Data Breach 13. Backups Vul Scans 9. Third Party Vendor Management 1. Role-Based Access Controls o RBAC 19. Cyber Incident 16. App Updates 8. Data Breach PoLP 10. Patch Management Al Third Party Vendor Management 17. Al 14. BYOD Audit Trail 20. Phishing Encryption 4. Shadow IT BIA/BCP/DRP Ransomware Backups Role-Based Access Controls o RBAC Cyber Incident Patch Management 15. Encryption 18. Vul Scans 3. Ransomware App Updates BYOD 12. PoLP 5. Audit Trail 11. IT Risk Assessments Data Classification 2. BIA/BCP/DRP Phishing 6. Data Classification 7. DLP IT Risk Assessments Shadow IT DLP Data Breach 13. Backups Vul Scans 9. Third Party Vendor Management 1. Role-Based Access Controls o RBAC 19. Cyber Incident 16. App Updates 8. Data Breach PoLP 10. Patch Management Al Third Party Vendor Management 17. Al 14. BYOD Audit Trail 20. Phishing Encryption 4. Shadow IT BIA/BCP/DRP Ransomware Backups Role-Based Access Controls o RBAC Cyber Incident Patch Management 15. Encryption 18. Vul Scans 3. Ransomware App Updates BYOD 12. PoLP 5. Audit Trail 11. IT Risk Assessments Data Classification 2. BIA/BCP/DRP Phishing 6. Data Classification 7. DLP IT Risk Assessments Shadow IT DLP
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Breach
Backups
13.
Vul Scans
Third Party Vendor Management
9.
Role-Based Access Controls o RBAC
1.
Cyber Incident
19.
App Updates
16.
Data Breach
8.
PoLP
Patch Management
10.
Al
Third Party Vendor Management
Al
17.
BYOD
14.
Audit Trail
Phishing
20.
Encryption
Shadow IT
4.
BIA/BCP/DRP
Ransomware
Backups
Role-Based Access Controls o RBAC
Cyber Incident
Patch Management
Encryption
15.
Vul Scans
18.
Ransomware
3.
App Updates
BYOD
PoLP
12.
Audit Trail
5.
IT Risk Assessments
11.
Data Classification
BIA/BCP/DRP
2.
Phishing
Data Classification
6.
DLP
7.
IT Risk Assessments
Shadow IT
DLP