Deemed Consent Digital Security Social Engineering Cybercrime
IT Security Retention Social Engineering Nine (9) Internet Hacker Malware Hacker Privacy Policy Firewall Confidential Notification Password Personal Data DPO Data Classification Risk Data Protection Clean Desk Policy Availability Ransomware CSA IT Support Business continuity management Integrity PDPC Cyber- attack Five (5) Incident Response Smart Devices Cyber Security Accountability Cybersecurity Encryption C.A.R.E 7Zip Data Breach Wi- Fi PDPA Phishing Emails BitLocker Bring your own device (BYOD) Back- up Restricted Insider Threat Deemed Consent Digital Security Social Engineering Cybercrime IT Security Retention Social Engineering Nine (9) Internet Hacker Malware Hacker Privacy Policy Firewall Confidential Notification Password Personal Data DPO Data Classification Risk Data Protection Clean Desk Policy Availability Ransomware CSA IT Support Business continuity management Integrity PDPC Cyber- attack Five (5) Incident Response Smart Devices Cyber Security Accountability Cybersecurity Encryption C.A.R.E 7Zip Data Breach Wi- Fi PDPA Phishing Emails BitLocker Bring your own device (BYOD) Back- up Restricted Insider Threat
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Deemed Consent
Digital Security
Social Engineering
Cybercrime
IT Security
Retention
Social Engineering
Nine (9)
Internet
Hacker
Malware
Hacker
Privacy Policy
Firewall
Confidential
Notification
Password
Personal Data
DPO
Data Classification
Risk
Data Protection
Clean Desk Policy
Availability
Ransomware
CSA
IT Support
Business continuity management
Integrity
PDPC
Cyber-attack
Five (5)
Incident Response
Smart Devices
Cyber
Security
Accountability
Cybersecurity
Encryption
C.A.R.E
7Zip
Data Breach
Wi-Fi
PDPA
Phishing Emails
BitLocker
Bring your own device (BYOD)
Back-up
Restricted
Insider Threat