Reporting Quarantine Accountability Staging Environments Encryption HSQF Audit Change Management Multi-Factor Authentication Unauthorized Access Access Control Procedures Benchmarking Incident Reporting User Training Incident Response Third- Party Vendors Systems Integrity Keeper ScreenConnect Remote Access Data Dictionary Supplier Security Classification Remote Access Shredders Compliance Continuous Improvement Least Privilege Confidentiality Data Breach Data Protection Security Controls Company Portal App Privacy Data Retention Data Stewards Application Hardening Assets Data Security Incident Management Roles Monitoring Access Control Policy HubSpot System Owners Information Security Personal Data Security Awareness Vulnerability Essential 8 Risk Management Breach Non- Compliance Physical Security Network Security Zero- Trust Security Incident CyberCert Training Change Management Transparency ISO27001 User Access Management Authentication Sensitive Data Vendor Risk Management Compliance Monitoring Security Training NIST Restricted Access Backup Cyber Security Control Owners Patch Operating System Policy Compliance Artificial Intelligence Passwords Risk Assessment Request System Guidelines Data Masking Reporting Quarantine Accountability Staging Environments Encryption HSQF Audit Change Management Multi-Factor Authentication Unauthorized Access Access Control Procedures Benchmarking Incident Reporting User Training Incident Response Third- Party Vendors Systems Integrity Keeper ScreenConnect Remote Access Data Dictionary Supplier Security Classification Remote Access Shredders Compliance Continuous Improvement Least Privilege Confidentiality Data Breach Data Protection Security Controls Company Portal App Privacy Data Retention Data Stewards Application Hardening Assets Data Security Incident Management Roles Monitoring Access Control Policy HubSpot System Owners Information Security Personal Data Security Awareness Vulnerability Essential 8 Risk Management Breach Non- Compliance Physical Security Network Security Zero- Trust Security Incident CyberCert Training Change Management Transparency ISO27001 User Access Management Authentication Sensitive Data Vendor Risk Management Compliance Monitoring Security Training NIST Restricted Access Backup Cyber Security Control Owners Patch Operating System Policy Compliance Artificial Intelligence Passwords Risk Assessment Request System Guidelines Data Masking
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Reporting
Quarantine
Accountability
Staging Environments
Encryption
HSQF
Audit
Change Management
Multi-Factor Authentication
Unauthorized Access
Access Control
Procedures
Benchmarking
Incident Reporting
User Training
Incident Response
Third-Party Vendors
Systems
Integrity
Keeper
ScreenConnect
Remote Access
Data Dictionary
Supplier Security
Classification
Remote Access
Shredders
Compliance
Continuous Improvement
Least Privilege
Confidentiality
Data Breach
Data Protection
Security Controls
Company Portal App
Privacy
Data Retention
Data Stewards
Application Hardening
Assets
Data Security
Incident Management
Roles
Monitoring
Access Control Policy
HubSpot
System Owners
Information Security
Personal Data
Security Awareness
Vulnerability
Essential 8
Risk Management
Breach
Non-Compliance
Physical Security
Network Security
Zero-Trust
Security Incident
CyberCert
Training
Change Management
Transparency
ISO27001
User Access Management
Authentication
Sensitive Data
Vendor Risk Management
Compliance Monitoring
Security Training
NIST
Restricted Access
Backup
Cyber Security
Control Owners
Patch Operating System
Policy Compliance
Artificial Intelligence
Passwords
Risk Assessment
Request System Guidelines
Data Masking