ISMS Training Exploit Integrity Malware Software/OS updates Social Engineering Personally identifiable information (PII) Multi-factor authentication (MFA) Awareness
Scam / Hoax Baiting Data Breach Screen lock policy Incident Reporting Secure Phones ISO 27001 Ransomware Virus Zero- day Phishing Encryption Human weaknesses Compromise Clear Desk USB Honeypots Password Policy Threat Awareness Cyberattack Password Reuse Vulnerability Availability Dark web ISMS Training Exploit Integrity Malware Software/OS updates Social Engineering Personally identifiable information (PII) Multi-factor authentication (MFA) Awareness Scam / Hoax Baiting Data Breach Screen lock policy Incident Reporting Secure Phones ISO 27001 Ransomware Virus Zero- day Phishing Encryption Human weaknesses Compromise Clear Desk USB Honeypots Password Policy Threat Awareness Cyberattack Password Reuse Vulnerability Availability Dark web
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
ISMS Training
Exploit
Integrity
Malware
Software/OS updates
Social Engineering
Personally identifiable information (PII)
Multi-factor authentication (MFA)
Awareness
Scam / Hoax
Baiting
Data Breach
Screen lock policy
Incident Reporting
Secure Phones
ISO 27001
Ransomware
Virus
Zero-day
Phishing
Encryption
Human weaknesses
Compromise
Clear Desk
USB Honeypots
Password Policy
Threat Awareness
Cyberattack
Password Reuse
Vulnerability
Availability
Dark web