Data Encryption Compliance Audit FFIEC Guidelines Incident Response Tokenization FedRAMP Access Control Internal Audit ISO 27001 Third- Party Risk Risk Assessment SOC 2 Audit Data Breach Notification PCI- DSS Multi-Factor Authentication Vulnerability Management Security Awareness Training HIPAA Cloud Assessment NIST 800-53 FedReg Compliance HITRUST CSF COBIT Framework Cloud Security Data Encryption Compliance Audit FFIEC Guidelines Incident Response Tokenization FedRAMP Access Control Internal Audit ISO 27001 Third- Party Risk Risk Assessment SOC 2 Audit Data Breach Notification PCI- DSS Multi-Factor Authentication Vulnerability Management Security Awareness Training HIPAA Cloud Assessment NIST 800-53 FedReg Compliance HITRUST CSF COBIT Framework Cloud Security
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Encryption
Compliance Audit
FFIEC Guidelines
Incident Response
Tokenization
FedRAMP
Access Control
Internal Audit
ISO 27001
Third-Party Risk
Risk Assessment
SOC 2 Audit
Data Breach Notification
PCI-DSS
Multi-Factor Authentication
Vulnerability Management
Security Awareness Training
HIPAA
Cloud Assessment
NIST 800-53
FedReg Compliance
HITRUST CSF
COBIT Framework
Cloud Security