VPN Secure Email Recover Spear Phishing Malware Identify Data Discovery Two-Factor Authentication Types of Hackers Phishing Least Privilege Secure Password SSL Decrypt Protect Advanced Persistent Threat Respond Detect Asset Management Security Awareness Training Firewall Antivirus PassPhase Patch Management Risk Assessment VPN Secure Email Recover Spear Phishing Malware Identify Data Discovery Two-Factor Authentication Types of Hackers Phishing Least Privilege Secure Password SSL Decrypt Protect Advanced Persistent Threat Respond Detect Asset Management Security Awareness Training Firewall Antivirus PassPhase Patch Management Risk Assessment
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
B-VPN
N-Secure Email
O-Recover
I-Spear Phishing
G-Malware
G-Identify
O-Data Discovery
O-Two-Factor Authentication
B-Types of Hackers
I-Phishing
O-Least Privilege
I-Secure Password
B-SSL Decrypt
G-Protect
N-Advanced Persistent Threat
G-Respond
O-Detect
N-Asset Management
I-Security Awareness Training
B-Firewall
N-Antivirus
B-PassPhase
G-Patch Management
I-Risk Assessment