Operational Risk Denial Managerial Controls Data At Rest Deterrent Controls Security incidents Confidentiality Tokenization Technical Controls Alteration Physical Controls Compliance Risk CIA Triad Security Controls Integrity Strategic Risk Preventive Controls Data loss prevention (DLP) system Masking DAD Triad Control Objectives Detective Controls Data in motion Financial Risk Caesar Cipher Data in processing Availability Data Minimization Corrective Controls Compensating Controls Encryption Disclosure De- identification Operational Controls Reputational Risk Operational Risk Denial Managerial Controls Data At Rest Deterrent Controls Security incidents Confidentiality Tokenization Technical Controls Alteration Physical Controls Compliance Risk CIA Triad Security Controls Integrity Strategic Risk Preventive Controls Data loss prevention (DLP) system Masking DAD Triad Control Objectives Detective Controls Data in motion Financial Risk Caesar Cipher Data in processing Availability Data Minimization Corrective Controls Compensating Controls Encryption Disclosure De- identification Operational Controls Reputational Risk
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Operational Risk
Denial
Managerial Controls
Data At Rest
Deterrent Controls
Security incidents
Confidentiality
Tokenization
Technical Controls
Alteration
Physical Controls
Compliance Risk
CIA Triad
Security Controls
Integrity
Strategic Risk
Preventive Controls
Data loss prevention (DLP) system
Masking
DAD Triad
Control Objectives
Detective Controls
Data in motion
Financial Risk
Caesar Cipher
Data in processing
Availability
Data Minimization
Corrective Controls
Compensating Controls
Encryption
Disclosure
De-identification
Operational Controls
Reputational Risk