Password Management Data Security Detection processes Supply Chain Management SOP Risk Assessment Hardware Inventory Data flows Third-Party Management Software Inventory Governance ISAC Maintenance Risk Management Strategy Vulnerabilities Asset Management Protective Technology PII Anomalies and Events Security Continous Monitorin Business Environment Risk Tolerance Identity Management Security Awareness & Training Password Management Data Security Detection processes Supply Chain Management SOP Risk Assessment Hardware Inventory Data flows Third-Party Management Software Inventory Governance ISAC Maintenance Risk Management Strategy Vulnerabilities Asset Management Protective Technology PII Anomalies and Events Security Continous Monitorin Business Environment Risk Tolerance Identity Management Security Awareness & Training
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Password Management
Data Security
Detection processes
Supply Chain Management
SOP
Risk Assessment
Hardware Inventory
Data flows
Third-Party Management
Software Inventory
Governance
ISAC
Maintenance
Risk Management Strategy
Vulnerabilities
Asset Management
Protective Technology
PII
Anomalies and Events
Security Continous Monitorin
Business Environment
Risk Tolerance
Identity Management
Security Awareness & Training