Staging Environments Company Portal App Policy Compliance Incident Management Roles Data Stewards Security Controls Remote Access Supplier Security Compliance Physical Security Access Control Policy Accountability Information Security Request System Guidelines Data Security Change Management Access Control Passwords Personal Data Procedures Transparency Incident Reporting Audit Incident Response Compliance Monitoring ScreenConnect Monitoring Data Breach Integrity Control Owners System Owners User Training Application Hardening Classification Training Security Training Backup Shredders CyberCert Network Security Artificial Intelligence Risk Management ISO27001 Confidentiality Risk Assessment Least Privilege NIST Security Incident Data Retention Third- Party Vendors Assets Patch Operating System Data Protection Change Management Authentication Non- Compliance Data Masking Vulnerability Unauthorized Access Sensitive Data Breach Quarantine Zero- Trust Privacy Remote Access Multi-Factor Authentication Continuous Improvement Security Awareness Systems HSQF Vendor Risk Management HubSpot Reporting Data Dictionary Benchmarking Encryption User Access Management Cyber Security Essential 8 Keeper Restricted Access Staging Environments Company Portal App Policy Compliance Incident Management Roles Data Stewards Security Controls Remote Access Supplier Security Compliance Physical Security Access Control Policy Accountability Information Security Request System Guidelines Data Security Change Management Access Control Passwords Personal Data Procedures Transparency Incident Reporting Audit Incident Response Compliance Monitoring ScreenConnect Monitoring Data Breach Integrity Control Owners System Owners User Training Application Hardening Classification Training Security Training Backup Shredders CyberCert Network Security Artificial Intelligence Risk Management ISO27001 Confidentiality Risk Assessment Least Privilege NIST Security Incident Data Retention Third- Party Vendors Assets Patch Operating System Data Protection Change Management Authentication Non- Compliance Data Masking Vulnerability Unauthorized Access Sensitive Data Breach Quarantine Zero- Trust Privacy Remote Access Multi-Factor Authentication Continuous Improvement Security Awareness Systems HSQF Vendor Risk Management HubSpot Reporting Data Dictionary Benchmarking Encryption User Access Management Cyber Security Essential 8 Keeper Restricted Access
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Staging Environments
Company Portal App
Policy Compliance
Incident Management
Roles
Data Stewards
Security Controls
Remote Access
Supplier Security
Compliance
Physical Security
Access Control Policy
Accountability
Information Security
Request System Guidelines
Data Security
Change Management
Access Control
Passwords
Personal Data
Procedures
Transparency
Incident Reporting
Audit
Incident Response
Compliance Monitoring
ScreenConnect
Monitoring
Data Breach
Integrity
Control Owners
System Owners
User Training
Application Hardening
Classification
Training
Security Training
Backup
Shredders
CyberCert
Network Security
Artificial Intelligence
Risk Management
ISO27001
Confidentiality
Risk Assessment
Least Privilege
NIST
Security Incident
Data Retention
Third-Party Vendors
Assets
Patch Operating System
Data Protection
Change Management
Authentication
Non-Compliance
Data Masking
Vulnerability
Unauthorized Access
Sensitive Data
Breach
Quarantine
Zero-Trust
Privacy
Remote Access
Multi-Factor Authentication
Continuous Improvement
Security Awareness
Systems
HSQF
Vendor Risk Management
HubSpot
Reporting
Data Dictionary
Benchmarking
Encryption
User Access Management
Cyber Security
Essential 8
Keeper
Restricted Access