Systems Monitoring Incident Management Application Hardening Training Passwords Security Incident Multi-Factor Authentication Keeper User Training Artificial Intelligence Reporting Physical Security Change Management Audit Risk Assessment Data Dictionary Compliance Personal Data CyberCert Accountability Continuous Improvement Data Protection Classification Company Portal App Quarantine Integrity Data Security Authentication Incident Reporting ISO27001 Vendor Risk Management Transparency HubSpot Privacy Shredders Remote Access Roles Security Awareness Compliance Monitoring System Owners User Access Management Access Control Security Training NIST Confidentiality Policy Compliance Vulnerability Access Control Policy Remote Access Non- Compliance Essential 8 Breach Request System Guidelines Control Owners ScreenConnect Zero- Trust Network Security Backup Assets Third- Party Vendors Restricted Access Supplier Security Information Security Sensitive Data Staging Environments Change Management Data Masking Patch Operating System HSQF Least Privilege Incident Response Data Breach Encryption Unauthorized Access Security Controls Benchmarking Procedures Data Stewards Cyber Security Data Retention Risk Management Systems Monitoring Incident Management Application Hardening Training Passwords Security Incident Multi-Factor Authentication Keeper User Training Artificial Intelligence Reporting Physical Security Change Management Audit Risk Assessment Data Dictionary Compliance Personal Data CyberCert Accountability Continuous Improvement Data Protection Classification Company Portal App Quarantine Integrity Data Security Authentication Incident Reporting ISO27001 Vendor Risk Management Transparency HubSpot Privacy Shredders Remote Access Roles Security Awareness Compliance Monitoring System Owners User Access Management Access Control Security Training NIST Confidentiality Policy Compliance Vulnerability Access Control Policy Remote Access Non- Compliance Essential 8 Breach Request System Guidelines Control Owners ScreenConnect Zero- Trust Network Security Backup Assets Third- Party Vendors Restricted Access Supplier Security Information Security Sensitive Data Staging Environments Change Management Data Masking Patch Operating System HSQF Least Privilege Incident Response Data Breach Encryption Unauthorized Access Security Controls Benchmarking Procedures Data Stewards Cyber Security Data Retention Risk Management
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Systems
Monitoring
Incident Management
Application Hardening
Training
Passwords
Security Incident
Multi-Factor Authentication
Keeper
User Training
Artificial Intelligence
Reporting
Physical Security
Change Management
Audit
Risk Assessment
Data Dictionary
Compliance
Personal Data
CyberCert
Accountability
Continuous Improvement
Data Protection
Classification
Company Portal App
Quarantine
Integrity
Data Security
Authentication
Incident Reporting
ISO27001
Vendor Risk Management
Transparency
HubSpot
Privacy
Shredders
Remote Access
Roles
Security Awareness
Compliance Monitoring
System Owners
User Access Management
Access Control
Security Training
NIST
Confidentiality
Policy Compliance
Vulnerability
Access Control Policy
Remote Access
Non-Compliance
Essential 8
Breach
Request System Guidelines
Control Owners
ScreenConnect
Zero-Trust
Network Security
Backup
Assets
Third-Party Vendors
Restricted Access
Supplier Security
Information Security
Sensitive Data
Staging Environments
Change Management
Data Masking
Patch Operating System
HSQF
Least Privilege
Incident Response
Data Breach
Encryption
Unauthorized Access
Security Controls
Benchmarking
Procedures
Data Stewards
Cyber Security
Data Retention
Risk Management