the Puppet, which describes my personal account of using open-source intelligence to (possibly) identify one the world's most wanted hackers, Phineas Fisher
  • Article author on security awareness for Human Resources Magazine, the print and online publication from the Hong Kong Institute of Human Resource Management (HKIHRM)
  • Article author of Creating leaders on the cyber battlefield for the print and online publication, Crisis Response Journal

Cyber Crisis Leadership

Traditional schools of management have ill-prepared today's leaders for non-routine situations leaving them to rely on routine approaches to navigate uncharted territory, take on new tasks, and face unprecedented cyber security and operational risks and challenges.

With leadership credibility on the line, it's imperative to understand how to re-frame thinking to identify missing information, perspectives, and bias.

In this session, we will learn how to rebuild our fast-acting...

Cyber SecurityEducational / Informative

Cybercriminal Psychology: An exploration into the minds of the internet's most notorious threats

This program brings to the surface the unique psychological aspects of some the other internet's most notorious threat actors. It explores a sampling of recent and historical cybercrime cases to help the audience better understand how our online enemies think.

This program is designed to be both informative and intriguing.
Cyber SecurityEducational / InformativeTechnical / Specific

Cyber Security: Executive Series

These sessions are designed to introduce managers, senior managers and executives to the most relevant cybersecurity topics to ensure they have the knowledge to make more informed decisions and better manage business risk.

  • EXEC100 Introduction to Cybersecurity - Foundational Concepts

  • EXEC101 Introduction to Cybersecurity - Security Awareness

  • EXEC102 Introduction to Cybersecurity - Social Engineering

  • EXEC103...

Educational / InformativeTechnical / Specific

Finding Phineas: Using open source intelligence to track down one of the world's most wanted hackers

This session covers the steps I took to use open source intelligence to possibly identify one of the world's most wanted hackers, Phineas Fisher.  This session includes reviews of actual artifacts and the correlation of data used during this investigation.
Cyber SecurityEducational / InformativeTechnical / SpecificInspirational / Life-changing

Executive Introduction to the CMMC

The purpose of this session is to provide an audience-aligned introduction to the new Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC).

I am provisional Certified CMMC Assessor and a provisional Certified CMMC Instructor.

This live session is based on a training video of the same name.  Feel free to view the video on the home page of our CMMC Training Academy (https://CMMCTraining.Academy).
Cyber SecurityEducational / InformativeTechnical / Specific