cw-13

12345678910111213141516171819
Across
  1. 3. (Duplicate) Tracking origin and consequence of breaches
  2. 4. Unfair AI outcomes affecting certain groups disproportionately
  3. 6. Passing along a risk/job to someone else
  4. 7. Ethical hacking test of defenses
  5. 8. Summarized results or status document
  6. 9. Defensive security professionals
  7. 11. Technical drawing illustrating data processing pathways
  8. 13. Host-based Intrusion Detection System acronym
  9. 14. (Triplicate) Standard plan to survive IT disasters
  10. 15. Unlocking secret messages with the right key
  11. 17. Industry-recognized certification from IAPP .
  12. 19. Platform used at Tekion for employee compliance and workplace training.
Down
  1. 1. Critical security gate in Tekion’s development lifecycle.
  2. 2. Keeping information secret
  3. 5. What to do to fix trouble spots
  4. 10. Company’s process for oversight and control
  5. 12. Process of grouping personal data into collective insights while masking individual identities
  6. 16. (Duplicate) Collected facts for incident investigation
  7. 17. Importance level assigned to system resources
  8. 18. Payments solution developed and secured by Tekion.