Thank you.
Thank you.
How many Facebook accounts are
compromised by hackers every day?
A) 100,000
B) 400,000
C) 600,000
D) 800,000
Thank you.
How many Facebook accounts are
compromised by hackers every day?
A) 100,000
B) 400,000
C) 600,000
D) 800,000
Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
Web application attacks are the #1 source of
data breaches, up 500% since 2014
Did you know?
Source: 2016 Data Breach Investigations Report, Verizon, 2016
Thank you.
How many users accounts were affected in
the September 2016 Yahoo breach?
A) 100 million
B) 500 million
C) 750 million
D) 1 billion
Thank you.
How many users accounts were affected in
the September 2016 Yahoo breach?
A) 100 million
B) 500 million
C) 750 million
D) 1 billion
Source: Perlroth, Nicole (September 22, 2016). "Yahoo Says Hackers Stole Data on 500 Million Users in 2014". The New
York Times. Retrieved September 22, 2016.
43% of developers have released apps with
known vulnerabilities at least 80% of the time
Did you know?
Source: The Impact of Security on Development: 2015 Survey Report, Prevoty, 2015
49% of IT security professionals said visibility
to infrastructure security is a big headache
Did you know?
Source: 2016 Cloud Security Spotlight Report, Information Security Linkedin Group Partner, 2016
Thank you.
MyDoom, the fastest-spreading email worm ever, is
considered the most expensive virus in cyber security
history. How much financial damage did it cause?
A) $22.5 million
B) $480 million
C) $18 billion
D) $38.5 billion
Thank you.
MyDoom, the fastest-spreading email worm ever, is
considered the most expensive virus in cyber security
history. How much financial damage did it cause?
A) $22.5 million
B) $480 million
C) $18 billion
D) $38.5 billion
Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
Among organizations that experienced security
incidents, 41% of IT security professionals say
the biggest impact comes from disrupted
business activities
Did you know?
Source: 2017 Cybersecurity Trends Report, Information Security Linkedin Group Partner, 2017
Thank you.
How many employees steal
proprietary corporate data when they
quit or are fired?
A) 23%
B) 34%
C) 51%
D) 59%
Thank you.
How many employees steal
proprietary corporate data when they
quit or are fired?
A) 23%
B) 34%
C) 51%
D) 59%
Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
Less than 5% of data center security budgets
are spent on application security
Did you know?
Source: 2016 Data Breach Investigations Report, Verizon, 2016
More than 70% of application developers
admitted that business pressures to release
application updates quickly, often override
security concerns
Did you know?
Source: The Impact of Security on Development: 2015 Survey Report, Prevoty, 2015
Thank you.
What is the average annualized cost of
crime incurred by US organizations?
A) $12.7 million
B) $28.5 million
C) $32.3 million
D) $98 million
Thank you.
What is the average annualized cost of
crime incurred by US organizations?
A) $12.7 million
B) $28.5 million
C) $32.3 million
D) $98 million
Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
59% of IT security professionals said
traditional tools work somewhat or not at all
Did you know?
Source: 2016 Cloud Security Spotlight Report, Information Security Linkedin Group Partner, 2016
Thank you.
What percentage of funds lost as a result
of cyber attacks are non-recoverable?
A) 23%
B) 48%
C) 68%
D) 72%
Thank you.
What percentage of funds lost as a result
of cyber attacks are non-recoverable?
A) 23%
B) 48%
C) 68%
D) 72%
Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
72% of web apps have at least one
encapsulation flaw
Did you know?
Source: HPE Security Research: Cyber Risk Report 2016, Hewlett Packard Enterprise, 201614.
41% of IT security professionals said reduced
effort around patches and upgrades of
software is a dominant driver for cloud-based
security solutions
Did you know?
Source: 2016 Cloud Security Spotlight Report, Information Security Linkedin Group Partner, 2016
Thank you.
How many cyber attack attempts does
the Pentagon report getting a day?
A) 1 million
B) 5 million
C) 8 million
D) 10 million
Thank you.
How many cyber attack attempts does
the Pentagon report getting a day?
A) 1 million
B) 5 million
C) 8 million
D) 10 million
Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
84% of IT security professionals are
dissatisfied with traditional security tools when
applied to cloud infrastructure
Did you know?
Source: ”Cloud Security” 2016 Spotlight Report
Thank you.
What is the average time to detect a
malicious or criminal attack?
A) 170 seconds
B) 170 minutes
C) 170 days
D) 17 months
Thank you.
What is the average time to detect a
malicious or criminal attack?
A) 170 seconds
B) 170 minutes
C) 170 days
D) 17 months
Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
Critical and high-risk vulnerabilities have an
average age of 300 and 500 days, respectively
Did you know?
Source: Web Applications Statistics Report. WhiteHat, 2016
50% of IT security professionals said
customer-facing web applications present the
highest security risk to the business
Did you know?
Source: 2017 Cybersecurity Trends Report, Information Security Linkedin Group Partner, 2017
Thank you.
What percentage of computers are
vulnerable to exploit kits?
A) 53%
B) 62%
C) 87%
D) 99%
Thank you.
What percentage of computers are
vulnerable to exploit kits?
A) 53%
B) 62%
C) 87%
D) 99%
Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016

CSS Trivia

  • 1.
  • 2.
    Thank you. How manyFacebook accounts are compromised by hackers every day? A) 100,000 B) 400,000 C) 600,000 D) 800,000
  • 3.
    Thank you. How manyFacebook accounts are compromised by hackers every day? A) 100,000 B) 400,000 C) 600,000 D) 800,000 Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
  • 4.
    Web application attacksare the #1 source of data breaches, up 500% since 2014 Did you know? Source: 2016 Data Breach Investigations Report, Verizon, 2016
  • 5.
    Thank you. How manyusers accounts were affected in the September 2016 Yahoo breach? A) 100 million B) 500 million C) 750 million D) 1 billion
  • 6.
    Thank you. How manyusers accounts were affected in the September 2016 Yahoo breach? A) 100 million B) 500 million C) 750 million D) 1 billion Source: Perlroth, Nicole (September 22, 2016). "Yahoo Says Hackers Stole Data on 500 Million Users in 2014". The New York Times. Retrieved September 22, 2016.
  • 7.
    43% of developershave released apps with known vulnerabilities at least 80% of the time Did you know? Source: The Impact of Security on Development: 2015 Survey Report, Prevoty, 2015
  • 8.
    49% of ITsecurity professionals said visibility to infrastructure security is a big headache Did you know? Source: 2016 Cloud Security Spotlight Report, Information Security Linkedin Group Partner, 2016
  • 9.
    Thank you. MyDoom, thefastest-spreading email worm ever, is considered the most expensive virus in cyber security history. How much financial damage did it cause? A) $22.5 million B) $480 million C) $18 billion D) $38.5 billion
  • 10.
    Thank you. MyDoom, thefastest-spreading email worm ever, is considered the most expensive virus in cyber security history. How much financial damage did it cause? A) $22.5 million B) $480 million C) $18 billion D) $38.5 billion Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
  • 11.
    Among organizations thatexperienced security incidents, 41% of IT security professionals say the biggest impact comes from disrupted business activities Did you know? Source: 2017 Cybersecurity Trends Report, Information Security Linkedin Group Partner, 2017
  • 12.
    Thank you. How manyemployees steal proprietary corporate data when they quit or are fired? A) 23% B) 34% C) 51% D) 59%
  • 13.
    Thank you. How manyemployees steal proprietary corporate data when they quit or are fired? A) 23% B) 34% C) 51% D) 59% Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
  • 14.
    Less than 5%of data center security budgets are spent on application security Did you know? Source: 2016 Data Breach Investigations Report, Verizon, 2016
  • 15.
    More than 70%of application developers admitted that business pressures to release application updates quickly, often override security concerns Did you know? Source: The Impact of Security on Development: 2015 Survey Report, Prevoty, 2015
  • 16.
    Thank you. What isthe average annualized cost of crime incurred by US organizations? A) $12.7 million B) $28.5 million C) $32.3 million D) $98 million
  • 17.
    Thank you. What isthe average annualized cost of crime incurred by US organizations? A) $12.7 million B) $28.5 million C) $32.3 million D) $98 million Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
  • 18.
    59% of ITsecurity professionals said traditional tools work somewhat or not at all Did you know? Source: 2016 Cloud Security Spotlight Report, Information Security Linkedin Group Partner, 2016
  • 19.
    Thank you. What percentageof funds lost as a result of cyber attacks are non-recoverable? A) 23% B) 48% C) 68% D) 72%
  • 20.
    Thank you. What percentageof funds lost as a result of cyber attacks are non-recoverable? A) 23% B) 48% C) 68% D) 72% Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
  • 21.
    72% of webapps have at least one encapsulation flaw Did you know? Source: HPE Security Research: Cyber Risk Report 2016, Hewlett Packard Enterprise, 201614.
  • 22.
    41% of ITsecurity professionals said reduced effort around patches and upgrades of software is a dominant driver for cloud-based security solutions Did you know? Source: 2016 Cloud Security Spotlight Report, Information Security Linkedin Group Partner, 2016
  • 23.
    Thank you. How manycyber attack attempts does the Pentagon report getting a day? A) 1 million B) 5 million C) 8 million D) 10 million
  • 24.
    Thank you. How manycyber attack attempts does the Pentagon report getting a day? A) 1 million B) 5 million C) 8 million D) 10 million Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
  • 25.
    84% of ITsecurity professionals are dissatisfied with traditional security tools when applied to cloud infrastructure Did you know? Source: ”Cloud Security” 2016 Spotlight Report
  • 26.
    Thank you. What isthe average time to detect a malicious or criminal attack? A) 170 seconds B) 170 minutes C) 170 days D) 17 months
  • 27.
    Thank you. What isthe average time to detect a malicious or criminal attack? A) 170 seconds B) 170 minutes C) 170 days D) 17 months Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
  • 28.
    Critical and high-riskvulnerabilities have an average age of 300 and 500 days, respectively Did you know? Source: Web Applications Statistics Report. WhiteHat, 2016
  • 29.
    50% of ITsecurity professionals said customer-facing web applications present the highest security risk to the business Did you know? Source: 2017 Cybersecurity Trends Report, Information Security Linkedin Group Partner, 2017
  • 30.
    Thank you. What percentageof computers are vulnerable to exploit kits? A) 53% B) 62% C) 87% D) 99%
  • 31.
    Thank you. What percentageof computers are vulnerable to exploit kits? A) 53% B) 62% C) 87% D) 99% Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016