Identity Management Business Environment Asset Management Anomalies and Events Risk Tolerance Risk Assessment Data flows Software Inventory Protective Technology Vulnerabilities PII Governance Password Management Maintenance Risk Management Strategy ISAC SOP Hardware Inventory Security Awareness & Training Data Security Supply Chain Management Third-Party Management Detection processes Security Continous Monitorin Identity Management Business Environment Asset Management Anomalies and Events Risk Tolerance Risk Assessment Data flows Software Inventory Protective Technology Vulnerabilities PII Governance Password Management Maintenance Risk Management Strategy ISAC SOP Hardware Inventory Security Awareness & Training Data Security Supply Chain Management Third-Party Management Detection processes Security Continous Monitorin
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Identity Management
Business Environment
Asset Management
Anomalies and Events
Risk Tolerance
Risk Assessment
Data flows
Software Inventory
Protective Technology
Vulnerabilities
PII
Governance
Password Management
Maintenance
Risk Management Strategy
ISAC
SOP
Hardware Inventory
Security Awareness & Training
Data Security
Supply Chain Management
Third-Party Management
Detection processes
Security Continous Monitorin