Vulnerability Management FFIEC Guidelines Compliance Audit HITRUST CSF Risk Assessment NIST 800-53 Internal Audit HIPAA FedRAMP Data Encryption Incident Response SOC 2 Audit FedReg Compliance Security Awareness Training Third- Party Risk Access Control Cloud Assessment Data Breach Notification ISO 27001 Multi-Factor Authentication Cloud Security COBIT Framework Tokenization PCI- DSS Vulnerability Management FFIEC Guidelines Compliance Audit HITRUST CSF Risk Assessment NIST 800-53 Internal Audit HIPAA FedRAMP Data Encryption Incident Response SOC 2 Audit FedReg Compliance Security Awareness Training Third- Party Risk Access Control Cloud Assessment Data Breach Notification ISO 27001 Multi-Factor Authentication Cloud Security COBIT Framework Tokenization PCI- DSS
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Vulnerability Management
FFIEC Guidelines
Compliance Audit
HITRUST CSF
Risk Assessment
NIST 800-53
Internal Audit
HIPAA
FedRAMP
Data Encryption
Incident Response
SOC 2 Audit
FedReg Compliance
Security Awareness Training
Third-Party Risk
Access Control
Cloud Assessment
Data Breach Notification
ISO 27001
Multi-Factor Authentication
Cloud Security
COBIT Framework
Tokenization
PCI-DSS