ManagedEndpointProtection(MDR)ITAuditsMailboxbackupFirewallProtectionAnti-Virus/MalwareProtectionDisasterRecoveryPlanMulti-FactorAuthentication(MFA)PermissionsBased FileAccessAcceptableUse PolicyEndpointProtection(EDR)ServerBackup(onsite andremote)SecurityAwarenessTrainingPenetrationTestsMobileDeviceManagementVPNBusinessContinuityPlanBitlockerDomainAuthenticationCybersecurityInsuranceHIPAAComplianceManagerPatchManagementAssetDocumentationPhishingCampaignsEmailSecurityManagedEndpointProtection(MDR)ITAuditsMailboxbackupFirewallProtectionAnti-Virus/MalwareProtectionDisasterRecoveryPlanMulti-FactorAuthentication(MFA)PermissionsBased FileAccessAcceptableUse PolicyEndpointProtection(EDR)ServerBackup(onsite andremote)SecurityAwarenessTrainingPenetrationTestsMobileDeviceManagementVPNBusinessContinuityPlanBitlockerDomainAuthenticationCybersecurityInsuranceHIPAAComplianceManagerPatchManagementAssetDocumentationPhishingCampaignsEmailSecurity

IT Risk Assessment - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Managed Endpoint Protection (MDR)
  2. IT Audits
  3. Mailbox backup
  4. Firewall Protection
  5. Anti-Virus/Malware Protection
  6. Disaster Recovery Plan
  7. Multi-Factor Authentication (MFA)
  8. Permissions Based File Access
  9. Acceptable Use Policy
  10. Endpoint Protection (EDR)
  11. Server Backup (onsite and remote)
  12. Security Awareness Training
  13. Penetration Tests
  14. Mobile Device Management
  15. VPN
  16. Business Continuity Plan
  17. Bitlocker
  18. Domain Authentication
  19. Cybersecurity Insurance
  20. HIPAA Compliance Manager
  21. Patch Management
  22. Asset Documentation
  23. Phishing Campaigns
  24. Email Security