The tool that centralized many RCC team processes.
What is OneTrust?
A new initiative designed to leverage our expertise in building security and resilience for our clients.
What is Resiliency as a Service (RaaS)?
What term describes fraudulent emails designed to trick recipients into clicking links or sharing data?
What is Phishing
NIST
What is National Institute of Standards & Technology
What MC member does our Chief Resiliency Officer roll up to?
What is Randy Jensen
Employees in an organization who do not have risk management as a primary role, but rather, have the responsibility of supporting their own department or divisions with developing and reporting risks.
Who is a Risk Champion?
This security measure requires users to verify their identity using multiple factors, such as a password and a fingerprint, before accessing sensitive systems.
What is multi-factor authentication?
Someone asking to "hold the door" to secure a buidling may be attempting this.
What is tailgating
HMDA
What is Home Mortgage Disclosure Act
What MC member is a big Michigan fan?
What is Ernie Katai
This strategic plan ensures that an organization can continue to operate during and after a disaster or unexpected event, minimizing disruption and maintaining essential functions.
What is a Business Continuity Plan?
This type of security attack targets specific individuals or organizations by using personalized information to make fraudulent messages appear legitimate.
What is spear phishing?
What control reduces damage if credentials are compromised.
What is multi-factor authentication (MFA)
RCSA
What is Risk & Control Self-Assessment
What MC member was recently named 2026 GlobeSt. Influencer in CRE technology?
What is Damu Bashyam
This fundamental activity involves examining financial records and operations to ensure accuracy, compliance, and efficiency within an organization.
What is an audit review?
This proactive security approach involves implementing measures to stop incidents before they occur and includes techniques such as security monitoring and threat intelligence to minimize the impact of cyberattacks.
What is Prevention in a Security Operations Center (SOC)?
An attacker takes on a persona through disguise or using information with identifiable features to represent themselves as someone they are not.
What is impersonation?
OWASP
What is Open Worldwide Application Security Project? [Daily Double]
What two MC members attended the same program for their MBA?
What is Damu and Hilary
These two companies are known as Government-Sponsored Enterprises and were established in 1938 and 1970, respectively.
What are Fannie Mae and Freddie Mac?
This security approach involves integrating security measures early in the software development lifecycle to identify and address vulnerabilities before they become critical issues.
What is the Shift Left mentality?
What film is this scene from?
What is Hackers
GLANCE
What is Government list affiliated name check engine
Which MC member served as a Sergeant in the U.S. Air Force?
What is Phil Long