Tell Me More
Policy Principles
Truth Be Told
Let me Google that for you
Follow the Leader
100

🎧

Name your favorite band

100

Where do you go to find HMH Policies

PolicyStat

100

True-ly Yourself

State one fun fact about yourself

100

When did HMH transition to Google?

March 2021

100

Which leader owns a cat?

Melissa Lawlor 

200

🎣

Name one of your hobbies

200

What is the current policy (rule) for new password length and characters?

must be a minimum of twelve (12) characters in length and include three from the following four categories:

  • Upper case letter (A - Z)
  • Lower case letter (a - z)
  • Number (0 - 9)
  • Special Character ('-!"$%()*,./:;?@[]^_`{|}~+<=>)
200

Truth in Melody

What's your go-to karaoke song (even if you don't do karaoke)?

200

What is the name of the central hub where administrators manage Google Workspace?

The Google Admin Console

200

Which leader begins each Monday commenting on days until Friday?

Charles Parris 

300

🦸

Name your favorite superpower and why

300

What is the correct way to report phishing emails?

The PhishAlarm button

300

True North

What's one thing you're looking forward to in the next month/year?

300

What does GCP & SCC stand for?

Google Cloud Platform & Security Command Center

300

Which leader has twins?

Charlene Salas

400

πŸ–οΈ

Name your favorite travel destination

400

This core principle of Identity and Access Management ensures that users only have access to the information and resources necessary for their specific roles and responsibilities?

Principle of Least Privilege

400

Truths of the Trail

Describe the last adventure you went on

400

What tool do we use for IaC?

Terraform

400

Name all Cyber and IAM management and their titles 

Mark Johnson - CISO

Matt Sadler and Melissa Lawlor - Directors of Cyber

Chris Jurs - Director of IAM

Charlene Salas - Manger of IAM

Charles Parris - Manager of Vuln and Patch Mgmt

500

πŸ€”

Name your favorite holiday tradition

500

A key component of this policy is establishing a clear process for prioritizing remediation efforts based on factors like severity, exploitability, and business impact.

Vulnerability Management Policy

500

Culinary Truths

If you could only eat one food for the rest of your life, what would it be?

500

What is Kubernetes (GKE)?

Cluster/Container Management System

500

Who is the new interim CIO?

Deborah Gash