I love Star Trek, DnD, coding, etc. Nerd Alert!
The US's first public park was in this headquarters city?
Boston
True or False: Cybersecurity is IT's responsibility.
False. It is everybody's responsibility.
Where can you find the malleus bone?
Ear (also known as hammer)
Name our founder and CEO.
Jack Koziol
I'm a twin!
Molly Mrozek
Completed in 1969, this 100-story steel and glass skyscraper is named after a famous American revolutionary.
The John Hancock Center
Ctrl, Alt, Delete
Windows, L
Control, Command, Q
Command, option, power
Limnology is the study of what?
Fresh water environments
Name our podcast.
CyberWork
I can make gifs!
Vidula Gongade, Giphy certified
A flood of what substance once took over Boston's North End in January 1919?
Molasses
What is the method of access control by which users must present multiple, separate pieces of identification, such as a password and keycard, in order to access a system?
Multifactor Authentication (MFA)
A chesterfield is a lesser known term for this type of furniture.
Name the simulator that we have in InfosecIQ that sends out simulated phony emails.
PhishNotify, PhishSim
On THREE occasions, my DNA tested as not fully human.
Alien, I mean ALBERT Lyngzeidetson
What items are bought more here than anywhere else, on a per capita basis? Hint: educational/entertainment
Books
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Ex, could be spearfishing, baiting, tailgating, quid pro quo.
Social Engineering
What film won Best Picture in 2009? (Hint: WWTBAM)
Slumdog Millionaire
We have a partnership with this company that allows us to have animated, gamified content. (hint: old school books)
Choose Your Own Adventure
I'm a Martial Arts Instructor. You may call be Guru.
Pembantu Guru Akyl Phillips
The building that houses our Chicago office was built in 1930 in Art Deco style. The building is a National Historic Landmark. Name the building.
Chicago Board of Trade (CBOT)
This role/job is responsible for planning and performing authorized, simulated attacks within an organization’s information systems, networks, applications and infrastructure to identify vulnerabilities and weaknesses.
Penetration tester or ethical hacker
July 1st
What's the name of our annual user conference?
Infosec Inspire