I've driven across the entire country from west coast to east coast.
Alex Thompson
What branded workout has their annual Games in Madison?
Crossfit
True or False: Cybersecurity is IT's responsibility.
False. It is everybody's responsibility.
Where can you find the malleus bone?
Ear (also known as hammer)
Name our founder and CEO.
Jack Koziol
I've trekked the Amazon rainforest.
Dave Sharma
What substance flooded the streets of Boston in 1919?
Molasses (Great Molasses Flood)
Ctrl, Alt, Delete
Windows, L
Control, Command, Q
Command, option, power
Limnology is the study of what?
Fresh water environments
Name our podcast.
CyberWork
I have several implanted microchips, LEDs and magnets.
Brock Warner
This notable building in Chicago was named after a founding father.
John Hancock Tower
What is the method of access control by which users must present multiple, separate pieces of identification, such as a password and keycard, in order to access a system?
Multifactor Authentication (MFA)
A chesterfield is a lesser known term for this type of furniture.
Name the simulator that we have in InfosecIQ that sends out simulated phony emails.
PhishNotify, PhishSim
I was once a witness to a bank robbery.
Nancy
What items are bought in Madison more than anywhere else in the US, on a per capita basis? Hint: educational/entertainment
Books
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Ex, could be spearfishing, baiting, tailgating, quid pro quo.
Social Engineering
July 1st
We have a partnership with this company that allows us to have animated, gamified content. (hint: old school books)
Choose Your Own Adventure
I once ziplined, bungee jumped, and spelunked all in one day.
Sophie
The building that houses our Chicago office was built in 1930 in Art Deco style. The building is a National Historic Landmark. Name the building.
Chicago Board of Trade (CBOT)
This role/job is responsible for planning and performing authorized, simulated attacks within an organization’s information systems, networks, applications and infrastructure to identify vulnerabilities and weaknesses.
Penetration tester or ethical hacker
What film won Best Picture in 2009? (Hint: WWTBAM)
Slumdog Millionaire
What's the name of our annual user conference?
Infosec Inspire