Works ininternalauditUsessamplingtechniquesoftenAutomateswith Python,R orsomethingelseHas an auditcertification(CIA, CISA,CRISC, etc.)Has led anaudit teamin anengagementUsersPower BIfor auditanalyticsWorks inCybersecurityWorks inhealthcareWorks in riskmanagementHas afavoriteauditframeworkHasauditedmobileappsHasauditedthird partyriskHasattended thisconferencein 2023 or2024Hasperformed acontrolwalkthroughHasimplementedCOBIT 2019UsesIDEA orACL toolsUses anAI tool foraudit prepHas done amaturityassessmentMetsomeonewho hasdone aSOC 2 AuditLovesExcelshortcutsHasauditeddisasterrecoveryHasperformed afraudinvestigationWorks inComplianceHasauditedphysicalsecurityHasworkedwith aGRC toolWorks ingovernmentWorks infinancialservicesUses dataanalyticsin auditsHasauditingIT generalcontrolsHas acybersecuritycertificaitonsPrefersNIST CSFor higherHaspresentedaconferenceHasauditedHRprocessesHas done aPCIassessmentWorks inmanufacturingHasauditedincidentresponseHas donea root-causeanalysisHasauditedfinancialreportingStartedcareer inauditingWorks inconsultingHas auditedcybersecuritycontrolsHas auditeda cloudenvironmentUsesChatGPTorHas done aprivacyassessmentStartedtheircareer inITPrefers theCOSOmethodologyHas donea SOXauditHasauditedprivilegedaccessHas anISACA orIIAcertificationWorks ininternalauditUsessamplingtechniquesoftenAutomateswith Python,R orsomethingelseHas an auditcertification(CIA, CISA,CRISC, etc.)Has led anaudit teamin anengagementUsersPower BIfor auditanalyticsWorks inCybersecurityWorks inhealthcareWorks in riskmanagementHas afavoriteauditframeworkHasauditedmobileappsHasauditedthird partyriskHasattended thisconferencein 2023 or2024Hasperformed acontrolwalkthroughHasimplementedCOBIT 2019UsesIDEA orACL toolsUses anAI tool foraudit prepHas done amaturityassessmentMetsomeonewho hasdone aSOC 2 AuditLovesExcelshortcutsHasauditeddisasterrecoveryHasperformed afraudinvestigationWorks inComplianceHasauditedphysicalsecurityHasworkedwith aGRC toolWorks ingovernmentWorks infinancialservicesUses dataanalyticsin auditsHasauditingIT generalcontrolsHas acybersecuritycertificaitonsPrefersNIST CSFor higherHaspresentedaconferenceHasauditedHRprocessesHas done aPCIassessmentWorks inmanufacturingHasauditedincidentresponseHas donea root-causeanalysisHasauditedfinancialreportingStartedcareer inauditingWorks inconsultingHas auditedcybersecuritycontrolsHas auditeda cloudenvironmentUsesChatGPTorHas done aprivacyassessmentStartedtheircareer inITPrefers theCOSOmethodologyHas donea SOXauditHasauditedprivilegedaccessHas anISACA orIIAcertification

ISACA/IIA Networking - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Works in internal audit
  2. Uses sampling techniques often
  3. Automates with Python, R or something else
  4. Has an audit certification (CIA, CISA, CRISC, etc.)
  5. Has led an audit team in an engagement
  6. Users Power BI for audit analytics
  7. Works in Cybersecurity
  8. Works in healthcare
  9. Works in risk management
  10. Has a favorite audit framework
  11. Has audited mobile apps
  12. Has audited third party risk
  13. Has attended this conference in 2023 or 2024
  14. Has performed a control walkthrough
  15. Has implemented COBIT 2019
  16. Uses IDEA or ACL tools
  17. Uses an AI tool for audit prep
  18. Has done a maturity assessment
  19. Met someone who has done a SOC 2 Audit
  20. Loves Excel shortcuts
  21. Has audited disaster recovery
  22. Has performed a fraud investigation
  23. Works in Compliance
  24. Has audited physical security
  25. Has worked with a GRC tool
  26. Works in government
  27. Works in financial services
  28. Uses data analytics in audits
  29. Has auditing IT general controls
  30. Has a cybersecurity certificaitons
  31. Prefers NIST CSF or higher
  32. Has presented a conference
  33. Has audited HR processes
  34. Has done a PCI assessment
  35. Works in manufacturing
  36. Has audited incident response
  37. Has done a root-cause analysis
  38. Has audited financial reporting
  39. Started career in auditing
  40. Works in consulting
  41. Has audited cybersecurity controls
  42. Has audited a cloud environment
  43. Uses ChatGPT or
  44. Has done a privacy assessment
  45. Started their career in IT
  46. Prefers the COSO methodology
  47. Has done a SOX audit
  48. Has audited privileged access
  49. Has an ISACA or IIA certification