Skip survey header
0%

ISSA Web Conference GRC Cyber Insurance February 18 2014

Thank you for attending the ISSA Web Conference - "GRC/Cyber Insurance" on February 18, 2014. Please complete the following quiz based on information presented during the conference. After successful completion of the quiz, a message will appear indicating you have passed (or neglected to pass).

A passing message or "Certificate of Attendance" can be printed and used as verification of your participation. Please PRINT this page and use it to submit CPE (continuing professional education) credit in accordance with the guidelines of the certifying organization.
This question requires a valid email address.
3. How satisfied are you with the educational content of the ISSA Web Conferences?
Very SatisfiedSatisfiedNeutralDissatisfiedVery DissatisfiedNot Applicable
4. Which of the following educational subjects are the most valuable to you?
Space Cell Very ValuableValuableSomewhat ValuableNot Valuable
Application Security
Cryptography
Data Protection
Disaster Preparedness
Endpoint Security
Forensics
Governance, Risk & Compliance
Identity Management
Incident Response
Information Security Ethics
Legal/Regulatory Trends
Physical Protection of IT Assets
Research & Trends
Securing the Mobile Workforce
Security and Third Party Vendors (Cloud, SaaS, etc)
Security Awareness
Strategy & Architecture
Threat Updates
6. According to JD Sherry, attackers are now turning to social media in order to target individuals or public assets. The often are able to remain undetected for months while the extract valuable data. *This question is required.
7. According to JD Sherry, risk management involves: *This question is required.
8. According to Michael Schmitt, cyber insurance coverage extends to employee information. *This question is required.
9. According to Michael Schmitt, there is a federal law which regulates notification requirements in event of a breach. *This question is required.
10. According to Michael Schmitt, cyber liability insurance only responds when there is an electronic attack by a hacker. *This question is required.
11. According to Simon Milner, traditional insurance (except Professional Indemnity) can protect you against cybercrime. *This question is required.
12. According to Simon Milner, which company is a Lloyd's insurer in London? *This question is required.
13. According to Simon Milner, specialist cyber insurers offer coverage for: *This question is required.
14. According to JD Sherry, purchasing cyber/data breach insurance is an important part of incident response fundamentals. *This question is required.