AlPoLP4.ShadowIT9.Third PartyVendorManagementVulScansDLP18.VulScansIT RiskAssessmentsAuditTrailPatchManagement11.IT RiskAssessments19.CyberIncident14.BYODBYOD16.AppUpdates8.DataBreachThird PartyVendorManagement5.AuditTrail3.RansomwareDataClassificationRole-BasedAccessControls oRBAC7.DLP15.EncryptionBIA/BCP/DRP2.BIA/BCP/DRP10.PatchManagement6.DataClassificationShadowITAppUpdates13.BackupsPhishing1.Role-BasedAccessControls oRBACBackupsCyberIncidentEncryption20.PhishingDataBreachRansomware17.Al12.PoLPAlPoLP4.ShadowIT9.Third PartyVendorManagementVulScansDLP18.VulScansIT RiskAssessmentsAuditTrailPatchManagement11.IT RiskAssessments19.CyberIncident14.BYODBYOD16.AppUpdates8.DataBreachThird PartyVendorManagement5.AuditTrail3.RansomwareDataClassificationRole-BasedAccessControls oRBAC7.DLP15.EncryptionBIA/BCP/DRP2.BIA/BCP/DRP10.PatchManagement6.DataClassificationShadowITAppUpdates13.BackupsPhishing1.Role-BasedAccessControls oRBACBackupsCyberIncidentEncryption20.PhishingDataBreachRansomware17.Al12.PoLP

RSM BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Al
  2. PoLP
  3. Shadow IT
    4.
  4. Third Party Vendor Management
    9.
  5. Vul Scans
  6. DLP
  7. Vul Scans
    18.
  8. IT Risk Assessments
  9. Audit Trail
  10. Patch Management
  11. IT Risk Assessments
    11.
  12. Cyber Incident
    19.
  13. BYOD
    14.
  14. BYOD
  15. App Updates
    16.
  16. Data Breach
    8.
  17. Third Party Vendor Management
  18. Audit Trail
    5.
  19. Ransomware
    3.
  20. Data Classification
  21. Role-Based Access Controls o RBAC
  22. DLP
    7.
  23. Encryption
    15.
  24. BIA/BCP/DRP
  25. BIA/BCP/DRP
    2.
  26. Patch Management
    10.
  27. Data Classification
    6.
  28. Shadow IT
  29. App Updates
  30. Backups
    13.
  31. Phishing
  32. Role-Based Access Controls o RBAC
    1.
  33. Backups
  34. Cyber Incident
  35. Encryption
  36. Phishing
    20.
  37. Data Breach
  38. Ransomware
  39. Al
    17.
  40. PoLP
    12.