Technical Controls Confidentiality Masking Compliance Risk Integrity CIA Triad Deterrent Controls DAD Triad Data in motion Data Minimization Compensating Controls Operational Risk Operational Controls Data in processing Data loss prevention (DLP) system Data At Rest Encryption Alteration Disclosure Security Controls Corrective Controls Strategic Risk Preventive Controls Control Objectives Security incidents Managerial Controls Availability Caesar Cipher Detective Controls Reputational Risk Tokenization Financial Risk Physical Controls Denial De- identification Technical Controls Confidentiality Masking Compliance Risk Integrity CIA Triad Deterrent Controls DAD Triad Data in motion Data Minimization Compensating Controls Operational Risk Operational Controls Data in processing Data loss prevention (DLP) system Data At Rest Encryption Alteration Disclosure Security Controls Corrective Controls Strategic Risk Preventive Controls Control Objectives Security incidents Managerial Controls Availability Caesar Cipher Detective Controls Reputational Risk Tokenization Financial Risk Physical Controls Denial De- identification
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Technical Controls
Confidentiality
Masking
Compliance Risk
Integrity
CIA Triad
Deterrent Controls
DAD Triad
Data in motion
Data Minimization
Compensating Controls
Operational Risk
Operational Controls
Data in processing
Data loss prevention (DLP) system
Data At Rest
Encryption
Alteration
Disclosure
Security Controls
Corrective Controls
Strategic Risk
Preventive Controls
Control Objectives
Security incidents
Managerial Controls
Availability
Caesar Cipher
Detective Controls
Reputational Risk
Tokenization
Financial Risk
Physical Controls
Denial
De-identification