Data inTransitCompensatingControlAccessRestrictionGeographicRestrictionPhysicalControlDirectiveControlDataEncryptionManagerialControlPreventativeControlAgent-basedDLPDataMinimizationSegmentationDatain UseAgent-lessDLPDetectiveControlTokenizationCorrectiveControlMaskingData LossPreventionSystemsDeterrentControlPermissionRestrictionDataat RestIsolationHashingData inTransitCompensatingControlAccessRestrictionGeographicRestrictionPhysicalControlDirectiveControlDataEncryptionManagerialControlPreventativeControlAgent-basedDLPDataMinimizationSegmentationDatain UseAgent-lessDLPDetectiveControlTokenizationCorrectiveControlMaskingData LossPreventionSystemsDeterrentControlPermissionRestrictionDataat RestIsolationHashing

CHAPTER 1 SEC+ PART 2 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Data in Transit
  2. Compensating Control
  3. Access Restriction
  4. Geographic Restriction
  5. Physical Control
  6. Directive Control
  7. Data Encryption
  8. Managerial Control
  9. Preventative Control
  10. Agent-based DLP
  11. Data Minimization
  12. Segmentation
  13. Data in Use
  14. Agent-less DLP
  15. Detective Control
  16. Tokenization
  17. Corrective Control
  18. Masking
  19. Data Loss Prevention Systems
  20. Deterrent Control
  21. Permission Restriction
  22. Data at Rest
  23. Isolation
  24. Hashing