Encryption9.Third PartyVendorManagement7.DLPIT RiskAssessmentsCyberIncident20.Phishing10.PatchManagementBYODThird PartyVendorManagementRansomware13.BackupsPhishingDataClassificationAuditTrailBIA/BCP/DRP12.PoLPVulScans14.BYODShadowIT5.AuditTrail2.BIA/BCP/DRP4.ShadowITBackups17.Al19.CyberIncident18.VulScansRole-BasedAccessControls oRBACAppUpdates11.IT RiskAssessments15.Encryption6.DataClassification8.DataBreach1.Role-BasedAccessControls oRBAC16.AppUpdatesPoLPDataBreach3.RansomwareAlPatchManagementDLPEncryption9.Third PartyVendorManagement7.DLPIT RiskAssessmentsCyberIncident20.Phishing10.PatchManagementBYODThird PartyVendorManagementRansomware13.BackupsPhishingDataClassificationAuditTrailBIA/BCP/DRP12.PoLPVulScans14.BYODShadowIT5.AuditTrail2.BIA/BCP/DRP4.ShadowITBackups17.Al19.CyberIncident18.VulScansRole-BasedAccessControls oRBACAppUpdates11.IT RiskAssessments15.Encryption6.DataClassification8.DataBreach1.Role-BasedAccessControls oRBAC16.AppUpdatesPoLPDataBreach3.RansomwareAlPatchManagementDLP

RSM BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Encryption
  2. Third Party Vendor Management
    9.
  3. DLP
    7.
  4. IT Risk Assessments
  5. Cyber Incident
  6. Phishing
    20.
  7. Patch Management
    10.
  8. BYOD
  9. Third Party Vendor Management
  10. Ransomware
  11. Backups
    13.
  12. Phishing
  13. Data Classification
  14. Audit Trail
  15. BIA/BCP/DRP
  16. PoLP
    12.
  17. Vul Scans
  18. BYOD
    14.
  19. Shadow IT
  20. Audit Trail
    5.
  21. BIA/BCP/DRP
    2.
  22. Shadow IT
    4.
  23. Backups
  24. Al
    17.
  25. Cyber Incident
    19.
  26. Vul Scans
    18.
  27. Role-Based Access Controls o RBAC
  28. App Updates
  29. IT Risk Assessments
    11.
  30. Encryption
    15.
  31. Data Classification
    6.
  32. Data Breach
    8.
  33. Role-Based Access Controls o RBAC
    1.
  34. App Updates
    16.
  35. PoLP
  36. Data Breach
  37. Ransomware
    3.
  38. Al
  39. Patch Management
  40. DLP