Vulner-abilityMGMTBusinessContinuityInventoryHardwareBoundaryDefenseAccountMonitoringSecurityAwarenessInventorySoftwareDataRecoverySecureAdminSecureNetworkIncidentResponseMalwareDefenseTheAlamoSecureConfigDataProtectionLimitPortsProtocolsVulner-abilityMGMTBusinessContinuityInventoryHardwareBoundaryDefenseAccountMonitoringSecurityAwarenessInventorySoftwareDataRecoverySecureAdminSecureNetworkIncidentResponseMalwareDefenseTheAlamoSecureConfigDataProtectionLimitPortsProtocols

Practical IT Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. Vulner-ability MGMT
  2. Business Continuity
  3. Inventory Hardware
  4. Boundary Defense
  5. Account Monitoring
  6. Security Awareness
  7. Inventory Software
  8. Data Recovery
  9. Secure Admin
  10. Secure Network
  11. Incident Response
  12. Malware Defense
  13. The Alamo
  14. Secure Config
  15. Data Protection
  16. Limit Ports Protocols