Miss sharpening your #2 pencil and finding out exactly what you know? Want to brush up on your knowledge of a good clean-desk policy or get advice on whether to take a new job? Below, links to the best quizzes and interactive tools that have run in CSO over the years. Answer honestly. We won’t fail you. How Flawed Is Your Security Program? has identified the 28 most common attributes of a flawed security program. Rank how often each one applies to your department, and find out whether you have a top-notch program–or a future working for Moo Burger. CSOThe Clean-Desk Test: What’s Wrong with this Picture?CSO all-time favorite. Bonus interactive tool: Rate your own desk! (Requires Flash Player 6.0.) A messy desk is a vulnerable desk. We’ve created one with 20 egregious violations of a good policy. See if you can find them in this Where are the Security Risks at this Offsite Meeting? Executives are gathering at a sensitive offsite meeting. Can you spot the 12 ways information might leak out? How Could This Employee Steal Company Secrets?Insiders (like the temp who sits at this desk) can use many tools and techniques to pilfer your intellectual property. How many can you find? This interactive tool helps you identify and rate each risk of insider theft. Should You Take the Job (or Shove It)?Take this quiz to figure out whether a job you’re considering is a great career move or a nightmare-in-waiting. What Type of Leader Are You? We tend to lump others into stereotypical roles, sometimes basing our judgment on relatively few data points. Take this quiz to see how others perceive your leadership style, and get pointers on making yourself more well-rounded. Related content brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management news Cybersecurity experts raise concerns over EU Cyber Resilience Act’s vulnerability disclosure requirements Open letter claims current provisions will create new threats that undermine the security of digital products and individuals. By Michael Hill Oct 03, 2023 4 mins Regulation Compliance Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe