Compliance
General Security
SBG-S Leadership
Famous Breaches
100

A series of regulatory standards that outline the lawful use and disclosure of protected health information.

What is HIPPA?

100

The service runs on port 22.

What is SSH?

100

Favorite animal: Dogs, specifically mine 

Favorite cuisine: Breakfast Burritos 

Favorite hobby: Skiing 

Job before Cisco: Security Compliance Manager, Instructure 

Who is Kori Minckler?

100

This once popular search engine and news outlet accounts for the largest breaches in history affecting over 3 billion users in 2013.

What is Yahoo?

200

A methodology used to map the outcomes of a risk assessment process for proper handling.

What is a Risk Matrix?

200

In this encryption technique the same key would encrypt and decrypt data.

What is symmetric encryption?

200

Favorite animal: Mantis Shrimp 

Favorite cuisine: Thai 

Favorite hobby: Hanging out with the dog 

Job before Cisco: Engineer at Duo 

Who is Kyle Lady?

200

This credit bureau’s breach cost the company over $700 million dollars after personal information such as social security numbers and addresses were stolen in 2017.

What is Equifax?

300

a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.

What is Identity Access Management (IAM)?

300

Sqlmap, Aircrack-ng, Hydra, and Nmap are all tools that come pre-installed on this operating system.  

What is Kali Linux?

300

Favorite animal: Tiger 

Favorite cuisine: Pizza 

Favorite hobby: Photography 

Job before Cisco: Enterprise Security Architect 

Who is Robert Kerby?

300

This popular retail store had over 60 million customer’s credit card and other sensitive data stolen in a breach that cost the company over $30 million dollars in 2013.

What is Target?

400

a Japanese government system for assessing the security of cloud service providers to participate in public sector projects.

What is ISMAP?

400

A cryptographic algorithm used in some of the most popular authentication and encryption protocols, including SSL, TLS, IPsec, SSH, and PGP  .

What is SHA-256?

400

Favorite animal: Tiger 

Favorite cuisine: Japanese 

Favorite hobby: Spending time outdoors 

Job before Cisco: Security Consultant 

Who is Apoorva Phadke?

400

This once popular early 2000’s social media website had emails, usernames, and passwords of over 360 million users stolen by a Russian hacker in 2013.

What is Myspace?

M
e
n
u