Risk Assessment Identify Security Awareness Training Least Privilege Recover Advanced Persistent Threat SSL Decrypt Antivirus Data Discovery Secure Email Respond Secure Password Phishing VPN PassPhase Detect Spear Phishing Protect Firewall Malware Types of Hackers Asset Management Two-Factor Authentication Patch Management Risk Assessment Identify Security Awareness Training Least Privilege Recover Advanced Persistent Threat SSL Decrypt Antivirus Data Discovery Secure Email Respond Secure Password Phishing VPN PassPhase Detect Spear Phishing Protect Firewall Malware Types of Hackers Asset Management Two-Factor Authentication Patch Management
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
I-Risk Assessment
G-Identify
I-Security Awareness Training
O-Least Privilege
O-Recover
N-Advanced Persistent Threat
B-SSL Decrypt
N-Antivirus
O-Data Discovery
N-Secure Email
G-Respond
I-Secure Password
I-Phishing
B-VPN
B-PassPhase
O-Detect
I-Spear Phishing
G-Protect
B-Firewall
G-Malware
B-Types of Hackers
N-Asset Management
O-Two-Factor Authentication
G-Patch Management