7. DLP 18. Vul Scans IT Risk Assessments 9. Third Party Vendor Management DLP 19. Cyber Incident 2. BIA/BCP/DRP 15. Encryption 16. App Updates 20. Phishing 14. BYOD 13. Backups 4. Shadow IT Al 6. Data Classification 3. Ransomware Audit Trail Data Breach Patch Management 11. IT Risk Assessments Role-Based Access Controls o RBAC 8. Data Breach Data Classification 5. Audit Trail Encryption BYOD Phishing Ransomware 17. Al PoLP App Updates Shadow IT BIA/BCP/DRP Third Party Vendor Management Backups 12. PoLP Cyber Incident 1. Role-Based Access Controls o RBAC Vul Scans 10. Patch Management 7. DLP 18. Vul Scans IT Risk Assessments 9. Third Party Vendor Management DLP 19. Cyber Incident 2. BIA/BCP/DRP 15. Encryption 16. App Updates 20. Phishing 14. BYOD 13. Backups 4. Shadow IT Al 6. Data Classification 3. Ransomware Audit Trail Data Breach Patch Management 11. IT Risk Assessments Role-Based Access Controls o RBAC 8. Data Breach Data Classification 5. Audit Trail Encryption BYOD Phishing Ransomware 17. Al PoLP App Updates Shadow IT BIA/BCP/DRP Third Party Vendor Management Backups 12. PoLP Cyber Incident 1. Role-Based Access Controls o RBAC Vul Scans 10. Patch Management
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
DLP
7.
Vul Scans
18.
IT Risk Assessments
Third Party Vendor Management
9.
DLP
Cyber Incident
19.
BIA/BCP/DRP
2.
Encryption
15.
App Updates
16.
Phishing
20.
BYOD
14.
Backups
13.
Shadow IT
4.
Al
Data Classification
6.
Ransomware
3.
Audit Trail
Data Breach
Patch Management
IT Risk Assessments
11.
Role-Based Access Controls o RBAC
Data Breach
8.
Data Classification
Audit Trail
5.
Encryption
BYOD
Phishing
Ransomware
Al
17.
PoLP
App Updates
Shadow IT
BIA/BCP/DRP
Third Party Vendor Management
Backups
PoLP
12.
Cyber Incident
Role-Based Access Controls o RBAC
1.
Vul Scans
Patch Management
10.