OKRClassificationSecuritymetamatebuyinalignmentwin-winSynergyActionitemsilosRemediationBestPracticesGDPRThird-PartyApplicationsDataGovernanceDashboardAttestationBucketSchematizationEnumerationDataquarantineDataLifecycleDataControlsCompliancePrestoDriverEnterpriseDataProtectionDataLifecycleOn thesamepageEnforcementsafeguardOKRstl;drStoragebusinessvaluemachinelearningmovefastMovetheneedle.ballparkRFCAccess tocontainersPipelinelowhangingfruitGoldenMeanimpaccDataUnderstandingEnforcementOnboardingAssetOwnershipbasicsecuritymaturitythinkoutside ofthe boxMAPWaveCAFEOneCatalogPolicyOKRClassificationSecuritymetamatebuyinalignmentwin-winSynergyActionitemsilosRemediationBestPracticesGDPRThird-PartyApplicationsDataGovernanceDashboardAttestationBucketSchematizationEnumerationDataquarantineDataLifecycleDataControlsCompliancePrestoDriverEnterpriseDataProtectionDataLifecycleOn thesamepageEnforcementsafeguardOKRstl;drStoragebusinessvaluemachinelearningmovefastMovetheneedle.ballparkRFCAccess tocontainersPipelinelowhangingfruitGoldenMeanimpaccDataUnderstandingEnforcementOnboardingAssetOwnershipbasicsecuritymaturitythinkoutside ofthe boxMAPWaveCAFEOneCatalogPolicy

Corp Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
  1. OKR
  2. Classification
  3. Security
  4. metamate
  5. buy in
  6. alignment
  7. win-win
  8. Synergy
  9. Action item
  10. silos
  11. Remediation
  12. Best Practices
  13. GDPR
  14. Third-Party Applications
  15. Data Governance
  16. Dashboard
  17. Attestation
  18. Bucket
  19. Schematization
  20. Enumeration
  21. Data quarantine
  22. Data Lifecycle
  23. Data Controls
  24. Compliance
  25. Presto Driver
  26. Enterprise Data Protection
  27. Data Lifecycle
  28. On the same page
  29. Enforcement
  30. safeguard
  31. OKRs
  32. tl;dr
  33. Storage
  34. business value
  35. machine learning
  36. move fast
  37. Move the needle.
  38. ball park
  39. RFC
  40. Access to containers
  41. Pipeline
  42. low hanging fruit
  43. Golden Mean
  44. impacc
  45. Data Understanding
  46. Enforcement
  47. Onboarding
  48. Asset Ownership
  49. basic security maturity
  50. think outside of the box
  51. MAP
  52. Wave
  53. CAFE
  54. One Catalog
  55. Policy