Across
- 5. Name the process for ensuring that data retained (in any format) is secure to help avoid a potential breach (e.g., unauthorized access or disclosure).
- 7. What is the retention period for email correspondence?
- 9. Injection, Broken Authentication and Sensitive Data Exposure are examples of bugs that Chainalysis wants to know about under which public policy?
- 10. What's the name of the process of preserving all forms of information relevant to legal proceedings?
Down
- 1. What is the first name of Chainalysis’ VP of security?
- 2. Which tool helped security to identify many unapproved applications located within Google, Slack and Zoom?
- 3. Name one of the industry standards that our security program is structured around?
- 4. What is the retention period for Product Development Data such as User Stories, Test Sets and Cases?
- 6. Which team should you notify In instances where unauthorized access or disclosure of data occurs?
- 8. What is stage 3 of the Application Security Engineering - Vulnerability Triage Policy?
