A Cyber Rethink

A Cyber Rethink

Assessment

Interactive Video

Business, Information Technology (IT), Architecture, Other

University

Hard

Created by

Quizizz Content

FREE Resource

The video discusses the evolution of cybersecurity threats, highlighting the NotPetya attack as a significant inflection point. It examines trends in cybersecurity budgets, emphasizing the need for increased spending. The structure of cybersecurity teams and reporting lines is explored, with a focus on the 3 lines of defense model. Metrics for measuring success in cybersecurity are discussed, along with the challenges of regulations and vendor assessments. The video concludes with insights on outsourcing and consulting in the cybersecurity field.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was a key characteristic of the NotPetya attack?

It was a phishing attack.

It targeted only financial institutions.

It was a ransomware attack.

It spread without regard for collateral damage.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the speaker, what is a common rule of thumb for cybersecurity spending?

15-20% of the IT budget

1-2% of the IT budget

Over 20% of the IT budget

6-8% of the IT budget

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What analogy does the speaker use to describe underinvestment in cybersecurity?

A leaking bucket

A credit card bill

A ticking clock

A broken bridge

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the 'Three Lines of Defense' model, who does the first line report to?

The Board of Directors

The CEO

The CFO

The CTO

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a benefit of having a 'Three Lines of Defense' model?

It focuses solely on financial risks.

It provides both embedded and independent perspectives.

It reduces the need for cybersecurity training.

It eliminates the need for external audits.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key metric for measuring cybersecurity success?

Number of software licenses

Amount of data stored

Number of major incidents

Number of employees

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does the speaker suggest viewing users in terms of phishing threats?

As sensors

As security experts

As passive observers

As potential threats

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?