MFA
EDR
PAM
Fusion
Meet the Team
100

Something you know, something you have, and this third “something” are considered the three acceptable methods of Multifactor authentication

What is “something you are”?

100

The "M" in MDR, just hope it's not Michael Scott's not in charge..

What is Managed?

100

What percentage of advanced cyber attacks rely on the exploitation of privileged credentials?

What is 100%? (+/- 2%)

100

Don't sleep on this cyber Fusion endorsement, which is designed to address both Patching and End of Life vulnerabilities.

What is the Neglected Software endorsement?

100

This is the number of Temple grads on the Mid-Atlantic team.

What is 5.

200

Like most good things, MFA requires this minimum number of authentication methods?

What is "two" methods? (but there can be more)

200

Laptops, Phones, Tablets, and these 2 other things are considered examples of endpoints

What are desktops/servers/workstations/IoT Devices?

200

This level of privilege is typically required for downloading applications onto a workstation/desktop.

What are Local Admin rights?

200

Largely the inspiration for our Fusion concepts, this type of interconnected exposure is what keeps carriers (and reinsurers) up at night.

What is Systemic Risk?

200

Cut from the same cloth... These two team members started their careers in recruiting

Who are Lily and Chris D?

300

HIPAA and this other regulatory standard requires MFA for certification and compliance.

What is PCI DSS?

300

Abbreviated as EPP, this suit of technologies typically includes antivirus, data encryption, intrusion prevention, and data loss prevention 

What is an "Endpoint Protection Platform"?

300

A successful ransomware attack, likely involves both Vertical elevation of privileges, as well as, this other type of movement throughout the network? 

What is Lateral/Horizontal Escalation/movement?

300

In this circumstance, SolarWinds would be considered considered a Limited Impact Event?

(Promise this isn't a trick question)

If SolarWinds was our insured?

300

Aloha! This team member was born in Hawaii. (Bonus point if you can name the Island)

Who is Adrienne. (Bonus point for Maui)

400

While once considered secure, this authentication method is no longer sufficient on it’s own due to bad actors’ ability to “phish” for this information.

What is something you know? (passwords also acceptable)

400

Though not the traditional John Hancock, this type of detection is to EPP, as “Heuristic-based” detection is to EDR.

What is Signature-base?

400

Commonly referred to as "the keys to the kingdom," these are the most highly protected assets because of their "god-like" capabilities.

What are Domain Admins/Accounts/Controllers?

400

This carveback is widely used by most carriers with respect to War; however, we've eliminated this in our new General Amendatory War Exclusion language.

What is the Cyber Terrorism carveback?

400

These 3 team members have September birthdays, all within a few days of each other.

Who are Adrienne, CJ and Kelly.

500

This percentage of targeted attacks are prevented through utilization of MFA.

What is 90% (+/- 5%)?

100% of automated bots, 99% of bulk phishing attacks and 90% of targeted attacks

500

Averaging 56 days, EDR helps cut down on this concept... the length of time a bad guys lingers inside a network undetected.

What is dwell time?

500

These are 3 compensating controls we may look for in lieu of a traditional PAM tool.

What are MFA, EDR, Vaulting/SSO Solution, Least Privileged Access, IDS/IPS..?

500

Though a mop might not get the job done.. This Widespread carveback affords coverage under insuring agreements  A & E, in the event an incident impacts a third party, which the insured has contracted to maintain data. 

What is the Custodian Breach carveback?

500

A musical prodigy - this team member plays the harmonica.

Chris K.

M
e
n
u