DataBreach13.BackupsVulScans9.Third PartyVendorManagement1.Role-BasedAccessControls oRBAC19.CyberIncident16.AppUpdates8.DataBreachPoLP10.PatchManagementAlThird PartyVendorManagement17.Al14.BYODAuditTrail20.PhishingEncryption4.ShadowITBIA/BCP/DRPRansomwareBackupsRole-BasedAccessControls oRBACCyberIncidentPatchManagement15.Encryption18.VulScans3.RansomwareAppUpdatesBYOD12.PoLP5.AuditTrail11.IT RiskAssessmentsDataClassification2.BIA/BCP/DRPPhishing6.DataClassification7.DLPIT RiskAssessmentsShadowITDLPDataBreach13.BackupsVulScans9.Third PartyVendorManagement1.Role-BasedAccessControls oRBAC19.CyberIncident16.AppUpdates8.DataBreachPoLP10.PatchManagementAlThird PartyVendorManagement17.Al14.BYODAuditTrail20.PhishingEncryption4.ShadowITBIA/BCP/DRPRansomwareBackupsRole-BasedAccessControls oRBACCyberIncidentPatchManagement15.Encryption18.VulScans3.RansomwareAppUpdatesBYOD12.PoLP5.AuditTrail11.IT RiskAssessmentsDataClassification2.BIA/BCP/DRPPhishing6.DataClassification7.DLPIT RiskAssessmentsShadowITDLP

RSM BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Data Breach
  2. Backups
    13.
  3. Vul Scans
  4. Third Party Vendor Management
    9.
  5. Role-Based Access Controls o RBAC
    1.
  6. Cyber Incident
    19.
  7. App Updates
    16.
  8. Data Breach
    8.
  9. PoLP
  10. Patch Management
    10.
  11. Al
  12. Third Party Vendor Management
  13. Al
    17.
  14. BYOD
    14.
  15. Audit Trail
  16. Phishing
    20.
  17. Encryption
  18. Shadow IT
    4.
  19. BIA/BCP/DRP
  20. Ransomware
  21. Backups
  22. Role-Based Access Controls o RBAC
  23. Cyber Incident
  24. Patch Management
  25. Encryption
    15.
  26. Vul Scans
    18.
  27. Ransomware
    3.
  28. App Updates
  29. BYOD
  30. PoLP
    12.
  31. Audit Trail
    5.
  32. IT Risk Assessments
    11.
  33. Data Classification
  34. BIA/BCP/DRP
    2.
  35. Phishing
  36. Data Classification
    6.
  37. DLP
    7.
  38. IT Risk Assessments
  39. Shadow IT
  40. DLP