Encryption 9. Third Party Vendor Management 7. DLP IT Risk Assessments Cyber Incident 20. Phishing 10. Patch Management BYOD Third Party Vendor Management Ransomware 13. Backups Phishing Data Classification Audit Trail BIA/BCP/DRP 12. PoLP Vul Scans 14. BYOD Shadow IT 5. Audit Trail 2. BIA/BCP/DRP 4. Shadow IT Backups 17. Al 19. Cyber Incident 18. Vul Scans Role-Based Access Controls o RBAC App Updates 11. IT Risk Assessments 15. Encryption 6. Data Classification 8. Data Breach 1. Role-Based Access Controls o RBAC 16. App Updates PoLP Data Breach 3. Ransomware Al Patch Management DLP Encryption 9. Third Party Vendor Management 7. DLP IT Risk Assessments Cyber Incident 20. Phishing 10. Patch Management BYOD Third Party Vendor Management Ransomware 13. Backups Phishing Data Classification Audit Trail BIA/BCP/DRP 12. PoLP Vul Scans 14. BYOD Shadow IT 5. Audit Trail 2. BIA/BCP/DRP 4. Shadow IT Backups 17. Al 19. Cyber Incident 18. Vul Scans Role-Based Access Controls o RBAC App Updates 11. IT Risk Assessments 15. Encryption 6. Data Classification 8. Data Breach 1. Role-Based Access Controls o RBAC 16. App Updates PoLP Data Breach 3. Ransomware Al Patch Management DLP
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Encryption
Third Party Vendor Management
9.
DLP
7.
IT Risk Assessments
Cyber Incident
Phishing
20.
Patch Management
10.
BYOD
Third Party Vendor Management
Ransomware
Backups
13.
Phishing
Data Classification
Audit Trail
BIA/BCP/DRP
PoLP
12.
Vul Scans
BYOD
14.
Shadow IT
Audit Trail
5.
BIA/BCP/DRP
2.
Shadow IT
4.
Backups
Al
17.
Cyber Incident
19.
Vul Scans
18.
Role-Based Access Controls o RBAC
App Updates
IT Risk Assessments
11.
Encryption
15.
Data Classification
6.
Data Breach
8.
Role-Based Access Controls o RBAC
1.
App Updates
16.
PoLP
Data Breach
Ransomware
3.
Al
Patch Management
DLP