EncryptionPortalScan(-ing)DecreaseSecurityMaturityServer(s)Update(d)Protection(s)URL(s)Report(-ing)AccountVMWAFBenefit(s)Click(s,-ed)EDRRiskGAPAnalysisStaleUsersProgressAttachment(s)StatusMimecastStat(s)SplunkWorkstation(s)Vulnerability(-ties)IncreaseZscalerPrioritizeScorePhish(-ing)VDIEmail(s)FinalizeEvidenceDataInventoryPolicy(-cies)ComplexityFrameworkConfirm(-ed, -ing,-ation)Incident(s)ProjectionLinkSensitiveIn-ProgressDiscoveryNextStepsSlide(s)ServiceVPNMigrationReview(ed)TrainingPermission(s)ColoAudit(-ing)BitdefenderEvent(s)AwarenessCompliance(-ant)License(s,-ing)A/VRequirement(s)Test(-ing)SupportFirewallControl(s)Asset(s)NetworkPoint(s)InboundInvestigating(-tion)ProcessMalwareMFADistribute(d0EncryptionPortalScan(-ing)DecreaseSecurityMaturityServer(s)Update(d)Protection(s)URL(s)Report(-ing)AccountVMWAFBenefit(s)Click(s,-ed)EDRRiskGAPAnalysisStaleUsersProgressAttachment(s)StatusMimecastStat(s)SplunkWorkstation(s)Vulnerability(-ties)IncreaseZscalerPrioritizeScorePhish(-ing)VDIEmail(s)FinalizeEvidenceDataInventoryPolicy(-cies)ComplexityFrameworkConfirm(-ed, -ing,-ation)Incident(s)ProjectionLinkSensitiveIn-ProgressDiscoveryNextStepsSlide(s)ServiceVPNMigrationReview(ed)TrainingPermission(s)ColoAudit(-ing)BitdefenderEvent(s)AwarenessCompliance(-ant)License(s,-ing)A/VRequirement(s)Test(-ing)SupportFirewallControl(s)Asset(s)NetworkPoint(s)InboundInvestigating(-tion)ProcessMalwareMFADistribute(d0

Security Governance - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
  1. Encryption
  2. Portal
  3. Scan (-ing)
  4. Decrease
  5. Security Maturity
  6. Server(s)
  7. Update(d)
  8. Protection(s)
  9. URL(s)
  10. Report (-ing)
  11. Account
  12. VM
  13. WAF
  14. Benefit(s)
  15. Click(s, -ed)
  16. EDR
  17. Risk
  18. GAP Analysis
  19. Stale Users
  20. Progress
  21. Attachment(s)
  22. Status
  23. Mimecast
  24. Stat(s)
  25. Splunk
  26. Workstation(s)
  27. Vulnerability (-ties)
  28. Increase
  29. Zscaler
  30. Prioritize
  31. Score
  32. Phish (-ing)
  33. VDI
  34. Email(s)
  35. Finalize
  36. Evidence
  37. Data
  38. Inventory
  39. Policy (-cies)
  40. Complexity
  41. Framework
  42. Confirm (-ed, -ing, -ation)
  43. Incident(s)
  44. Projection
  45. Link
  46. Sensitive
  47. In-Progress
  48. Discovery
  49. Next Steps
  50. Slide(s)
  51. Service
  52. VPN
  53. Migration
  54. Review(ed)
  55. Training
  56. Permission(s)
  57. Colo
  58. Audit (-ing)
  59. Bitdefender
  60. Event(s)
  61. Awareness
  62. Compliance (-ant)
  63. License(s, -ing)
  64. A/V
  65. Requirement(s)
  66. Test (-ing)
  67. Support
  68. Firewall
  69. Control(s)
  70. Asset(s)
  71. Network
  72. Point(s)
  73. Inbound
  74. Investigating (-tion)
  75. Process
  76. Malware
  77. MFA
  78. Distribute(d0