Reputational Risk Disclosure Physical Controls CIA Triad Security incidents Denial Integrity Compliance Risk Alteration Compensating Controls Corrective Controls Availability Masking Data Minimization Tokenization Caesar Cipher Data At Rest De- identification Encryption Managerial Controls Data in motion Data in processing Strategic Risk Detective Controls Operational Risk DAD Triad Data loss prevention (DLP) system Operational Controls Confidentiality Control Objectives Preventive Controls Financial Risk Deterrent Controls Security Controls Technical Controls Reputational Risk Disclosure Physical Controls CIA Triad Security incidents Denial Integrity Compliance Risk Alteration Compensating Controls Corrective Controls Availability Masking Data Minimization Tokenization Caesar Cipher Data At Rest De- identification Encryption Managerial Controls Data in motion Data in processing Strategic Risk Detective Controls Operational Risk DAD Triad Data loss prevention (DLP) system Operational Controls Confidentiality Control Objectives Preventive Controls Financial Risk Deterrent Controls Security Controls Technical Controls
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Reputational Risk
Disclosure
Physical Controls
CIA Triad
Security incidents
Denial
Integrity
Compliance Risk
Alteration
Compensating Controls
Corrective Controls
Availability
Masking
Data Minimization
Tokenization
Caesar Cipher
Data At Rest
De-identification
Encryption
Managerial Controls
Data in motion
Data in processing
Strategic Risk
Detective Controls
Operational Risk
DAD Triad
Data loss prevention (DLP) system
Operational Controls
Confidentiality
Control Objectives
Preventive Controls
Financial Risk
Deterrent Controls
Security Controls
Technical Controls