Across
- 4. Legal basis requiring explicit permission for data processing
- 7. Special rights or access levels in a system
- 9. Offensive security and threat-simulation platform at Tekion.
- 11. Privacy principle restricting how long personal data can be kept
- 12. Copying data for recovery after loss
- 14. AI-powered platform at Tekion that finds and fixes app code vulnerabilities.
- 17. Sequence of actions to achieve an outcome
- 19. Tactics, Techniques, and Procedures acronym
- 20. Self-replicating malware spreading through networks
Down
- 1. Unplanned event threatening data or operations
- 2. A company you hire to run your security monitoring remotely
- 3. Verifying identity to access a system
- 5. Canada's Personal Information Protection and Electronic Documents Act
- 6. Recovery strategy for a detected issue
- 8. Combining individual data points into statistical summaries to protect privacy
- 10. Document tracking known risks
- 13. Runtime application security platform deployed at Tekion.
- 15. Bringing operations back after an incident
- 16. International standards-setting organization
- 18. Data Loss Prevention: protecting info from leaving the network
