Scam/ HoaxCyberattackPasswordReuseDarkwebVirusSoftware/OSupdatesSocialEngineeringMalwareSecurePhonesPasswordPolicyPersonallyidentifiableinformation(PII)VulnerabilityClearDeskExploitMulti-factorauthentication(MFA)IntegrityAwarenessBaitingScreenlockpolicyIncidentReportingISO27001 AvailabilityRansomwareZero-dayHumanweaknessesThreatAwarenessPhishingDataBreachCompromiseISMSTrainingUSBHoneypotsEncryptionScam/ HoaxCyberattackPasswordReuseDarkwebVirusSoftware/OSupdatesSocialEngineeringMalwareSecurePhonesPasswordPolicyPersonallyidentifiableinformation(PII)VulnerabilityClearDeskExploitMulti-factorauthentication(MFA)IntegrityAwarenessBaitingScreenlockpolicyIncidentReportingISO27001 AvailabilityRansomwareZero-dayHumanweaknessesThreatAwarenessPhishingDataBreachCompromiseISMSTrainingUSBHoneypotsEncryption

Information Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
  1. Scam / Hoax
  2. Cyberattack
  3. Password Reuse
  4. Dark web
  5. Virus
  6. Software/OS updates
  7. Social Engineering
  8. Malware
  9. Secure Phones
  10. Password Policy
  11. Personally identifiable information (PII)
  12. Vulnerability
  13. Clear Desk
  14. Exploit
  15. Multi-factor authentication (MFA)
  16. Integrity
  17. Awareness
  18. Baiting
  19. Screen lock policy
  20. Incident Reporting
  21. ISO 27001
  22. Availability
  23. Ransomware
  24. Zero-day
  25. Human weaknesses
  26. Threat Awareness
  27. Phishing
  28. Data Breach
  29. Compromise
  30. ISMS Training
  31. USB Honeypots
  32. Encryption