PII Risk Assessment Vulnerabilities Governance Protective Technology Identity Management Security Awareness & Training Business Environment Security Continous Monitorin Hardware Inventory Anomalies and Events Detection processes ISAC Asset Management Data flows SOP Software Inventory Third-Party Management Risk Tolerance Password Management Risk Management Strategy Maintenance Supply Chain Management Data Security PII Risk Assessment Vulnerabilities Governance Protective Technology Identity Management Security Awareness & Training Business Environment Security Continous Monitorin Hardware Inventory Anomalies and Events Detection processes ISAC Asset Management Data flows SOP Software Inventory Third-Party Management Risk Tolerance Password Management Risk Management Strategy Maintenance Supply Chain Management Data Security
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
PII
Risk Assessment
Vulnerabilities
Governance
Protective Technology
Identity Management
Security Awareness & Training
Business Environment
Security Continous Monitorin
Hardware Inventory
Anomalies and Events
Detection processes
ISAC
Asset Management
Data flows
SOP
Software Inventory
Third-Party Management
Risk Tolerance
Password Management
Risk Management Strategy
Maintenance
Supply Chain Management
Data Security