This is is a cybersecurity solution that collects and analyzes security data (logs, events) from an organization's entire IT environment in real-time, providing centralized visibility to detect, investigate, and respond to threats, meet compliance, and gain insights into security posture.
SIEM or SEIM Security Information & Event Management system
CVE on release day? Don’t have a heart attack - get a container <BLANK>
What is Bypass?
The foundational documentation of any Security organization
"All good security begins with<Blank>"
What is Policy
This common attack involves an attacker sending fraudulent emails that appear to come from a reputable source, aiming to steal sensitive information.
What is Phishing?
This NFL team is headed to a wildcard Round after losing their last 4 games.
Who are the Greenbay Packers
During an incident, this analyst role records all important events such as who joined or left a call, or if containment was reached.
What is a Scribe
Security incident? Slow down eager beaver and check the <BLANK>
What are Logs?
While this architectural strategy is not strictly required for PCI compliance, it is highly recommended to reduce scope (and cost) of the audit.
What is Network Segmentation?
“P@ssword1” and “Winter2025!” are examples of this bad habit that makes it easy for attackers to guess your credentials.
What are Weak (or Common) Passwords?
<Blank> is a group of dolphins
What is a Pod?
What is a False Positive?
Used for tokenization and encryption - but not Amateur integrity.
What is Protegrity?
Even if encrypted, this 3 or 4 digit security code found on the back of a credit card must never be stored after authorization is complete.
What is the CVV/CVC?
This polite but dangerous behavior involves holding a secure open for a stranger behind your, allowing them unauthorized entry.
What is Tailgating (or Piggybacking)?
fruit can you dry to make prunes
What are Plums?
This Policy gives guidance to what users are allowed to do with their technology resources.
HR Policy 607
Common Vulnerabilities and <BLANK> or CV<blank>
What are Exposures, or E?
In PCI DSS 4.0, this authentication method is now strictly required for all access into the Cardholder Data Environment, not just for remote access or administrators.
What is MFA (Multi-Factor Authentication)?
This encrypted “tunnel” software allows remote workers to security access the corporate network from home or public location.
What is a VPN (Virtual Private Network)?
A sloop, yawl, ketch and a schooner are all types of these…
What are Boats?
This file will give you the opportunity to review a user's browser activity in both Chrome, and Edge browsers.
What is the history.db file
<Blank> on Security
This term describes the gradual accumulation of access rights beyond what a user needs, often happening as they move between roles over the years.
What is Access Creep (or Privilege Creep)?
While firewalls and antivirus software are important, security experts agree that this is the single most effective defense against social engineering attacks
What is a “Human Firewall” (or Security Awareness)?
The Great Lakes form part of our border with Canada. Name all five of them.
What are Huron, Ontario, Michigan Erie and Superior?