CyberSecurityEncryptionAvailabilityInsiderThreatBack-upHackerPasswordCyber-attackDataClassificationNotificationAccountabilityCleanDeskPolicyNine(9)RetentionITSecuritySocialEngineeringPDPABring yourowndevice(BYOD)PhishingEmailsIntegrityWi-FiRestrictedRansomwareDataBreachDigitalSecurityConfidentialCybersecurityBitLockerPDPCSmartDevicesCybercrimeInternetSocialEngineeringIncidentResponseFive(5)C.A.R.EDataProtectionRiskBusinesscontinuitymanagementDeemedConsentHackerITSupport7ZipPersonalDataDPOMalwarePrivacyPolicyFirewallCSACyberSecurityEncryptionAvailabilityInsiderThreatBack-upHackerPasswordCyber-attackDataClassificationNotificationAccountabilityCleanDeskPolicyNine(9)RetentionITSecuritySocialEngineeringPDPABring yourowndevice(BYOD)PhishingEmailsIntegrityWi-FiRestrictedRansomwareDataBreachDigitalSecurityConfidentialCybersecurityBitLockerPDPCSmartDevicesCybercrimeInternetSocialEngineeringIncidentResponseFive(5)C.A.R.EDataProtectionRiskBusinesscontinuitymanagementDeemedConsentHackerITSupport7ZipPersonalDataDPOMalwarePrivacyPolicyFirewallCSA

Compliance Initiative - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Cyber Security
  2. Encryption
  3. Availability
  4. Insider Threat
  5. Back-up
  6. Hacker
  7. Password
  8. Cyber-attack
  9. Data Classification
  10. Notification
  11. Accountability
  12. Clean Desk Policy
  13. Nine (9)
  14. Retention
  15. IT Security
  16. Social Engineering
  17. PDPA
  18. Bring your own device (BYOD)
  19. Phishing Emails
  20. Integrity
  21. Wi-Fi
  22. Restricted
  23. Ransomware
  24. Data Breach
  25. Digital Security
  26. Confidential
  27. Cybersecurity
  28. BitLocker
  29. PDPC
  30. Smart Devices
  31. Cybercrime
  32. Internet
  33. Social Engineering
  34. Incident Response
  35. Five (5)
  36. C.A.R.E
  37. Data Protection
  38. Risk
  39. Business continuity management
  40. Deemed Consent
  41. Hacker
  42. IT Support
  43. 7Zip
  44. Personal Data
  45. DPO
  46. Malware
  47. Privacy Policy
  48. Firewall
  49. CSA