DataBreachISO27001 Virus Scam/ HoaxAvailabilityClearDeskSocialEngineeringBaitingISMSTrainingSecurePhonesPhishingIncidentReportingPasswordReuseHumanweaknessesPasswordPolicyEncryptionPersonallyidentifiableinformation(PII)MalwareIntegrityScreenlockpolicyZero-dayCompromiseRansomwareDarkwebExploitThreatAwarenessUSBHoneypotsCyberattackAwarenessVulnerabilityMulti-factorauthentication(MFA)Software/OSupdatesDataBreachISO27001 VirusScam/ HoaxAvailabilityClearDeskSocialEngineeringBaitingISMSTrainingSecurePhonesPhishingIncidentReportingPasswordReuseHumanweaknessesPasswordPolicyEncryptionPersonallyidentifiableinformation(PII)MalwareIntegrityScreenlockpolicyZero-dayCompromiseRansomwareDarkwebExploitThreatAwarenessUSBHoneypotsCyberattackAwarenessVulnerabilityMulti-factorauthentication(MFA)Software/OSupdates

Information Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
  1. Data Breach
  2. ISO 27001
  3. Virus
  4. Scam / Hoax
  5. Availability
  6. Clear Desk
  7. Social Engineering
  8. Baiting
  9. ISMS Training
  10. Secure Phones
  11. Phishing
  12. Incident Reporting
  13. Password Reuse
  14. Human weaknesses
  15. Password Policy
  16. Encryption
  17. Personally identifiable information (PII)
  18. Malware
  19. Integrity
  20. Screen lock policy
  21. Zero-day
  22. Compromise
  23. Ransomware
  24. Dark web
  25. Exploit
  26. Threat Awareness
  27. USB Honeypots
  28. Cyberattack
  29. Awareness
  30. Vulnerability
  31. Multi-factor authentication (MFA)
  32. Software/OS updates