Compliance
Identity and Access
Security Operations
Vendor Risk
Artificial Intelligence
100

This U.S. organization publishes cybersecurity frameworks and standards that guide federal agencies and private sector companies in managing risk.

What is NIST (National Institute of Standards and Technology)?

100

This access control model assigns permissions to users based on their job functions, streamlining access management and enforcing least privilege.

What is Role-Based Access Control (RBAC)?

100

This Microsoft solution helps organizations discover, classify, and protect sensitive data across their digital estate, supporting compliance, data security, and data governance efforts.

What is Microsoft Purview?

100

This document outlines the responsibilities, expectations, and security requirements between an organization and its third-party vendor.

What is a Service Level Agreement (SLA)?

100

This type of flaw in AI systems can lead to unfair or discriminatory outcomes, often stemming from skewed training data or flawed assumptions.

What is Bias?

200

This cryptographic standard ensures that encryption modules used by federal agencies meet rigorous security requirements.


What is FIPS 140?

200

This Industry standard protocol allows users to authenticate once and access multiple systems, often used in Single Sign-On (SSO) implementations.

What is SAML (Security Assertion Markup Language)?

200

This platform, purchased by DAS, helps organizations prepare for and respond to crises, including cybersecurity incidents, by streamlining communication and emergency planning (BCP/DR)?

What is Preparis?

200

This type of assessment evaluates a vendor’s cybersecurity posture before onboarding, often using questionnaires or audits.

What is a vendor risk assessment?

200

This concept involves integrating human oversight into AI decision-making processes to ensure accuracy, accountability, and ethical compliance

What is Human in the Loop?

300

These hardware-based authentication devices support multi-factor authentication and can help organizations meet compliance requirements for secure access.

What are YubiKeys?

300

This JFS IAM tool helps organizations manage access reviews and certifications, ensuring users have appropriate access to systems and data.

What is Saviynt?

300

This Qualys tool provides visibility into internet-facing assets, helping security teams identify and manage exposed systems before attackers do.

What is Qualys Attack Surface Management (ASM)?

300

This cybersecurity ratings platform, purchased by DAS,  provides continuous, data-driven insights into a vendor’s external security posture using publicly available data.

What is Bitsight?

300

This term refers to the safeguards and policies built into AI systems to prevent misuse, ensure ethical behavior, and maintain security boundaries

What are AI guardrails?

400

This assessment evaluates how personal information is collected, stored, and protected in a system, helping organizations comply with privacy regulations.

What is a Privacy Impact Assessment (PIA)?

400

This principle limits user access rights to the minimum necessary to perform their job functions, reducing the risk of insider threats.

What is the principle of least privilege?

400

This type of security operation focuses on monitoring user and entity (Device) behavior and data access patterns to detect insider threats and prevent data exfiltration.

What is user and entity behavior analytics (UEBA)?

400

This privacy and risk management GRC platform, purchased by DAS,  helps organizations automate third-party risk workflows, manage vendor inventories, and ensure compliance with global regulations.

What is OneTrust?

400

This practice ensures that AI systems used in cybersecurity are transparent, explainable, and aligned with organizational and societal values.

What is AI governance?

500

This formal document outlines the security controls in place for an information system, detailing how they meet compliance requirements and mitigate risk.

What is a System Security Plan (SSP)?

500

This open standard, used by many cloud providers, automates the exchange of user identity information between identity providers and service providers, streamlining provisioning and deprovisioning.

What is SCIM (System for Cross-domain Identity Management)?

500

This data security platform, used by JFS, uses automation and deep file system analysis to detect abnormal access patterns, ransomware prevention, protect sensitive data, and enforce least privilege access.

What is Varonis?

500

This advanced vendor risk strategy combines external risk ratings, internal assessments, and real-time threat intelligence to create a dynamic, multi-layered risk profile.

What is a hybrid (vendor risk) scoring model?

500

This term describes when an AI system generates false or misleading information that appears plausible, posing risks in threat analysis or automated decision-making.

What are AI hallucinations?

M
e
n
u