13.BackupsVulScansAl15.Encryption8.DataBreach3.Ransomware7.DLP4.ShadowITBYODEncryption10.PatchManagementCyberIncidentShadowITRole-BasedAccessControls oRBAC5.AuditTrailPhishing6.DataClassification19.CyberIncidentBackupsBIA/BCP/DRP18.VulScansRansomware14.BYOD9.Third PartyVendorManagementDLPDataClassificationPatchManagementPoLP11.IT RiskAssessmentsAuditTrailThird PartyVendorManagement16.AppUpdatesAppUpdates2.BIA/BCP/DRP12.PoLP1.Role-BasedAccessControls oRBACDataBreach20.Phishing17.AlIT RiskAssessments13.BackupsVulScansAl15.Encryption8.DataBreach3.Ransomware7.DLP4.ShadowITBYODEncryption10.PatchManagementCyberIncidentShadowITRole-BasedAccessControls oRBAC5.AuditTrailPhishing6.DataClassification19.CyberIncidentBackupsBIA/BCP/DRP18.VulScansRansomware14.BYOD9.Third PartyVendorManagementDLPDataClassificationPatchManagementPoLP11.IT RiskAssessmentsAuditTrailThird PartyVendorManagement16.AppUpdatesAppUpdates2.BIA/BCP/DRP12.PoLP1.Role-BasedAccessControls oRBACDataBreach20.Phishing17.AlIT RiskAssessments

RSM BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Backups
    13.
  2. Vul Scans
  3. Al
  4. Encryption
    15.
  5. Data Breach
    8.
  6. Ransomware
    3.
  7. DLP
    7.
  8. Shadow IT
    4.
  9. BYOD
  10. Encryption
  11. Patch Management
    10.
  12. Cyber Incident
  13. Shadow IT
  14. Role-Based Access Controls o RBAC
  15. Audit Trail
    5.
  16. Phishing
  17. Data Classification
    6.
  18. Cyber Incident
    19.
  19. Backups
  20. BIA/BCP/DRP
  21. Vul Scans
    18.
  22. Ransomware
  23. BYOD
    14.
  24. Third Party Vendor Management
    9.
  25. DLP
  26. Data Classification
  27. Patch Management
  28. PoLP
  29. IT Risk Assessments
    11.
  30. Audit Trail
  31. Third Party Vendor Management
  32. App Updates
    16.
  33. App Updates
  34. BIA/BCP/DRP
    2.
  35. PoLP
    12.
  36. Role-Based Access Controls o RBAC
    1.
  37. Data Breach
  38. Phishing
    20.
  39. Al
    17.
  40. IT Risk Assessments