Across
- 2. Investigates and mitigates cyber incidents, such as data breaches or malware attacks.
- 4. Simulates cyberattacks to find vulnerabilities in systems.
Down
- 1. Monitors and analyzes security threats to protect an organization.
- 3. Designs, implements, and maintains secure network infrastructure.
- 5. A high-level executive responsible for overseeing an organization's entire cybersecurity strategy.
