RCC
Information Security
Social Engineering
Acronyms
Management Committee
100

A mechanism or process implemented to mitigate or manage risk.

What is a control?

100

A weakness in a system, network, or application that can be misused or exploited.

What is a vulnerability?

100

This term describes fraudulent emails designed to trick recipients into clicking links or sharing data.

What is Phishing?

100

NIST

What is the National Institute of Standards & Technology?


100

Our Chief Resiliency Officer reports directly to this MC member.

Who is Randy Jensen?

200

A structured framework used by software teams to design, develop, and test high-quality software or procure it.

What is the Software Development Life Cycle (SDLC)?

200

This type of security team controls the defensive barrier between the enterprise and the rest of the internet. They are experts in skills such as threat hunting and incident response.

What is a blue team?

200

Someone asking to "hold the door" to secure a buidling may be attempting this.

What is tailgating

200

HMDA

What is the Home Mortgage Disclosure Act?

200

This MC member is a big Michigan fan.

Who is Ernie Katai?


300

Metrics used to signal increasing risk exposure before an issue occurs are called these.

What are key risk indicators (KRIs)?

300

The steps and processes we take to reduce or eliminate the threats to our system.

What are mitigations?

300

A control that reduces damage if credentials are compromised.

What is multi-factor authentication (MFA)

300

RCSA

What is Risk & Control Self-Assessment?

300

This MC member was recently named 2026 GlobeSt. Influencer in CRE technology.

Who is Damu Bashyam?

400

This process evaluates how disruptions to business processes impact operations, financials, and customers, and helps prioritize recovery efforts.

What is a Business Impact Analysis?

400

A repeatable implementation of an attack unknown to the community.

What is a zero-day exploit?

400

An attacker takes on a persona through disguise or using information with identifiable features to represent themselves as someone they are not.

What is impersonation? 

400

OWASP

What is the Open Worldwide Application Security Project? [Daily Double]

400

These two MC members attended the same program for their MBA.

Who are Damu and Hilary?


500

These investors are considered GSEs.

What are Fannie Mae and Freddie Mac?

500

These three words make up the CIA Triad.

What is confidentiality, integrity and availability?

500

*Video Prompt* Name that film!

What is Hackers

500

GLANCE

What is the Government list affiliated name check engine?


500

This MC member served as a Sergeant in the U.S. Air Force.

Who is Phil Long?