Multi-factorauthentication(MFA)MalwareIntegrityVirusCyberattackVulnerabilityScreenlockpolicySoftware/OSupdatesDataBreachPasswordReuseZero-dayRansomwareHumanweaknessesIncidentReportingPasswordPolicyExploitThreatAwarenessISO27001 AwarenessPhishing Scam/ HoaxSocialEngineeringPersonallyidentifiableinformation(PII)CompromiseDarkwebISMSTrainingBaitingEncryptionSecurePhonesUSBHoneypotsAvailabilityClearDeskMulti-factorauthentication(MFA)MalwareIntegrityVirusCyberattackVulnerabilityScreenlockpolicySoftware/OSupdatesDataBreachPasswordReuseZero-dayRansomwareHumanweaknessesIncidentReportingPasswordPolicyExploitThreatAwarenessISO27001 AwarenessPhishingScam/ HoaxSocialEngineeringPersonallyidentifiableinformation(PII)CompromiseDarkwebISMSTrainingBaitingEncryptionSecurePhonesUSBHoneypotsAvailabilityClearDesk

Information Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
  1. Multi-factor authentication (MFA)
  2. Malware
  3. Integrity
  4. Virus
  5. Cyberattack
  6. Vulnerability
  7. Screen lock policy
  8. Software/OS updates
  9. Data Breach
  10. Password Reuse
  11. Zero-day
  12. Ransomware
  13. Human weaknesses
  14. Incident Reporting
  15. Password Policy
  16. Exploit
  17. Threat Awareness
  18. ISO 27001
  19. Awareness
  20. Phishing
  21. Scam / Hoax
  22. Social Engineering
  23. Personally identifiable information (PII)
  24. Compromise
  25. Dark web
  26. ISMS Training
  27. Baiting
  28. Encryption
  29. Secure Phones
  30. USB Honeypots
  31. Availability
  32. Clear Desk