Third-PartyManagementGovernanceAssetManagementRiskAssessmentMaintenanceAnomaliesandEventsDetectionprocessesDataSecuritySecurityContinousMonitorinAccessControlRiskManagementStrategyRiskTolerancePasswordManagementPIISecurityAwareness& TrainingBusinessEnvironmentSupply ChainManagementVulnerabilitiesInformaitonProtectionProcessesandProceduresProtectiveTechnologyDataflowsIdentityManagementSoftwareInventoryHardwareInventoryThird-PartyManagementGovernanceAssetManagementRiskAssessmentMaintenanceAnomaliesandEventsDetectionprocessesDataSecuritySecurityContinousMonitorinAccessControlRiskManagementStrategyRiskTolerancePasswordManagementPIISecurityAwareness& TrainingBusinessEnvironmentSupply ChainManagementVulnerabilitiesInformaitonProtectionProcessesandProceduresProtectiveTechnologyDataflowsIdentityManagementSoftwareInventoryHardwareInventory

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Third-Party Management
  2. Governance
  3. Asset Management
  4. Risk Assessment
  5. Maintenance
  6. Anomalies and Events
  7. Detection processes
  8. Data Security
  9. Security Continous Monitorin
  10. Access Control
  11. Risk Management Strategy
  12. Risk Tolerance
  13. Password Management
  14. PII
  15. Security Awareness & Training
  16. Business Environment
  17. Supply Chain Management
  18. Vulnerabilities
  19. Informaiton Protection Processes and Procedures
  20. Protective Technology
  21. Data flows
  22. Identity Management
  23. Software Inventory
  24. Hardware Inventory