Al PoLP 4. Shadow IT 9. Third Party Vendor Management Vul Scans DLP 18. Vul Scans IT Risk Assessments Audit Trail Patch Management 11. IT Risk Assessments 19. Cyber Incident 14. BYOD BYOD 16. App Updates 8. Data Breach Third Party Vendor Management 5. Audit Trail 3. Ransomware Data Classification Role-Based Access Controls o RBAC 7. DLP 15. Encryption BIA/BCP/DRP 2. BIA/BCP/DRP 10. Patch Management 6. Data Classification Shadow IT App Updates 13. Backups Phishing 1. Role-Based Access Controls o RBAC Backups Cyber Incident Encryption 20. Phishing Data Breach Ransomware 17. Al 12. PoLP Al PoLP 4. Shadow IT 9. Third Party Vendor Management Vul Scans DLP 18. Vul Scans IT Risk Assessments Audit Trail Patch Management 11. IT Risk Assessments 19. Cyber Incident 14. BYOD BYOD 16. App Updates 8. Data Breach Third Party Vendor Management 5. Audit Trail 3. Ransomware Data Classification Role-Based Access Controls o RBAC 7. DLP 15. Encryption BIA/BCP/DRP 2. BIA/BCP/DRP 10. Patch Management 6. Data Classification Shadow IT App Updates 13. Backups Phishing 1. Role-Based Access Controls o RBAC Backups Cyber Incident Encryption 20. Phishing Data Breach Ransomware 17. Al 12. PoLP
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Al
PoLP
Shadow IT
4.
Third Party Vendor Management
9.
Vul Scans
DLP
Vul Scans
18.
IT Risk Assessments
Audit Trail
Patch Management
IT Risk Assessments
11.
Cyber Incident
19.
BYOD
14.
BYOD
App Updates
16.
Data Breach
8.
Third Party Vendor Management
Audit Trail
5.
Ransomware
3.
Data Classification
Role-Based Access Controls o RBAC
DLP
7.
Encryption
15.
BIA/BCP/DRP
BIA/BCP/DRP
2.
Patch Management
10.
Data Classification
6.
Shadow IT
App Updates
Backups
13.
Phishing
Role-Based Access Controls o RBAC
1.
Backups
Cyber Incident
Encryption
Phishing
20.
Data Breach
Ransomware
Al
17.
PoLP
12.