MailboxbackupBitlockerPatchManagementMulti-FactorAuthentication(MFA)HIPAAComplianceManagerPhishingCampaignsEndpointProtection(EDR)AssetDocumentationFirewallProtectionCybersecurityInsuranceITAuditsVPNServerBackup(onsite andremote)ManagedEndpointProtection(MDR)AcceptableUse PolicySecurityAwarenessTrainingDisasterRecoveryPlanPenetrationTestsAnti-Virus/MalwareProtectionBusinessContinuityPlanPermissionsBased FileAccessMobileDeviceManagementEmailSecurityDomainAuthenticationMailboxbackupBitlockerPatchManagementMulti-FactorAuthentication(MFA)HIPAAComplianceManagerPhishingCampaignsEndpointProtection(EDR)AssetDocumentationFirewallProtectionCybersecurityInsuranceITAuditsVPNServerBackup(onsite andremote)ManagedEndpointProtection(MDR)AcceptableUse PolicySecurityAwarenessTrainingDisasterRecoveryPlanPenetrationTestsAnti-Virus/MalwareProtectionBusinessContinuityPlanPermissionsBased FileAccessMobileDeviceManagementEmailSecurityDomainAuthentication

IT Risk Assessment - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Mailbox backup
  2. Bitlocker
  3. Patch Management
  4. Multi-Factor Authentication (MFA)
  5. HIPAA Compliance Manager
  6. Phishing Campaigns
  7. Endpoint Protection (EDR)
  8. Asset Documentation
  9. Firewall Protection
  10. Cybersecurity Insurance
  11. IT Audits
  12. VPN
  13. Server Backup (onsite and remote)
  14. Managed Endpoint Protection (MDR)
  15. Acceptable Use Policy
  16. Security Awareness Training
  17. Disaster Recovery Plan
  18. Penetration Tests
  19. Anti-Virus/Malware Protection
  20. Business Continuity Plan
  21. Permissions Based File Access
  22. Mobile Device Management
  23. Email Security
  24. Domain Authentication