RCC
Information Security
Social Engineering
Acronyms
Management Committee
100

The tool that centralized many RCC team processes.

What is OneTrust?

100

A new initiative designed to leverage our expertise in building security and resilience for our clients.

What is Resiliency as a Service (RaaS)?

100

What term describes fraudulent emails designed to trick recipients into clicking links or sharing data?

What is Phishing

100

NIST

What is National Institute of Standards & Technology


100

What MC member does our Chief Resiliency Officer roll up to?

What is Randy Jensen

200

Employees in an organization who do not have risk management as a primary role, but rather, have the responsibility of supporting their own department or divisions with developing and reporting risks.

Who is a Risk Champion?

200

This security measure requires users to verify their identity using multiple factors, such as a password and a fingerprint, before accessing sensitive systems.

What is multi-factor authentication?

200

Someone asking to "hold the door" to secure a buidling may be attempting this.

What is tailgating

200

HMDA

What is Home Mortgage Disclosure Act

200

What MC member is a big Michigan fan?

What is Ernie Katai


300

This strategic plan ensures that an organization can continue to operate during and after a disaster or unexpected event, minimizing disruption and maintaining essential functions.

What is a Business Continuity Plan?

300

This type of security attack targets specific individuals or organizations by using personalized information to make fraudulent messages appear legitimate.

What is spear phishing?

300

What control reduces damage if credentials are compromised.

What is multi-factor authentication (MFA)

300

RCSA

What is Risk & Control Self-Assessment

300

What MC member was recently named 2026 GlobeSt. Influencer in CRE technology?

What is Damu Bashyam

400

This fundamental activity involves examining financial records and operations to ensure accuracy, compliance, and efficiency within an organization.

What is an audit review?

400

This proactive security approach involves implementing measures to stop incidents before they occur and includes techniques such as security monitoring and threat intelligence to minimize the impact of cyberattacks.

What is Prevention in a Security Operations Center (SOC)?

400

An attacker takes on a persona through disguise or using information with identifiable features to represent themselves as someone they are not.

What is impersonation? 

400

OWASP

What is Open Worldwide Application Security Project? [Daily Double]

400

What two MC members attended the same program for their MBA?

What is Damu and Hilary


500

These two companies are known as Government-Sponsored Enterprises and were established in 1938 and 1970, respectively.

What are Fannie Mae and Freddie Mac?

500

This security approach involves integrating security measures early in the software development lifecycle to identify and address vulnerabilities before they become critical issues.

What is the Shift Left mentality?

500

What film is this scene from?

What is Hackers

500

GLANCE

What is Government list affiliated name check engine


500

Which MC member served as a Sergeant in the U.S. Air Force?

What is Phil Long

M
e
n
u