7.DLP18.VulScansIT RiskAssessments9.Third PartyVendorManagementDLP19.CyberIncident2.BIA/BCP/DRP15.Encryption16.AppUpdates20.Phishing14.BYOD13.Backups4.ShadowITAl6.DataClassification3.RansomwareAuditTrailDataBreachPatchManagement11.IT RiskAssessmentsRole-BasedAccessControls oRBAC8.DataBreachDataClassification5.AuditTrailEncryptionBYODPhishingRansomware17.AlPoLPAppUpdatesShadowITBIA/BCP/DRPThird PartyVendorManagementBackups12.PoLPCyberIncident1.Role-BasedAccessControls oRBACVulScans10.PatchManagement7.DLP18.VulScansIT RiskAssessments9.Third PartyVendorManagementDLP19.CyberIncident2.BIA/BCP/DRP15.Encryption16.AppUpdates20.Phishing14.BYOD13.Backups4.ShadowITAl6.DataClassification3.RansomwareAuditTrailDataBreachPatchManagement11.IT RiskAssessmentsRole-BasedAccessControls oRBAC8.DataBreachDataClassification5.AuditTrailEncryptionBYODPhishingRansomware17.AlPoLPAppUpdatesShadowITBIA/BCP/DRPThird PartyVendorManagementBackups12.PoLPCyberIncident1.Role-BasedAccessControls oRBACVulScans10.PatchManagement

RSM BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. DLP
    7.
  2. Vul Scans
    18.
  3. IT Risk Assessments
  4. Third Party Vendor Management
    9.
  5. DLP
  6. Cyber Incident
    19.
  7. BIA/BCP/DRP
    2.
  8. Encryption
    15.
  9. App Updates
    16.
  10. Phishing
    20.
  11. BYOD
    14.
  12. Backups
    13.
  13. Shadow IT
    4.
  14. Al
  15. Data Classification
    6.
  16. Ransomware
    3.
  17. Audit Trail
  18. Data Breach
  19. Patch Management
  20. IT Risk Assessments
    11.
  21. Role-Based Access Controls o RBAC
  22. Data Breach
    8.
  23. Data Classification
  24. Audit Trail
    5.
  25. Encryption
  26. BYOD
  27. Phishing
  28. Ransomware
  29. Al
    17.
  30. PoLP
  31. App Updates
  32. Shadow IT
  33. BIA/BCP/DRP
  34. Third Party Vendor Management
  35. Backups
  36. PoLP
    12.
  37. Cyber Incident
  38. Role-Based Access Controls o RBAC
    1.
  39. Vul Scans
  40. Patch Management
    10.