Impact Contribution Data Governance Diagnostic Analytics Community Contribution String Better off Who Editor Define Leverage Objective Data Breach Org Admin Collect Quality Cybersecurity Impact Measurement and Management (IMM) Theme(s) Impact Framework Key Impact Indicator (KII) What Predictive Analytics Qualitative data Results Based Accountability (RBA) Data Privacy Correlation Multi-Factor Authentication (MFA) Data Protection Descriptive Analytics Pie Chart Causation Unique Identifier Dimension Data Retention Policy Cluster Chart Outcomes Data Management Quantitative data Access Control Outlier Viewer Prescriptive Analytics Protected Health Information (PHI) Personally Identifiable Information (PII) Bar Chart Impact Attribution Distinct Count Data Validation Analyze Impact Contribution Data Governance Diagnostic Analytics Community Contribution String Better off Who Editor Define Leverage Objective Data Breach Org Admin Collect Quality Cybersecurity Impact Measurement and Management (IMM) Theme(s) Impact Framework Key Impact Indicator (KII) What Predictive Analytics Qualitative data Results Based Accountability (RBA) Data Privacy Correlation Multi-Factor Authentication (MFA) Data Protection Descriptive Analytics Pie Chart Causation Unique Identifier Dimension Data Retention Policy Cluster Chart Outcomes Data Management Quantitative data Access Control Outlier Viewer Prescriptive Analytics Protected Health Information (PHI) Personally Identifiable Information (PII) Bar Chart Impact Attribution Distinct Count Data Validation Analyze
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Impact Contribution
Data Governance
Diagnostic Analytics
Community Contribution
String
Better off
Who
Editor
Define
Leverage
Objective
Data Breach
Org Admin
Collect
Quality
Cybersecurity
Impact Measurement and Management (IMM)
Theme(s)
Impact Framework
Key Impact Indicator (KII)
What
Predictive Analytics
Qualitative data
Results Based Accountability (RBA)
Data Privacy
Correlation
Multi-Factor Authentication (MFA)
Data Protection
Descriptive Analytics
Pie Chart
Causation
Unique Identifier
Dimension
Data Retention Policy
Cluster Chart
Outcomes
Data Management
Quantitative data
Access Control
Outlier
Viewer
Prescriptive Analytics
Protected Health Information (PHI)
Personally Identifiable Information (PII)
Bar Chart
Impact Attribution
Distinct Count
Data Validation
Analyze