DataEncryptionComplianceAuditFFIECGuidelinesIncidentResponseTokenizationFedRAMPAccessControlInternalAuditISO27001Third-PartyRiskRiskAssessmentSOC 2AuditDataBreachNotificationPCI-DSSMulti-FactorAuthenticationVulnerabilityManagementSecurityAwarenessTrainingHIPAACloudAssessmentNIST800-53FedRegComplianceHITRUSTCSFCOBITFrameworkCloudSecurityDataEncryptionComplianceAuditFFIECGuidelinesIncidentResponseTokenizationFedRAMPAccessControlInternalAuditISO27001Third-PartyRiskRiskAssessmentSOC 2AuditDataBreachNotificationPCI-DSSMulti-FactorAuthenticationVulnerabilityManagementSecurityAwarenessTrainingHIPAACloudAssessmentNIST800-53FedRegComplianceHITRUSTCSFCOBITFrameworkCloudSecurity

SRC Summit - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Data Encryption
  2. Compliance Audit
  3. FFIEC Guidelines
  4. Incident Response
  5. Tokenization
  6. FedRAMP
  7. Access Control
  8. Internal Audit
  9. ISO 27001
  10. Third-Party Risk
  11. Risk Assessment
  12. SOC 2 Audit
  13. Data Breach Notification
  14. PCI-DSS
  15. Multi-Factor Authentication
  16. Vulnerability Management
  17. Security Awareness Training
  18. HIPAA
  19. Cloud Assessment
  20. NIST 800-53
  21. FedReg Compliance
  22. HITRUST CSF
  23. COBIT Framework
  24. Cloud Security