LinkControl(s)A/VDiscoveryInvestigating(-tion)InventoryPrioritizeDecreaseBenefit(s)AccountVPNZscalerStaleUsersReport(-ing)ScoreBitdefenderGAPAnalysisPoint(s)Workstation(s)EncryptionLicense(s,-ing)ProgressConfirm(-ed, -ing,-ation)Incident(s)SecurityMaturityRiskEmail(s)ComplexityEvent(s)SupportCompliance(-ant)Server(s)StatusClick(s,-ed)MimecastURL(s)Requirement(s)In-ProgressProtection(s)MalwareFrameworkTrainingAttachment(s)MFAAudit(-ing)Test(-ing)AwarenessStat(s)ProcessEvidenceVulnerability(-ties)FinalizePhish(-ing)Asset(s)Slide(s)InboundIncreaseSplunkNextStepsColoFirewallProjectionScan(-ing)Review(ed)SensitiveNetworkVMPolicy(-cies)DataServiceMigrationPermission(s)VDIWAFDistribute(d0PortalUpdate(d)EDRLinkControl(s)A/VDiscoveryInvestigating(-tion)InventoryPrioritizeDecreaseBenefit(s)AccountVPNZscalerStaleUsersReport(-ing)ScoreBitdefenderGAPAnalysisPoint(s)Workstation(s)EncryptionLicense(s,-ing)ProgressConfirm(-ed, -ing,-ation)Incident(s)SecurityMaturityRiskEmail(s)ComplexityEvent(s)SupportCompliance(-ant)Server(s)StatusClick(s,-ed)MimecastURL(s)Requirement(s)In-ProgressProtection(s)MalwareFrameworkTrainingAttachment(s)MFAAudit(-ing)Test(-ing)AwarenessStat(s)ProcessEvidenceVulnerability(-ties)FinalizePhish(-ing)Asset(s)Slide(s)InboundIncreaseSplunkNextStepsColoFirewallProjectionScan(-ing)Review(ed)SensitiveNetworkVMPolicy(-cies)DataServiceMigrationPermission(s)VDIWAFDistribute(d0PortalUpdate(d)EDR

Security Governance - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
  1. Link
  2. Control(s)
  3. A/V
  4. Discovery
  5. Investigating (-tion)
  6. Inventory
  7. Prioritize
  8. Decrease
  9. Benefit(s)
  10. Account
  11. VPN
  12. Zscaler
  13. Stale Users
  14. Report (-ing)
  15. Score
  16. Bitdefender
  17. GAP Analysis
  18. Point(s)
  19. Workstation(s)
  20. Encryption
  21. License(s, -ing)
  22. Progress
  23. Confirm (-ed, -ing, -ation)
  24. Incident(s)
  25. Security Maturity
  26. Risk
  27. Email(s)
  28. Complexity
  29. Event(s)
  30. Support
  31. Compliance (-ant)
  32. Server(s)
  33. Status
  34. Click(s, -ed)
  35. Mimecast
  36. URL(s)
  37. Requirement(s)
  38. In-Progress
  39. Protection(s)
  40. Malware
  41. Framework
  42. Training
  43. Attachment(s)
  44. MFA
  45. Audit (-ing)
  46. Test (-ing)
  47. Awareness
  48. Stat(s)
  49. Process
  50. Evidence
  51. Vulnerability (-ties)
  52. Finalize
  53. Phish (-ing)
  54. Asset(s)
  55. Slide(s)
  56. Inbound
  57. Increase
  58. Splunk
  59. Next Steps
  60. Colo
  61. Firewall
  62. Projection
  63. Scan (-ing)
  64. Review(ed)
  65. Sensitive
  66. Network
  67. VM
  68. Policy (-cies)
  69. Data
  70. Service
  71. Migration
  72. Permission(s)
  73. VDI
  74. WAF
  75. Distribute(d0
  76. Portal
  77. Update(d)
  78. EDR