Workstation(s)EDRAccountNextStepsControl(s)Distribute(d0Review(ed)AwarenessEncryptionSecurityMaturityLicense(s,-ing)Asset(s)In-ProgressRequirement(s)VPNDataInvestigating(-tion)FirewallEvidenceDiscoveryScoreIncident(s)GAPAnalysisScan(-ing)Server(s)Permission(s)BitdefenderPrioritizeVMDecreaseMalwareColoAudit(-ing)Protection(s)ProgressComplexityMFAWAFStaleUsersPoint(s)MimecastProjectionServiceVulnerability(-ties)TrainingTest(-ing)Email(s)ProcessClick(s,-ed)Attachment(s)PortalSlide(s)LinkZscalerIncreaseFrameworkMigrationFinalizeSensitiveBenefit(s)NetworkStat(s)Event(s)SupportRiskStatusCompliance(-ant)VDIInboundInventoryPolicy(-cies)A/VUpdate(d)Confirm(-ed, -ing,-ation)SplunkURL(s)Phish(-ing)Report(-ing)Workstation(s)EDRAccountNextStepsControl(s)Distribute(d0Review(ed)AwarenessEncryptionSecurityMaturityLicense(s,-ing)Asset(s)In-ProgressRequirement(s)VPNDataInvestigating(-tion)FirewallEvidenceDiscoveryScoreIncident(s)GAPAnalysisScan(-ing)Server(s)Permission(s)BitdefenderPrioritizeVMDecreaseMalwareColoAudit(-ing)Protection(s)ProgressComplexityMFAWAFStaleUsersPoint(s)MimecastProjectionServiceVulnerability(-ties)TrainingTest(-ing)Email(s)ProcessClick(s,-ed)Attachment(s)PortalSlide(s)LinkZscalerIncreaseFrameworkMigrationFinalizeSensitiveBenefit(s)NetworkStat(s)Event(s)SupportRiskStatusCompliance(-ant)VDIInboundInventoryPolicy(-cies)A/VUpdate(d)Confirm(-ed, -ing,-ation)SplunkURL(s)Phish(-ing)Report(-ing)

Security Governance - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
  1. Workstation(s)
  2. EDR
  3. Account
  4. Next Steps
  5. Control(s)
  6. Distribute(d0
  7. Review(ed)
  8. Awareness
  9. Encryption
  10. Security Maturity
  11. License(s, -ing)
  12. Asset(s)
  13. In-Progress
  14. Requirement(s)
  15. VPN
  16. Data
  17. Investigating (-tion)
  18. Firewall
  19. Evidence
  20. Discovery
  21. Score
  22. Incident(s)
  23. GAP Analysis
  24. Scan (-ing)
  25. Server(s)
  26. Permission(s)
  27. Bitdefender
  28. Prioritize
  29. VM
  30. Decrease
  31. Malware
  32. Colo
  33. Audit (-ing)
  34. Protection(s)
  35. Progress
  36. Complexity
  37. MFA
  38. WAF
  39. Stale Users
  40. Point(s)
  41. Mimecast
  42. Projection
  43. Service
  44. Vulnerability (-ties)
  45. Training
  46. Test (-ing)
  47. Email(s)
  48. Process
  49. Click(s, -ed)
  50. Attachment(s)
  51. Portal
  52. Slide(s)
  53. Link
  54. Zscaler
  55. Increase
  56. Framework
  57. Migration
  58. Finalize
  59. Sensitive
  60. Benefit(s)
  61. Network
  62. Stat(s)
  63. Event(s)
  64. Support
  65. Risk
  66. Status
  67. Compliance (-ant)
  68. VDI
  69. Inbound
  70. Inventory
  71. Policy (-cies)
  72. A/V
  73. Update(d)
  74. Confirm (-ed, -ing, -ation)
  75. Splunk
  76. URL(s)
  77. Phish (-ing)
  78. Report (-ing)