Password Management Anomalies and Events Software Inventory Protective Technology Business Environment Supply Chain Management Risk Management Strategy Risk Tolerance ISAC SOP Vulnerabilities Data Security Third-Party Management Maintenance Governance Data flows Security Continous Monitorin Identity Management PII Risk Assessment Asset Management Hardware Inventory Detection processes Security Awareness & Training Password Management Anomalies and Events Software Inventory Protective Technology Business Environment Supply Chain Management Risk Management Strategy Risk Tolerance ISAC SOP Vulnerabilities Data Security Third-Party Management Maintenance Governance Data flows Security Continous Monitorin Identity Management PII Risk Assessment Asset Management Hardware Inventory Detection processes Security Awareness & Training
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Password Management
Anomalies and Events
Software Inventory
Protective Technology
Business Environment
Supply Chain Management
Risk Management Strategy
Risk Tolerance
ISAC
SOP
Vulnerabilities
Data Security
Third-Party Management
Maintenance
Governance
Data flows
Security Continous Monitorin
Identity Management
PII
Risk Assessment
Asset Management
Hardware Inventory
Detection processes
Security Awareness & Training