Vulnerabilities Security Continous Monitorin Anomalies and Events Password Management ISAC Protective Technology Supply Chain Management Software Inventory Maintenance Data flows Identity Management Risk Tolerance SOP Detection processes Governance Asset Management Security Awareness & Training Third-Party Management Risk Assessment Business Environment Hardware Inventory PII Risk Management Strategy Data Security Vulnerabilities Security Continous Monitorin Anomalies and Events Password Management ISAC Protective Technology Supply Chain Management Software Inventory Maintenance Data flows Identity Management Risk Tolerance SOP Detection processes Governance Asset Management Security Awareness & Training Third-Party Management Risk Assessment Business Environment Hardware Inventory PII Risk Management Strategy Data Security
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Vulnerabilities
Security Continous Monitorin
Anomalies and Events
Password Management
ISAC
Protective Technology
Supply Chain Management
Software Inventory
Maintenance
Data flows
Identity Management
Risk Tolerance
SOP
Detection processes
Governance
Asset Management
Security Awareness & Training
Third-Party Management
Risk Assessment
Business Environment
Hardware Inventory
PII
Risk Management Strategy
Data Security