Big Picture
Think Cybersecurity
Social Engineering
Financial Theft
AI: For Better or Worse
100

Third largest economy behind the US and China

What is, if cyber damagers were a nation?
100

Think of cybersecurity as a BLANK to a goal

What is a JOURNEY?

100

The psychological manipulation of people into performing actions or divulging confidential information they normally would not do.

What is Social Engineering?

100

This trojan steals banking credentials

What is Zeus?

100

Cools things AI can do

What is 

Plan Workouts & Meals
Write an email or wedding speech
Generate arguments for or against something
Appeal an insurance denial
Excel formulas
Learn a new language
Create an app with no coding experience
Build new games
Make a music playlist

200
CISA

What is the Cybersecurity and Infrastructure Agency?

200

_____ has a focus on infrastructure, systems, configurations, deployment of new hardware or cloud services

What is IT or TDI? 

200

In 2023, this casino/hotel lost over $100 Million dollars and experienced over 10 days of down time

Who is MGM?

200

Security concept in which a user is given the minimum levels of access – or permissions – needed to perform his/her job functions

What is least privileged access?

200

This type of risk: deep fakes

What is misinformation or manipulation?

300

Leading cause of cyber failure that you have influence over

What are Insider Threats?

300

______ focuses on the risks around the infrastructure, systems, and data.

What is Security?

300

Type of attack that involves the phone (voice)

What is vishing?

300

Electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism.

What is multi-factor authentication or MFA?

300

When AI makes up data that does not exist

What is hallucinations or AI hallucinations?

400

Colorado company that went under due to a ransomware attack

What is Colorado Timberline?

400

IT/TDI works to:

What is deploy firewalls or install AV software or configure network, or configure cloud solutions or install hardware?

400

Type of attack that involves texting

What is smishing?

400

Software we utilize for endpoint protection to stop malicious code

What is Crowdstrike?

400

An exploit or attack on a vulnerability that is unknown

What is zero-day attack or zero-day exploit?

500

The three companies that were not the target but were affected by NotPetya, costing billions of dollars.

Who are FedEx, Merck and Marsk?

500

Cybersecurity works to:

What is hunt and detect threats, respond to threats and malicious activity, compliance, pentest and risk audits, develop incident response plans?

500

Fear, urgency, curiosity, desire to help, distraction

What are tactics used by social engineering?

500

A cyberattack technique whereby adversaries assume the digital identity of a trusted persona in an attempt to trick employees or customers into taking a desired action, such as making a payment or purchase, sharing data or divulging sensitive information.

What is business email compromise or BEC?

500

This film, starring Will Smith, is a technophobic cop who investigates a crime that may have been perpetrated by a robot, which leads to a larger threat to humanity.

What is I, Robot?