Report(-ing)Protection(s)FrameworkEDRServiceStat(s)Control(s)Permission(s)FirewallNetworkSecurityMaturityVMDataEmail(s)SensitiveMalwareStatusInvestigating(-tion)Review(ed)AwarenessPolicy(-cies)A/VRiskGAPAnalysisConfirm(-ed, -ing,-ation)ColoCompliance(-ant)Attachment(s)Scan(-ing)StaleUsersLinkMimecastVulnerability(-ties)URL(s)ScoreWorkstation(s)Benefit(s)Incident(s)MigrationLicense(s,-ing)Update(d)DiscoveryBitdefenderMFAEvent(s)IncreaseProjectionAccountDistribute(d0Phish(-ing)ComplexitySlide(s)PortalDecreaseRequirement(s)Point(s)In-ProgressProcessZscalerClick(s,-ed)FinalizeProgressWAFNextStepsEvidenceVDISupportTrainingInventoryInboundPrioritizeVPNServer(s)Asset(s)EncryptionAudit(-ing)Test(-ing)SplunkReport(-ing)Protection(s)FrameworkEDRServiceStat(s)Control(s)Permission(s)FirewallNetworkSecurityMaturityVMDataEmail(s)SensitiveMalwareStatusInvestigating(-tion)Review(ed)AwarenessPolicy(-cies)A/VRiskGAPAnalysisConfirm(-ed, -ing,-ation)ColoCompliance(-ant)Attachment(s)Scan(-ing)StaleUsersLinkMimecastVulnerability(-ties)URL(s)ScoreWorkstation(s)Benefit(s)Incident(s)MigrationLicense(s,-ing)Update(d)DiscoveryBitdefenderMFAEvent(s)IncreaseProjectionAccountDistribute(d0Phish(-ing)ComplexitySlide(s)PortalDecreaseRequirement(s)Point(s)In-ProgressProcessZscalerClick(s,-ed)FinalizeProgressWAFNextStepsEvidenceVDISupportTrainingInventoryInboundPrioritizeVPNServer(s)Asset(s)EncryptionAudit(-ing)Test(-ing)Splunk

Security Governance - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
  1. Report (-ing)
  2. Protection(s)
  3. Framework
  4. EDR
  5. Service
  6. Stat(s)
  7. Control(s)
  8. Permission(s)
  9. Firewall
  10. Network
  11. Security Maturity
  12. VM
  13. Data
  14. Email(s)
  15. Sensitive
  16. Malware
  17. Status
  18. Investigating (-tion)
  19. Review(ed)
  20. Awareness
  21. Policy (-cies)
  22. A/V
  23. Risk
  24. GAP Analysis
  25. Confirm (-ed, -ing, -ation)
  26. Colo
  27. Compliance (-ant)
  28. Attachment(s)
  29. Scan (-ing)
  30. Stale Users
  31. Link
  32. Mimecast
  33. Vulnerability (-ties)
  34. URL(s)
  35. Score
  36. Workstation(s)
  37. Benefit(s)
  38. Incident(s)
  39. Migration
  40. License(s, -ing)
  41. Update(d)
  42. Discovery
  43. Bitdefender
  44. MFA
  45. Event(s)
  46. Increase
  47. Projection
  48. Account
  49. Distribute(d0
  50. Phish (-ing)
  51. Complexity
  52. Slide(s)
  53. Portal
  54. Decrease
  55. Requirement(s)
  56. Point(s)
  57. In-Progress
  58. Process
  59. Zscaler
  60. Click(s, -ed)
  61. Finalize
  62. Progress
  63. WAF
  64. Next Steps
  65. Evidence
  66. VDI
  67. Support
  68. Training
  69. Inventory
  70. Inbound
  71. Prioritize
  72. VPN
  73. Server(s)
  74. Asset(s)
  75. Encryption
  76. Audit (-ing)
  77. Test (-ing)
  78. Splunk