Security Continous Monitorin Supply Chain Management Risk Tolerance SOP Identity Management Third-Party Management Password Management ISAC Software Inventory Security Awareness & Training Maintenance Data Security Business Environment Governance Data flows PII Asset Management Risk Management Strategy Hardware Inventory Risk Assessment Vulnerabilities Detection processes Anomalies and Events Protective Technology Security Continous Monitorin Supply Chain Management Risk Tolerance SOP Identity Management Third-Party Management Password Management ISAC Software Inventory Security Awareness & Training Maintenance Data Security Business Environment Governance Data flows PII Asset Management Risk Management Strategy Hardware Inventory Risk Assessment Vulnerabilities Detection processes Anomalies and Events Protective Technology
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Security Continous Monitorin
Supply Chain Management
Risk Tolerance
SOP
Identity Management
Third-Party Management
Password Management
ISAC
Software Inventory
Security Awareness & Training
Maintenance
Data Security
Business Environment
Governance
Data flows
PII
Asset Management
Risk Management Strategy
Hardware Inventory
Risk Assessment
Vulnerabilities
Detection processes
Anomalies and Events
Protective Technology