A Cyber Rethink

A Cyber Rethink

Assessment

Interactive Video

Business, Information Technology (IT), Architecture, Other

University

Hard

Created by

Quizizz Content

FREE Resource

The video discusses the evolution of cybersecurity threats, highlighting the NotPetya attack as a significant inflection point. It examines trends in cybersecurity budgets, emphasizing the need for increased spending. The structure of cybersecurity teams and reporting lines is explored, with a focus on the 3 lines of defense model. Metrics for measuring success in cybersecurity are discussed, along with the challenges of regulations and vendor assessments. The video concludes with insights on outsourcing and consulting in the cybersecurity field.

Read more

10 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

How have cyber security threats evolved over the years according to the speaker?

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

What was significant about the NotPetya attack mentioned in the text?

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

What is the recommended percentage of IT budget that should be allocated to cyber security?

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 1 pt

What are the three lines of defense model in cyber security as described by the speaker?

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

How does the speaker suggest organizations should measure their cyber security success?

Evaluate responses using AI:

OFF

6.

OPEN ENDED QUESTION

3 mins • 1 pt

What metrics does the speaker mention for evaluating cyber security effectiveness?

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

3 mins • 1 pt

What is the speaker's view on the importance of harmonized federal regulations in cyber security?

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?