Something you know, something you have, and this third “something” are considered the three acceptable methods of Multifactor authentication
What is “something you are”?
The "M" in MDR, just hope it's not Michael Scott doing it...
What is Managed?
What percentage of ADVANCED cyber attacks rely on the exploitation of privileged credentials?
What is 100%? (+/- 2%)
Don't sleep on this cyber Fusion endorsement, which is designed to address both Patching and End of Life vulnerabilities.
What is the Neglected Software endorsement?
Eventually finding the light, this individual first dabbled on the dark side, working previously at a brokerage
Who is Casey Cameron?
Like most good things, MFA requires this minimum number of authentication methods?
What is "two" methods? (but there can be more)
Laptops, Phones, Tablets, are considered examples of endpoints, name 2 others.
What are desktops/servers/workstations/IoT Devices?
This level of privilege is typically required for downloading applications onto a workstation/desktop.
What are Local Admin rights?
Largely the inspiration for our Fusion concepts, this type of interconnected exposure is what keeps carriers (and reinsurers) up at night.
What is Systemic Risk?
This individual recruited one of our team members and joined the team shortly after.
(bonus if you can guess who was recruited)
Who is Eric?
HIPAA and this other regulatory standard requires MFA for certification and compliance.
What is PCI DSS?
Abbreviated as EPP, this suit of technologies typically includes antivirus, data encryption, intrusion prevention, and data loss prevention
What is an "Endpoint Protection Platform"?
A successful ransomware attack, likely involves both Vertical elevation of privileges, as well as, this other type of movement throughout the network?
What is Lateral/Horizontal Escalation/movement?
In this circumstance, SolarWinds would be considered considered a Limited Impact Event?
(Promise this isn't a trick question)
If SolarWinds was our insured?
These 7 team members became apart of the team (aka REGION OF THE YEAR!!) during the pandemic.
(need to name all 7)
Who is Will, Colin B, Collin P, Erin, Eric, Brenden, and Brooke?
While once considered secure, this authentication method is no longer sufficient on it’s own due to bad actors’ ability to “phish” for this information.
What is something you know? (passwords also acceptable)
Though not the traditional John Hancock, this type of detection is to EPP, as “Heuristic-based” detection is to EDR.
What is Signature-base?
Commonly referred to as "the keys to the kingdom," these are the most highly protected assets because of their "god-like" capabilities.
What are Domain Admins/Accounts/Controllers?
This carveback is widely used by most carriers with respect to War; however, we've eliminated this in our new General Amendatory War Exclusion language.
What is the Cyber Terrorism carveback?
Though the insurance industry might not be known for its fashion sense, this team member once received a superlative for best dressed.
Who is Ryan Kelleher?
This percentage of targeted attacks are prevented through utilization of MFA.
What is 90% (+/- 5%)?
100% of automated bots, 99% of bulk phishing attacks and 90% of targeted attacks
Averaging 56 days, EDR helps cut down on this concept... the length of time a bad guys lingers inside a network undetected.
What is dwell time?
These are 3 compensating controls we may look for in lieu of a traditional PAM tool.
What are MFA, EDR, Vaulting/SSO Solution, Least Privileged Access, IDS/IPS..?
Though a mop might not get the job done.. This Widespread carveback affords coverage under insuring agreements A & E, in the event an incident impacts a third party, which the insured has contracted to maintain data.
What is the Custodian Breach carveback?
This team member once went to nationals for one of the most intense sports out there ...... badminton.
Who is Sarah Campbell?
(she did even better in provincials)