13. Backups Vul Scans Al 15. Encryption 8. Data Breach 3. Ransomware 7. DLP 4. Shadow IT BYOD Encryption 10. Patch Management Cyber Incident Shadow IT Role-Based Access Controls o RBAC 5. Audit Trail Phishing 6. Data Classification 19. Cyber Incident Backups BIA/BCP/DRP 18. Vul Scans Ransomware 14. BYOD 9. Third Party Vendor Management DLP Data Classification Patch Management PoLP 11. IT Risk Assessments Audit Trail Third Party Vendor Management 16. App Updates App Updates 2. BIA/BCP/DRP 12. PoLP 1. Role-Based Access Controls o RBAC Data Breach 20. Phishing 17. Al IT Risk Assessments 13. Backups Vul Scans Al 15. Encryption 8. Data Breach 3. Ransomware 7. DLP 4. Shadow IT BYOD Encryption 10. Patch Management Cyber Incident Shadow IT Role-Based Access Controls o RBAC 5. Audit Trail Phishing 6. Data Classification 19. Cyber Incident Backups BIA/BCP/DRP 18. Vul Scans Ransomware 14. BYOD 9. Third Party Vendor Management DLP Data Classification Patch Management PoLP 11. IT Risk Assessments Audit Trail Third Party Vendor Management 16. App Updates App Updates 2. BIA/BCP/DRP 12. PoLP 1. Role-Based Access Controls o RBAC Data Breach 20. Phishing 17. Al IT Risk Assessments
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Backups
13.
Vul Scans
Al
Encryption
15.
Data Breach
8.
Ransomware
3.
DLP
7.
Shadow IT
4.
BYOD
Encryption
Patch Management
10.
Cyber Incident
Shadow IT
Role-Based Access Controls o RBAC
Audit Trail
5.
Phishing
Data Classification
6.
Cyber Incident
19.
Backups
BIA/BCP/DRP
Vul Scans
18.
Ransomware
BYOD
14.
Third Party Vendor Management
9.
DLP
Data Classification
Patch Management
PoLP
IT Risk Assessments
11.
Audit Trail
Third Party Vendor Management
App Updates
16.
App Updates
BIA/BCP/DRP
2.
PoLP
12.
Role-Based Access Controls o RBAC
1.
Data Breach
Phishing
20.
Al
17.
IT Risk Assessments