What does cybersecurity help protect in a pension system?
Member and financial data
What type of attacks are becoming more common for public pension systems?
Cyberattacks
What’s the first thing to do when a breach occurs?
Follow the incident response plan
What’s one of the biggest risks inside an organization?
Human error or insider threats
What type of insurance helps protect organizations after a cyberattack?
Cyber insurance
Who gave the welcome remarks on Day 2?
Hank Kim, NCPERS
True or False: Trustees play a role in identifying and reducing cyber risks.
True
What’s one goal of incident response?
To limit damage and restore security
What is social engineering?
Tricking people into revealing information
Who moderated the session on Cyber Insurance & Vendor Requirements?
Laurie Mitchell, Tegrit
True or False: Cybersecurity is only the IT department’s job.
False— trustees share responsibility
Name one of the speakers who discussed board responsibilities in cybersecurity.
Michael Stoyanovich (Segal) or Paul LaClair (Linea)
True or False: It’s fine not to tell members if their data was compromised.
False
Who led the session on human risk factors?
Doug Hislop, Soteria
Why might trustees ask vendors to carry cyber insurance?
To protect both sides if a breach happens
Who led the session on ‘Cybersecurity Fundamentals’?
Peter Dewar, Linea
What should trustees make sure is regularly reviewed — policies, technology, or both?
Both
Who were the speakers for the Incident Response session?
Jeffrey Mills and Michael Stoyanovich, Segal
What can help prevent phishing attacks?
Employee training or strong passwords
What did trustees do in the Cybersecurity Challenge & Phishing Simulation?
Responded to a mock cyber incident
Why is cybersecurity important for trustees to understand?
It’s part of their fiduciary duty to protect data.
What’s one example of sensitive information a pension system must protect?
Member data or financial records.
What are the three main phases of incident response mentioned in the agenda?
Detection, mitigation, and communication
Who discussed real-time threat detection using AI?
Jean Carlo Oviedo, ABL Technologies
Who facilitated the Cybersecurity Challenge?
Jessica Ransome, NCPERS