Control Cyber Breach Risk Acceptance Operational Risks Risk Escalation Quantitative Analysis Strategic Risks Frequency Governance External Threats Contingency Plan Vulnerability Risk Tolerance Early Warning Risk Appetite Mitigation Financial Risks Insurance Hazard Severity Legal/ Compliance Risk Likelihood Risk Capacity Business Continuity Technology Risks Stakeholder Residual Risk Risk & Security Committee Risk Avoidance Control Cyber Breach Risk Acceptance Operational Risks Risk Escalation Quantitative Analysis Strategic Risks Frequency Governance External Threats Contingency Plan Vulnerability Risk Tolerance Early Warning Risk Appetite Mitigation Financial Risks Insurance Hazard Severity Legal/ Compliance Risk Likelihood Risk Capacity Business Continuity Technology Risks Stakeholder Residual Risk Risk & Security Committee Risk Avoidance
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Control
Cyber Breach
Risk Acceptance
Operational Risks
Risk Escalation
Quantitative Analysis
Strategic Risks
Frequency
Governance
External Threats
Contingency Plan
Vulnerability
Risk Tolerance
Early Warning
Risk Appetite
Mitigation
Financial Risks
Insurance
Hazard
Severity
Legal/ Compliance Risk
Likelihood
Risk Capacity
Business Continuity
Technology Risks
Stakeholder
Residual Risk
Risk & Security Committee
Risk Avoidance