π§
Name your favorite band
Where do you go to find HMH Policies
PolicyStat
True-ly Yourself
State one fun fact about yourself
When did HMH transition to Google?
March 2021
Which leader owns a cat?
Melissa Lawlor
π£
Name one of your hobbies
What is the current policy (rule) for new password length and characters?
must be a minimum of twelve (12) characters in length and include three from the following four categories:
Truth in Melody
What's your go-to karaoke song (even if you don't do karaoke)?
What is the name of the central hub where administrators manage Google Workspace?
The Google Admin Console
Which leader begins each Monday commenting on days until Friday?
Charles Parris
π¦Έ
Name your favorite superpower and why
What is the correct way to report phishing emails?
The PhishAlarm button
True North
What's one thing you're looking forward to in the next month/year?
What does GCP & SCC stand for?
Google Cloud Platform & Security Command Center
Which leader has twins?
Charlene Salas
ποΈ
Name your favorite travel destination
This core principle of Identity and Access Management ensures that users only have access to the information and resources necessary for their specific roles and responsibilities?
Principle of Least Privilege
Truths of the Trail
Describe the last adventure you went on
What tool do we use for IaC?
Terraform
Name all Cyber and IAM management and their titles
Mark Johnson - CISO
Matt Sadler and Melissa Lawlor - Directors of Cyber
Chris Jurs - Director of IAM
Charlene Salas - Manger of IAM
Charles Parris - Manager of Vuln and Patch Mgmt
π€
Name your favorite holiday tradition
A key component of this policy is establishing a clear process for prioritizing remediation efforts based on factors like severity, exploitability, and business impact.
Vulnerability Management Policy
Culinary Truths
If you could only eat one food for the rest of your life, what would it be?
What is Kubernetes (GKE)?
Cluster/Container Management System
Who is the new interim CIO?
Deborah Gash