Something you know, something you have, and this third “something” are considered the three acceptable methods of Multifactor authentication
What is “something you are”?
The "M" in MDR, just hope it's not Michael Scott's not in charge..
What is Managed?
What percentage of advanced cyber attacks rely on the exploitation of privileged credentials?
What is 100%? (+/- 2%)
Don't sleep on this cyber Fusion endorsement, which is designed to address both Patching and End of Life vulnerabilities.
What is the Neglected Software endorsement?
This is the number of Temple grads on the Mid-Atlantic team.
What is 5.
Like most good things, MFA requires this minimum number of authentication methods?
What is "two" methods? (but there can be more)
Laptops, Phones, Tablets, and these 2 other things are considered examples of endpoints
What are desktops/servers/workstations/IoT Devices?
This level of privilege is typically required for downloading applications onto a workstation/desktop.
What are Local Admin rights?
Largely the inspiration for our Fusion concepts, this type of interconnected exposure is what keeps carriers (and reinsurers) up at night.
What is Systemic Risk?
Cut from the same cloth... These two team members started their careers in recruiting
Who are Lily and Chris D?
HIPAA and this other regulatory standard requires MFA for certification and compliance.
What is PCI DSS?
Abbreviated as EPP, this suit of technologies typically includes antivirus, data encryption, intrusion prevention, and data loss prevention
What is an "Endpoint Protection Platform"?
A successful ransomware attack, likely involves both Vertical elevation of privileges, as well as, this other type of movement throughout the network?
What is Lateral/Horizontal Escalation/movement?
In this circumstance, SolarWinds would be considered considered a Limited Impact Event?
(Promise this isn't a trick question)
If SolarWinds was our insured?
Aloha! This team member was born in Hawaii. (Bonus point if you can name the Island)
Who is Adrienne. (Bonus point for Maui)
While once considered secure, this authentication method is no longer sufficient on it’s own due to bad actors’ ability to “phish” for this information.
What is something you know? (passwords also acceptable)
Though not the traditional John Hancock, this type of detection is to EPP, as “Heuristic-based” detection is to EDR.
What is Signature-base?
Commonly referred to as "the keys to the kingdom," these are the most highly protected assets because of their "god-like" capabilities.
What are Domain Admins/Accounts/Controllers?
This carveback is widely used by most carriers with respect to War; however, we've eliminated this in our new General Amendatory War Exclusion language.
What is the Cyber Terrorism carveback?
These 3 team members have September birthdays, all within a few days of each other.
Who are Adrienne, CJ and Kelly.
This percentage of targeted attacks are prevented through utilization of MFA.
What is 90% (+/- 5%)?
100% of automated bots, 99% of bulk phishing attacks and 90% of targeted attacks
Averaging 56 days, EDR helps cut down on this concept... the length of time a bad guys lingers inside a network undetected.
What is dwell time?
These are 3 compensating controls we may look for in lieu of a traditional PAM tool.
What are MFA, EDR, Vaulting/SSO Solution, Least Privileged Access, IDS/IPS..?
Though a mop might not get the job done.. This Widespread carveback affords coverage under insuring agreements A & E, in the event an incident impacts a third party, which the insured has contracted to maintain data.
What is the Custodian Breach carveback?
A musical prodigy - this team member plays the harmonica.
Chris K.