Technology Risks Cyber Breach Governance Risk Escalation Severity Stakeholder Quantitative Analysis Risk Capacity Risk Tolerance Likelihood Early Warning Operational Risks Vulnerability Business Continuity Risk & Security Committee Strategic Risks External Threats Financial Risks Contingency Plan Frequency Hazard Residual Risk Risk Avoidance Risk Acceptance Control Insurance Risk Appetite Legal/ Compliance Risk Mitigation Technology Risks Cyber Breach Governance Risk Escalation Severity Stakeholder Quantitative Analysis Risk Capacity Risk Tolerance Likelihood Early Warning Operational Risks Vulnerability Business Continuity Risk & Security Committee Strategic Risks External Threats Financial Risks Contingency Plan Frequency Hazard Residual Risk Risk Avoidance Risk Acceptance Control Insurance Risk Appetite Legal/ Compliance Risk Mitigation
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Technology Risks
Cyber Breach
Governance
Risk Escalation
Severity
Stakeholder
Quantitative Analysis
Risk Capacity
Risk Tolerance
Likelihood
Early Warning
Operational Risks
Vulnerability
Business Continuity
Risk & Security Committee
Strategic Risks
External Threats
Financial Risks
Contingency Plan
Frequency
Hazard
Residual Risk
Risk Avoidance
Risk Acceptance
Control
Insurance
Risk Appetite
Legal/ Compliance Risk
Mitigation