MailboxbackupAssetDocumentationEndpointProtection(EDR)AcceptableUse PolicySecurityAwarenessTrainingPermissionsBased FileAccessBitlockerPhishingCampaignsEmailSecurityDomainAuthenticationITAuditsBusinessContinuityPlanVPNFirewallProtectionDisasterRecoveryPlanPenetrationTestsAnti-Virus/MalwareProtectionMulti-FactorAuthentication(MFA)CybersecurityInsuranceManagedEndpointProtection(MDR)HIPAAComplianceManagerPatchManagementMobileDeviceManagementServerBackup(onsite andremote)MailboxbackupAssetDocumentationEndpointProtection(EDR)AcceptableUse PolicySecurityAwarenessTrainingPermissionsBased FileAccessBitlockerPhishingCampaignsEmailSecurityDomainAuthenticationITAuditsBusinessContinuityPlanVPNFirewallProtectionDisasterRecoveryPlanPenetrationTestsAnti-Virus/MalwareProtectionMulti-FactorAuthentication(MFA)CybersecurityInsuranceManagedEndpointProtection(MDR)HIPAAComplianceManagerPatchManagementMobileDeviceManagementServerBackup(onsite andremote)

IT Risk Assessment - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Mailbox backup
  2. Asset Documentation
  3. Endpoint Protection (EDR)
  4. Acceptable Use Policy
  5. Security Awareness Training
  6. Permissions Based File Access
  7. Bitlocker
  8. Phishing Campaigns
  9. Email Security
  10. Domain Authentication
  11. IT Audits
  12. Business Continuity Plan
  13. VPN
  14. Firewall Protection
  15. Disaster Recovery Plan
  16. Penetration Tests
  17. Anti-Virus/Malware Protection
  18. Multi-Factor Authentication (MFA)
  19. Cybersecurity Insurance
  20. Managed Endpoint Protection (MDR)
  21. HIPAA Compliance Manager
  22. Patch Management
  23. Mobile Device Management
  24. Server Backup (onsite and remote)