Integrity ISO 27001 Password Reuse Compromise Threat Awareness Availability Phishing Data Breach Social Engineering Screen lock policy Awareness
Scam / Hoax Incident Reporting Clear Desk Virus Malware Human weaknesses Encryption Multi-factor authentication (MFA) Baiting Vulnerability Password Policy Zero- day Exploit Software/OS updates Ransomware USB Honeypots Dark web ISMS Training Cyberattack Personally identifiable information (PII) Secure Phones Integrity ISO 27001 Password Reuse Compromise Threat Awareness Availability Phishing Data Breach Social Engineering Screen lock policy Awareness Scam / Hoax Incident Reporting Clear Desk Virus Malware Human weaknesses Encryption Multi-factor authentication (MFA) Baiting Vulnerability Password Policy Zero- day Exploit Software/OS updates Ransomware USB Honeypots Dark web ISMS Training Cyberattack Personally identifiable information (PII) Secure Phones
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Integrity
ISO 27001
Password Reuse
Compromise
Threat Awareness
Availability
Phishing
Data Breach
Social Engineering
Screen lock policy
Awareness
Scam / Hoax
Incident Reporting
Clear Desk
Virus
Malware
Human weaknesses
Encryption
Multi-factor authentication (MFA)
Baiting
Vulnerability
Password Policy
Zero-day
Exploit
Software/OS updates
Ransomware
USB Honeypots
Dark web
ISMS Training
Cyberattack
Personally identifiable information (PII)
Secure Phones