Al 6. Data Classification 1. Role-Based Access Controls o RBAC 2. BIA/BCP/DRP 3. Ransomware 19. Cyber Incident 17. Al Phishing Ransomware Shadow IT 13. Backups 9. Third Party Vendor Management Data Classification PoLP App Updates 14. BYOD 10. Patch Management 4. Shadow IT 16. App Updates Audit Trail 20. Phishing Role-Based Access Controls o RBAC Encryption Cyber Incident Patch Management Data Breach BYOD 12. PoLP 5. Audit Trail 7. DLP Backups Third Party Vendor Management 8. Data Breach 11. IT Risk Assessments BIA/BCP/DRP DLP Vul Scans IT Risk Assessments 15. Encryption 18. Vul Scans Al 6. Data Classification 1. Role-Based Access Controls o RBAC 2. BIA/BCP/DRP 3. Ransomware 19. Cyber Incident 17. Al Phishing Ransomware Shadow IT 13. Backups 9. Third Party Vendor Management Data Classification PoLP App Updates 14. BYOD 10. Patch Management 4. Shadow IT 16. App Updates Audit Trail 20. Phishing Role-Based Access Controls o RBAC Encryption Cyber Incident Patch Management Data Breach BYOD 12. PoLP 5. Audit Trail 7. DLP Backups Third Party Vendor Management 8. Data Breach 11. IT Risk Assessments BIA/BCP/DRP DLP Vul Scans IT Risk Assessments 15. Encryption 18. Vul Scans
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Al
Data Classification
6.
Role-Based Access Controls o RBAC
1.
BIA/BCP/DRP
2.
Ransomware
3.
Cyber Incident
19.
Al
17.
Phishing
Ransomware
Shadow IT
Backups
13.
Third Party Vendor Management
9.
Data Classification
PoLP
App Updates
BYOD
14.
Patch Management
10.
Shadow IT
4.
App Updates
16.
Audit Trail
Phishing
20.
Role-Based Access Controls o RBAC
Encryption
Cyber Incident
Patch Management
Data Breach
BYOD
PoLP
12.
Audit Trail
5.
DLP
7.
Backups
Third Party Vendor Management
Data Breach
8.
IT Risk Assessments
11.
BIA/BCP/DRP
DLP
Vul Scans
IT Risk Assessments
Encryption
15.
Vul Scans
18.