Across
- 2. Dealing with crises as they happen
- 3. Replacing sensitive data with non-sensitive equivalents
- 9. Software designed to harm or exploit systems
- 12. Computer Emergency Response Team acronym
- 13. Applying updates to fix bugs or vulnerabilities
- 15. Confidence in a system’s reliability and integrity
- 16. Reading the fine print with a magnifying glass
- 18. Monitoring and analytics solution adopted by Tekion SOC
- 19. Identity and access management platform for login security at Tekion.
- 20. How far the flashlight shines on your work
Down
- 1. The fusion of security and IT operations for strong defense
- 4. Encoding data so only authorized can read
- 5. Verifying the claimed identity of a user, system, or device.
- 6. Entity determining purposes and means of personal data processing
- 7. California's comprehensive state law granting consumers rights over their personal information.
- 8. Document explaining how organization collects and uses personal data
- 10. Cloud-native tool at Tekion that safeguards running apps from attacks.
- 11. Because numbers never fudge the truth
- 14. The hole in your security bucket
- 17. A security team's overall defensive stance
