Left of Boom
What's up CIS?
Typical Day in Managed Services
vCIO & AM Power Moves
Know Your Terms & Acronyms
100

The training we wished every user took seriously so they would just stop clicking those links in emails.

What is Cyber or Security Awareness Training?

100

The very first control. CIS 1.1: Establish and Maintain a Detailed Enterprise __________.

What is Asset Inventory?

100

The magical act of writing stuff down so teammates and new hires in IT are not in the dark.

What is Documentation and/or SOPs?

100

The meeting with a customer that confirms... "Here's why you still pay us." :)

What is the QBR - Quarterly Business Review?

100

Requiring two forms of verification to access an account or system.

What is MFA - Multi-factor Authentication?

200

The control you hope is in place on a laptop to protect PII data when a user reports that their laptop is stolen.

What is endpoint encryption?

(Bitlocker, FileVault, etc.)

200

CIS 5.1: Establish and Maintain an Inventory of _______.

What is Accounts?

200
When a Level 2 or 3 engineer is interrupted by other teammates for information.

What is context switching or the shoulder tap?

200

What a customer says to you when an internet domain expires on your watch, causing an outage.

What is... "Didn't we hire you to take care of this?"

200

The acronym, ASM, stands for a solution that combines asset discovery, inventory, configurations, and vulnerabilities into one system.

What is Attack Surface Management?

300

The required remediation for a vulnerability identified with a CVE.

What is a Patch or Security Update?

300

CIS 2.1: Establish and Maintain a _________ Inventory.

What is Software?

300

The most used word in Managed Services... the opposite of reactive.

What is proactive?

300

The process that failed when a customer says "Why does Bob still have access? He left the company last month."

What is proper deprovisioning and the associated HR processes to indicate departure?

300

Endpoint solution that leverages behavioral analysis rather than signatures to detect malware.

What is EDR - Endpoint Detection and Response?

400

The 2 core functions in the original 5 within NIST that are Left of Boom.

What is Identify and Protect?
400

CIS 3.2: Establish and Maintain a _____________.

What is a Data Inventory?

400

The symptom detected when someone made an unexpected DNS change.

What is email downtime or website down?

400
The acronym GRC stands for...

What is Governance, Risk and Compliance?

400

When a system's setup degrades from it's desired state.

What is Configuration Drift?
500

The 3rd step in MITRE's Attack Framework where the adversary is trying to get into your network.

 What is Initial Access?

500

CIS 4.1: Establish and Maintain a Secure _________ Process.

What is Configuration?

500

Two critical teams that bring order to left and right of boom in IT & Security.  Hint: They rhyme with the word "rock".

What is the NOC and the SOC?  Bonus if you mentioned ROC. :)

500

In Cyber, Impact and Probability are multiplied to calculate this.

What is Risk?

 (vCIOs use this to prioritize initiatives.)

500

What cloud-based network architecture converges network and security into a single solution and is replacing VPN?

What is SASE - Secure Access Service Edge?