Availability PDPA Risk
Cyber Security IT Security Accountability Cybersecurity Cybercrime Malware Firewall Hacker Nine (9) Privacy Policy Insider Threat Confidential Social Engineering Deemed Consent Integrity Password Data Breach Incident Response Notification Data Protection C.A.R.E Clean Desk Policy Restricted Encryption Retention Ransomware Bring your own device (BYOD) Wi- Fi Business continuity management Cyber- attack IT Support BitLocker Back- up PDPC DPO 7Zip Data Classification Social Engineering Smart Devices Personal Data Phishing Emails Digital Security Internet Hacker CSA Five (5) Availability PDPA Risk Cyber Security IT Security Accountability Cybersecurity Cybercrime Malware Firewall Hacker Nine (9) Privacy Policy Insider Threat Confidential Social Engineering Deemed Consent Integrity Password Data Breach Incident Response Notification Data Protection C.A.R.E Clean Desk Policy Restricted Encryption Retention Ransomware Bring your own device (BYOD) Wi- Fi Business continuity management Cyber- attack IT Support BitLocker Back- up PDPC DPO 7Zip Data Classification Social Engineering Smart Devices Personal Data Phishing Emails Digital Security Internet Hacker CSA Five (5)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Availability
PDPA
Risk
Cyber
Security
IT Security
Accountability
Cybersecurity
Cybercrime
Malware
Firewall
Hacker
Nine (9)
Privacy Policy
Insider Threat
Confidential
Social Engineering
Deemed Consent
Integrity
Password
Data Breach
Incident Response
Notification
Data Protection
C.A.R.E
Clean Desk Policy
Restricted
Encryption
Retention
Ransomware
Bring your own device (BYOD)
Wi-Fi
Business continuity management
Cyber-attack
IT Support
BitLocker
Back-up
PDPC
DPO
7Zip
Data Classification
Social Engineering
Smart Devices
Personal Data
Phishing Emails
Digital Security
Internet
Hacker
CSA
Five (5)