ManagedEndpointProtection(MDR)BusinessContinuityPlanAssetDocumentationVPNITAuditsSecurityAwarenessTrainingAnti-Virus/MalwareProtectionEmailSecurityCybersecurityInsuranceBitlockerMailboxbackupHIPAAComplianceManagerPermissionsBased FileAccessPenetrationTestsAcceptableUse PolicyMobileDeviceManagementServerBackup(onsite andremote)PatchManagementEndpointProtection(EDR)Multi-FactorAuthentication(MFA)FirewallProtectionDisasterRecoveryPlanDomainAuthenticationPhishingCampaignsManagedEndpointProtection(MDR)BusinessContinuityPlanAssetDocumentationVPNITAuditsSecurityAwarenessTrainingAnti-Virus/MalwareProtectionEmailSecurityCybersecurityInsuranceBitlockerMailboxbackupHIPAAComplianceManagerPermissionsBased FileAccessPenetrationTestsAcceptableUse PolicyMobileDeviceManagementServerBackup(onsite andremote)PatchManagementEndpointProtection(EDR)Multi-FactorAuthentication(MFA)FirewallProtectionDisasterRecoveryPlanDomainAuthenticationPhishingCampaigns

IT Risk Assessment - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Managed Endpoint Protection (MDR)
  2. Business Continuity Plan
  3. Asset Documentation
  4. VPN
  5. IT Audits
  6. Security Awareness Training
  7. Anti-Virus/Malware Protection
  8. Email Security
  9. Cybersecurity Insurance
  10. Bitlocker
  11. Mailbox backup
  12. HIPAA Compliance Manager
  13. Permissions Based File Access
  14. Penetration Tests
  15. Acceptable Use Policy
  16. Mobile Device Management
  17. Server Backup (onsite and remote)
  18. Patch Management
  19. Endpoint Protection (EDR)
  20. Multi-Factor Authentication (MFA)
  21. Firewall Protection
  22. Disaster Recovery Plan
  23. Domain Authentication
  24. Phishing Campaigns