Pie Chart Impact Framework Data Governance Objective Predictive Analytics Leverage Descriptive Analytics String Qualitative data Prescriptive Analytics Distinct Count Data Validation Who Data Management Impact Contribution Data Protection Dimension Impact Attribution Correlation Impact Measurement and Management (IMM) Personally Identifiable Information (PII) Editor Data Breach Viewer Cluster Chart What Analyze Unique Identifier Collect Org Admin Bar Chart Quality Access Control Results Based Accountability (RBA) Causation Protected Health Information (PHI) Diagnostic Analytics Multi-Factor Authentication (MFA) Data Privacy Outlier Theme(s) Define Cybersecurity Outcomes Data Retention Policy Key Impact Indicator (KII) Better off Quantitative data Community Contribution Pie Chart Impact Framework Data Governance Objective Predictive Analytics Leverage Descriptive Analytics String Qualitative data Prescriptive Analytics Distinct Count Data Validation Who Data Management Impact Contribution Data Protection Dimension Impact Attribution Correlation Impact Measurement and Management (IMM) Personally Identifiable Information (PII) Editor Data Breach Viewer Cluster Chart What Analyze Unique Identifier Collect Org Admin Bar Chart Quality Access Control Results Based Accountability (RBA) Causation Protected Health Information (PHI) Diagnostic Analytics Multi-Factor Authentication (MFA) Data Privacy Outlier Theme(s) Define Cybersecurity Outcomes Data Retention Policy Key Impact Indicator (KII) Better off Quantitative data Community Contribution
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Pie Chart
Impact Framework
Data Governance
Objective
Predictive Analytics
Leverage
Descriptive Analytics
String
Qualitative data
Prescriptive Analytics
Distinct Count
Data Validation
Who
Data Management
Impact Contribution
Data Protection
Dimension
Impact Attribution
Correlation
Impact Measurement and Management (IMM)
Personally Identifiable Information (PII)
Editor
Data Breach
Viewer
Cluster Chart
What
Analyze
Unique Identifier
Collect
Org Admin
Bar Chart
Quality
Access Control
Results Based Accountability (RBA)
Causation
Protected Health Information (PHI)
Diagnostic Analytics
Multi-Factor Authentication (MFA)
Data Privacy
Outlier
Theme(s)
Define
Cybersecurity
Outcomes
Data Retention Policy
Key Impact Indicator (KII)
Better off
Quantitative data
Community Contribution