Requirement(s)In-ProgressSupportReview(ed)URL(s)Control(s)MimecastPrioritizeColoInventoryZscalerNextStepsSplunkScoreNetworkTest(-ing)Stat(s)BitdefenderDiscoveryConfirm(-ed, -ing,-ation)Server(s)LinkEvent(s)Vulnerability(-ties)InboundProtection(s)AwarenessCompliance(-ant)PortalSensitiveRiskPolicy(-cies)License(s,-ing)GAPAnalysisFinalizeMalwareFirewallDecreasePoint(s)MFAVPNA/VEmail(s)MigrationEncryptionSecurityMaturityEDRClick(s,-ed)AccountTrainingSlide(s)ComplexityAudit(-ing)Investigating(-tion)Attachment(s)EvidencePermission(s)VDIProjectionStaleUsersIncident(s)Phish(-ing)Update(d)WAFDataServiceFrameworkIncreaseScan(-ing)Asset(s)ProgressWorkstation(s)ProcessStatusDistribute(d0Report(-ing)VMBenefit(s)Requirement(s)In-ProgressSupportReview(ed)URL(s)Control(s)MimecastPrioritizeColoInventoryZscalerNextStepsSplunkScoreNetworkTest(-ing)Stat(s)BitdefenderDiscoveryConfirm(-ed, -ing,-ation)Server(s)LinkEvent(s)Vulnerability(-ties)InboundProtection(s)AwarenessCompliance(-ant)PortalSensitiveRiskPolicy(-cies)License(s,-ing)GAPAnalysisFinalizeMalwareFirewallDecreasePoint(s)MFAVPNA/VEmail(s)MigrationEncryptionSecurityMaturityEDRClick(s,-ed)AccountTrainingSlide(s)ComplexityAudit(-ing)Investigating(-tion)Attachment(s)EvidencePermission(s)VDIProjectionStaleUsersIncident(s)Phish(-ing)Update(d)WAFDataServiceFrameworkIncreaseScan(-ing)Asset(s)ProgressWorkstation(s)ProcessStatusDistribute(d0Report(-ing)VMBenefit(s)

Security Governance - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
  1. Requirement(s)
  2. In-Progress
  3. Support
  4. Review(ed)
  5. URL(s)
  6. Control(s)
  7. Mimecast
  8. Prioritize
  9. Colo
  10. Inventory
  11. Zscaler
  12. Next Steps
  13. Splunk
  14. Score
  15. Network
  16. Test (-ing)
  17. Stat(s)
  18. Bitdefender
  19. Discovery
  20. Confirm (-ed, -ing, -ation)
  21. Server(s)
  22. Link
  23. Event(s)
  24. Vulnerability (-ties)
  25. Inbound
  26. Protection(s)
  27. Awareness
  28. Compliance (-ant)
  29. Portal
  30. Sensitive
  31. Risk
  32. Policy (-cies)
  33. License(s, -ing)
  34. GAP Analysis
  35. Finalize
  36. Malware
  37. Firewall
  38. Decrease
  39. Point(s)
  40. MFA
  41. VPN
  42. A/V
  43. Email(s)
  44. Migration
  45. Encryption
  46. Security Maturity
  47. EDR
  48. Click(s, -ed)
  49. Account
  50. Training
  51. Slide(s)
  52. Complexity
  53. Audit (-ing)
  54. Investigating (-tion)
  55. Attachment(s)
  56. Evidence
  57. Permission(s)
  58. VDI
  59. Projection
  60. Stale Users
  61. Incident(s)
  62. Phish (-ing)
  63. Update(d)
  64. WAF
  65. Data
  66. Service
  67. Framework
  68. Increase
  69. Scan (-ing)
  70. Asset(s)
  71. Progress
  72. Workstation(s)
  73. Process
  74. Status
  75. Distribute(d0
  76. Report (-ing)
  77. VM
  78. Benefit(s)