CyberCert Privacy Data Breach Restricted Access Essential 8 Incident Response Systems Data Security Security Training Supplier Security Information Security Access Control Continuous Improvement Quarantine Risk Assessment Monitoring Data Protection Shredders Data Dictionary Remote Access Assets Compliance Monitoring Patch Operating System Data Retention Security Awareness Security Controls Roles Control Owners Training Accountability Confidentiality User Access Management Procedures Security Incident Vulnerability Cyber Security Application Hardening Multi-Factor Authentication Encryption Access Control Policy Benchmarking Reporting Classification Artificial Intelligence Keeper User Training NIST Remote Access Risk Management Company Portal App Zero- Trust Data Stewards Transparency System Owners Request System Guidelines Breach Change Management Physical Security Policy Compliance Non- Compliance ScreenConnect Unauthorized Access Least Privilege Staging Environments Third- Party Vendors HubSpot Passwords Audit Incident Management ISO27001 Incident Reporting Integrity Data Masking Network Security Compliance Backup HSQF Personal Data Sensitive Data Vendor Risk Management Authentication Change Management CyberCert Privacy Data Breach Restricted Access Essential 8 Incident Response Systems Data Security Security Training Supplier Security Information Security Access Control Continuous Improvement Quarantine Risk Assessment Monitoring Data Protection Shredders Data Dictionary Remote Access Assets Compliance Monitoring Patch Operating System Data Retention Security Awareness Security Controls Roles Control Owners Training Accountability Confidentiality User Access Management Procedures Security Incident Vulnerability Cyber Security Application Hardening Multi-Factor Authentication Encryption Access Control Policy Benchmarking Reporting Classification Artificial Intelligence Keeper User Training NIST Remote Access Risk Management Company Portal App Zero- Trust Data Stewards Transparency System Owners Request System Guidelines Breach Change Management Physical Security Policy Compliance Non- Compliance ScreenConnect Unauthorized Access Least Privilege Staging Environments Third- Party Vendors HubSpot Passwords Audit Incident Management ISO27001 Incident Reporting Integrity Data Masking Network Security Compliance Backup HSQF Personal Data Sensitive Data Vendor Risk Management Authentication Change Management
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
CyberCert
Privacy
Data Breach
Restricted Access
Essential 8
Incident Response
Systems
Data Security
Security Training
Supplier Security
Information Security
Access Control
Continuous Improvement
Quarantine
Risk Assessment
Monitoring
Data Protection
Shredders
Data Dictionary
Remote Access
Assets
Compliance Monitoring
Patch Operating System
Data Retention
Security Awareness
Security Controls
Roles
Control Owners
Training
Accountability
Confidentiality
User Access Management
Procedures
Security Incident
Vulnerability
Cyber Security
Application Hardening
Multi-Factor Authentication
Encryption
Access Control Policy
Benchmarking
Reporting
Classification
Artificial Intelligence
Keeper
User Training
NIST
Remote Access
Risk Management
Company Portal App
Zero-Trust
Data Stewards
Transparency
System Owners
Request System Guidelines
Breach
Change Management
Physical Security
Policy Compliance
Non-Compliance
ScreenConnect
Unauthorized Access
Least Privilege
Staging Environments
Third-Party Vendors
HubSpot
Passwords
Audit
Incident Management
ISO27001
Incident Reporting
Integrity
Data Masking
Network Security
Compliance
Backup
HSQF
Personal Data
Sensitive Data
Vendor Risk Management
Authentication
Change Management