backupnon-disclosureagreementsthreatintegrityaccesscontrolISMSinterestedpartyinformationsecurityrisklikelihoodconfidentialityCryptographyrisktreatmentvulnerabilityAvailabilityAnnexAriskownerclassificationincidentnonconformityassetmalwarepolicyriskassessmentbackupnon-disclosureagreementsthreatintegrityaccesscontrolISMSinterestedpartyinformationsecurityrisklikelihoodconfidentialityCryptographyrisktreatmentvulnerabilityAvailabilityAnnexAriskownerclassificationincidentnonconformityassetmalwarepolicyriskassessment

ISMS BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. backup
  2. non-disclosure agreements
  3. threat
  4. integrity
  5. access control
  6. ISMS
  7. interested party
  8. information security
  9. risk
  10. likelihood
  11. confidentiality
  12. Cryptography
  13. risk treatment
  14. vulnerability
  15. Availability
  16. Annex A
  17. risk owner
  18. classification
  19. incident
  20. nonconformity
  21. asset
  22. malware
  23. policy
  24. risk assessment