16.AppUpdates6.DataClassificationAlBYOD13.BackupsEncryption1.Role-BasedAccessControls oRBACBackups7.DLPCyberIncident9.Third PartyVendorManagementShadowIT5.AuditTrail15.Encryption14.BYODThird PartyVendorManagement17.Al4.ShadowITIT RiskAssessments19.CyberIncident20.PhishingAppUpdatesDataClassificationPatchManagementPoLPBIA/BCP/DRP18.VulScans2.BIA/BCP/DRPRansomware8.DataBreach10.PatchManagementPhishing12.PoLP11.IT RiskAssessmentsRole-BasedAccessControls oRBACAuditTrailDLP3.RansomwareDataBreachVulScans16.AppUpdates6.DataClassificationAlBYOD13.BackupsEncryption1.Role-BasedAccessControls oRBACBackups7.DLPCyberIncident9.Third PartyVendorManagementShadowIT5.AuditTrail15.Encryption14.BYODThird PartyVendorManagement17.Al4.ShadowITIT RiskAssessments19.CyberIncident20.PhishingAppUpdatesDataClassificationPatchManagementPoLPBIA/BCP/DRP18.VulScans2.BIA/BCP/DRPRansomware8.DataBreach10.PatchManagementPhishing12.PoLP11.IT RiskAssessmentsRole-BasedAccessControls oRBACAuditTrailDLP3.RansomwareDataBreachVulScans

RSM BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. App Updates
    16.
  2. Data Classification
    6.
  3. Al
  4. BYOD
  5. Backups
    13.
  6. Encryption
  7. Role-Based Access Controls o RBAC
    1.
  8. Backups
  9. DLP
    7.
  10. Cyber Incident
  11. Third Party Vendor Management
    9.
  12. Shadow IT
  13. Audit Trail
    5.
  14. Encryption
    15.
  15. BYOD
    14.
  16. Third Party Vendor Management
  17. Al
    17.
  18. Shadow IT
    4.
  19. IT Risk Assessments
  20. Cyber Incident
    19.
  21. Phishing
    20.
  22. App Updates
  23. Data Classification
  24. Patch Management
  25. PoLP
  26. BIA/BCP/DRP
  27. Vul Scans
    18.
  28. BIA/BCP/DRP
    2.
  29. Ransomware
  30. Data Breach
    8.
  31. Patch Management
    10.
  32. Phishing
  33. PoLP
    12.
  34. IT Risk Assessments
    11.
  35. Role-Based Access Controls o RBAC
  36. Audit Trail
  37. DLP
  38. Ransomware
    3.
  39. Data Breach
  40. Vul Scans