Cloud Assessment Multi-Factor Authentication Incident Response Tokenization ISO 27001 Internal Audit HIPAA Security Awareness Training Data Encryption Risk Assessment Third- Party Risk Vulnerability Management HITRUST CSF SOC 2 Audit NIST 800-53 FedRAMP Cloud Security Data Breach Notification FedReg Compliance FFIEC Guidelines COBIT Framework Compliance Audit Access Control PCI- DSS Cloud Assessment Multi-Factor Authentication Incident Response Tokenization ISO 27001 Internal Audit HIPAA Security Awareness Training Data Encryption Risk Assessment Third- Party Risk Vulnerability Management HITRUST CSF SOC 2 Audit NIST 800-53 FedRAMP Cloud Security Data Breach Notification FedReg Compliance FFIEC Guidelines COBIT Framework Compliance Audit Access Control PCI- DSS
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cloud Assessment
Multi-Factor Authentication
Incident Response
Tokenization
ISO 27001
Internal Audit
HIPAA
Security Awareness Training
Data Encryption
Risk Assessment
Third-Party Risk
Vulnerability Management
HITRUST CSF
SOC 2 Audit
NIST 800-53
FedRAMP
Cloud Security
Data Breach Notification
FedReg Compliance
FFIEC Guidelines
COBIT Framework
Compliance Audit
Access Control
PCI-DSS