Email(s)Server(s)Compliance(-ant)VDIProcessVMBitdefenderRiskVulnerability(-ties)InboundDistribute(d0Audit(-ing)DataMimecastEvidenceMalwareUpdate(d)Policy(-cies)SplunkFrameworkURL(s)Review(ed)A/VScan(-ing)Incident(s)Phish(-ing)PrioritizeEvent(s)Point(s)ZscalerWAFScoreIncreaseClick(s,-ed)ProgressAccountAsset(s)Control(s)Protection(s)NetworkSupportStatusBenefit(s)EncryptionConfirm(-ed, -ing,-ation)Workstation(s)SensitiveServiceRequirement(s)Investigating(-tion)StaleUsersAttachment(s)MFATrainingFinalizeDecreaseMigrationSlide(s)ComplexityPermission(s)ProjectionGAPAnalysisVPNSecurityMaturityStat(s)NextStepsPortalFirewallAwarenessEDRLicense(s,-ing)DiscoveryLinkInventoryReport(-ing)In-ProgressColoTest(-ing)Email(s)Server(s)Compliance(-ant)VDIProcessVMBitdefenderRiskVulnerability(-ties)InboundDistribute(d0Audit(-ing)DataMimecastEvidenceMalwareUpdate(d)Policy(-cies)SplunkFrameworkURL(s)Review(ed)A/VScan(-ing)Incident(s)Phish(-ing)PrioritizeEvent(s)Point(s)ZscalerWAFScoreIncreaseClick(s,-ed)ProgressAccountAsset(s)Control(s)Protection(s)NetworkSupportStatusBenefit(s)EncryptionConfirm(-ed, -ing,-ation)Workstation(s)SensitiveServiceRequirement(s)Investigating(-tion)StaleUsersAttachment(s)MFATrainingFinalizeDecreaseMigrationSlide(s)ComplexityPermission(s)ProjectionGAPAnalysisVPNSecurityMaturityStat(s)NextStepsPortalFirewallAwarenessEDRLicense(s,-ing)DiscoveryLinkInventoryReport(-ing)In-ProgressColoTest(-ing)

Security Governance - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
  1. Email(s)
  2. Server(s)
  3. Compliance (-ant)
  4. VDI
  5. Process
  6. VM
  7. Bitdefender
  8. Risk
  9. Vulnerability (-ties)
  10. Inbound
  11. Distribute(d0
  12. Audit (-ing)
  13. Data
  14. Mimecast
  15. Evidence
  16. Malware
  17. Update(d)
  18. Policy (-cies)
  19. Splunk
  20. Framework
  21. URL(s)
  22. Review(ed)
  23. A/V
  24. Scan (-ing)
  25. Incident(s)
  26. Phish (-ing)
  27. Prioritize
  28. Event(s)
  29. Point(s)
  30. Zscaler
  31. WAF
  32. Score
  33. Increase
  34. Click(s, -ed)
  35. Progress
  36. Account
  37. Asset(s)
  38. Control(s)
  39. Protection(s)
  40. Network
  41. Support
  42. Status
  43. Benefit(s)
  44. Encryption
  45. Confirm (-ed, -ing, -ation)
  46. Workstation(s)
  47. Sensitive
  48. Service
  49. Requirement(s)
  50. Investigating (-tion)
  51. Stale Users
  52. Attachment(s)
  53. MFA
  54. Training
  55. Finalize
  56. Decrease
  57. Migration
  58. Slide(s)
  59. Complexity
  60. Permission(s)
  61. Projection
  62. GAP Analysis
  63. VPN
  64. Security Maturity
  65. Stat(s)
  66. Next Steps
  67. Portal
  68. Firewall
  69. Awareness
  70. EDR
  71. License(s, -ing)
  72. Discovery
  73. Link
  74. Inventory
  75. Report (-ing)
  76. In-Progress
  77. Colo
  78. Test (-ing)