Anomalies and Events Third-Party Management Data flows Security Awareness & Training SOP Protective Technology Maintenance Identity Management Data Security PII Security Continous Monitorin Detection processes Business Environment Hardware Inventory Risk Tolerance Password Management Supply Chain Management Risk Management Strategy Vulnerabilities Governance ISAC Software Inventory Risk Assessment Asset Management Anomalies and Events Third-Party Management Data flows Security Awareness & Training SOP Protective Technology Maintenance Identity Management Data Security PII Security Continous Monitorin Detection processes Business Environment Hardware Inventory Risk Tolerance Password Management Supply Chain Management Risk Management Strategy Vulnerabilities Governance ISAC Software Inventory Risk Assessment Asset Management
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Anomalies and Events
Third-Party Management
Data flows
Security Awareness & Training
SOP
Protective Technology
Maintenance
Identity Management
Data Security
PII
Security Continous Monitorin
Detection processes
Business Environment
Hardware Inventory
Risk Tolerance
Password Management
Supply Chain Management
Risk Management Strategy
Vulnerabilities
Governance
ISAC
Software Inventory
Risk Assessment
Asset Management