I'm a fencing champion.
Menna Elagizy
The King's birthday is celebrated throughout which country on the 27th of April?
Netherlands
True or False: Cybersecurity is IT's responsibility.
False. It is everybody's responsibility.
Where can you find the malleus bone?
Ear (also known as hammer)
Name our current CEO.
Jim Chilton
I did A LOT of breakdancing when I was younger.
Mahdi Abdulhamid
What substance flooded the streets of Boston in 1919?
Molasses (Great Molasses Flood)
Ctrl, Alt, Delete
Windows, L
Control, Command, Q
Command, option, power
Limnology is the study of what?
Fresh water environments
Name our podcast.
CyberWork
As a hockey fan, my favorite hockey team is the Montreal Canadiens.
Lisa Breton
This notable building in Chicago was named after a founding father.
John Hancock Tower
What is the method of access control by which users must present multiple, separate pieces of identification, such as a password and keycard, in order to access a system?
Multifactor Authentication (MFA)
A chesterfield is a lesser known term for this type of furniture.
Name the simulator that we have in InfosecIQ that sends out simulated phony emails.
PhishNotify, PhishSim
I played football/soccer at university.
Victoria Gustitis
I have lived in 8 countries.
Nate Bernolet
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Ex, could be spearfishing, baiting, tailgating, quid pro quo.
Social Engineering
July 1st
We have a partnership with this company that allows us to have animated, gamified content. (hint: old school books)
Choose Your Own Adventure
I once used to be an MC and performed in huge venues.
Shiraz Qureshi
The building that houses our Chicago office was built in 1930 in Art Deco style. The building is a National Historic Landmark. Name the building.
Chicago Board of Trade (CBOT)
This role/job is responsible for planning and performing authorized, simulated attacks within an organization’s information systems, networks, applications and infrastructure to identify vulnerabilities and weaknesses.
Penetration tester or ethical hacker
What film won Best Picture in 2009? (Hint: WWTBAM)
Slumdog Millionaire
What's the name of our annual user conference?
Infosec Inspire