ScreenlockpolicySecurePhonesRansomwareEncryptionVirusAvailabilityZero-dayISMSTrainingPersonallyidentifiableinformation(PII)PasswordReusePhishingThreatAwarenessMalwareCyberattackCompromiseBaitingExploitPasswordPolicyIntegrityAwarenessDarkwebMulti-factorauthentication(MFA)USBHoneypotsHumanweaknessesSoftware/OSupdatesClearDeskSocialEngineeringISO27001  Scam/ HoaxIncidentReportingDataBreachVulnerabilityScreenlockpolicySecurePhonesRansomwareEncryptionVirusAvailabilityZero-dayISMSTrainingPersonallyidentifiableinformation(PII)PasswordReusePhishingThreatAwarenessMalwareCyberattackCompromiseBaitingExploitPasswordPolicyIntegrityAwarenessDarkwebMulti-factorauthentication(MFA)USBHoneypotsHumanweaknessesSoftware/OSupdatesClearDeskSocialEngineeringISO27001 Scam/ HoaxIncidentReportingDataBreachVulnerability

Information Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
  1. Screen lock policy
  2. Secure Phones
  3. Ransomware
  4. Encryption
  5. Virus
  6. Availability
  7. Zero-day
  8. ISMS Training
  9. Personally identifiable information (PII)
  10. Password Reuse
  11. Phishing
  12. Threat Awareness
  13. Malware
  14. Cyberattack
  15. Compromise
  16. Baiting
  17. Exploit
  18. Password Policy
  19. Integrity
  20. Awareness
  21. Dark web
  22. Multi-factor authentication (MFA)
  23. USB Honeypots
  24. Human weaknesses
  25. Software/OS updates
  26. Clear Desk
  27. Social Engineering
  28. ISO 27001
  29. Scam / Hoax
  30. Incident Reporting
  31. Data Breach
  32. Vulnerability