ball park Asset Ownership Data quarantine Action item Schematization buy in Bucket win- win impacc Move the needle. Onboarding Data Lifecycle Dashboard Compliance OKRs On the same page Data Governance safeguard Enterprise Data Protection Enumeration Storage RFC Presto Driver think outside of the box Data Lifecycle Golden Mean Pipeline basic security maturity Remediation GDPR Data Understanding Synergy Security metamate machine learning move fast low hanging fruit OKR Wave MAP Enforcement Policy Data Controls tl;dr alignment Third-Party Applications Attestation Enforcement Classification silos business value One Catalog Best Practices CAFE Access to containers ball park Asset Ownership Data quarantine Action item Schematization buy in Bucket win- win impacc Move the needle. Onboarding Data Lifecycle Dashboard Compliance OKRs On the same page Data Governance safeguard Enterprise Data Protection Enumeration Storage RFC Presto Driver think outside of the box Data Lifecycle Golden Mean Pipeline basic security maturity Remediation GDPR Data Understanding Synergy Security metamate machine learning move fast low hanging fruit OKR Wave MAP Enforcement Policy Data Controls tl;dr alignment Third-Party Applications Attestation Enforcement Classification silos business value One Catalog Best Practices CAFE Access to containers
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
ball park
Asset Ownership
Data quarantine
Action item
Schematization
buy in
Bucket
win-win
impacc
Move the needle.
Onboarding
Data Lifecycle
Dashboard
Compliance
OKRs
On the same page
Data Governance
safeguard
Enterprise Data Protection
Enumeration
Storage
RFC
Presto Driver
think outside of the box
Data Lifecycle
Golden Mean
Pipeline
basic security maturity
Remediation
GDPR
Data Understanding
Synergy
Security
metamate
machine learning
move fast
low hanging fruit
OKR
Wave
MAP
Enforcement
Policy
Data Controls
tl;dr
alignment
Third-Party Applications
Attestation
Enforcement
Classification
silos
business value
One Catalog
Best Practices
CAFE
Access to containers