PermissionsBased FileAccessMailboxbackupITAuditsSecurityAwarenessTrainingBusinessContinuityPlanDisasterRecoveryPlanDomainAuthenticationEmailSecurityFirewallProtectionAcceptableUse PolicyPhishingCampaignsManagedEndpointProtection(MDR)HIPAAComplianceManagerPenetrationTestsAssetDocumentationCybersecurityInsuranceEndpointProtection(EDR)Multi-FactorAuthentication(MFA)BitlockerServerBackup(onsite andremote)PatchManagementMobileDeviceManagementAnti-Virus/MalwareProtectionVPNPermissionsBased FileAccessMailboxbackupITAuditsSecurityAwarenessTrainingBusinessContinuityPlanDisasterRecoveryPlanDomainAuthenticationEmailSecurityFirewallProtectionAcceptableUse PolicyPhishingCampaignsManagedEndpointProtection(MDR)HIPAAComplianceManagerPenetrationTestsAssetDocumentationCybersecurityInsuranceEndpointProtection(EDR)Multi-FactorAuthentication(MFA)BitlockerServerBackup(onsite andremote)PatchManagementMobileDeviceManagementAnti-Virus/MalwareProtectionVPN

IT Risk Assessment - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Permissions Based File Access
  2. Mailbox backup
  3. IT Audits
  4. Security Awareness Training
  5. Business Continuity Plan
  6. Disaster Recovery Plan
  7. Domain Authentication
  8. Email Security
  9. Firewall Protection
  10. Acceptable Use Policy
  11. Phishing Campaigns
  12. Managed Endpoint Protection (MDR)
  13. HIPAA Compliance Manager
  14. Penetration Tests
  15. Asset Documentation
  16. Cybersecurity Insurance
  17. Endpoint Protection (EDR)
  18. Multi-Factor Authentication (MFA)
  19. Bitlocker
  20. Server Backup (onsite and remote)
  21. Patch Management
  22. Mobile Device Management
  23. Anti-Virus/Malware Protection
  24. VPN