PasswordGISGDCriticalDataNetworkPDPAM365SharepointTrackORISGovernanceVAPTAssessmentDowntimeTechnologyInformationComplianceRiskCloudSecurityCybersecurityAwarenessSystemKRIDueDiligencePasswordGISGDCriticalDataNetworkPDPAM365SharepointTrackORISGovernanceVAPTAssessmentDowntimeTechnologyInformationComplianceRiskCloudSecurityCybersecurityAwarenessSystemKRIDueDiligence

Technology Risk - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Password
  2. GISGD
  3. Critical
  4. Data
  5. Network
  6. PDPA
  7. M365
  8. Sharepoint
  9. Track
  10. ORIS
  11. Governance
  12. VAPT
  13. Assessment
  14. Downtime
  15. Technology
  16. Information
  17. Compliance
  18. Risk
  19. Cloud Security
  20. Cybersecurity
  21. Awareness
  22. System
  23. KRI
  24. Due Diligence