Attachment(s)Stat(s)TrainingServer(s)DiscoveryStatusMimecastIncreasePrioritizeCompliance(-ant)Review(ed)Permission(s)GAPAnalysisProjectionEncryptionMigrationServiceColoNextStepsFinalizeBitdefenderVPNEvidenceVDIEDRRequirement(s)InboundAwarenessTest(-ing)AccountURL(s)FirewallWorkstation(s)PortalIn-ProgressPhish(-ing)Asset(s)SecurityMaturitySupportSensitivePoint(s)ProgressEmail(s)InventoryEvent(s)NetworkMFAInvestigating(-tion)VMBenefit(s)Incident(s)Distribute(d0Slide(s)Audit(-ing)FrameworkDataRiskProcessA/VLinkScan(-ing)WAFProtection(s)ScorePolicy(-cies)Report(-ing)ComplexityLicense(s,-ing)DecreaseVulnerability(-ties)ZscalerConfirm(-ed, -ing,-ation)MalwareStaleUsersSplunkControl(s)Click(s,-ed)Update(d)Attachment(s)Stat(s)TrainingServer(s)DiscoveryStatusMimecastIncreasePrioritizeCompliance(-ant)Review(ed)Permission(s)GAPAnalysisProjectionEncryptionMigrationServiceColoNextStepsFinalizeBitdefenderVPNEvidenceVDIEDRRequirement(s)InboundAwarenessTest(-ing)AccountURL(s)FirewallWorkstation(s)PortalIn-ProgressPhish(-ing)Asset(s)SecurityMaturitySupportSensitivePoint(s)ProgressEmail(s)InventoryEvent(s)NetworkMFAInvestigating(-tion)VMBenefit(s)Incident(s)Distribute(d0Slide(s)Audit(-ing)FrameworkDataRiskProcessA/VLinkScan(-ing)WAFProtection(s)ScorePolicy(-cies)Report(-ing)ComplexityLicense(s,-ing)DecreaseVulnerability(-ties)ZscalerConfirm(-ed, -ing,-ation)MalwareStaleUsersSplunkControl(s)Click(s,-ed)Update(d)

Security Governance - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
  1. Attachment(s)
  2. Stat(s)
  3. Training
  4. Server(s)
  5. Discovery
  6. Status
  7. Mimecast
  8. Increase
  9. Prioritize
  10. Compliance (-ant)
  11. Review(ed)
  12. Permission(s)
  13. GAP Analysis
  14. Projection
  15. Encryption
  16. Migration
  17. Service
  18. Colo
  19. Next Steps
  20. Finalize
  21. Bitdefender
  22. VPN
  23. Evidence
  24. VDI
  25. EDR
  26. Requirement(s)
  27. Inbound
  28. Awareness
  29. Test (-ing)
  30. Account
  31. URL(s)
  32. Firewall
  33. Workstation(s)
  34. Portal
  35. In-Progress
  36. Phish (-ing)
  37. Asset(s)
  38. Security Maturity
  39. Support
  40. Sensitive
  41. Point(s)
  42. Progress
  43. Email(s)
  44. Inventory
  45. Event(s)
  46. Network
  47. MFA
  48. Investigating (-tion)
  49. VM
  50. Benefit(s)
  51. Incident(s)
  52. Distribute(d0
  53. Slide(s)
  54. Audit (-ing)
  55. Framework
  56. Data
  57. Risk
  58. Process
  59. A/V
  60. Link
  61. Scan (-ing)
  62. WAF
  63. Protection(s)
  64. Score
  65. Policy (-cies)
  66. Report (-ing)
  67. Complexity
  68. License(s, -ing)
  69. Decrease
  70. Vulnerability (-ties)
  71. Zscaler
  72. Confirm (-ed, -ing, -ation)
  73. Malware
  74. Stale Users
  75. Splunk
  76. Control(s)
  77. Click(s, -ed)
  78. Update(d)