AssetDocumentationEndpointProtection(EDR)PatchManagementHIPAAComplianceManagerCybersecurityInsurancePhishingCampaignsITAuditsBitlockerSecurityAwarenessTrainingPenetrationTestsMailboxbackupPermissionsBased FileAccessAnti-Virus/MalwareProtectionVPNEmailSecurityServerBackup(onsite andremote)FirewallProtectionBusinessContinuityPlanDisasterRecoveryPlanManagedEndpointProtection(MDR)Multi-FactorAuthentication(MFA)AcceptableUse PolicyDomainAuthenticationMobileDeviceManagementAssetDocumentationEndpointProtection(EDR)PatchManagementHIPAAComplianceManagerCybersecurityInsurancePhishingCampaignsITAuditsBitlockerSecurityAwarenessTrainingPenetrationTestsMailboxbackupPermissionsBased FileAccessAnti-Virus/MalwareProtectionVPNEmailSecurityServerBackup(onsite andremote)FirewallProtectionBusinessContinuityPlanDisasterRecoveryPlanManagedEndpointProtection(MDR)Multi-FactorAuthentication(MFA)AcceptableUse PolicyDomainAuthenticationMobileDeviceManagement

IT Risk Assessment - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Asset Documentation
  2. Endpoint Protection (EDR)
  3. Patch Management
  4. HIPAA Compliance Manager
  5. Cybersecurity Insurance
  6. Phishing Campaigns
  7. IT Audits
  8. Bitlocker
  9. Security Awareness Training
  10. Penetration Tests
  11. Mailbox backup
  12. Permissions Based File Access
  13. Anti-Virus/Malware Protection
  14. VPN
  15. Email Security
  16. Server Backup (onsite and remote)
  17. Firewall Protection
  18. Business Continuity Plan
  19. Disaster Recovery Plan
  20. Managed Endpoint Protection (MDR)
  21. Multi-Factor Authentication (MFA)
  22. Acceptable Use Policy
  23. Domain Authentication
  24. Mobile Device Management