A Cyber Rethink

A Cyber Rethink

Assessment

Interactive Video

•

Business, Information Technology (IT), Architecture, Other

•

University

•

Practice Problem

•

Hard

Created by

Wayground Content

FREE Resource

The video discusses the evolution of cybersecurity threats, highlighting the NotPetya attack as a significant inflection point. It examines trends in cybersecurity budgets, emphasizing the need for increased spending. The structure of cybersecurity teams and reporting lines is explored, with a focus on the 3 lines of defense model. Metrics for measuring success in cybersecurity are discussed, along with the challenges of regulations and vendor assessments. The video concludes with insights on outsourcing and consulting in the cybersecurity field.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was a key characteristic of the NotPetya attack?

It was a phishing attack.

It targeted only financial institutions.

It was a ransomware attack.

It spread without regard for collateral damage.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the speaker, what is a common rule of thumb for cybersecurity spending?

15-20% of the IT budget

1-2% of the IT budget

Over 20% of the IT budget

6-8% of the IT budget

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What analogy does the speaker use to describe underinvestment in cybersecurity?

A leaking bucket

A credit card bill

A ticking clock

A broken bridge

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the 'Three Lines of Defense' model, who does the first line report to?

The Board of Directors

The CEO

The CFO

The CTO

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a benefit of having a 'Three Lines of Defense' model?

It focuses solely on financial risks.

It provides both embedded and independent perspectives.

It reduces the need for cybersecurity training.

It eliminates the need for external audits.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key metric for measuring cybersecurity success?

Number of software licenses

Amount of data stored

Number of major incidents

Number of employees

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does the speaker suggest viewing users in terms of phishing threats?

As sensors

As security experts

As passive observers

As potential threats

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?