EncryptionRole-BasedAccessControls oRBACDLPDataBreachBYODFree!PatchManagementRansomwareCyberIncidentBackupsShadowITPoLPThird PartyVendorManagementVulScansIT RiskAssessmentsDataClassificationAlPhishingAppUpdatesAuditTrailBIA/BCP/DRPEncryptionRole-BasedAccessControls oRBACDLPDataBreachBYODFree!PatchManagementRansomwareCyberIncidentBackupsShadowITPoLPThird PartyVendorManagementVulScansIT RiskAssessmentsDataClassificationAlPhishingAppUpdatesAuditTrailBIA/BCP/DRP

RSM CYBER BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
  1. Encryption
  2. Role-Based Access Controls o RBAC
  3. DLP
  4. Data Breach
  5. BYOD
  6. Free!
  7. Patch Management
  8. Ransomware
  9. Cyber Incident
  10. Backups
  11. Shadow IT
  12. PoLP
  13. Third Party Vendor Management
  14. Vul Scans
  15. IT Risk Assessments
  16. Data Classification
  17. Al
  18. Phishing
  19. App Updates
  20. Audit Trail
  21. BIA/BCP/DRP