RansomwareIncidentReportingHumanweaknessesSecurePhonesPasswordPolicyDarkwebExploitAvailabilityThreatAwarenessEncryptionSoftware/OSupdatesBaitingPhishingClearDeskPersonallyidentifiableinformation(PII)MalwarePasswordReuseVulnerabilityDataBreachISO27001 CyberattackAwarenessVirusScreenlockpolicyZero-dayCompromise Scam/ HoaxIntegrityUSBHoneypotsISMSTrainingMulti-factorauthentication(MFA)SocialEngineeringRansomwareIncidentReportingHumanweaknessesSecurePhonesPasswordPolicyDarkwebExploitAvailabilityThreatAwarenessEncryptionSoftware/OSupdatesBaitingPhishingClearDeskPersonallyidentifiableinformation(PII)MalwarePasswordReuseVulnerabilityDataBreachISO27001 CyberattackAwarenessVirusScreenlockpolicyZero-dayCompromiseScam/ HoaxIntegrityUSBHoneypotsISMSTrainingMulti-factorauthentication(MFA)SocialEngineering

Information Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
  1. Ransomware
  2. Incident Reporting
  3. Human weaknesses
  4. Secure Phones
  5. Password Policy
  6. Dark web
  7. Exploit
  8. Availability
  9. Threat Awareness
  10. Encryption
  11. Software/OS updates
  12. Baiting
  13. Phishing
  14. Clear Desk
  15. Personally identifiable information (PII)
  16. Malware
  17. Password Reuse
  18. Vulnerability
  19. Data Breach
  20. ISO 27001
  21. Cyberattack
  22. Awareness
  23. Virus
  24. Screen lock policy
  25. Zero-day
  26. Compromise
  27. Scam / Hoax
  28. Integrity
  29. USB Honeypots
  30. ISMS Training
  31. Multi-factor authentication (MFA)
  32. Social Engineering