Scan(-ing)Slide(s)Event(s)MigrationServer(s)Stat(s)Incident(s)Point(s)EvidenceDiscoveryFirewallTest(-ing)NetworkScoreRequirement(s)Protection(s)GAPAnalysisServiceAsset(s)Phish(-ing)MalwareDataDistribute(d0StaleUsersPortalInventoryReport(-ing)Permission(s)Compliance(-ant)Workstation(s)VDITrainingProcessSecurityMaturityAudit(-ing)MFADecreaseColoURL(s)ZscalerComplexityVMEncryptionSensitiveAccountA/VVPNVulnerability(-ties)Investigating(-tion)ProgressIncreaseBitdefenderInboundEmail(s)WAFStatusBenefit(s)NextStepsEDRConfirm(-ed, -ing,-ation)Update(d)MimecastRiskClick(s,-ed)ProjectionIn-ProgressLinkPolicy(-cies)Attachment(s)SplunkLicense(s,-ing)Review(ed)AwarenessFinalizeFrameworkPrioritizeControl(s)SupportScan(-ing)Slide(s)Event(s)MigrationServer(s)Stat(s)Incident(s)Point(s)EvidenceDiscoveryFirewallTest(-ing)NetworkScoreRequirement(s)Protection(s)GAPAnalysisServiceAsset(s)Phish(-ing)MalwareDataDistribute(d0StaleUsersPortalInventoryReport(-ing)Permission(s)Compliance(-ant)Workstation(s)VDITrainingProcessSecurityMaturityAudit(-ing)MFADecreaseColoURL(s)ZscalerComplexityVMEncryptionSensitiveAccountA/VVPNVulnerability(-ties)Investigating(-tion)ProgressIncreaseBitdefenderInboundEmail(s)WAFStatusBenefit(s)NextStepsEDRConfirm(-ed, -ing,-ation)Update(d)MimecastRiskClick(s,-ed)ProjectionIn-ProgressLinkPolicy(-cies)Attachment(s)SplunkLicense(s,-ing)Review(ed)AwarenessFinalizeFrameworkPrioritizeControl(s)Support

Security Governance - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
  1. Scan (-ing)
  2. Slide(s)
  3. Event(s)
  4. Migration
  5. Server(s)
  6. Stat(s)
  7. Incident(s)
  8. Point(s)
  9. Evidence
  10. Discovery
  11. Firewall
  12. Test (-ing)
  13. Network
  14. Score
  15. Requirement(s)
  16. Protection(s)
  17. GAP Analysis
  18. Service
  19. Asset(s)
  20. Phish (-ing)
  21. Malware
  22. Data
  23. Distribute(d0
  24. Stale Users
  25. Portal
  26. Inventory
  27. Report (-ing)
  28. Permission(s)
  29. Compliance (-ant)
  30. Workstation(s)
  31. VDI
  32. Training
  33. Process
  34. Security Maturity
  35. Audit (-ing)
  36. MFA
  37. Decrease
  38. Colo
  39. URL(s)
  40. Zscaler
  41. Complexity
  42. VM
  43. Encryption
  44. Sensitive
  45. Account
  46. A/V
  47. VPN
  48. Vulnerability (-ties)
  49. Investigating (-tion)
  50. Progress
  51. Increase
  52. Bitdefender
  53. Inbound
  54. Email(s)
  55. WAF
  56. Status
  57. Benefit(s)
  58. Next Steps
  59. EDR
  60. Confirm (-ed, -ing, -ation)
  61. Update(d)
  62. Mimecast
  63. Risk
  64. Click(s, -ed)
  65. Projection
  66. In-Progress
  67. Link
  68. Policy (-cies)
  69. Attachment(s)
  70. Splunk
  71. License(s, -ing)
  72. Review(ed)
  73. Awareness
  74. Finalize
  75. Framework
  76. Prioritize
  77. Control(s)
  78. Support