VulnerabilityManagementFFIECGuidelinesComplianceAuditHITRUSTCSFRiskAssessmentNIST800-53InternalAuditHIPAAFedRAMPDataEncryptionIncidentResponseSOC 2AuditFedRegComplianceSecurityAwarenessTrainingThird-PartyRiskAccessControlCloudAssessmentDataBreachNotificationISO27001Multi-FactorAuthenticationCloudSecurityCOBITFrameworkTokenizationPCI-DSSVulnerabilityManagementFFIECGuidelinesComplianceAuditHITRUSTCSFRiskAssessmentNIST800-53InternalAuditHIPAAFedRAMPDataEncryptionIncidentResponseSOC 2AuditFedRegComplianceSecurityAwarenessTrainingThird-PartyRiskAccessControlCloudAssessmentDataBreachNotificationISO27001Multi-FactorAuthenticationCloudSecurityCOBITFrameworkTokenizationPCI-DSS

SRC Summit - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Vulnerability Management
  2. FFIEC Guidelines
  3. Compliance Audit
  4. HITRUST CSF
  5. Risk Assessment
  6. NIST 800-53
  7. Internal Audit
  8. HIPAA
  9. FedRAMP
  10. Data Encryption
  11. Incident Response
  12. SOC 2 Audit
  13. FedReg Compliance
  14. Security Awareness Training
  15. Third-Party Risk
  16. Access Control
  17. Cloud Assessment
  18. Data Breach Notification
  19. ISO 27001
  20. Multi-Factor Authentication
  21. Cloud Security
  22. COBIT Framework
  23. Tokenization
  24. PCI-DSS