Security Continous Monitorin Data Security Hardware Inventory Asset Management Security Awareness & Training Software Inventory Risk Tolerance Detection processes Maintenance Risk Assessment Password Management Governance PII Data flows Vulnerabilities Supply Chain Management ISAC Identity Management Protective Technology Business Environment Risk Management Strategy Third-Party Management SOP Anomalies and Events Security Continous Monitorin Data Security Hardware Inventory Asset Management Security Awareness & Training Software Inventory Risk Tolerance Detection processes Maintenance Risk Assessment Password Management Governance PII Data flows Vulnerabilities Supply Chain Management ISAC Identity Management Protective Technology Business Environment Risk Management Strategy Third-Party Management SOP Anomalies and Events
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Security Continous Monitorin
Data Security
Hardware Inventory
Asset Management
Security Awareness & Training
Software Inventory
Risk Tolerance
Detection processes
Maintenance
Risk Assessment
Password Management
Governance
PII
Data flows
Vulnerabilities
Supply Chain Management
ISAC
Identity Management
Protective Technology
Business Environment
Risk Management Strategy
Third-Party Management
SOP
Anomalies and Events