Just Do it
What are the 3 main types of Decision Criteria?
What are Technical, Economic, Relationship?
How much was the largest Darktrace deal to date?
What is $15M?
Which communication channel is most used in phishing attempts?
What is Email?
The name of the Grinch's dog.
Who is Max?
Taste the Rainbow
What is Skittles?
Who created MEDDICC?
Who is Dick Dunkel?
Which one of our founding Members at Darktrace previously worked for UK governments cyber defense effort? Hint: He also has a history degree from Durham University
Who is Nick Trim?
This framework is often used to map the stages of an attack.
What is the MITRE ATT&CK Framework?
Finish this quote from Elf: “I planned out our whole day. First we make snow angels for two hours, and then we’ll go ice skating, and then we’ll eat a whole roll of Tollhouse Cookie Dough as fast as we can, and then to finish, ............. ” – Buddy
Have it your way
What is Burger King?
What should you do if your prospect does not have a clear Decision Criteria?
What is "Help them build it!"?
Who was Darktraces first customer?
What is Drax?
This type of email attack is very targeted with the intent of using social engineering to trick a user into clicking on a malicious payload.
What is spear phishing?
What are the names of Ethan's cats?
Who is Juniper and Jameson/Jamie?
Think outside the bun
What is Taco Bell?
When should you identify pain?
What is *TRICK question!* While you should identify pain in your first call, discovery of pain should continue throughout the entire process with every new person you speak to?
Darktrace won an award at the 2022 US Homeland Security Awards. What was the name of that award?
What is 'Best Cyber Critical Infrastructure Solution’?
The use of IT-related hardware or software by a department or individual without the knowledge of the IT or security group within the organization
What is Shadow IT?
The country where KFC is a popular Christmas meal.
What is Japan?
It keeps going and going and going
What is Energizer?
What are the four types of Competition?
What are...?
1. Rival solutions
2. Other projects (fighting for the same $)
3. Internal (doing it themselves)
4. Interia (doing nothing)
What AI does PREVENT/ASM rely most heavily on to tackle the most ambiguous and error-prone assets encountered?
What is "natural language processing and image classification algorithms"?
An attack that is designed to hinder or stop the normal functioning of a website, server, or other network resource.
What is DoS Attack (Denial of Service)?
There's only one Blockbuster still operating in the U.S.- where is it?
What is Bend, Oregon?