ISMR
Security Tools & Engineering
Governance, Risk & Compliance
Security Awareness
PotPourri
100

This is is a cybersecurity solution that collects and analyzes security data (logs, events) from an organization's entire IT environment in real-time, providing centralized visibility to detect, investigate, and respond to threats, meet compliance, and gain insights into security posture. 

SIEM or SEIM Security Information & Event Management system

100

CVE on release day? Don’t have a heart attack - get a container <BLANK>

What is Bypass?

100

The foundational documentation of any Security organization

"All good security begins with<Blank>"

What is Policy

100

This common attack involves an attacker sending fraudulent emails that appear to come from a reputable source, aiming to steal sensitive information.

What is Phishing?

100

This NFL team is headed to a wildcard Round after losing their last 4 games.

Who are the Greenbay Packers

200

During an incident, this analyst role records all important events such as who joined or left a call, or if containment was reached. 

What is a Scribe

200

Security incident?  Slow down eager beaver and check the <BLANK>

What are Logs?

200

While this architectural strategy is not strictly required for PCI compliance, it is highly recommended to reduce scope (and cost) of the audit.

What is Network Segmentation?

200

“P@ssword1” and “Winter2025!” are examples of this bad habit that makes it easy for attackers to guess your credentials.

What are Weak (or Common) Passwords?

200

<Blank> is a group of dolphins

What is a Pod?

300
When an event fires, but it was either expected behavior, or the result of benign activity. 

What is a False Positive?

300

Used for tokenization and encryption - but not Amateur integrity.

What is Protegrity?

300

Even if encrypted, this 3 or 4 digit security code found on the back of a credit card must never be stored after authorization is complete.

What is the CVV/CVC?

300

This polite but dangerous behavior involves holding a secure open for a stranger behind your, allowing them unauthorized entry.

What is Tailgating (or Piggybacking)?

300

fruit can you dry to make prunes

What are Plums?

400

This Policy gives guidance to what users are allowed to do with their technology resources.

HR Policy 607

400

Common Vulnerabilities and <BLANK> or CV<blank>

What are Exposures, or E?

400

In PCI DSS 4.0, this authentication method is now strictly required for all access into the Cardholder Data Environment, not just for remote access or administrators.

What is MFA (Multi-Factor Authentication)?

400

This encrypted “tunnel” software allows remote workers to security access the corporate network from home or public location.

What is a VPN (Virtual Private Network)?

400

A sloop, yawl, ketch and a schooner are all types of these…

What are Boats?

500

This file will give you the opportunity to review a user's browser activity in both Chrome, and Edge browsers. 

What is the history.db file

500

<Blank> on Security

Who is Krebs or Schneier
500

This term describes the gradual accumulation of access rights beyond what a user needs, often happening as they move between roles over the years.

What is Access Creep (or Privilege Creep)?

500

While firewalls and antivirus software are important, security experts agree that this is the single most effective defense against social engineering attacks

What is a “Human Firewall” (or Security Awareness)?

500

The Great Lakes form part of our border with Canada. Name all five of them.

What are Huron, Ontario, Michigan Erie and Superior?

M
e
n
u