Third-Party Management SOP Anomalies and Events Risk Management Strategy Business Environment Security Continous Monitorin Asset Management Supply Chain Management Risk Assessment Detection processes Password Management Protective Technology Data flows ISAC PII Hardware Inventory Security Awareness & Training Vulnerabilities Governance Software Inventory Risk Tolerance Identity Management Data Security Maintenance Third-Party Management SOP Anomalies and Events Risk Management Strategy Business Environment Security Continous Monitorin Asset Management Supply Chain Management Risk Assessment Detection processes Password Management Protective Technology Data flows ISAC PII Hardware Inventory Security Awareness & Training Vulnerabilities Governance Software Inventory Risk Tolerance Identity Management Data Security Maintenance
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Third-Party Management
SOP
Anomalies and Events
Risk Management Strategy
Business Environment
Security Continous Monitorin
Asset Management
Supply Chain Management
Risk Assessment
Detection processes
Password Management
Protective Technology
Data flows
ISAC
PII
Hardware Inventory
Security Awareness & Training
Vulnerabilities
Governance
Software Inventory
Risk Tolerance
Identity Management
Data Security
Maintenance