Challenge yourself with puzzles designed to test and expand your knowledge of cybersecurity concepts, trends, and terminology. Whether you’re an expert or new to the field, these puzzles are a fun way to stay engaged with the latest in cybersecurity. 

Across:

1. A secret set of characters used for authentication

3. Process of converting information into a code

7. October marks National Cybersecurity ___ Month

8. The core of what cybersecurity aims to protect

Down:

1. Deceptive attempt to obtain sensitive information

2. Software that demands payment from users

4. Program developed by criminals to cause harm

5. Deceptive emails often request this personal code

6. Advisable action for compromised login credentials

Read Next

CyberNextDC 2024 Recap

The CyberNext DC Conference featured speakers from industry and government, and panel sessions focused on strengthening cybersecurity, promoting regulatory harmonization, and enhancing resilience.

Special Episode: A Look Ahead to Cyber Policy in 2025 (DCP S2 Bonus)

For our last Distilling Cyber Policy podcast episode of 2024, Alex and Jen are joined by four CCPL experts to try and predict the future of cyber policy in the coming year, while reflecting on some of their predictions from last year.

CyberNext DC 2024 Preview

CyberNext DC is back for 2024! On Dec. 12 the Cybersecurity Coalition and Cyber Threat Alliance will host a day-long policy summit featuring leaders from the cybersecurity community and administration officials who are driving policy efforts.