CompensatingControlSegmentationDeterrentControlHashingData LossPreventionSystemsDirectiveControlPreventativeControlPermissionRestrictionGeographicRestrictionAgent-lessDLPTokenizationIsolationAccessRestrictionDetectiveControlDataMinimizationPhysicalControlDataEncryptionCorrectiveControlManagerialControlAgent-basedDLPDataat RestData inTransitMaskingDatain UseCompensatingControlSegmentationDeterrentControlHashingData LossPreventionSystemsDirectiveControlPreventativeControlPermissionRestrictionGeographicRestrictionAgent-lessDLPTokenizationIsolationAccessRestrictionDetectiveControlDataMinimizationPhysicalControlDataEncryptionCorrectiveControlManagerialControlAgent-basedDLPDataat RestData inTransitMaskingDatain Use

CHAPTER 1 SEC+ PART 2 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Compensating Control
  2. Segmentation
  3. Deterrent Control
  4. Hashing
  5. Data Loss Prevention Systems
  6. Directive Control
  7. Preventative Control
  8. Permission Restriction
  9. Geographic Restriction
  10. Agent-less DLP
  11. Tokenization
  12. Isolation
  13. Access Restriction
  14. Detective Control
  15. Data Minimization
  16. Physical Control
  17. Data Encryption
  18. Corrective Control
  19. Managerial Control
  20. Agent-based DLP
  21. Data at Rest
  22. Data in Transit
  23. Masking
  24. Data in Use