PortalEvidenceFinalizeMimecastWorkstation(s)InboundColoSensitiveSupportDataMFANetworkControl(s)ComplexityLinkGAPAnalysisUpdate(d)MigrationProtection(s)Test(-ing)Compliance(-ant)ZscalerIn-ProgressVDIBitdefenderLicense(s,-ing)FirewallProgressServer(s)Benefit(s)DecreaseURL(s)ProcessEDRSecurityMaturityMalwareAccountProjectionStaleUsersPoint(s)VMRiskStat(s)PrioritizeStatusA/VVPNEncryptionIncident(s)Slide(s)InventoryWAFAsset(s)AwarenessSplunkScan(-ing)Distribute(d0Email(s)Vulnerability(-ties)IncreaseReview(ed)ServiceTrainingReport(-ing)Permission(s)Event(s)ScoreInvestigating(-tion)Attachment(s)Audit(-ing)Policy(-cies)Confirm(-ed, -ing,-ation)Phish(-ing)FrameworkNextStepsClick(s,-ed)DiscoveryRequirement(s)PortalEvidenceFinalizeMimecastWorkstation(s)InboundColoSensitiveSupportDataMFANetworkControl(s)ComplexityLinkGAPAnalysisUpdate(d)MigrationProtection(s)Test(-ing)Compliance(-ant)ZscalerIn-ProgressVDIBitdefenderLicense(s,-ing)FirewallProgressServer(s)Benefit(s)DecreaseURL(s)ProcessEDRSecurityMaturityMalwareAccountProjectionStaleUsersPoint(s)VMRiskStat(s)PrioritizeStatusA/VVPNEncryptionIncident(s)Slide(s)InventoryWAFAsset(s)AwarenessSplunkScan(-ing)Distribute(d0Email(s)Vulnerability(-ties)IncreaseReview(ed)ServiceTrainingReport(-ing)Permission(s)Event(s)ScoreInvestigating(-tion)Attachment(s)Audit(-ing)Policy(-cies)Confirm(-ed, -ing,-ation)Phish(-ing)FrameworkNextStepsClick(s,-ed)DiscoveryRequirement(s)

Security Governance - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
  1. Portal
  2. Evidence
  3. Finalize
  4. Mimecast
  5. Workstation(s)
  6. Inbound
  7. Colo
  8. Sensitive
  9. Support
  10. Data
  11. MFA
  12. Network
  13. Control(s)
  14. Complexity
  15. Link
  16. GAP Analysis
  17. Update(d)
  18. Migration
  19. Protection(s)
  20. Test (-ing)
  21. Compliance (-ant)
  22. Zscaler
  23. In-Progress
  24. VDI
  25. Bitdefender
  26. License(s, -ing)
  27. Firewall
  28. Progress
  29. Server(s)
  30. Benefit(s)
  31. Decrease
  32. URL(s)
  33. Process
  34. EDR
  35. Security Maturity
  36. Malware
  37. Account
  38. Projection
  39. Stale Users
  40. Point(s)
  41. VM
  42. Risk
  43. Stat(s)
  44. Prioritize
  45. Status
  46. A/V
  47. VPN
  48. Encryption
  49. Incident(s)
  50. Slide(s)
  51. Inventory
  52. WAF
  53. Asset(s)
  54. Awareness
  55. Splunk
  56. Scan (-ing)
  57. Distribute(d0
  58. Email(s)
  59. Vulnerability (-ties)
  60. Increase
  61. Review(ed)
  62. Service
  63. Training
  64. Report (-ing)
  65. Permission(s)
  66. Event(s)
  67. Score
  68. Investigating (-tion)
  69. Attachment(s)
  70. Audit (-ing)
  71. Policy (-cies)
  72. Confirm (-ed, -ing, -ation)
  73. Phish (-ing)
  74. Framework
  75. Next Steps
  76. Click(s, -ed)
  77. Discovery
  78. Requirement(s)