Across
- 3. (Duplicate) Tracking origin and consequence of breaches
- 4. Unfair AI outcomes affecting certain groups disproportionately
- 6. Passing along a risk/job to someone else
- 7. Ethical hacking test of defenses
- 8. Summarized results or status document
- 9. Defensive security professionals
- 11. Technical drawing illustrating data processing pathways
- 13. Host-based Intrusion Detection System acronym
- 14. (Triplicate) Standard plan to survive IT disasters
- 15. Unlocking secret messages with the right key
- 17. Industry-recognized certification from IAPP .
- 19. Platform used at Tekion for employee compliance and workplace training.
Down
- 1. Critical security gate in Tekion’s development lifecycle.
- 2. Keeping information secret
- 5. What to do to fix trouble spots
- 10. Company’s process for oversight and control
- 12. Process of grouping personal data into collective insights while masking individual identities
- 16. (Duplicate) Collected facts for incident investigation
- 17. Importance level assigned to system resources
- 18. Payments solution developed and secured by Tekion.
