Strategy Testing Exposure BusinessContinuity Documentation Control Oversight Reduction Maintenance Policy Benchmarking Regulation Awareness Preparedness Environment Decision Coordination Protection Audit Uncertainty Pivot Monitoring Identification Ethics Training Culture Likelihood Security Loss Procedure Compliance Prevention Guidelines Recovery Disaster Assessment Reporting Incident Impact Vulnerability Planning Insurance Evidence Analysis Alert Liability Response Escalation Scenario Investigation Infrastructure Review Governance Threat Probability Prioritization Hazard Validation Consequence Framework Verification Legal Evaluation Mitigation Safeguard Forecasting Resilience Emergency Crisis Integration Metrics Management Contingency Treatment Assurance Strategy Testing Exposure BusinessContinuity Documentation Control Oversight Reduction Maintenance Policy Benchmarking Regulation Awareness Preparedness Environment Decision Coordination Protection Audit Uncertainty Pivot Monitoring Identification Ethics Training Culture Likelihood Security Loss Procedure Compliance Prevention Guidelines Recovery Disaster Assessment Reporting Incident Impact Vulnerability Planning Insurance Evidence Analysis Alert Liability Response Escalation Scenario Investigation Infrastructure Review Governance Threat Probability Prioritization Hazard Validation Consequence Framework Verification Legal Evaluation Mitigation Safeguard Forecasting Resilience Emergency Crisis Integration Metrics Management Contingency Treatment Assurance
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Strategy
Testing
Exposure
BusinessContinuity
Documentation
Control
Oversight
Reduction
Maintenance
Policy
Benchmarking
Regulation
Awareness
Preparedness
Environment
Decision
Coordination
Protection
Audit
Uncertainty
Pivot
Monitoring
Identification
Ethics
Training
Culture
Likelihood
Security
Loss
Procedure
Compliance
Prevention
Guidelines
Recovery
Disaster
Assessment
Reporting
Incident
Impact
Vulnerability
Planning
Insurance
Evidence
Analysis
Alert
Liability
Response
Escalation
Scenario
Investigation
Infrastructure
Review
Governance
Threat
Probability
Prioritization
Hazard
Validation
Consequence
Framework
Verification
Legal
Evaluation
Mitigation
Safeguard
Forecasting
Resilience
Emergency
Crisis
Integration
Metrics
Management
Contingency
Treatment
Assurance