Third-Party Management Anomalies and Events Supply Chain Management Risk Management Strategy Vulnerabilities Software Inventory Hardware Inventory Business Environment Risk Assessment Protective Technology Risk Tolerance Data flows Detection processes Asset Management Password Management SOP Identity Management PII Governance Data Security ISAC Security Awareness & Training Maintenance Security Continous Monitorin Third-Party Management Anomalies and Events Supply Chain Management Risk Management Strategy Vulnerabilities Software Inventory Hardware Inventory Business Environment Risk Assessment Protective Technology Risk Tolerance Data flows Detection processes Asset Management Password Management SOP Identity Management PII Governance Data Security ISAC Security Awareness & Training Maintenance Security Continous Monitorin
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Third-Party Management
Anomalies and Events
Supply Chain Management
Risk Management Strategy
Vulnerabilities
Software Inventory
Hardware Inventory
Business Environment
Risk Assessment
Protective Technology
Risk Tolerance
Data flows
Detection processes
Asset Management
Password Management
SOP
Identity Management
PII
Governance
Data Security
ISAC
Security Awareness & Training
Maintenance
Security Continous Monitorin