SecureConfigSecureAdminLimitPorts &ProtocolsTheAlamoBoundaryDefensebingobakerIncidentResponseSecurityAwarenessSecureNetworkSoftwareInventoryBusinessContinuityMalwareDefenseVulner-abilityMGMTDataProtectionDataRecoveryAccountMonitoringHardwareInventorySecureConfigSecureAdminLimitPorts &ProtocolsTheAlamoBoundaryDefensebingobakerIncidentResponseSecurityAwarenessSecureNetworkSoftwareInventoryBusinessContinuityMalwareDefenseVulner-abilityMGMTDataProtectionDataRecoveryAccountMonitoringHardwareInventory

Practical IT Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
  1. Secure Config
  2. Secure Admin
  3. Limit Ports & Protocols
  4. The Alamo
  5. Boundary Defense
  6. bingo baker
  7. Incident Response
  8. Security Awareness
  9. Secure Network
  10. Software Inventory
  11. Business Continuity
  12. Malware Defense
  13. Vulner-ability MGMT
  14. Data Protection
  15. Data Recovery
  16. Account Monitoring
  17. Hardware Inventory