Risk Management Strategy Security Continous Monitorin Third-Party Management Identity Management Vulnerabilities Password Management Security Awareness & Training Detection processes Governance Hardware Inventory Data flows Risk Tolerance Business Environment PII Data Security Anomalies and Events Risk Assessment Software Inventory SOP Supply Chain Management Protective Technology Maintenance ISAC Asset Management Risk Management Strategy Security Continous Monitorin Third-Party Management Identity Management Vulnerabilities Password Management Security Awareness & Training Detection processes Governance Hardware Inventory Data flows Risk Tolerance Business Environment PII Data Security Anomalies and Events Risk Assessment Software Inventory SOP Supply Chain Management Protective Technology Maintenance ISAC Asset Management
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Risk Management Strategy
Security Continous Monitorin
Third-Party Management
Identity Management
Vulnerabilities
Password Management
Security Awareness & Training
Detection processes
Governance
Hardware Inventory
Data flows
Risk Tolerance
Business Environment
PII
Data Security
Anomalies and Events
Risk Assessment
Software Inventory
SOP
Supply Chain Management
Protective Technology
Maintenance
ISAC
Asset Management