Show yoursocial mediaaccount isprivacyprotectedProvide inputfor futuresecuritytrainingDefinePhishingDefinePhishingParticipatein Doc.Lunch"Be caught bysecurityproperlywearing IDbadgeGive anexample of asecurecomputerpasswordName afamouscybersecurity spyShow phonesecurity withlockedscreenName acybersecuritythreatEmailPASecurityAnswerSecurityQuestionDefineComputerVirusName acybersecuritythreatDefinecomputervirusProvide inputfor futuresecuritytrainingRead CyberSecurityDSSPamphletAnswersecurityquestionAsk FSO acybersecurityrelatedquestionParticipatein"CaptionThis"Participatein "CyberMovieMontage"Report asuspiciousemailCompleteCrosswordPuzzleReport asecurityviolationShow yoursocial mediaaccount isprivacyprotectedProvide inputfor futuresecuritytrainingDefinePhishingDefinePhishingParticipatein Doc.Lunch"Be caught bysecurityproperlywearing IDbadgeGive anexample of asecurecomputerpasswordName afamouscybersecurity spyShow phonesecurity withlockedscreenName acybersecuritythreatEmailPASecurityAnswerSecurityQuestionDefineComputerVirusName acybersecuritythreatDefinecomputervirusProvide inputfor futuresecuritytrainingRead CyberSecurityDSSPamphletAnswersecurityquestionAsk FSO acybersecurityrelatedquestionParticipatein"CaptionThis"Participatein "CyberMovieMontage"Report asuspiciousemailCompleteCrosswordPuzzleReport asecurityviolation

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Show your social media account is privacy protected
  2. Provide input for future security training
  3. Define Phishing
  4. Define Phishing
  5. Participate in Doc. Lunch"
  6. Be caught by security properly wearing ID badge
  7. Give an example of a secure computer password
  8. Name a famous cyber security spy
  9. Show phone security with locked screen
  10. Name a cyber security threat
  11. Email PA Security
  12. Answer Security Question
  13. Define Computer Virus
  14. Name a cyber security threat
  15. Define computer virus
  16. Provide input for future security training
  17. Read Cyber Security DSS Pamphlet
  18. Answer security question
  19. Ask FSO a cyber security related question
  20. Participate in "Caption This"
  21. Participate in "Cyber Movie Montage"
  22. Report a suspicious email
  23. Complete Crossword Puzzle
  24. Report a security violation