Encryption Strategic Risk Financial Risk Data loss prevention (DLP) system Data Minimization Reputational Risk DAD Triad Detective Controls Disclosure Deterrent Controls Compliance Risk Tokenization Caesar Cipher Integrity Technical Controls CIA Triad Data in processing Managerial Controls Masking Preventive Controls Operational Risk Data in motion Control Objectives Confidentiality Physical Controls Alteration De- identification Security Controls Operational Controls Corrective Controls Denial Data At Rest Security incidents Compensating Controls Availability Encryption Strategic Risk Financial Risk Data loss prevention (DLP) system Data Minimization Reputational Risk DAD Triad Detective Controls Disclosure Deterrent Controls Compliance Risk Tokenization Caesar Cipher Integrity Technical Controls CIA Triad Data in processing Managerial Controls Masking Preventive Controls Operational Risk Data in motion Control Objectives Confidentiality Physical Controls Alteration De- identification Security Controls Operational Controls Corrective Controls Denial Data At Rest Security incidents Compensating Controls Availability
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Encryption
Strategic Risk
Financial Risk
Data loss prevention (DLP) system
Data Minimization
Reputational Risk
DAD Triad
Detective Controls
Disclosure
Deterrent Controls
Compliance Risk
Tokenization
Caesar Cipher
Integrity
Technical Controls
CIA Triad
Data in processing
Managerial Controls
Masking
Preventive Controls
Operational Risk
Data in motion
Control Objectives
Confidentiality
Physical Controls
Alteration
De-identification
Security Controls
Operational Controls
Corrective Controls
Denial
Data At Rest
Security incidents
Compensating Controls
Availability