Identify Phishing Asset Management Recover Respond Firewall Spear Phishing Patch Management Two-Factor Authentication Data Discovery Types of Hackers Security Awareness Training Antivirus Secure Email Secure Password Least Privilege SSL Decrypt Protect PassPhase Detect Malware VPN Risk Assessment Advanced Persistent Threat Identify Phishing Asset Management Recover Respond Firewall Spear Phishing Patch Management Two-Factor Authentication Data Discovery Types of Hackers Security Awareness Training Antivirus Secure Email Secure Password Least Privilege SSL Decrypt Protect PassPhase Detect Malware VPN Risk Assessment Advanced Persistent Threat
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Identify
I-Phishing
N-Asset Management
O-Recover
G-Respond
B-Firewall
I-Spear Phishing
G-Patch Management
O-Two-Factor Authentication
O-Data Discovery
B-Types of Hackers
I-Security Awareness Training
N-Antivirus
N-Secure Email
I-Secure Password
O-Least Privilege
B-SSL Decrypt
G-Protect
B-PassPhase
O-Detect
G-Malware
B-VPN
I-Risk Assessment
N-Advanced Persistent Threat