EndpointProtection(EDR)EmailSecurityAssetDocumentationServerBackup(onsite andremote)VPNPenetrationTestsMailboxbackupAnti-Virus/MalwareProtectionBitlockerAcceptableUse PolicyDisasterRecoveryPlanDomainAuthenticationMobileDeviceManagementHIPAAComplianceManagerPhishingCampaignsCybersecurityInsuranceMulti-FactorAuthentication(MFA)PermissionsBased FileAccessITAuditsManagedEndpointProtection(MDR)PatchManagementFirewallProtectionBusinessContinuityPlanSecurityAwarenessTrainingEndpointProtection(EDR)EmailSecurityAssetDocumentationServerBackup(onsite andremote)VPNPenetrationTestsMailboxbackupAnti-Virus/MalwareProtectionBitlockerAcceptableUse PolicyDisasterRecoveryPlanDomainAuthenticationMobileDeviceManagementHIPAAComplianceManagerPhishingCampaignsCybersecurityInsuranceMulti-FactorAuthentication(MFA)PermissionsBased FileAccessITAuditsManagedEndpointProtection(MDR)PatchManagementFirewallProtectionBusinessContinuityPlanSecurityAwarenessTraining

IT Risk Assessment - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Endpoint Protection (EDR)
  2. Email Security
  3. Asset Documentation
  4. Server Backup (onsite and remote)
  5. VPN
  6. Penetration Tests
  7. Mailbox backup
  8. Anti-Virus/Malware Protection
  9. Bitlocker
  10. Acceptable Use Policy
  11. Disaster Recovery Plan
  12. Domain Authentication
  13. Mobile Device Management
  14. HIPAA Compliance Manager
  15. Phishing Campaigns
  16. Cybersecurity Insurance
  17. Multi-Factor Authentication (MFA)
  18. Permissions Based File Access
  19. IT Audits
  20. Managed Endpoint Protection (MDR)
  21. Patch Management
  22. Firewall Protection
  23. Business Continuity Plan
  24. Security Awareness Training