SecureNetworkMalwareDefenseSoftwareInventoryDataRecoveryIncidentResponseTheAlamobingobakerAccountMonitoringHardwareInventoryVulner-abilityMGMTSecurityAwarenessSecureAdminDataProtectionBusinessContinuitySecureConfigBoundaryDefenseLimitPorts &ProtocolsSecureNetworkMalwareDefenseSoftwareInventoryDataRecoveryIncidentResponseTheAlamobingobakerAccountMonitoringHardwareInventoryVulner-abilityMGMTSecurityAwarenessSecureAdminDataProtectionBusinessContinuitySecureConfigBoundaryDefenseLimitPorts &Protocols

Practical IT Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
  1. Secure Network
  2. Malware Defense
  3. Software Inventory
  4. Data Recovery
  5. Incident Response
  6. The Alamo
  7. bingo baker
  8. Account Monitoring
  9. Hardware Inventory
  10. Vulner-ability MGMT
  11. Security Awareness
  12. Secure Admin
  13. Data Protection
  14. Business Continuity
  15. Secure Config
  16. Boundary Defense
  17. Limit Ports & Protocols