Al6.DataClassification1.Role-BasedAccessControls oRBAC2.BIA/BCP/DRP3.Ransomware19.CyberIncident17.AlPhishingRansomwareShadowIT13.Backups9.Third PartyVendorManagementDataClassificationPoLPAppUpdates14.BYOD10.PatchManagement4.ShadowIT16.AppUpdatesAuditTrail20.PhishingRole-BasedAccessControls oRBACEncryptionCyberIncidentPatchManagementDataBreachBYOD12.PoLP5.AuditTrail7.DLPBackupsThird PartyVendorManagement8.DataBreach11.IT RiskAssessmentsBIA/BCP/DRPDLPVulScansIT RiskAssessments15.Encryption18.VulScansAl6.DataClassification1.Role-BasedAccessControls oRBAC2.BIA/BCP/DRP3.Ransomware19.CyberIncident17.AlPhishingRansomwareShadowIT13.Backups9.Third PartyVendorManagementDataClassificationPoLPAppUpdates14.BYOD10.PatchManagement4.ShadowIT16.AppUpdatesAuditTrail20.PhishingRole-BasedAccessControls oRBACEncryptionCyberIncidentPatchManagementDataBreachBYOD12.PoLP5.AuditTrail7.DLPBackupsThird PartyVendorManagement8.DataBreach11.IT RiskAssessmentsBIA/BCP/DRPDLPVulScansIT RiskAssessments15.Encryption18.VulScans

RSM BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Al
  2. Data Classification
    6.
  3. Role-Based Access Controls o RBAC
    1.
  4. BIA/BCP/DRP
    2.
  5. Ransomware
    3.
  6. Cyber Incident
    19.
  7. Al
    17.
  8. Phishing
  9. Ransomware
  10. Shadow IT
  11. Backups
    13.
  12. Third Party Vendor Management
    9.
  13. Data Classification
  14. PoLP
  15. App Updates
  16. BYOD
    14.
  17. Patch Management
    10.
  18. Shadow IT
    4.
  19. App Updates
    16.
  20. Audit Trail
  21. Phishing
    20.
  22. Role-Based Access Controls o RBAC
  23. Encryption
  24. Cyber Incident
  25. Patch Management
  26. Data Breach
  27. BYOD
  28. PoLP
    12.
  29. Audit Trail
    5.
  30. DLP
    7.
  31. Backups
  32. Third Party Vendor Management
  33. Data Breach
    8.
  34. IT Risk Assessments
    11.
  35. BIA/BCP/DRP
  36. DLP
  37. Vul Scans
  38. IT Risk Assessments
  39. Encryption
    15.
  40. Vul Scans
    18.