Stat(s)MFAProcessDistribute(d0StaleUsersStatusPortalVPNScoreGAPAnalysisDecreaseProtection(s)IncreaseDiscoveryReview(ed)Email(s)InboundScan(-ing)AccountConfirm(-ed, -ing,-ation)License(s,-ing)MalwareSensitiveNextStepsPrioritizeEncryptionSlide(s)Test(-ing)ServiceControl(s)Click(s,-ed)ComplexitySecurityMaturityLinkReport(-ing)ColoSupportVulnerability(-ties)Permission(s)FinalizeURL(s)VDIProjectionPoint(s)FrameworkFirewallIn-ProgressAsset(s)TrainingZscalerVMServer(s)AwarenessBitdefenderEDRInvestigating(-tion)Policy(-cies)MigrationInventoryUpdate(d)WAFEvent(s)Incident(s)Compliance(-ant)ProgressAudit(-ing)Requirement(s)EvidenceNetworkMimecastRiskDataBenefit(s)Attachment(s)SplunkA/VWorkstation(s)Phish(-ing)Stat(s)MFAProcessDistribute(d0StaleUsersStatusPortalVPNScoreGAPAnalysisDecreaseProtection(s)IncreaseDiscoveryReview(ed)Email(s)InboundScan(-ing)AccountConfirm(-ed, -ing,-ation)License(s,-ing)MalwareSensitiveNextStepsPrioritizeEncryptionSlide(s)Test(-ing)ServiceControl(s)Click(s,-ed)ComplexitySecurityMaturityLinkReport(-ing)ColoSupportVulnerability(-ties)Permission(s)FinalizeURL(s)VDIProjectionPoint(s)FrameworkFirewallIn-ProgressAsset(s)TrainingZscalerVMServer(s)AwarenessBitdefenderEDRInvestigating(-tion)Policy(-cies)MigrationInventoryUpdate(d)WAFEvent(s)Incident(s)Compliance(-ant)ProgressAudit(-ing)Requirement(s)EvidenceNetworkMimecastRiskDataBenefit(s)Attachment(s)SplunkA/VWorkstation(s)Phish(-ing)

Security Governance - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
  1. Stat(s)
  2. MFA
  3. Process
  4. Distribute(d0
  5. Stale Users
  6. Status
  7. Portal
  8. VPN
  9. Score
  10. GAP Analysis
  11. Decrease
  12. Protection(s)
  13. Increase
  14. Discovery
  15. Review(ed)
  16. Email(s)
  17. Inbound
  18. Scan (-ing)
  19. Account
  20. Confirm (-ed, -ing, -ation)
  21. License(s, -ing)
  22. Malware
  23. Sensitive
  24. Next Steps
  25. Prioritize
  26. Encryption
  27. Slide(s)
  28. Test (-ing)
  29. Service
  30. Control(s)
  31. Click(s, -ed)
  32. Complexity
  33. Security Maturity
  34. Link
  35. Report (-ing)
  36. Colo
  37. Support
  38. Vulnerability (-ties)
  39. Permission(s)
  40. Finalize
  41. URL(s)
  42. VDI
  43. Projection
  44. Point(s)
  45. Framework
  46. Firewall
  47. In-Progress
  48. Asset(s)
  49. Training
  50. Zscaler
  51. VM
  52. Server(s)
  53. Awareness
  54. Bitdefender
  55. EDR
  56. Investigating (-tion)
  57. Policy (-cies)
  58. Migration
  59. Inventory
  60. Update(d)
  61. WAF
  62. Event(s)
  63. Incident(s)
  64. Compliance (-ant)
  65. Progress
  66. Audit (-ing)
  67. Requirement(s)
  68. Evidence
  69. Network
  70. Mimecast
  71. Risk
  72. Data
  73. Benefit(s)
  74. Attachment(s)
  75. Splunk
  76. A/V
  77. Workstation(s)
  78. Phish (-ing)