16. App Updates 6. Data Classification Al BYOD 13. Backups Encryption 1. Role-Based Access Controls o RBAC Backups 7. DLP Cyber Incident 9. Third Party Vendor Management Shadow IT 5. Audit Trail 15. Encryption 14. BYOD Third Party Vendor Management 17. Al 4. Shadow IT IT Risk Assessments 19. Cyber Incident 20. Phishing App Updates Data Classification Patch Management PoLP BIA/BCP/DRP 18. Vul Scans 2. BIA/BCP/DRP Ransomware 8. Data Breach 10. Patch Management Phishing 12. PoLP 11. IT Risk Assessments Role-Based Access Controls o RBAC Audit Trail DLP 3. Ransomware Data Breach Vul Scans 16. App Updates 6. Data Classification Al BYOD 13. Backups Encryption 1. Role-Based Access Controls o RBAC Backups 7. DLP Cyber Incident 9. Third Party Vendor Management Shadow IT 5. Audit Trail 15. Encryption 14. BYOD Third Party Vendor Management 17. Al 4. Shadow IT IT Risk Assessments 19. Cyber Incident 20. Phishing App Updates Data Classification Patch Management PoLP BIA/BCP/DRP 18. Vul Scans 2. BIA/BCP/DRP Ransomware 8. Data Breach 10. Patch Management Phishing 12. PoLP 11. IT Risk Assessments Role-Based Access Controls o RBAC Audit Trail DLP 3. Ransomware Data Breach Vul Scans
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
App Updates
16.
Data Classification
6.
Al
BYOD
Backups
13.
Encryption
Role-Based Access Controls o RBAC
1.
Backups
DLP
7.
Cyber Incident
Third Party Vendor Management
9.
Shadow IT
Audit Trail
5.
Encryption
15.
BYOD
14.
Third Party Vendor Management
Al
17.
Shadow IT
4.
IT Risk Assessments
Cyber Incident
19.
Phishing
20.
App Updates
Data Classification
Patch Management
PoLP
BIA/BCP/DRP
Vul Scans
18.
BIA/BCP/DRP
2.
Ransomware
Data Breach
8.
Patch Management
10.
Phishing
PoLP
12.
IT Risk Assessments
11.
Role-Based Access Controls o RBAC
Audit Trail
DLP
Ransomware
3.
Data Breach
Vul Scans