Fedwire Planning 4.0 Jira Audit Information and Reference Document (AIRD) Enterprise Password Vault (EPV) Apache Independence Securities Transfer ISSI Free Transfer Categorize Data Warehouse Detective Controls ETS ALERT Preventative Controls Bill Barouski INSite Middleware Adversarial Wholesale Enterprise Risk Management End-to- End Audit Mobile Steward Narrow Risk E- Apps Data Loss Protection Objectivity Audit Mission Entitlement Holder Targeted Audit Programs Authorizing Official Business Process overview ROAM Network Access Control (NAC) Fraud Environmental POA&M Exception Common Audit Programs Funds Transfer IS Incident Management Inherited control Governance Fedwire Planning 4.0 Jira Audit Information and Reference Document (AIRD) Enterprise Password Vault (EPV) Apache Independence Securities Transfer ISSI Free Transfer Categorize Data Warehouse Detective Controls ETS ALERT Preventative Controls Bill Barouski INSite Middleware Adversarial Wholesale Enterprise Risk Management End-to- End Audit Mobile Steward Narrow Risk E- Apps Data Loss Protection Objectivity Audit Mission Entitlement Holder Targeted Audit Programs Authorizing Official Business Process overview ROAM Network Access Control (NAC) Fraud Environmental POA&M Exception Common Audit Programs Funds Transfer IS Incident Management Inherited control Governance
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Fedwire
Planning 4.0
Jira
Audit Information and Reference Document (AIRD)
Enterprise Password Vault (EPV)
Apache
Independence
Securities Transfer
ISSI
Free Transfer
Categorize
Data Warehouse
Detective Controls
ETS ALERT
Preventative Controls
Bill Barouski
INSite
Middleware
Adversarial
Wholesale
Enterprise Risk Management
End-to-End Audit
Mobile
Steward
Narrow
Risk
E-Apps
Data Loss Protection
Objectivity
Audit Mission
Entitlement Holder
Targeted Audit Programs
Authorizing Official
Business Process overview
ROAM
Network Access Control (NAC)
Fraud
Environmental
POA&M
Exception
Common Audit Programs
Funds Transfer
IS Incident Management
Inherited control
Governance