Multi-factor authentication (MFA) Malware Integrity Virus Cyberattack Vulnerability Screen lock policy Software/OS updates Data Breach Password Reuse Zero- day Ransomware Human weaknesses Incident Reporting Password Policy Exploit Threat Awareness ISO 27001 Awareness Phishing
Scam / Hoax Social Engineering Personally identifiable information (PII) Compromise Dark web ISMS Training Baiting Encryption Secure Phones USB Honeypots Availability Clear Desk Multi-factor authentication (MFA) Malware Integrity Virus Cyberattack Vulnerability Screen lock policy Software/OS updates Data Breach Password Reuse Zero- day Ransomware Human weaknesses Incident Reporting Password Policy Exploit Threat Awareness ISO 27001 Awareness Phishing Scam / Hoax Social Engineering Personally identifiable information (PII) Compromise Dark web ISMS Training Baiting Encryption Secure Phones USB Honeypots Availability Clear Desk
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Multi-factor authentication (MFA)
Malware
Integrity
Virus
Cyberattack
Vulnerability
Screen lock policy
Software/OS updates
Data Breach
Password Reuse
Zero-day
Ransomware
Human weaknesses
Incident Reporting
Password Policy
Exploit
Threat Awareness
ISO 27001
Awareness
Phishing
Scam / Hoax
Social Engineering
Personally identifiable information (PII)
Compromise
Dark web
ISMS Training
Baiting
Encryption
Secure Phones
USB Honeypots
Availability
Clear Desk