SecureNetworkIncidentResponseDataProtectionTheAlamoDataRecoverySecureConfigSecurityAwarenessSoftwareInventoryBusinessContinuityMalwareDefenseBoundaryDefensebingobakerVulner-abilityMGMTLimitPorts &ProtocolsHardwareInventorySecureAdminAccountMonitoringSecureNetworkIncidentResponseDataProtectionTheAlamoDataRecoverySecureConfigSecurityAwarenessSoftwareInventoryBusinessContinuityMalwareDefenseBoundaryDefensebingobakerVulner-abilityMGMTLimitPorts &ProtocolsHardwareInventorySecureAdminAccountMonitoring

Practical IT Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
  1. Secure Network
  2. Incident Response
  3. Data Protection
  4. The Alamo
  5. Data Recovery
  6. Secure Config
  7. Security Awareness
  8. Software Inventory
  9. Business Continuity
  10. Malware Defense
  11. Boundary Defense
  12. bingo baker
  13. Vulner-ability MGMT
  14. Limit Ports & Protocols
  15. Hardware Inventory
  16. Secure Admin
  17. Account Monitoring