ServiceSupportIncreaseMigrationStat(s)Attachment(s)Benefit(s)Policy(-cies)License(s,-ing)LinkEncryptionScoreMimecastDataFirewallDiscoveryEDRProgressPoint(s)ZscalerSplunkAsset(s)PrioritizePhish(-ing)StaleUsersReview(ed)SensitiveInboundEvidenceIn-ProgressGAPAnalysisTest(-ing)Scan(-ing)Email(s)BitdefenderProjectionSlide(s)URL(s)Report(-ing)PortalA/VAwarenessAccountNextStepsWAFInventoryVPNEvent(s)VMVulnerability(-ties)Confirm(-ed, -ing,-ation)Control(s)FinalizeComplexityMalwareSecurityMaturityRiskRequirement(s)ColoFrameworkPermission(s)Compliance(-ant)Protection(s)TrainingServer(s)VDIClick(s,-ed)NetworkMFAProcessStatusAudit(-ing)Incident(s)Distribute(d0Investigating(-tion)Workstation(s)DecreaseUpdate(d)ServiceSupportIncreaseMigrationStat(s)Attachment(s)Benefit(s)Policy(-cies)License(s,-ing)LinkEncryptionScoreMimecastDataFirewallDiscoveryEDRProgressPoint(s)ZscalerSplunkAsset(s)PrioritizePhish(-ing)StaleUsersReview(ed)SensitiveInboundEvidenceIn-ProgressGAPAnalysisTest(-ing)Scan(-ing)Email(s)BitdefenderProjectionSlide(s)URL(s)Report(-ing)PortalA/VAwarenessAccountNextStepsWAFInventoryVPNEvent(s)VMVulnerability(-ties)Confirm(-ed, -ing,-ation)Control(s)FinalizeComplexityMalwareSecurityMaturityRiskRequirement(s)ColoFrameworkPermission(s)Compliance(-ant)Protection(s)TrainingServer(s)VDIClick(s,-ed)NetworkMFAProcessStatusAudit(-ing)Incident(s)Distribute(d0Investigating(-tion)Workstation(s)DecreaseUpdate(d)

Security Governance - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
  1. Service
  2. Support
  3. Increase
  4. Migration
  5. Stat(s)
  6. Attachment(s)
  7. Benefit(s)
  8. Policy (-cies)
  9. License(s, -ing)
  10. Link
  11. Encryption
  12. Score
  13. Mimecast
  14. Data
  15. Firewall
  16. Discovery
  17. EDR
  18. Progress
  19. Point(s)
  20. Zscaler
  21. Splunk
  22. Asset(s)
  23. Prioritize
  24. Phish (-ing)
  25. Stale Users
  26. Review(ed)
  27. Sensitive
  28. Inbound
  29. Evidence
  30. In-Progress
  31. GAP Analysis
  32. Test (-ing)
  33. Scan (-ing)
  34. Email(s)
  35. Bitdefender
  36. Projection
  37. Slide(s)
  38. URL(s)
  39. Report (-ing)
  40. Portal
  41. A/V
  42. Awareness
  43. Account
  44. Next Steps
  45. WAF
  46. Inventory
  47. VPN
  48. Event(s)
  49. VM
  50. Vulnerability (-ties)
  51. Confirm (-ed, -ing, -ation)
  52. Control(s)
  53. Finalize
  54. Complexity
  55. Malware
  56. Security Maturity
  57. Risk
  58. Requirement(s)
  59. Colo
  60. Framework
  61. Permission(s)
  62. Compliance (-ant)
  63. Protection(s)
  64. Training
  65. Server(s)
  66. VDI
  67. Click(s, -ed)
  68. Network
  69. MFA
  70. Process
  71. Status
  72. Audit (-ing)
  73. Incident(s)
  74. Distribute(d0
  75. Investigating (-tion)
  76. Workstation(s)
  77. Decrease
  78. Update(d)