VMBenefit(s)DataStaleUsersSupportComplexityControl(s)FrameworkFinalizeUpdate(d)Protection(s)TrainingSplunkAsset(s)Scan(-ing)Email(s)Review(ed)A/VNextStepsClick(s,-ed)ProjectionPortalServiceMigrationSecurityMaturityScorePolicy(-cies)EvidenceURL(s)EDRColoReport(-ing)IncreaseIn-ProgressGAPAnalysisProgressPhish(-ing)Distribute(d0Slide(s)InventoryVulnerability(-ties)AccountNetworkWorkstation(s)Confirm(-ed, -ing,-ation)RiskPoint(s)ZscalerPrioritizeAudit(-ing)MimecastIncident(s)Permission(s)Compliance(-ant)Event(s)License(s,-ing)FirewallSensitiveDiscoveryAttachment(s)Requirement(s)StatusMalwareStat(s)EncryptionServer(s)MFALinkVDITest(-ing)AwarenessWAFVPNProcessBitdefenderInvestigating(-tion)DecreaseInboundVMBenefit(s)DataStaleUsersSupportComplexityControl(s)FrameworkFinalizeUpdate(d)Protection(s)TrainingSplunkAsset(s)Scan(-ing)Email(s)Review(ed)A/VNextStepsClick(s,-ed)ProjectionPortalServiceMigrationSecurityMaturityScorePolicy(-cies)EvidenceURL(s)EDRColoReport(-ing)IncreaseIn-ProgressGAPAnalysisProgressPhish(-ing)Distribute(d0Slide(s)InventoryVulnerability(-ties)AccountNetworkWorkstation(s)Confirm(-ed, -ing,-ation)RiskPoint(s)ZscalerPrioritizeAudit(-ing)MimecastIncident(s)Permission(s)Compliance(-ant)Event(s)License(s,-ing)FirewallSensitiveDiscoveryAttachment(s)Requirement(s)StatusMalwareStat(s)EncryptionServer(s)MFALinkVDITest(-ing)AwarenessWAFVPNProcessBitdefenderInvestigating(-tion)DecreaseInbound

Security Governance - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
  1. VM
  2. Benefit(s)
  3. Data
  4. Stale Users
  5. Support
  6. Complexity
  7. Control(s)
  8. Framework
  9. Finalize
  10. Update(d)
  11. Protection(s)
  12. Training
  13. Splunk
  14. Asset(s)
  15. Scan (-ing)
  16. Email(s)
  17. Review(ed)
  18. A/V
  19. Next Steps
  20. Click(s, -ed)
  21. Projection
  22. Portal
  23. Service
  24. Migration
  25. Security Maturity
  26. Score
  27. Policy (-cies)
  28. Evidence
  29. URL(s)
  30. EDR
  31. Colo
  32. Report (-ing)
  33. Increase
  34. In-Progress
  35. GAP Analysis
  36. Progress
  37. Phish (-ing)
  38. Distribute(d0
  39. Slide(s)
  40. Inventory
  41. Vulnerability (-ties)
  42. Account
  43. Network
  44. Workstation(s)
  45. Confirm (-ed, -ing, -ation)
  46. Risk
  47. Point(s)
  48. Zscaler
  49. Prioritize
  50. Audit (-ing)
  51. Mimecast
  52. Incident(s)
  53. Permission(s)
  54. Compliance (-ant)
  55. Event(s)
  56. License(s, -ing)
  57. Firewall
  58. Sensitive
  59. Discovery
  60. Attachment(s)
  61. Requirement(s)
  62. Status
  63. Malware
  64. Stat(s)
  65. Encryption
  66. Server(s)
  67. MFA
  68. Link
  69. VDI
  70. Test (-ing)
  71. Awareness
  72. WAF
  73. VPN
  74. Process
  75. Bitdefender
  76. Investigating (-tion)
  77. Decrease
  78. Inbound